SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies

Size: px
Start display at page:

Download "SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies"

Transcription

1 SQUARE Project: Cost/Beneft Analyss Framework for Informaton Securty Improvement Projects n Small Companes System Qualty Requrements Engneerng (SQUARE) Team Nck (Nng) Xe Nancy R. Mead, Advsor Contrbutors: Peter Chen Marjon Dean Llan Lopez Don Ojoko-Adams Hasan Osman November 2004 Techncal Note CMU/SEI-2004-TN-045 Networked Systems Survvablty Program Unlmted dstrbuton subject to the copyrght.

2 Ths work s sponsored by the U.S. Department of Defense. The Software Engneerng Insttute s a federally funded research and development center sponsored by the U.S. Department of Defense. Copyrght 2004 Carnege Mellon Unversty. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks n ths report s not ntended n any way to nfrnge on the rghts of the trademark holder. Internal use. Permsson to reproduce ths document and to prepare dervatve works from ths document for nternal use s granted, provded the copyrght and No Warranty statements are ncluded wth all reproductons and dervatve works. External use. Requests for permsson to reproduce ths document or prepare dervatve works of ths document for external and commercal use should be addressed to the SEI Lcensng Agent. Ths work was created n the performance of Federal Government Contract Number F C-0003 wth Carnege Mellon Unversty for the operaton of the Software Engneerng Insttute, a federally funded research and development center. The Government of the Unted States has a royalty-free government-purpose lcense to use, duplcate, or dsclose the work, n whole or n part and n any manner, and to have or permt others to do so, for government purposes pursuant to the copyrght lcense under the clause at For nformaton about purchasng paper copes of SEI reports, please vst the publcatons porton of our Web ste (

3 Contents Abstract...v 1 Introducton The Problem A Framework for Cost/Beneft Analyss The Acme Company System Overvew Busness Goals Securty Objectves Cost/Beneft Analyss Framework Terms and Concepts Methodology Stakeholder Involvement Evaluaton Crtera Maxmzng System Value Wthn Real-Lfe Budget Constrants Cost/Beneft Analyss Framework n Practce Msuse Cases Categores of Threats Rsk Exposures Archtectural Recommendatons Polcy Recommendatons Total System Value Versus Total Implementaton Costs Beneft/Cost Rato Versus Total Implementaton Costs Total Implementaton Costs Versus Rsk Exposures Values Versus Rsk Exposures Lessons Learned Msuse Cases Estmaton of Losses Estmaton of Costs Cost Structures of Securty Improvement Projects...24 CMU/SEI-2004-TN-045

4 4.5 Values of Securty Improvement Projects Conclusons Future Work References CMU/SEI-2004-TN-045

5 Lst of Fgures Fgure 1: Categorzaton of Threats, Msuse Cases, and Incdents... 6 Fgure 2: Total System Value vs. Total Implementaton Costs Fgure 3: Beneft/Cost Rato vs. Total Implementaton Costs Fgure 4: Total Implementaton Costs vs. Rsk Exposures Fgure 5: Values vs. Rsk Exposures CMU/SEI-2004-TN-045

6 v CMU/SEI-2004-TN-045

7 Lst of Tables Table 1: Terms and Concepts Used n the Framework... 4 Table 2: Example Msuse Case Table 3: Cost Estmates for Archtectural Recommendatons Table 4: Cost Estmates for Polcy Recommendatons CMU/SEI-2004-TN-045 v

8 v CMU/SEI-2004-TN-045

9 Abstract Many companes rely on hstorcal data to buld predctablty models for cost/beneft justfcaton of future projects. Unfortunately, for small companes, whch generally do not have a process for collectng securty data, the costs and the benefts of nformaton securty mprovement projects have been very dffcult to estmate and justfy. In addton, detaled attack data are smply not avalable to be used as references n cost estmatons. Gven these dffcultes, many small companes choose to gnore entrely the securty vulnerabltes n ther systems, and many suffer the consequences of securty breaches and sgnfcant fnancal loss. Small companes that do mplement securty mprovement projects often have problems understandng the cost structures of ther mprovement ntatves and how to translate rsk exposures nto costs that can be passed on to ther customers. To deal wth the aforementoned problems, ths report descrbes a general framework for herarchcal cost/beneft analyss amed at provdng acceptable estmatons for small companes n ther nformaton securty mprovement projects. The framework classfes msuse cases nto categores of threats for whch natonally surveyed rsks and fnancal data are publcly avalable. For each category of threats, costs, benefts, baselne rsks, and resdual rsks are estmated. The framework then generates all permutatons of possble solutons and analyzes the most optmal approach to maxmze the value of securty mprovement projects. The framework analyzes the problems from fve dmensons: Total Implementaton Costs, Total System Value, Net Project Value, Beneft/Cost Rato, and Rsk Exposures. The fnal proposed system wll be derved from the comparsons of these dmensons, takng nto consderaton each company s specfc stuaton. Ths report s one of a seres of reports resultng from research conducted by the System Qualty Requrements Engneerng (SQUARE) Team as part of an ndependent research and development project of the Software Engneerng Insttute. CMU/SEI-2004-TN-045 v

10 v CMU/SEI-2004-TN-045

11 1 Introducton The purpose of a cost/beneft analyss s to provde a set of quanttatve metrcs to assst companes n ther decson makng. In nformaton securty mprovement projects, such analyss can provde nsghts about whch vulnerabltes and/or desgn flaws to fx, n what order of mportance, and for how much nvestment. By assocatng a calbrated monetary amount wth each rsk, vulnerablty, cost tem, and recommendaton, a cost/beneft analyss enables companes to compare and contrast avalable alternatves and to arrve at a sound decson wth fnancal justfcaton. 1.1 The Problem Informaton securty data has tradtonally been very dffcult to collect. In small companes, where human resources are especally scarce, the process of collectng data on the annual number of securty breaches and ther resultng fnancal losses s typcally non-exstent. Ths creates the problem that, on one hand, small companes need relable data to make good decsons, and on the other hand, they cannot have data when no one has tme to collect data. In addton, securty rsk s often an unknown quantty, because no one can predct the exact tme and methods of future securty ncdents. Busnesses can only hope to reduce rsk and potental loss by mplementng securty solutons. At a detaled level, there s often a manyto-many relatonshp between rsks and securty mprovement measures, and t s dffcult to compute the actual rsk versus the cost for each specfc msuse and attack. Wthout relable hstorcal data and/or comparable thrd-party data, small companes are usually at a loss about whether to mplement ther securty mprovement projects. Many small companes choose to gnore entrely the securty vulnerabltes n ther systems, and many suffer the consequences of securty breaches and sgnfcant fnancal loss when attacks occur. Small companes that do mplement the securty mprovement projects often have problems understandng the cost structures of ther mprovement ntatves and how to translate rsk reducton nto costs that can be passed on to ther customers. 1.2 A Framework for Cost/Beneft Analyss To deal wth the aforementoned problems, we have devsed the Cost/Beneft Analyss Framework, a general framework for herarchcal cost/beneft analyss amed at provdng acceptable estmatons for small companes n ther nformaton securty mprovement projects. The framework classfes msuse cases nto categores of threats for whch natonally surveyed rsks and fnancal data are publcly avalable. For each category of threats, costs, benefts, baselne rsks, and resdual rsks are estmated. The framework then CMU/SEI-2004-TN-045 1

