Performance And Analysis Of Risk Assessment Methodologies In Information Security
|
|
|
- Gabriel Parsons
- 9 years ago
- Views:
Transcription
1 International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala *2, Anueep Katragaa #3 Dr.L.S.S.Rey* 4 #1 Faculty,Computer Science an Engering KL EF University(KLU) Vaeswaram,Inia. * 2 Stuent,Computer Science an Engering KL EF University(KLU) Vaeswaram,Inia. #3 Stuent,Computer Science an Engering KL EF University(KLU) Vaeswaram,Inia. Professor,Computer Science an Engering KL EF University(KLU) Vaeswaram,Inia Abstract This stuy equates a choice of methos that allow an organization to weigh their information security risk. The initial moels went through two selection iterations before we en up with the final three fully stuie moels. The main purpose of the stuy is to compare an clarify the ifferent activities, inputs an outputs require by each information security risk assessment moels an also analyse which ones aress information security risk effectively. The resulting information helps evaluating the moels applicability to an organization an their specific nees. In orer to verify an valiate the conclusions taken from the theoretical stuy of the three final moels, a practical experience was put into practice in a real organization. Keywors Risk Assessment Moels, Information Security Risk, Information Security, Risk Assessment, Risk Assessment Moels Comparison. I. PROBLEM Most of the organizations fin it ifficult an costly to eal with the Information Security in a proper way. When a new vulnerability or a new virus is recognize or etecte, the consequences can be comprehensive on the fly. In aition, it is clear that interoperability between organizations is significant an will become more important in the future. To provie fast an suitable response to security incients an to ensure interoperability between organizations, there is a nee for a systematic an pre-ef tactic to eal with Information Security challenge. II. INFORMATION SECURITY RISK ASSESSMENT Information security risk assessment is the progression that ientifies an valuates the risks to information security by efining the likelihoo of occurrence an the resulting impact. It uniquely recognizes threats, categorizes assets an rates system vulnerabilities as it provies key information an strategies to implement effective controls. III. INFORMATION SECURITY RISK ANALYSIS Risk analysis ( or Ientification ) generally involves : Ientification of assets: Information (atabases an ata files, contracts an agreements, system ocumentation, research information, user manuals, training material, working or support proceures, busss enurance plans, fall back arrangements, auit trails, an archive information); Software Assets (applicationsoftware,system software, evelopment tools, an utilities); Physical Assets (computer equipment, communications equipment, removable meia, an other apparatus);services(computing an communications services, general utilities, e.g. heating, lighting, power, an air-conitioning); People, an their qualifications, skills, an experience; Intangibles, such as promnce an image of the organization. Ientification of legal an busss requirements relevant for the ientifie assets. Collecting all policies, proceures an controls currently in place. Assess whether or not the existing policies, proceures an controls implemente are satisfactory. Ientification of substantial threats or risk sources. These threats can be fragmente into Human an nhuman elements. (Acts of nature, acts of war, accients, among others malicious acts originating from insie or outsie the organization). Ientification of vulnerabilities for the ientifie assets. Asset is ef as whatever having value to an organization. Threat is a latent cause of an unwante incient, which may consequence harm to a system or organization. ISSN: Page 3685
2 International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Vulnerability is a weakness of an asset or group of assets that can be exploite by one or more threats. It is the susceptibility to injury or attack. In computer security, the term vulnerability is applie to a weakness in a system which allows an attacker to intrue upon the integrity of that system. A requirement is a singular ocumente nee of what a specific asset shoul be, o or respect. Impact can be ef as the severity of the consequences of an event or incient. In the backgroun of information security, the impact is a loss of availability, integrity, an confientiality of information. Likelihoo is the probabilities of a threat to show up. An besies this relation, we shoul remin ourselves that given enough time an etermination, people can circumvent almost every security measure. They can be extremely creative when intereste. Therefore this motivation factor shoul be seriously aresse in the information security risk assessment course. In aition to this