1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
padilas [110]
3 years ago
11

se the following facts to assess the time-based model of security for the ABC Company; how well does the existing system protect

ABC? Assume that the best-, average-, and worst-case estimates are independent for each component of the model.The company is considering investing up to an additional $100,000 to improve its security. Given the following possibilities, which single investment would you recommend? Which combination of investments would you recommend? Explain your answer.A. An investment of $75,000 would change the estimates for protection time to 19 minutes (worst case), 23 minutes (average case), and 30 minutes (best case).B. An investment of $75,000 would change the estimates for detection time to 2 minutes (best case), 4 minutes (average case), and 7 minutes (worst case).C. An investment of $75,000 would change the estimates for response time to 3 minutes (best case), 6 minutes (average case), and 10 minutes (worst case).D. An investment of $25,000 would change the estimates for protection time to 17 minutes (worst case), 22 minutes (average case), and 28 minutes (best case).E. An investment of $25,000 would change the estimates of detection time to 4 minutes (best case), 7 minutes (average case) and 9 minutes (worst case).F. An investment of $25,000 would change the estimates for response time to 4 minutes (best case), 9 minutes (average case), and 12 minutes (worst case).
Business
1 answer:
Sedbober [7]3 years ago
7 0

Answer:

Question Completed:

Use the following facts to assess the time-based model of security for the ABC Company;  how well does the existing system protect ABC? Assume that the best-, average-,  and worst-case estimates are independent for each component of the model.

1) Estimated time that existing controls will protect the system from attack = 15  minutes (worst case), 20 minutes (average case), and 25 minutes (best case)

2) Estimated time to detect that an attack is happening = 5 minutes (best case), 8  minutes (average case) and 10 minutes (worst case)

3) Estimated time to respond (or correct) to an attack once it has been detected = 6 minutes  (best case), 14 minutes (average case), and 20 minutes (worst case)  

Current Estimate

Case                       P             D            R         Time based security(P>D+R)

Best                      25              5           6           25 > 11

Average               20              8           14           20 < 22

Worst                    15              10          20           15 < 30

Assumptions      

A) Case                       P             D            R         Time based security(P>D+R)

     Best                      30            5           6           30 > 11

     Average               23            8           14           23 > 22

     Worst                    19            10          20           19 < 30

B) Case                       P             D            R         Time based security(P>D+R)

     Best                      25            2           6           25 > 8

   Average                 20            4           14           20 > 18

    Worst                      15            7          20           15 < 27

C) Case                       P             D            R         Time based security(P>D+R)

     Best                      25             5           3           25 > 8

    Average                20              8           6           20 > 14

    Worst                    15              10          10           15 < 20

D) Case                       P             D            R         Time based security(P>D+R)

    Best                       28              5           6           28 > 11

    Average                22              8           14           22 = 22

    Worst                     17              10          20           17 < 30

E) Case                       P             D            R         Time based security(P>D+R)

     Best                      25            4           6           25 > 10

   Average                 20            7           14           20 < 21

    Worst                      15            9          20           15 < 29

F) Case                       P             D            R         Time based security(P>D+R)

     Best                      25             5           4           25 > 9

    Average                20              8           9           20 > 17

    Worst                    15              10          12           15 < 22

Explanation:

Question 1) Which single investment would you recommend?

A single investment of $75,000 in option C. This gives a margin of +17 on the best case scenario and +6 on the average case scenario and -5 on the worst case scenario, which is the best alternative on the 3 scenarios as the joint outcome is +18 (17 + 6 - 5).

Question 2) Which combination?

Note that since the total amount is $100,000, the combination would be a $75,000 and a $25,000 investment

The combination of A and F, gives the best outcome on the 3 cases in comparison to other combinations

Case                       P             D            R         Time based security(P>D+R)

 Best                      30             5           4           30 > 9

Average                 23            8           9           23 > 17

Worst                     19              10          12          19 < 22

You might be interested in
The Director of Information Technology for the city of Tampa, Florida formed a company to sell computer supplies and software. A
yanalaym [24]

Answer:

1. Recording

2. Authorization

Explanation:

Based on the scenario described above, it can be concluded that the control issue, in this case, arose because the Director had both RECORDING and AUTHORIZING duties.

This is because, for the Director of Information Technology for the city of Tampa, Florida not to have been convicted by a jury regardless of what she did, she must have followed the Segregation of Duties accordingly. This is a means of reducing the errors or fraudulent activities of employees.

And given she has a RECORD of transactions to prove her innocence and at the same time, she has AUTHORIZATION or the approval to supply the software, and hence, she is not guilty of the accusation.