12 generates all permutatons of possble solutons and analyzes the most optmal approach to maxmze the value of securty mprovement projects. The framework s descrbed n detal n Secton The Acme Company Throughout ths report we wll use the Acme Company as the alas of our real-lfe clent. The Acme Company s a small start-up software company. Its core product has attracted nterests from several large prospects. However, before deals can be sgned, these prospect companes demand that the Acme Company show them that the product s reasonably secure when deployed n large, heterogeneous enterprse envronments. Because of customer demands, the Acme Company s plannng to ntate a project to mprove the securty of ts product. Before the project s undertaken, however, ts costs must be justfed relatve to ts benefts. An applcaton of the framework to the Acme Company example s dscussed n Secton System Overvew The Acme Company s core product s a web-based n-ter asset management system wth browser clents, web servers, applcaton servers, and database components. It has an exstng clent nstallaton base. Currently t s undergong a major mgraton to a new verson. It remans to be shown whether the system can be reasonably secure when deployed n a large, heterogeneous enterprse envronment Busness Goals As wth any busness, one of the Acme Company s man objectves s to make a proft. In addton to the securty objectves presented n ths document, Acme wants to keep focus on ts busness goals of ncreasng profts and market share n the ndustry. Hence, ncorporatng securty mprovements should work n parallel wth the orgnal objectves rather than aganst them Securty Objectves The followng are Acme s securty objectves for ts asset management system. They are lsted alphabetcally. Avalablty: The busness purpose of the system can be met, and the system s accessble to those who need to use t [SANS 03]. Confdentalty: Informaton s not made avalable or dsclosed to unauthorzed ndvduals, enttes, or processes (.e., to any unauthorzed system entty) [SANS 03]. 2 CMU/SEI-2004-TN-045

13 Integrty: The system performs ts ntended functon n an unmpared manner, free from delberate or nadvertent unauthorzed manpulaton. Data n the system are not changed, destroyed, or lost n an unauthorzed or accdental manner [Allen 99]. CMU/SEI-2004-TN-045 3

14 2 Cost/Beneft Analyss Framework 2.1 Terms and Concepts Terms and concepts used n the Cost/Beneft Analyss Framework are defned n Table 1. Table 1: Terms and Concepts Used n the Framework Category of Threats Category of Preventons Baselne Rsk Bypass Rate Resdual Rsk Net Present Value (NPV) a set of related msuses and attacks that pose threats to the organzaton a set of recommendatons that suffcently mtgate a Category of Threats. A Category of Preventons has a one-to-one relatonshp wth a Category of Threats. ncdent rsk to the organzaton f no securty solutons are n place probablty that an attack wll penetrate a gven securty soluton and result n observable damage. A 100% bypass rate means the securty soluton does not stop any ncdents; a 0% bypass rate means the securty soluton stops all ncdents. 1 ncdent rsk to the organzaton f securty solutons are properly nstalled, utlzed, and montored. Resdual Rsk = Baselne Rsks x Bypass Rate. the present value of an nvestment s future net cash flow mnus the ntal nvestment 2.2 Methodology The Cost/Beneft Analyss Framework derves ts cost and beneft fgures from msuse cases and the archtectural and polcy recommendatons needed to mtgate these msuse cases. We 1 The authors gratefully acknowledge the deas expressed by Arora et al. that all securty solutons are subject to rate of falures (bypass), whch needs to be accounted for n the rsk reducton analyss. (Arora, Ashsh; Hall, Denns; Pnto, C. Arel; Ramsey, Dwayne; & Telang, Rahul. An Ounce of Preventon vs. a Pound of Cure: How Can We Measure the Value of IT Securty Solutons? Carnege Mellon CyLab, 2004.) 4 CMU/SEI-2004-TN-045

15 wll not explan n depth how to generate msuse cases and recommendatons, snce they are very company and project specfc. To llustrate our ponts, we wll show examples of msuse cases and recommendatons n Secton 3. The framework categorzes related msuses nto Categores of Threats, whch are sets of related msuses and attacks that pose threats to the organzaton. Examples of Categores of Threats nclude denal of servce, system penetraton, and sabotage of data. Categorzaton has several benefts. Frst, categores are hgh level and easy to understand by busness users. Second, categorzaton reduces the scope and the dmensons of the problem by aggregatng on top of related msuse cases, whch themselves are aggregates of ncdents. Thrd, categores are relatvely dstnct from each other. We are assumng that the effects of mtgatng rsks n one Category of Threats are neglgble to other Categores of Threats. Ths assumpton allows us to compute ndependently costs of mplementatons for each Category of Preventons wthout worryng about overlappng cardnaltes. Fnally, attack and loss data for Categores of Threats can be found n natonal surveys, whch provde reasonable estmates for small companes wthout forcng them to nvest large amounts of human resources n data collecton or research. The most dffcult problem for any small company s the lack of hstorcal data or comparable external data to base ts analyss on. Therefore, reasonable assumptons need to be made n the areas of expected probabltes and consequences when the company s subject to msuses and attacks. In most cases, even for large companes, we cannot accurately predct when and how an attack wll happen. However, these challenges can be overcome wth threat categorzaton. Annual natonal surveys have shown that over the perod of a year, Categores of Threats have average probabltes of occurrences and ranges of fnancal losses due to exposures to these Categores of Threats. Because these Categores of Threats are general and encompassng, they can be assumed to nclude most of the msuses and attacks that a small company s lkely to face. By not concentratng on each specfc msuse or attack that a company may face, small companes can avod gettng consumed by over-detaled rsk modelng that they have no resources or relable data to do. Instead, by focusng on mtgatng Categores of Threats, small companes wll have reasonable estmatons of ther expected loss f they were to take no actons aganst a set of probable msuse cases. From Categores of Threats they can quantfy and prortze sets of securty mprovement measures wth respect to ther hgh-level securty and busness goals. We call these securty mprovement measures Categores of Preventons. They have one-to-one relatonshps wth Categores of Threats. CMU/SEI-2004-TN-045 5

16 Enterprse Securty Legend Entty Connector And Category of Threats 1 Category of Threats N Or Msuse Case 1 Msuse Case S Msuse Case 1 Msuse Case T Incdent 1 Incdent Incdent 1 Incdent j Incdent 1 Incdent k Incdent 1 Incdent l Fgure 1: Categorzaton of Threats, Msuse Cases, and Incdents The framework takes fnancal and probablstc data from annual natonal surveys for each Category of Threats. The prncpal assumpton s that a small company s subject to attacks and msuses at probabltes at or near natonal average. If the company cannot provde an estmate for the expected loss when msuses happen, lower ends of natonally surveyed loss are used as cost avodance tems for mplementng securty mprovement measures. We use the lower end because small companes typcally do not have as many assets to lose as larger companes. The goal of the framework s to support better decson-makng to ensure that resources are effectvely allocated n the lfetme of the project. Typcally, a securty mprovement project runs for M number of years and there are N possble Categores of Preventons to mplement. If and only f all the archtectural and polcy recommendatons n a Category of Preventons are mplemented do we consder the rsks n ts correspondng Category of Threats mtgated; otherwse Category of Threats s consdered not to have been mtgated. Let s defne the followng: X = 1 f we are gong to mplement a Category of Preventon ( = 1, 2 N) = 0 f we are not gong to mplement a Category of Preventon ( = 1, 2 N) 6 CMU/SEI-2004-TN-045