relation, new threats an vulnerabilities are unceasingly appearing an when consiering risks to information infrastructures, the number, type, an variation are overwhelming. Despite being har to keep up with all these new vulnerabilities an threats, they nee to be manage satisfactorily or else the organization future an existence can be enangere. Fig 1: Information Security IV. INFORMATION SECURITY RISK EVALUATION Risk evaluation or estimation is the process use to assign values to consequences, their likelihoo an to the level of risk. It involves: i. Assessment of the probability of the threats an vulnerabilities to ensue; ii. Calculation of the effect that each threat woul have on each asset; iii. Determination of quantitative (measurable) or qualitative (escriptive) value of risk. One significant thing to take into thought is that these three variables rarely are penent from each other. In information security, there s a possible relation between asset value, impact an probability. For example, it s more likely a hacker will exploit a vulnerability that causes a bigger impact than one with small impact. Likewise, a valuable asset has more probability of being compromise than a valueless one. Therefore, in this fiel we have to take into consieration more than simply ranom or unintene acts. V. A COMPARATIVE ANALYSIS ON INFORMATION SECURITY RISK ASSESSMENT MODELS There are several moels an methos with ifferent approaches that ai in the risk assessment process. This stuy will aress the methos that support the risk assessment process an those which can be applie to information security. Thus, methos that are not classifie as risk assessment or risk management oriente or that are general management oriente (i.e. corporate governance) frameworks like Coso, Cobit or Basel II have been let off from the stuy. High-level reference ocuments like the ISO Guie 73 are also not taken into thought in this section. Risk assessment moels can be separate into quantitative an qualitative. 1) Qualitative vs. Quantitative Moels: Risk assessment moels can be parte into quantitative an qualitative. Quantitative moels use measurable, objective ata to eterm asset value, probability of loss, an accompanying risk(s). The goal is to try to calculate objective numeric values for each of the components gathere uring the risk assessment an cost-benefit analysis. Qualitative methos use a relative measure of risk or asset value base on ranking or separation into expressive categories such as low, meium, high; not important, important, very important; or on a scale from 1 to 10. A qualitative moel evaluates the impact an likelihoo of the ientifie risks in a rapi an cost-effective manner. The sets of risks recore an analyse in qualitative risk assessment can provie a founation for a attentive quantitative assessment. Both qualitative an quantitative approaches to security risk management have their avantages an isavantages. Certain ISSN: Page 3686
3 International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 situations may call for organizations to implement the quantitative approach. Alternatively, organizations of small size or with limite resources will probably fin the qualitative approach much more to their liking. The following table abriges the benefits an rawbacks of each approach: TABLE I ADVANTAGES Quantitative Qualitative Risks are prioritize by Enables visibility an financial impact; assets unerstaning of risk are prioritize by ranking. financial values. Easier to reach Results facilitate consensus management of risk by t necessary to return on security quantify threat investment. frequency. Results can be t necessary to expresse in management-specific eterm terminology (for financial values of example, monetary assets. values an probability Easier to involve expresse as a specific people who are not percentage). experts on security or Accuracy tens to computers. increase over time as the organization buils historic recor of ata while gaining experience. TABLE II DISADVANTAGES Quantitative Impact values assigne to risks are base on subjective opinions of participants. Process to reach creible results an consensus is very time consuming. Calculations can be complex an time consuming. Results are presente in monetary terms only, an they may be ifficult for nontechnical people to interpret. Process requires expertise, so participants cannot be easily coache through it. Qualitative Insufficient ifferentiation between important risks. Difficult to justify investing in control implementation because there is no basis for a cost benefit analysis. Results are epenent upon the quality of the risk management team that is create. inclues a thorough stuy of the most relevant moels an a comparison between those same moels. 