3 0
3 years ago
The daily profit p in dollars of a company making tables is described by the function upper p left parenthesis x right parenthes
Assoli18 [71]

The following equation of parabola is given:

p(x)= - 5 x^2 + 240 x - 2475

where p(x) = y

This is a standard form of the parabola. We need to convert this into vertex form of equation. The equation must be in the form:

y – k = a (x – h)^2

Where h and k are the vertex of the parabola. Therefore,

y = - 5 x^2 + 240 x - 2475

y = -5 (x^2 – 48 x + 495)

Completing the square:

y = -5 (x^2 - 48 x + 495 + _) - (-5)* _

Where the value in the blank _ is = -b/2

Since b = -48        therefore,

y = -5 (x^2 – 48 x + 495 + 81) + 405

y – 405 = -5 (x^2 – 48 x + 576)

y – 405 = -5 (x – 24)^2

Therefore the vertex is at points (24, 405).

The company should make 24 tables per day to attain maximum profit.

4 0
3 years ago
Danielle has to send a message to her manager. It is taking her extra time to draft the message because of the number of edits s
alex41 [277]

The type of communication that Danielle is carrying out is written communication. She is editing the written message to be sent to her manager.

<h3>What is Written Communication?</h3>

A 'Written Communication' refers to the process of sending messages, orders, or commands in writing thru letters, circulars, manuals, reports, telegrams, workplace memos, bulletins, and many more.

It is a proper approach to conversation and is much less flexible in nature.

Therefore, The type of communication that Danielle is carrying out is written communication. She is editing the written message to be sent to her manager.

learn more about written communication here:

brainly.com/question/7562621

#SPJ1

8 0
2 years ago
Lewis Company had the following transactions involving notes payable.
Fiesta28 [93]

Answer and Explanation:

The journal entries are shown below

1. Cash Dr $50,500

        To Note payable $50,500

(Being the amount borrowed is recorded)                    

2. Cash Dr $61,200

        To Note payable $61,200

(Being the amount borrowed is recorded)          

3. Interest expense $2,020

         To Interest payable $2,020

(Being the interest expense is recorded)

The computation is shown below:

= $50,500 × 8% × 6 months ÷ 12 months

= $2,020        

4. Interest expense $612

         To Interest payable $612

(Being the interest expense is recorded)

The computation is shown below:

= $61,200 × 6% × 2 months ÷ 12 months

= $612    

5. Note payable $61,200

    Interest expense $306

   Interest payable $612

          To Cash $62,118       ($61,200 + $918)

(Being the principal and the interest is recorded)

= $61,200 × 6% × 3 months ÷ 12 months

= $2,020

5. Note payable $50,500

    Interest expense $1,010

   Interest payable $2,020

          To Cash $62,118       ($50,500 + $3,030)

(Being the principal and the interest is recorded)

= $50,500 × 8% × 9 months ÷ 12 months

= $3,030

8 0
3 years ago
Colleen Matthews had just turned 22 when her hard work finally started to pay off. Six months earlier Colleen graduated from a s
const2013 [10]

Answer:

Prosecutors of this case can use the net worth method to determine the extent these executives have been receiving  illegal incomes by computing their wealth at the beginning  and at the end of the period under investigation.

There will be an increase in the executives wealth, and since this increase cannot be traced to any legal income source, it will become taxable income, with the calculated penalties and fines.

Explanation:

The net worth method specifies that any increase in wealth, which is not traced to non-taxable sources, should be determined as a taxable income for the period under review.  Ordinarily, the net worth is the difference between assets and liabilities.  Since the executives use the money personally at their convenience, this will increase their personal wealth.

5 0
3 years ago
Other questions:
  • 1. Use the given th term rules to find given<br>sequence 3n+ 1 (5th and 7th term)​
    6·1 answer
  • If own price elasticity of demand for your market is -1.2, and your marginal cost is flat at 10, what is the optimal price for y
    10·1 answer
  • Property that has been discarded by the true owner, who has no intention of reclaiming title to is referred to as .
    5·1 answer
  • It is quite clear that Jean-Baptiste Colbert, Louis XIV’s chief accountant, was instrumental in bringing back the financial glor
    10·1 answer
  • The exit-voice-loyalty-neglect (EVLN) model Multiple Choice outlines the four consequences of emotional intelligence. is a templ
    12·1 answer
  • The placement of proof-point information on product packaging is part of which of the four ps?
    15·1 answer
  • The first electronic stock market is known as
    6·1 answer
  • During the maturity stage of the product life cycle, profit declines primarily because: Multiple Choice a) there is fierce price
    8·1 answer
  • Estelle has 30 years of experience in your field and has answered your questions giving you advice and help you make contacts sh
    5·1 answer
  • One piece of evidence suggesting that the stock market is efficient is that most individual investors cannot earn returns that b
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!