17 Usng the aforementoned probabltes from the surveys, Margn of Safety and Rsk Exposures of a company s exstng system can be calculated. Margn of Safety s the probablty that none of the categores of threats happen at all wthn a year. Therefore, t s the accumulatve product of (1 probabltes of a Category of Threats happenng). The probablty of a Category of Threats happenng wll dffer dependng on whether the gven Category of Threats has been mtgated. When unmtgated, a partcular Category of Threats wll have Baselne Rsk (ncdent rsk to the organzaton f no securty solutons are n place) assumed at natonal average; when mtgated, the same Category of Threats wll have only Resdual Rsk, whch s the ncdent rsk to the organzaton even f securty solutons are properly nstalled, utlzed, and montored. However, even wth proper securty solutons n place, an attack stll mght penetrate the securty solutons and result n observable damage. The rate of such occurrence s thus defned as the Bypass Rate. A 100% Bypass Rate means the securty soluton does not stop any ncdents; a 0% Bypass Rate means the securty soluton stops all ncdents. For small companes, whch typcally do not have volumnous data on ther nformaton securty, a reasonable estmate of Bypass Rate can be used. Ths s the case n the Acme Company example n Secton 3. For = 1, 2.N number of possble Categores of Preventons: Resdual Rsk = Baselne Rsk x Bypass Rate Margn of Safety (1 P{ attacked } ) N = 1 N = 1 ( 1 P ) P = Baselne_R sk f X = 0 Resdual_R sk f X = 1 Example 1: Rsk Exposure = 1 Margn of Safety If a company currently has a 60% lkelhood of encounterng msuse ncdents n Category A and a 30% lkelhood of encounterng msuse ncdents n Category B, then: Baselne Rsk (A) = 60% Baselne Rsk (B) = 30% Margn of Safety = (1-60%) x (1 30%) = 28% Rsk Exposure = 1 28% = 72% when no acton s taken. CMU/SEI-2004-TN-045 7

18 Example 1, contnued: The company can take steps to mtgate Category A and/or Category B. The avalable soluton for A s hghly effectve (Bypass Rate of 5%), but the avalable soluton for B s not effectve (Bypass Rate of 70%), so: Resdual Rsk (A) = 60% * 5% = 3% Resdual Rsk (B) = 30% * 70% = 21% When steps to address both A & B are mplemented: Margn of Safety = ( 1 3% ) x (1 21%) = 77% Rsk Exposure = 1 77% = 23% The Cost/Beneft Analyss Framework employs the formula of Annualzed Loss n each category multpled by Baselne Rsk n each category to calculate the Baselne Cost n each category. The Baselne Cost s the amount n dollars that an organzaton s expected to lose by takng no acton aganst a Category of Threats. The Annualzed Loss s then used to derve the Tangble Benefts n the Benefts secton (cost avodance) of the recommendatons for each category, f the recommendatons were to be mplemented. The cost avoded by mplementng the securty solutons s the amount n dollars reduced from the total possble loss by the effectveness of the securty solutons. The effectveness of a securty soluton s essentally the amount of rsk reducton a Category of Preventons can acheve. Annualzed Loss (AL) = Surveyed_Average f no data avalable Avg_Incde nt_loss Est_Frequency f data or estmaton avalable Baselne Cost Resdual Cost = Baselne_R sk AL = Resdual_R sk AL = Baselne_R sk Bypass_Rate Tangble Beneft = 0 f X = 0 Baselne_Cost Resdual_Cost f X = 1 Intangble Beneft = 0 f X = 0 Custom_Ben eft f X = 1 AL 8 CMU/SEI-2004-TN-045

19 Total Benefts = = N = 1 N = 1 Tangble_B eneft + N = 1 (AL Baselne_Rsk X Intangble_Beneft (1 Bypass_Rate )) + N = 1 (X Custom_Beneft ) Example 2: If the company loses $50,000 for each msuse ncdent n Category A and there are 10 ncdents per year n Category A, and the company loses $100,000 for each msuse ncdent n Category B and there are 2 ncdents per year n Category B: Annualzed Loss (A) = $50,000 x 10 = $500,000 Annualzed Loss (B) = $100,000 x 2 = $200,000 Usng fgures from Example 1: Baselne Cost (A) = $500,000 x 60% = $300,000 Resdual Cost (A) = $500,000 x 3% = $15,000 Baselne Cost (B) = $200,000 x 30% = $60,000 Resdual Cost (B) = $200,000 x 21% = $42,000 Tangble Beneft (for mtgatng A) = $300,000 - $15,000 = $285,000 Tangble Beneft (for mtgatng B) = $60,000 - $42,000 = $18,000 Suppose that the company can get a $50,000 government award for havng effectvely guarded aganst msuses n Category A, then: Intangble Beneft (for mtgatng A) = $50,000 Intangble Beneft (for mtgatng B) = $0 Total Benefts = ($285,000 + $18,000 ) + ($50,000 + $0) = $353,000 Wth stakeholders feedback, msuse cases n each Category of Threats can be dentfed as hgh, medum, or low n prorty. We found that small companes typcally wll only have the resources to mtgate hgh-prorty msuse cases. Gven such constrants, t s mportant to note that msuses and attacks wth low to medum rsk can stll occur. Therefore, the Bypass Rate shall not be too low when medum- and low-prorty rsks have not been mtgated. The recommendatons that correspond to hgh-prorty msuse cases are used n the calculatons of the Cost/Beneft Analyss Framework. Cost Avodance s used as the beneft for each Category of Preventons. If there are any other ntangble benefts, they should be ncluded as well. Costs of mplementaton for each recommendaton need to be estmated, checked wth stakeholders, and then adjusted based on ther feedback. Total System Value, Total CMU/SEI-2004-TN-045 9

20 Implementaton Costs, Net Project Value, and Beneft/Cost Rato (B/C) are then calculated. For more detals, see Secton 2.4, Evaluaton Crtera. 2.3 Stakeholder Involvement Stakeholders must be regularly nvolved n ths Cost/Beneft Analyss Framework to ensure reasonably accurate results, especally durng the msuse case dentfcaton phase and the cost estmaton phase for mplementng recommendatons. After the stakeholders reply wth ther feedback and suggestons for change, cost/beneft calculatons should be updated and mproved on n a reteratve process over a span of several weeks. Small companes probably do not have months of tme to analyze a project. Therefore, we recommend that the Cost/Beneft Analyss be done wth an exstng set of templates nstead of renventng the wheel. Also, t s mportant to keep n mnd that the proposed system and alternatves may change, dependng on a company s nternal assessment of ts assets, vulnerabltes, development tmeframes, and rsks and ther assocated costs, among other varables. 2.4 Evaluaton Crtera The crtera for evaluatng alternatves are based on fve key metrcs: Total Implementaton Costs, Net Project Value, Total System Value, Beneft/Cost Rato, and Rsk Exposures. These fve crtera serve dfferent purposes. Total Implementaton Costs can help small companes make decsons as to how much money they can spend wthout jeopardzng growth n other areas of need. Net Project Value demonstrates the extent to whch a partcular securty soluton can contrbute to the overall system. Total System Value takes nto consderaton the fact that unmtgated threats stll cost a company some amount of money n rsks. It accounts for scenaros where the Net Project Value s hgh whle the overall value of the system s low because the soluton dd not address costly threats. A postve Net Project Value s a strong key ndcator that the soluton s worthwhle to mplement; a large Total System Value suggests that the system wll be mproved by mplementng the project; and a large B/C Rato relatve to other solutons ndcates that the soluton should be mplemented frst because t s more cost effectve. Combned wth Rsk Exposures after mplementng the proposed system versus mplementng alternatves, these fve crtera form the bass of correlaton between benefts of desred securty mprovement, costs wthn avalable fscal budget, and tolerance of acceptable Rsk Exposures. The proposed system and the alternatves wll be chosen from a fnte set of possble solutons that small companes may wsh to mplement or gnore, based on comparng and analyzng present values of these metrcs. Let s assume that Categores of Preventons have the followng characterstcs, whch we can calculate by dong a cost/beneft spreadsheet on each category. All values are NPV. 10 CMU/SEI-2004-TN-045