2) Moel Selection : There are several moels an methos that help in the risk assessment process. This stuy will aress the methos that support the risk assessment process an those which can be practical to information security. Therefore, methos that are not classifie as risk assessment or risk management oriente or that are general management oriente (i.e. corporate governance) frameworks like Coso, Cobit or Basel II are not consiere in this stuy. High-level reference ocuments like the ISO Guie 73 are also not taken into consieration as risk valuation moels. This ocument provies an outl of existing Information Security Risk Assessment methos, an a comparison that evaluates those ifferent methoologies. It aims to escribe an compare properties of Information Security Risk Assessment methos in a concise manner. Unless otherwise state, the wors moel an metho are use in this ocument to refer to an information security risk assessment metho or moel, though often times the full phrase is also use. After a perio of some research some moels were ientifie as suitable for evaluating information security risk. These moels are the following: i. OCTAVE ii. Mehari iii. MAGERIT iv. IT-Grunschutz v. EBIOS vi. IRAM vii. SARA viii. SPRINT ix. ISO x. NIST SP xi. CRAMM xii. MIGRA xiii. MAR xiv. ISAMM xv. GAO/AIMD xvi. IT System Security Assessment xvii. MG-2 an MG-3 xviii. Dutch A&K Analysis xix. MARION xx. Austrian IT Security Hanbook xxi. Microsoft s Security Risk Management Guie xxii. Risk IT As was state before, this is a non-exhaustive list. VI. EXISTING MODELS 1) Introuction : This chapter eluciates clearly how the stuy was carrie out. It exposes the methos an processes use to o the comparative stuy starting with a substantial list of information security risk moels. The chapter 3) First Iteration Selection Criteria : In the last section 22 risk assessment moels were acknowlege. However, some of them are more aequate to assess information security risks than others. Therefore, this first selection iteration plays to exclue some of the moels base in a criteria escribe below. These criteria assess four essential moel features. If a ISSN: Page 3687
4 International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 moel oesn t hol any of those properties it will be exclue from the universe to stuy. The criteria use in this selection iteration are the following: /Guiel Is the moel really a metho? Or just a stanar or guiel? is ef as an orerly arrangement of parts or steps to achieve an en, a regular an systematic proceure of accomplishing something. Guiels are avice or instructions given in orer to guie or irect an action. A stanar is a set of rules wiely recognize or engage (especially because of its excellence) that control how people evelop an manage materials, proucts, services, technologies, tasks, processes, an systems. Exclue the moel if it isn t a metho. Ientifies Information Security Risks Does the ocument ientify Information Security Risks? Information security means guaring information an information systems from unauthorize access, use, isclosure, isruption, moification or estruction. The Security Risk level of a system is a mixture of the importance of maintaining the Availability that system, the Integrity of ata house on or manage by that system an the Confientiality of sensitive information eposite on that system. Exclue the metho if it oesn t ientify Information Security risks. Price an availability of ocumentation Is the information publicly avai sufficient to properly evaluate an compare the moel with others? Does the information comfort to answer all criteria questions? What s the assesse price to obtain all ocumentation an tools neee to implement the moel? Exclue the moel if it is unavai or too har/expensive to purchase. Last review When was the moel last revise or upate? Exclue if iscontinue, obsolete or not upate/reviewe in more than a ecae. Name OCTAVE Mehari MAGERI T IT- Grunschu tz EBIOS NIST SP CRAMM MIGRA MAR ISAMM GAO/AIM D IT System Security Assessmen t MG-2 an MG-3 Security Risk Manageme nt Guie Austrian IT Security Hanbook or Guiel? Stana r an Guiel Guiel Guiel s an Case Stuie s Guiel Guiel Guiel Guiel Ienti fier IS Risks Docum entatio n? Expens ive Expens ive Last Revie w N/A 2 n Iterati on? N/A N/A N/A N/A 4) Criteria Applie to Each Moel : After the efining the selection criteria, each moel was scrutinize an evaluate using those criteria. ISSN: Page 3688