21 Category of Preventons ( P ) Baselne Cost A ) f X = 0 ( Resdual Cost R ) f X = 1 ( Implementaton Cost C ) f X = 1 ( 1 A 1 R 1 C 1 2 A 2 R 2 C 2 N A N R N C N Total Implementaton Costs Total Implementaton Costs are the present value costs calculated over the length of the project. Because there mght be overlappng n costs of mplementng archtectural and polcy recommendatons when some recommendatons (e.g., good password management) may be necessary to mtgate multple Categores of Threats, total mplementaton costs are the sum of all present value costs of mplementaton mnus any overlappng costs. Total Implementaton Costs N = = 1 j= 1 k= j+ 1 N N ( C X ) Overlap _ Cost X X jk j k Net Project Value Net Project Value s the present value of savngs (loss) from the total benefts of mplementng recommendatons mnus total costs of mplementng recommendatons. It demonstrates the value that the project can delver to the overall system. The hgher the Net Project Value s, the better. Net Project Value (NV) = Total Benefts Total Implementaton Costs Total System Value Total System Value s the present value of Net Project Value mnus the present value of expected loss from unmtgated threats. It takes nto consderaton that unmtgated threats stll cost companes some amount of money n rsks. If a Category of Threats s mtgated, then ts Resdual Cost s used; otherwse ts Baselne Cost s used. Total System Value accounts for scenaros where the Net Project Value s hgh whle the overall value of the system s low because the soluton dd not address costly threats. It evaluates the system s overall value after mplementng the project and provdes hgh-level gudance to the busness objectve beyond the project tself. The hgher the Total System Value s, the better. Total System Value (TV) = Net Project Value - costs of unmtgated rsks N N = Net Project Value ( X R + ( 1 X ) A ) Theoretcally the hgher TV s, the better; but t needs to be taken nto consderaton wth Rsk Exposures and other company-specfc factors. Because X s ether 0 or 1 (2 choces) and = 1 = 1 CMU/SEI-2004-TN

22 there are N categores, there are 2 N possble solutons. For small N ths can be easly calculated va a computer program (e.g., Mcrosoft Excel), whch s the case n the Acme Company example. In fact, ths s where categorzaton helps out small companes n terms of estmaton efforts because t reduces the sze of N. Beneft/Cost Rato (B/C) Beneft/Cost Rato pertans to the rato between the net beneft n mplementng a securty soluton and the costs of mplementaton. It demonstrates the capablty for the organzaton to proft (cost savngs) from ts securty nvestments. The hgher the B/C Rato, the better an nvestment s. BC = Total_Benefts Total_Implementaton_Costs Example 3: If t costs $200,000 to mplement solutons for A and $150,000 to mplement solutons for B, wth $40,000 of overlappng hardware costs, then: Total Benefts = $335,000 (from Example 2) Resdual Costs (A) = $15,000 (from Example 1) Resdual Costs (B) = $42,000 (from Example 1) Total Implementaton Costs = $200,000 + $150,000 - $40,000 = $310,000 Net Project Value = $335,000 - $310,000 = $25,000 Total System Value = $25,000 ($15,000 + $42,000) = -$32,000 Beneft/Cost Rato = $335,000/$310,000 = 108% 2.5 Maxmzng System Value Wthn Real-Lfe Budget Constrants We have untl now presented a framework that analyzes the proposed system versus the alternatves assumng that there are no lmts and no varatons to yearly budgets. For the sake of convenence, we assumed that the budget s gong to be so large that these varables could be gnored. However, we know from real-lfe experence that ths s often not the case, especally n small companes where captal s at a premum. Companes wth lttle ntal budgets and large future budgets wll make ther decsons sgnfcantly dfferent from companes that have large ntal budgets but lttle future budgets. In such cases, to deal wth real-lfe budget constrants, we must fnd a lnear soluton n whch all constrants are lnear functons of the decson varables. Some or all of the decson varables must have nteger values (0 or 1, do or not do). In mathematcs terms, the model to solve these knds of problems s called Integer Model [Camm 00]. We are able to do so because decsons to mplement Categores of Preventons are essentally concrete (yes/no), and the optons come from a fnte set of Categores of Preventons that are suffcently dstnct from each other. 12 CMU/SEI-2004-TN-045

23 Back to the problem, there are N possble Categores of Preventons to mplement, each of whch runs for M number of years, wth the followng Total System Values and yearly mplementaton costs. Category of Preventons ( P ) 1 2 N Implementaton Cost ( C t ) f X = 1 Y 0 Y 1 C C C Y M C 1 M C C 2 M C N 0 C N1 C NM And we have avalable budget for each year: B 0, B 1, budget. B M, wth B 0 beng the ntal Now we have to decde whch set of Categores of Preventons to mplement n order to maxmze our returns wthn the budget constrants. We know that yearly costs for mplementatons must also be wthn the yearly budget. The constrants for the Lnear Model problem are then the lnear sum of mplementaton costs for each category. If a Category of Preventons was mplemented, then t would contrbute ts cost aganst the budget; otherwse t wll count as 0. N =1 C t X B t or (t=0, 1, 2 M) C 10 X 1 + C20 X C N 0 X N B0 11 X 1 + C21 X CN1 X N B1 (year 0) C (year 1). C1 X 1 + C2 X C X B (year M) M M NM N There could be Z number of solutons to ths set of equatons, where Z s less than or equal to 2 N. We can exhaustvely apply every set of possble ( X 1, X 2 M X N ) values to calculate fnancally feasble solutons under the budget constrant. In fact, n most cases we expect the exhaustve method to be used because t s easy to understand and easy to calculate when N s not too large. However, should there be a stuaton where N s very large, the Branch and Bound method may be used. Brand and Bound s an algorthmc technque to fnd the optmal soluton by keepng the best soluton found so far [NIST 04]. In the Brand and Bound method, f a partal soluton cannot mprove on the best value, t s abandoned. The method systematcally enumerates a fracton of feasble solutons, whle stll guaranteeng CMU/SEI-2004-TN

24 that the most optmal nteger soluton s found. Several commercally avalable software packages support the Brand and Bound method, ncludng Mcrosoft Excel. In the end, we should get a set of TV values and a set of ( X 1, X 2 X N ), from whch we derve the proposed system and possble alternatves. When we analyze them wth ther assocated Beneft/Cost Rato and Rsk Exposures, we can fnd the best paths to take for nformaton securty mprovement projects n small companes. 14 CMU/SEI-2004-TN-045

25 3 Cost/Beneft Analyss Framework n Practce The Cost/Beneft Analyss Framework s appled on the Acme Company to help t determne how to meet ts securty and busness objectves at the same tme wthn reasonable costs. 3.1 Msuse Cases Before the cost/beneft analyss can be done, msuse cases must be dentfed n order to accurately access the mpact of msuses when they happen. Ths report wll not go nto detal about how these msuse cases are generated. The msuse case documentaton shown n Table 2 s provded as an example of the level of detal msuse cases need n order to derve comprehensve archtectural recommendatons and polcy recommendatons. Attack trees for msuse cases may also be used to ensure that the lst of archtectural and polcy recommendatons s complete. Table 2: Example Msuse Case Number: MC-xx Name: Users gan sys admn rghts on the server (elevaton of prvleges). Scope: User Authorzaton Concerns Prorty: Low Medum x Hgh Deployment Envronment: Ms-actors: Access Rght Levels: x Intranet Extranet/Internet Users Low-Level System User x Medum-Level System User x Hgh-Level System User Sys-Admn-Level System User x Other Network User Pont of Entry: Network x Host Applcaton Securty Attrbutes affected: Descrpton: Sophstcaton: Pre-condtons: Assumptons: Post-condtons: x Confdentalty x Integrty Avalablty A user attempts to gan sys admn rghts on the server and succeeds. Low Medum x Hgh The user has unntended logon rghts to the Wndows 2003 server. The user s not already a sys admn. The user does not have expressed permsson to gan sys admn rghts. Worst Case Threat: Wanted Preventon Guarantee: The user gans sys admn rghts on the server and then tampers wth system and/or user data. Hs/her actons are never caught. Enforce machne access control lst (ACL) securty polcy (role-based user authentcaton). CMU/SEI-2004-TN