5 International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Microsoft security risk manageme nt guie Risk Dutch A&K Analysis MARION Guiel Frame work Up to ate Availa ble N/A Obsol ete Obsol ete 5) Chosen s : As a result of applying the 4 criteria escribe above, 16 of the 22 initial moels were exclue. These moels in t conform with one or more criterion an for that reason they won t be stuie in more unerstaning. netheless, six moels were in conformance with all the criteria. These moels are: Octave,Mehari, Magerit, IT-Grunschutz, Ebios an IRAM. Only these moels will be measure after this point. 6) Secon Iteration Selection Criteria : Despite having reuce the initial universe of moels to almost one fourth, six is still a significant number of moels to stuy in etail (consiering the present time an people limitations of this work). Therefore, the universe of moels will again be reuce through another set of stanars. The 5 selecte criteria are escribe below: Complexity, Effort an preparation This criterion tries to reflect the level of preparation, information, effort an skills neee to implement the moel, an the level of etail an scope of the risk analysis results. To express this criterion in a more quantitative manner, moels are classifie uner three levels of complexity: Little grounwork neee; less etail/accuracy in the output. Quick assessment; Some preparation neee; meium output etail/accuracy. Broa preparation an effort neee; more etail/accuracy on the output. Approach of the moel The risk assessment approach each moel avocates (e.g. self-assessment, interviews, workshops). This criterion oesn t preten to analyse the approach in great etail. It will only consier the main ieas an strategies of each moel. A more comprehensive analysis will take place in the next section. Tools If the moel provie supportive tools an how can we obtain them. This criterion is ivie into the following categories: tool; Pai tool (but with a trial perio); Pai tool (with no trial avai); software tool but has supporting ocumentation(e.g. worksheets,questionnaires, forms); supporting tools. Origin In this stuy three likely sources for a moel were consiere. These entities can be: Acaemic; Governmental; Commercial. Geographical sprea Countries in which the moel is known to be implemente. 7) Comparison Criteria : This section familiarizes the criteria that will be use to evaluate an compare the three information security risk assessment moels in more etail. Some of the moels characteristics were alreay analyse uring the selection process escribe above. Some of these assessment criteria are similar to the criteria use before, but in this section the moels will be analyse in more complexity. Below we have the escription of the new set of criteria: Concept efinition This criterion pretens to clarify an istinguish the three information security risk assessment moels by ientifying an escribing their basic an most relevant concepts. It evaluates the resemblances an ifferences between the concept efinitions each moel proposes. The concepts that will be uner evaluation in this stuy are: Risk, Asset, Vulnerability, Threat, Impact, Control (or Risk Treatment), Resiual Risk, an Security Requirements or Objectives. Approach to information security assessment The risk assessment approach each moel avocates (e.g. self-assessment, interviews, workshops). This measure analyses the approach with greater etail than the previous section analysis an also compare the three final moels consequently. To assess the approach at this stage moels are characterize uner the following aspects: Description (of the approach) Main activities How risk is calculate Results an output This criterion analyses the etail of each moels output after the risk assessment is complete. It tries to evaluate the quality, clarity of the information prouce. It also ifferentiates moels that generate qualitative an quantitative ata, an moels that recommen information security controls of countermeasures, allowing the organization to continue the risk management course. ISSN: Page 3689
6 International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Complexity This criterion tries to reprouce the level of preparation, information, effort an skills neee to implement the moel, an the level of etail an scope of the risk analysis results. This criterion was also use in the selection process, but in this section the final moels will be equate in more etail. To asses this level moels are characterize uner the following aspects: Level of etail; Inputs / Preparation neee (ease of gathering the neee information); Techniques; People involve; Effort; Time; Skills neee; The above mentione criteria will be applie to the three moels in the following sections. 8) Results an Output OCTAVE The information prouce after unertaking the OCTAVE methoology is the following: Critical Assets; Security Requirements for Critical Assets; Threats to Critical Assets (incluing the concerns to an organization if a threat is realize) Risks to Critical Assets (the risks are a simple quantitative measure of the extent to which the organization is stuck by a threat. This relative risk score is erive by bearing in min the extent to which the consequence of a risk impacts the organization against the comparative importance of the various impact areas, an possibly the probability) IRAM IRAM methoology generates the following information an reports: Phase 1: Busss impact rating an assessment summary forms; Phase 2: Threat an vulnerability