26 Potental Msactor Profles: Stakeholders and Threats: Related Use Cases: Related Threats: Archtectural Recommendaton: Polcy Recommendaton: Wanted Detecton Guarantee: Wanted Recovery Guarantee: Hghly sklled users wth hgh crmnal ntent. Logon attempts are logged and vewed by system admnstrators. Remove users unauthorzed logon rghts on the server. Acme Company s clent: loss of data ntegrty and/or confdentalty Acme Company: loss of reputaton, loss of current and potental clents UC-06, UC-07, UC-08 Elevaton of prvleges, unauthorzed access to admnstraton nterfaces, unauthorzed access to confguraton stores Store audt nformaton n a separate locaton from the servers and the workstatons. Implement a strong role-based authentcaton control. Patch applcatons and operatng systems routnely (bmonthly). Ensure that users do not have rghts or access levels beyond those prescrbed by ther job responsbltes. Revew audt nformaton routnely (monthly). Store and cross-revew confguraton changes (monthly). Enforce strong password polces. Password protect any necessary shared documents. Requre users to change ther passwords perodcally (monthly). Perodcally revew user actvtes (bmonthly). Requre users to log out of the system or close ther browser as soon as ther actvtes are done. Requre users never to reveal ther account names and passwords. Perform routne system and data backup (weekly). 3.2 Categores of Threats The Cost/Beneft Analyss Framework categorzes all msuse cases nto seven Categores of Threats: Denal of Servce System Penetraton Sabotage of Data Theft of Propretary Info Unauthorzed Access by Insders Vrus Actve Wretappng [Rchardson 03] Fnancal and probablstc data are avalable for these categores from the 2003 CSI/FBI Computer Crme and Securty Survey [Rchardson 03]. Gven that the Acme Company had not pad much attenton to ts own securty efforts up to ths pont n tme, we assumed that Acme wll have Baselne Rsks at or near natonal average wthn each Category of Threats. The lower end of reported losses s ntally used as the estmate of Annualzed Loss f attacks were successful n achevng observable damages. Later the Acme Company performs an nternal estmaton and determnes a more precse set of fnancal numbers that get ncorporated n the analyss nstead. 16 CMU/SEI-2004-TN-045

27 3.3 Rsk Exposures The cost/beneft analyss assumes that the Bypass Rate s approxmately 10%. Subsequent calculatons show that when none of the seven Categores of Threats are mtgated, the Acme Company s core product s Rsk Exposures to some combnaton of msuses are above 90%. Because the probablty of msuses/attacks s very hgh, the cost/beneft analyss s needed n order to manage and mtgate the company s Rsk Exposures for ts core product. 3.4 Archtectural Recommendatons From our work, we have dscovered that archtectural recommendatons tend to have costs that are heavly front-loaded (e.g., ntal mplementaton costs). It ntutvely makes sense because archtectural mprovements need to be mplemented, tested, and deployed before benefts can be realzed over the lfetme of a project. The Acme Company prefers to vew the costs of mplementaton n terms of man-hours of effort. We have no objectons to ths method of evaluaton. In fact, we would recommend the man-hour estmaton method to our future clents because t s a standard way of makng engneerng estmates. We can then multply man-hours wth average hourly wage rates to arrve at a good estmaton of total costs. Other than costs of salares, there are mantenance costs (also calculated va manhours), thrd-party software costs, and hardware costs. Table 3 shows the format we used to break down the types of costs that archtectural recommendatons have. Table 3: Cost Estmates for Archtectural Recommendatons Archtectural No. Recommendaton AR-01 All shared drves on the network should enforce authentcaton polces. AR-02 Antvrus software s nstalled on the server. Related Msuse Cases Mant. Cost ($/ year) Software Cost [Type]/($) Hardware Cost [Type]/ ($) Category of Implementaton Prorty Threat Cost ($/ year) MC-01 Hgh U $xxx $xxx $xxx $xxx MC-17 Hgh V $xxx $xxx $xxx $xxx 3.5 Polcy Recommendatons Polcy recommendatons tend to recur over the lfetme of the project. The cost of tranng and the cost of enforcement are dffcult to quantfy on the macro level. However, the feedback we ganed from the Acme Company s that t s much easer to vsualze the efforts n terms of man-hours per user per year. The total costs can then be calculated by multplyng man-hours per user per year wth an estmated number of users and wth average hourly wage rates. Table 4 shows the format we used to break down the types of costs that polcy recommendatons have. CMU/SEI-2004-TN

28 Table 4: Cost Estmates for Polcy Recommendatons No. Polcy Recommendaton PR-01 All nstallaton must be approved and revewed by managers. PR-02 Applcatons and operatng systems must be patched routnely (bmonthly). Related Msuse Cases MC-13, MC-15 MC-01, MC-03, MC-13, MC-15, MC-16, MC-17, MC-18, MC-19, MC-20, MC-21, MC-22 Prorty Category of Threat Tranng Cost ($) Enforcement Cost ($) Other Costs [Type]/ ($) Hgh U, W $xxx $xxx Name/$xxx Hgh U, P $xxx $xxx Name/$xxx 3.6 Total System Value Versus Total Implementaton Costs The Total System Value vs. Total Implementaton Costs graph n Fgure 2 shows us there are optmal and non-optmal solutons among the securty solutons that the Acme Company may choose to mplement. The solutons wth hgher Total System Value are better solutons. The four colored boxes (solutons) are better solutons wthn ther respectve cost ranges because they have the hghest Total System Value compared to other solutons on the same vertcal lnes n the graph. The pnk soluton represents the Total System Value of the current system. It has zero total mplementaton costs. The Blue soluton (Alternatve 2) represents the total value of the system when every archtectural and polcy recommendaton has been mplemented. The brown soluton (Alternatve 1) and the red soluton (Proposed System) have the hghest Total System Value, meanng that by mplementng ether one the Acme Company can obtan the best value for ts system over the next three years of project lfetme. From a strctly fnancal perspectve, solutons wth hgher Total System Value and lower Total Implementaton Costs are preferred. Therefore, the graph suggests that Alternatve 1 s a better soluton than the Proposed System or Alternatve 2. However, t s not mmedately apparent from ths vew the extent to whch Rsk Exposures are reduced. We shall examne Rsk Exposures n later sectons. It s worth notng, however, that Alternatve 1 s a subset of the Proposed System. 18 CMU/SEI-2004-TN-045

29 Total System Value vs. Total Implementaton Costs $0 A1 PS $0 $50,000 $100,000 $150,000 $200,000 $250,000 ($50,000) ($100,000) CS ($150,000) A2 Total Value of System Poly. (Total Value of System) ($200,000) Legend Proposed System ($250,000) Alternatve 1 Alternatve 2 ($300,000) Current System ($350,000) Total Implementaton Costs Fgure 2: Total System Value vs. Total Implementaton Costs 3.7 Beneft/Cost Rato Versus Total Implementaton Costs How effectve are the solutons n delverng results? Beneft/Cost Rato gves us the trend pattern when compared aganst the Total Implementaton Costs. From the graph, B/C Rato brefly ncreases before droppng as costs of mplementng securty recommendatons go up. Small companes often gan sgnfcant benefts by mplementng a small set of selected securty mprovement recommendatons but then lose the benefts when they start to mplement addtonal securty solutons. The Beneft/Cost Rato vs. Total Implementaton Costs graph n Fgure 3 suggests that there are hghly cost-effectve securty solutons that should be mplemented frst. The Current System s not present on ths graph because there s no mplementaton cost nvolved wth takng no acton. Smlar to the Total System Value vs. Total Implementaton Costs graph, the three solutons wth hgher Total System Value are more cost effectve when compared aganst other securty solutons that have the same mplementaton cost. Alternatve 1 appears to be more cost effectve than the red or blue soluton. However, when compared to the prevous graph, we note that Alternatve 1 and the Recommendaton have the same total value. Ths suggests that the addtonal nvestment wth the Recommendaton mtgates the cost of addtonal rsk at or near 100% Beneft/Cost Rato, whch s the case when we see that the Recommendaton has approxmately 100% Beneft/Cost Rato. The trend lne also suggests that f the Acme Company nvests more resources to become more secure, ts return on the nvestment wll declne precptously. Wthout ntangble benefts such as new CMU/SEI-2004-TN

30 revenue opportuntes, large nvestments assocated wth makng many securty mprovements are probably dffcult to justfy beyond an acceptable level of rsk tolerance. Beneft/Cost Rato vs. Total Implementaton Costs % A % PS 80.00% A2 BC Rato Poly. (BC Rato) 60.00% Legend 40.00% Proposed System Alternatve % Alternatve 2 Current System 0.00% $0 $50,000 $100,000 $150,000 $200,000 $250,000 $300,000 Total Implementaton Costs Fgure 3: Beneft/Cost Rato vs. Total Implementaton Costs 3.8 Total Implementaton Costs Versus Rsk Exposures The Total Implementaton Costs vs. Rsk Exposures graph n Fgure 4 shows us that ntally securty mprovements can be costly. Securty mprovements may be best when done together wth mplementng multple Categores of Preventons. The solutons that mtgate more rsks wth lower costs are better solutons. There are several thngs to be notced wth the graph. Frst, costs go up when Rsk Exposures go down, whch s to be expected. Second, the smallest Rsk Exposure s not near zero. Ths s due to the fact that a small company such as the Acme Company may not have the resources to mplement and enforce every sngle recommendaton. Therefore, ts Bypass Rates and Resdual Rsks for securty breaches are stll hgh, whch causes ts Rsk Exposures to be hgh. More detaled studes are warranted f the Acme Company needs to reduce ts rsk exposures further. However, from the trend projecton, we can see that the cost goes up sgnfcantly as Rsk Exposures become smaller and smaller. It s an ndcaton that the costs needed to cover edge scenaros may be very expensve and may only be justfed wth large ncreases n the benefts (such as new revenue opportuntes) that addtonal securty mprovements would brng. 20 CMU/SEI-2004-TN-045

31 The varance around the trend lne s extremely hgh when rsks are not mtgated. Ths suggests a few possble scenaros. Frst, there are Categores of Threats wth low rates of return and hgh costs to fx. Therefore, they should only be mplemented after other categores wth hgher Beneft/Cost Rato. Second, strateges that focus on mtgatng only very small number of Categores of Threats may be nether cost effectve nor rsk averse. $600,000 Total Implementaton Costs vs. Rsk Exposures $500,000 $400,000 Total Implementaton Costs Log. (Total Implementaton Costs) $300,000 Legend Proposed System $200,000 A2 Alternatve 1 Alternatve 2 $100,000 PS A1 Current System $0 CS 0.00% 20.00% 40.00% 60.00% 80.00% % % Rsk Exposures Fgure 4: Total Implementaton Costs vs. Rsk Exposures 3.9 Values Versus Rsk Exposures The Values vs. Rsk Exposures graph n Fgure 5 shows us what happens when Rsk Exposures are taken nto consderaton. The graph shows the relatonshps between Net Project Value, Total System Value, and Rsk Exposures. The gap between Total System Value and Net Project Value represents the amount of costs n unmtgated rsks the Acme Company s subject to wth respect to each possble soluton. Because costs of unmtgated rsks are the product of multplyng probabltes of occurrence by Annualzed Loss (when msuses happen), they are essentally approxmatons of costs of uncertanty. The hgher Rsk Exposures are, the hgher the uncertanty and volatlty s. As Rsk Exposures decrease, gaps become smaller and Total System Value becomes more predctable. Therefore, the Proposed System s a much more rsk-averse soluton that delvers the same results when compared to Alternatve 1. So t s a better soluton, wth same Total System Value, less volatlty, hgher predctablty, and smaller Rsk Exposures. Furthermore, the dotted lne of Total System Value w/o Resdual Costs s shown to demonstrate the extent to whch Resdual Rsks can have an affect on the Total System Value. CMU/SEI-2004-TN

32 When securty solutons are hghly effectve (.e., Bypass Rate s small), the gap between the two Total System Values wll be small; otherwse the gap wll be large. The gap between the two Total System Values represents the costs of the Resdual Rsks that the project s avalable securty solutons cannot mtgate. In order to reduce the Resdual Costs, the Acme Company needs to consder mplementng medum- and low-prorty recommendatons. Values vs. Rsk Exposures $40,000 $20,000 A1 PS CS $0 0.00% 20.00% 40.00% 60.00% 80.00% % % ($20,000) PS A1 "Total System Value" ($40,000) ($60,000) ($80,000) ($100,000) ($120,000) ($140,000) ($160,000) A2 CS Legend "Net Present Value of Project" Total System Value w/o Resdual Costs Proposed System Alternatve 1 Alternatve 2 Current System ($180,000) Rsk Exposures Fgure 5: Values vs. Rsk Exposures 22 CMU/SEI-2004-TN-045

33 4 Lessons Learned 4.1 Msuse Cases The Cost/Beneft Analyss Framework s bult on msuse cases. Even though the generaton and valdaton of msuse cases are not dscussed n ths report, the comprehensveness of msuse cases wll drectly mpact the accuracy of the results n the cost/beneft analyss. We have dscovered that a cost/beneft analyss contrbutes to more clarfcaton and better understandng of the project s msuse cases. The average probabltes of occurrence and expected loss gve nsghts nto the prortzaton of msuse cases when costs of rsks are ranked. In addton, t provdes quantfable mappng from descrptons to mplementaton choces for archtectural and polcy recommendatons. Understandng man-hour and captal expendture requrements helps stakeholders plan the project wth respect to ther stuatons. 4.2 Estmaton of Losses The framework ntally used estmated cost fgures from the lower end of natonally surveyed losses for each Category of Threats. Later on, we worked wth the Acme Company to come up wth a set of loss fgures for each msuse case per ncdent. We multpled estmated frequences (per year) by estmated ncdent losses (for all msuse cases n a category) to derve the Annualzed Loss for each Category of Threats. Through ths process we found that Lower ends of natonally surveyed losses may be used as estmatons for tangble losses (productvty loss, fxng cost, etc.). Surveyed losses cannot suffcently account for ntangble losses (loss of reputaton, loss of confdental data, etc.), snce these values are hghly company and project specfc. Intangble losses often exceed tangble losses for many Categores of Threats. For small companes, loss of reputaton may be a very mportant tem of nterest, and t can contrbute sgnfcantly to ntangble losses. Therefore, for better accuracy, we hghly recommend that losses are estmated for each msuse case. 4.3 Estmaton of Costs Our experence s that the Acme Company strongly prefers the use of man-hours to estmate costs of mplementaton. Its senor techncal and project leads make effort estmatons n man-hours. The company provdes average cost fgures for employees n dfferent roles. CMU/SEI-2004-TN