assessment reports, etaile security requirements report; Phase 3: Control evaluation an selection reports; BIA Summary T&VA Summary CS Summary IRAM s approach helps to ef the criticality an promnce of information systems. IT-GRUNDSCHUTZ Relation between main IT applications, their protection requirements an the rationales behin the assignment of protection requirements categories. IT assets uner evaluation (busss-critical information an IT applications) mappe with IT-Grunschutz moules. IT security/risk level of the organization (obta through a security check that verifies if appropriate security methos are implemente or not) provies etaile technical commenations 9) Complexity : OCTAVE Level of etail There are ifferent OCTAVE methos base on OCTAVE Criteria. The methos are precise guiels for implementation planning with a goo level of feature but with no technical etails. Inputs / Preparation neee Obtain management support an allot appropriate organizational assets to the process. Evaluation Scope (the extent of each evaluation must be ef); Establish risk evaluation measures accoring to the organization; Ientify the people that will join in the workshops an interviews. Techniques Workshop-style, collaborative setting an is supporte with guiance, worksheets, an questionnaires, which are involve in the metho. People involve In OCTAVE, an interisciplinary team, calle the analysis team, leas the evaluation. The analysis team shoul contain people from both the busss units an the IT epartment (because information security inclues equally busss- an technology relate issues), an from multiple organizational levels (senior management, mile management, an staff). Effort (time) Some ays or weeks of training are sufficient. Skills neee Busss an IT skills an knowlege. IRAM Level of etail Analyses information risk at ifferent levels of etail epening on factors such as management iscretion, perceive criticality / importance or avai time (e.g. high-level analysis through to etaile analysis). Inputs / Preparation neee Profile of system, Risk Evaluation Criteria, Security Requirements, Impact Areas. Techniques Workshop base (typically conucte with busss an IT staff), Face- to-face interviews, One user guie for each phase, Process oriente, Busss Impact Reference Table (BIRT), ISF threat information inquiry. People involve Busss an IT staff. Effort (time) 3-5 ays (for each system).1-2 weeks per risk analysis. Skills neee Meium level of expertise yesirable (Risk Analysis practitioner, little technical knowlege neee). IT-GRUNDSCHUTZ Level of etail Very etaile (more than 3000 pages). It comprises both common IT security recommenations for establishing an applicable IT security process an ISSN: Page 3690
7 International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 etaile technical recommenations to accomplish the necessary IT security level for a specific omain. Inputs / Preparation neee Ientifying the area of application within which the process shoul apply. The information an busss processes that are to be protecte must be ientifie; Ascertaining the ominant conitions; Techniques Has a methoology that emonstrates how the angers liste in the IT-Grunschutz Catalogues [GS-KAT] can be use to carry out an scrutiny of IT risks. People involve Aime at persons responsible for IT operations an IT security as well as IT security officers, experts, consultants an all intereste parties entruste with IT security management. Effort (time) Some weeks of training are enough. Skills neee Specialist (thorough knowlege an experience is require) REFERENCES [1] Sun, L.., Srivastava, R., Mock, T.: An Information Systems Security Risk Assessment Moel uner Dempster-Shafer Theory of Belief Functions. Journal of Management Information Systems, Vol. 22,. 4, Spring 2006: (2006) [2] Alberts, C.: Common Elements of Risk. Technical te CMU/SEI-2006-TN-014, Carnegie Mellon University (April 2006) [3] SPRINT: Risk Analysis For Information Systems, User Guie, Version 1.0. The European Security Forum (1997) Bayne, J.: An Overview of Treath an Risk Assessment. SANS Institute, as part of the Information Security Reaing Room (2002) [4] A Risk Management Stanar. AIRMIC, ALARM, IRM, Lonon (2002) [5] Brewer, D.: Risk Assessment Moels an Evolving Approaches. IAAC workshop, Senate House, Lonon (2000) [6] Jeremy Hilton,Pete Burnap an Anas Tawileh: s for the ientification of Emerging an Future Risk, ENISA (2007) [7] Inventory of risk assessment an risk management methos. ENISA a hoc working group on risk assessment an risk management (2006) [8] W.G. Bornman L. Labuschagne: A Comparative Framework for Evaluating Information Security Risk Management s. Stanar Bank Acaemy for Information Technology,Ran Afrikaans University (2004) [9] Alberts, C. an Dorofee, A An Introuction to the OCTAVE. Software Engering Institute, Carnegie MellonUniversity,USA. ISSN: Page 3691