34 Costs are then calculated on the number of man-hours multpled by average hourly wage rates. We found ths process of cost estmaton to be very effectve. We wll strongly recommend ths process n our future work. 4.4 Cost Structures of Securty Improvement Projects We found that the costs of ensurng polcy complance heavly domnate n the costs of mplementaton for vrtually every Category of Threats. Ths suggests that securty mprovement projects are very human-effort ntensve n ther cost structures. The costs wll be spread over the lfetme of these projects. Such costs are often seen as hdden costs that many companes tradtonally have dffcultes n quantfyng. The framework can provde sgnfcant nsght nto the hdden costs of polcy complance by examnng and then summng up the efforts for every recommendaton. However, because costs are accumulated over multple years, companes that take on securty mprovement projects need to look at ther nvestments from a long-term perspectve. The cost structures of securty mprovement projects wll be determned prmarly by the companes wllngness to nvest n ther employees on securty awareness and polcy enforcement. 4.5 Values of Securty Improvement Projects The Acme Company s most optmal Total System Value s stll negatve. There are two possble explanatons for ths phenomenon. Frst, Resdual Rsks stll cost companes a certan amount. Real-lfe experences have shown us that no securty soluton s 100% secure. Therefore, even the best effort of securty mprovement may not reduce rsks to zero. Second, securty mprovement may need to be vewed from a lose-less perspectve rather than the proft-more perspectve that typcal IT projects are judged on. Lose-less s another way of proftng by mnmzng the rsks of havng msuses and attacks. 24 CMU/SEI-2004-TN-045

35 5 Conclusons The objectve of the Cost/Beneft Analyss Framework s to provde a quantfable fnancal analyss framework that small companes can apply on ther securty mprovement projects. Wthn ths scope, we show that unmtgated rsks can be translated nto costs, and we demonstrate the estmaton methods for calculatng costs of mplementaton for archtectural and polcy recommendatons. Most mportantly, we show through the example of the Acme Company that small companes can obtan optmal results for mprovng the securty of ther systems and the optmal results can be acheved wth reasonable reductons n Rsk Exposures. The reductons n Rsk Exposures n turn enable small companes to have less volatlty n ther Total System Value. The ncrease n predctablty of results by mplementng optmal securty solutons wll enable small companes to proft from securty mprovements and to plan for future growth. CMU/SEI-2004-TN

36 6 Future Work There are several questons that drve future work on the Cost/Beneft Analyss Framework: Can the Acme Company s trend patterns be wtnessed n other small companes and ther securty mprovement projects? How would the estmate values compare to emprcal data f we were to follow through wth the Acme Company over the lfetme of ts project? Are there any other varables that we have not accounted for n the framework? If so, why do they exst and how can we account for them? What f Categores of Threats cannot be assumed to be ndependent from each other? So far we have assumed that the effects of mtgatng threats n one category are neglgble to the rsks n other categores. If ths assumpton no longer holds, how do the resultng nterdependences affect the framework? Can the framework be appled to larger companes? The overall goal of the framework s to provde a way for small companes to be able to accurately estmate the cost of ther securty mprovement projects. By ncorporatng lessons learned from the Acme Company, we wll strve n the future to refne the estmaton methods to facltate further analyss use the estmaton methods wth other companes to see f smlar trend patterns exst develop a general set of cost/beneft profles and metrcs for projects wth dfferent types of system archtectures desgn a spreadsheet to automate the cost/beneft calculatons and to select the most optmal soluton formalze the relatonshp between the fve metrcs we proposed n Secton CMU/SEI-2004-TN-045

37 References URLs are vald as of the publcaton date of ths document. [Allen 99] [Camm 00] [NIST 04] [Rchardson 03] [SANS 03] Allen, J.; Chrste, A.; Fthen, W.; McHugh, J.; Pckel, J.; & Stoner, E. State of the Practce of Intruson Detecton Technologes (CMU/SEI-99-TR-028, ADA375846). Pttsburgh, PA: Software Engneerng Insttute, Carnege Mellon Unversty, tr028app-a.html. Camm, Jeffrey D. & Evans, James R. Management Scence & Decson Technology. South-Western College Publshng, Natonal Insttute of Standards and Technology. branch and bound. (2004). Rchardson, Robert CSI/FBI Computer Crme and Securty Survey. Computer Securty Insttute. (2003). SANS Insttute. SANS Glossary of Terms Used n Securty and Intruson Detecton. (2003). CMU/SEI-2004-TN

38 28 CMU/SEI-2004-TN-045

39 REPORT DOCUMENTATION PAGE Form Approved OMB No Publc reportng burden for ths collecton of nformaton s estmated to average 1 hour per response, ncludng the tme for revewng nstructons, searchng exstng data sources, gatherng and mantanng the data needed, and completng and revewng the collecton of nformaton. Send comments regardng ths burden estmate or any other aspect of ths collecton of nformaton, ncludng suggestons for reducng ths burden, to Washngton Headquarters Servces, Drectorate for nformaton Operatons and Reports, 1215 Jefferson Davs Hghway, Sute 1204, Arlngton, VA , and to the Offce of Management and Budget, Paperwork Reducton Project ( ), Washngton, DC AGENCY USE ONLY (Leave Blank) 2. REPORT DATE November REPORT TYPE AND DATES COVERED Fnal 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS SQUARE Project: Cost/Beneft Analyss Framework for Informaton F C-0003 Securty Improvement Projects n Small Companes 6. AUTHOR(S) Nck (Nng) Xe 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Software Engneerng Insttute Carnege Mellon Unversty Pttsburgh, PA SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) HQ ESC/XPK 5 Egln Street Hanscom AFB, MA SUPPLEMENTARY NOTES 8. PERFORMING ORGANIZATION REPORT NUMBER CMU/SEI-2004-TN SPONSORING/MONITORING AGENCY REPORT NUMBER 12A DISTRIBUTION/AVAILABILITY STATEMENT Unclassfed/Unlmted, DTIC, NTIS 13. ABSTRACT (MAXIMUM 200 WORDS) 12B DISTRIBUTION CODE Many companes rely on hstorcal data to buld predctablty models for cost/beneft justfcaton of future projects. Unfortunately, for small companes, whch generally do not have a process for collectng securty data, the costs and the benefts of nformaton securty mprovement projects have been very dffcult to estmate and justfy. In addton, detaled attack data are smply not avalable to be used as references n cost estmatons. Gven these dffcultes, many small companes choose to gnore entrely the securty vulnerabltes n ther systems, and many suffer the consequences of securty breaches and sgnfcant fnancal loss. Small companes that do mplement securty mprovement projects often have problems understandng the cost structures of ther mprovement ntatves and how to translate rsk exposures nto costs that can be passed on to ther customers. To deal wth the aforementoned problems, ths paper descrbes a general framework for herarchcal cost/beneft analyss amed at provdng acceptable estmatons for small companes n ther nformaton securty mprovement projects. The framework classfes msuse cases nto categores of threats for whch natonally surveyed rsks and fnancal data are publcly avalable. For each category of threats, costs, benefts, baselne rsks, and resdual rsks are estmated. The framework then generates all permutatons of possble solutons and analyzes the most optmal approach to maxmze the value of securty mprovement projects. The framework analyzes the problems from fve dmensons: Total Implementaton Costs, Total System Value, Net Project Value, Beneft/Cost Rato, and Rsk Exposures. The fnal proposed system wll be derved from the comparsons of these dmensons, takng nto consderaton each company s specfc stuaton. Ths report s one of a seres of reports resultng from research conducted by the System Qualty Requrements Engneerng (SQUARE) Team as part of an ndependent research and development project of the Software Engneerng Insttute.

40 14. SUBJECT TERMS cost/beneft analyss, nformaton securty mprovement, nformaton securty costs, msuse cases 15. NUMBER OF PAGES PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassfed 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassfed 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassfed 20. LIMITATION OF ABSTRACT NSN Standard Form 298 (Rev. 2-89) Prescrbed by ANSI Std. Z UL

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Analysis of Premium Liabilities for Australian Lines of Business

Analysis of Premium Liabilities for Australian Lines of Business Summary of Analyss of Premum Labltes for Australan Lnes of Busness Emly Tao Honours Research Paper, The Unversty of Melbourne Emly Tao Acknowledgements I am grateful to the Australan Prudental Regulaton

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120 Kel Insttute for World Economcs Duesternbrooker Weg 45 Kel (Germany) Kel Workng Paper No. Path Dependences n enture Captal Markets by Andrea Schertler July The responsblty for the contents of the workng

More information

Stress test for measuring insurance risks in non-life insurance

Stress test for measuring insurance risks in non-life insurance PROMEMORIA Datum June 01 Fnansnspektonen Författare Bengt von Bahr, Younes Elonq and Erk Elvers Stress test for measurng nsurance rsks n non-lfe nsurance Summary Ths memo descrbes stress testng of nsurance

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

ECONOMICS OF PLANT ENERGY SAVINGS PROJECTS IN A CHANGING MARKET Douglas C White Emerson Process Management

ECONOMICS OF PLANT ENERGY SAVINGS PROJECTS IN A CHANGING MARKET Douglas C White Emerson Process Management ECONOMICS OF PLANT ENERGY SAVINGS PROJECTS IN A CHANGING MARKET Douglas C Whte Emerson Process Management Abstract Energy prces have exhbted sgnfcant volatlty n recent years. For example, natural gas prces

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Optimal allocation of safety and security resources

Optimal allocation of safety and security resources 397 A publcaton of VOL. 31, 2013 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Eddy De Rademaeker, Bruno Fabano, Smberto Senn Buratt Copyrght 2013, AIDIC Servz S.r.l., ISBN 978-88-95608-22-8; ISSN 1974-9791

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

One Click.. Ȯne Location.. Ȯne Portal...

One Click.. Ȯne Location.. Ȯne Portal... New Addton to your NJ-HITEC Membershp! Member Portal Detals & Features Insde! One Clck.. Ȯne Locaton.. Ȯne Portal... Connect...Share...Smplfy Health IT Member Portal Benefts Trusted Advsor - NJ-HITEC s

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Electronic Document Management

Electronic Document Management tem no 14- THE CTY OF EDNBURGH COUNCL Electronc Document Management Executve of the Councl 7th October 2003 y. 1 1. 2 2.1 2.2 2.3 2.4 2.5 Purpose of report To approve a preferred suppler and proposed way

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Construction Rules for Morningstar Canada Target Dividend Index SM

Construction Rules for Morningstar Canada Target Dividend Index SM Constructon Rules for Mornngstar Canada Target Dvdend Index SM Mornngstar Methodology Paper October 2014 Verson 1.2 2014 Mornngstar, Inc. All rghts reserved. The nformaton n ths document s the property

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Time Value of Money. Types of Interest. Compounding and Discounting Single Sums. Page 1. Ch. 6 - The Time Value of Money. The Time Value of Money

Time Value of Money. Types of Interest. Compounding and Discounting Single Sums. Page 1. Ch. 6 - The Time Value of Money. The Time Value of Money Ch. 6 - The Tme Value of Money Tme Value of Money The Interest Rate Smple Interest Compound Interest Amortzng a Loan FIN21- Ahmed Y, Dasht TIME VALUE OF MONEY OR DISCOUNTED CASH FLOW ANALYSIS Very Important

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

1. Math 210 Finite Mathematics

1. Math 210 Finite Mathematics 1. ath 210 Fnte athematcs Chapter 5.2 and 5.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, [email protected]

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Return decomposing of absolute-performance multi-asset class portfolios. Working Paper - Nummer: 16

Return decomposing of absolute-performance multi-asset class portfolios. Working Paper - Nummer: 16 Return decomposng of absolute-performance mult-asset class portfolos Workng Paper - Nummer: 16 2007 by Dr. Stefan J. Illmer und Wolfgang Marty; n: Fnancal Markets and Portfolo Management; March 2007; Volume

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

A powerful tool designed to enhance innovation and business performance

A powerful tool designed to enhance innovation and business performance A powerful tool desgned to enhance nnovaton and busness performance The LEGO Foundaton has taken over the responsblty for the LEGO SERIOUS PLAY method. Ths change wll help create the platform for the contnued

More information

Getting It Together Project & Implementation Management

Getting It Together Project & Implementation Management Gettng It Together Project & Implementaton Management CFE NETWORKING November 30, 2011 Fnancng NFA Fshng Best Practces Tranng & Mentorng Marketng & Brandng Governance Markets Fsh Legal Regulaton ? HR

More information

A Framework. for Measuring and Managing. Brand Equity

A Framework. for Measuring and Managing. Brand Equity A Framework for Measurng and Managng Brand Equty 6 Summer 2008 By Wllam Neal and Ron Strauss For most publcly owned organzatons, the majorty of ther assets cannot be accounted for by current fnancal accountng

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Optimal Customized Pricing in Competitive Settings

Optimal Customized Pricing in Competitive Settings Optmal Customzed Prcng n Compettve Settngs Vshal Agrawal Industral & Systems Engneerng, Georga Insttute of Technology, Atlanta, Georga 30332 [email protected] Mark Ferguson College of Management,

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Reporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide

Reporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide Reportng Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (ncludng SME Corporate), Soveregn and Bank Instructon Gude Ths nstructon gude s desgned to assst n the completon of the FIRB

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

Time Value of Money Module

Time Value of Money Module Tme Value of Money Module O BJECTIVES After readng ths Module, you wll be able to: Understand smple nterest and compound nterest. 2 Compute and use the future value of a sngle sum. 3 Compute and use the

More information

Section 5.3 Annuities, Future Value, and Sinking Funds

Section 5.3 Annuities, Future Value, and Sinking Funds Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 [email protected] M. Cecla Bastarrca Computer Scences Department Unversty

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

14.74 Lecture 5: Health (2)

14.74 Lecture 5: Health (2) 14.74 Lecture 5: Health (2) Esther Duflo February 17, 2004 1 Possble Interventons Last tme we dscussed possble nterventons. Let s take one: provdng ron supplements to people, for example. From the data,

More information

Introduction CONTENT. - Whitepaper -

Introduction CONTENT. - Whitepaper - OneCl oud ForAl l YourCr t c al Bus nes sappl c at ons Bl uew r esol ut ons www. bl uew r e. c o. uk Introducton Bluewre Cloud s a fully customsable IaaS cloud platform desgned for organsatons who want

More information

Mathematics of Finance

Mathematics of Finance CHAPTER 5 Mathematcs of Fnance 5.1 Smple and Compound Interest 5.2 Future Value of an Annuty 5.3 Present Value of an Annuty; Amortzaton Revew Exercses Extended Applcaton: Tme, Money, and Polynomals Buyng

More information

FINANCIAL MATHEMATICS. A Practical Guide for Actuaries. and other Business Professionals

FINANCIAL MATHEMATICS. A Practical Guide for Actuaries. and other Business Professionals FINANCIAL MATHEMATICS A Practcal Gude for Actuares and other Busness Professonals Second Edton CHRIS RUCKMAN, FSA, MAAA JOE FRANCIS, FSA, MAAA, CFA Study Notes Prepared by Kevn Shand, FSA, FCIA Assstant

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Portfolio Loss Distribution

Portfolio Loss Distribution Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht [email protected] 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event.

For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event. Audtng Wndows & Actve Drectory Changes va Wndows Event Logs Ths document takes a lghtweght look at the steps and consderatons nvolved n settng up Wndows and/or Actve Drectory event log audtng. Settng up

More information

HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA*

HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA* HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA* Luísa Farnha** 1. INTRODUCTION The rapd growth n Portuguese households ndebtedness n the past few years ncreased the concerns that debt

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information