8 International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 ISSN: Page 3692
State of Louisiana Office of Information Technology. Change Management Plan
State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change
Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service
DOI: 10.1111/j.1471-1842.2008.00833.x Using research evience in mental health: user-rating an focus group stuy of clinicians preferences for a new clinical question-answering service Elizabeth A. Barley*,
Comparative Study of Information Security Risk Assessment Models
Comparative Study of Information Security Risk Assessment Models Filipe Macedo and Miguel Mira da Silva Instituto Superior Técnico, Universidade Técnica de Lisboa, Av. Rovisco Pais, 1049-001, Lisboa, Portugal
Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection
Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University [email protected] Abstract A number of Enterprise Frameworks
How To Segmentate An Insurance Customer In An Insurance Business
International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah
Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law
Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC
RUNESTONE, an International Student Collaboration Project
RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department
This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements.
WMG 7.60 per hour Ref: WMG005/15 Fixe Term Contract: 4 Weeks Full Time to be unertaken in summer 2015 (with the possibility of a further 4 weeks employment, applicants must therefore be available for the
! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6
! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,
The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis.
The higher eucation factor: The role of higher eucation in the hiring an promotion practices in the fire service. By Nick Geis Spring 2012 A paper submitte to the faculty of The University of North Carolina
Aon Retiree Health Exchange
2014 2015 Meicare Insurance Guie Aon Retiree Health Exchange Recommene by Why You Nee More Coverage I alreay have coverage. Aren t Meicare Parts A an B enough? For many people, Meicare alone oes not provie
On Adaboost and Optimal Betting Strategies
On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore
Enterprise Resource Planning
Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach
Modelling and Resolving Software Dependencies
June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software
The one-year non-life insurance risk
The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the
Chapter 9 AIRPORT SYSTEM PLANNING
Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................
Data Center Power System Reliability Beyond the 9 s: A Practical Approach
Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical
Product Differentiation for Software-as-a-Service Providers
University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation
Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market
RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational
Introduction to Integration Part 1: Anti-Differentiation
Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction
INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES
1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical
MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND
art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN
Achieving quality audio testing for mobile phones
Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing
Option Pricing for Inventory Management and Control
Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories
FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY
FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering
Cross-Over Analysis Using T-Tests
Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows
USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS
Proceeings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, an M. Fu, es. USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS Anthony
Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar
Aalborg Universitet Heat-An-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Publishe in: International Journal of Heat an Mass Transfer
ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014
ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory
Sustainability Through the Market: Making Markets Work for Everyone q
www.corporate-env-strategy.com Sustainability an the Market Sustainability Through the Market: Making Markets Work for Everyone q Peter White Sustainable evelopment is about ensuring a better quality of
Manure Spreader Calibration
Agronomy Facts 68 Manure Spreaer Calibration Manure spreaer calibration is an essential an valuable nutrient management tool for maximizing the efficient use of available manure nutrients. Planne manure
Rural Development Tools: What Are They and Where Do You Use Them?
Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist [email protected] Juith I. Stallmann
The development of an innovative education curriculum for 11 16 yr old children with type 1 diabetes mellitus (T1DM)
Peiatric Diabetes 2006: 7: 322 328 All rights reserve # 2006 The Authors Journal compilation # 2006 Blackwell Munksgaar Peiatric Diabetes Original Article The evelopment of an innovative eucation curriculum
Professional Level Options Module, Paper P4(SGP)
Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be
Dow Jones Sustainability Group Index: A Global Benchmark for Corporate Sustainability
www.corporate-env-strategy.com Sustainability Inex Dow Jones Sustainability Group Inex: A Global Benchmark for Corporate Sustainability Ivo Knoepfel Increasingly investors are iversifying their portfolios
An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations
This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi
Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes
Proceeings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Moeling an Preicting Popularity Dynamics via Reinforce Poisson Processes Huawei Shen 1, Dashun Wang 2, Chaoming Song 3, Albert-László
A New Evaluation Measure for Information Retrieval Systems
A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz [email protected] Christian Bauckhage Deutsche Telekom Laboratories [email protected] Jérôme Kunegis [email protected]
Unbalanced Power Flow Analysis in a Micro Grid
International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung
Software Diversity for Information Security
for Information Security Pei-yu Chen, Gaurav Kataria an Ramayya Krishnan,3 Heinz School, Tepper School an 3 Cylab Carnegie Mellon University Abstract: In this paper we analyze a software iversification-base
Calibration of the broad band UV Radiometer
Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure
Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines
EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,
CALCULATION INSTRUCTIONS
Energy Saving Guarantee Contract ppenix 8 CLCULTION INSTRUCTIONS Calculation Instructions for the Determination of the Energy Costs aseline, the nnual mounts of Savings an the Remuneration 1 asics ll prices
SAMPLE SEO Analysis Report
Page 1 SAMPLE SEO Analysis Report October 3, 2009 Page 2 SAMPLE Keywor Phrase Analysis: Tier #3 Hello Via Net Marketing, Below is the list of keywors that represents the market research that has been performe
View Synthesis by Image Mapping and Interpolation
View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer
Digital barrier option contract with exponential random time
IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun
S&P Systematic Global Macro Index (S&P SGMI) Methodology
S&P Systematic Global Macro Inex (S&P SGMI) Methoology May 2014 S&P Dow Jones Inices: Inex Methoology Table of Contents Introuction 3 Overview 3 Highlights 4 The S&P SGMI Methoology 4 Inex Family 5 Inex
A Data Placement Strategy in Scientific Cloud Workflows
A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,
Stock Market Value Prediction Using Neural Networks
Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: [email protected] Hamireza Taremian Engineering
Minimizing Makespan in Flow Shop Scheduling Using a Network Approach
Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie
An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it
An introuction to the Re Cross Re Crescent s Learning platform an how to aopt it www.ifrc.org Saving lives, changing mins. The International Feeration of Re Cross an Re Crescent Societies (IFRC) is the
Ch 10. Arithmetic Average Options and Asian Opitons
Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options
Dynamic Network Security Deployment Under Partial Information
Dynamic Network Security Deployment Uner Partial nformation nvite Paper) George Theoorakopoulos EPFL Lausanne, Switzerlan Email: george.theoorakopoulos @ epfl.ch John S. Baras University of Marylan College
A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE. No.107. Guide to the calibration and testing of torque transducers
A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE No.107 Guie to the calibration an testing of torque transucers Goo Practice Guie 107 Measurement Goo Practice Guie No.107 Guie to the calibration an testing of
Improving Direct Marketing Profitability with Neural Networks
Volume 9 o.5, September 011 Improving Direct Marketing Profitability with eural etworks Zaiyong Tang Salem State University Salem, MA 01970 ABSTRACT Data mining in irect marketing aims at ientifying the
JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT
OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,
Mathematics Review for Economists
Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school
Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014
Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,
1 Introduction to the Recommendations and their Application Principles
1 Introuction to the Recommenations an their Application Principles 1.1 National an International Regulations for Piling Wors (1) Since the implementation ofdin EN 1997-1:2009-09: Eurocoe 7: Geotechnical
Why is oil and grease-free so important in oxygen systems?
Why is oil an grease-free so important in oxygen systems? 1. Forewor Oxygen this vital gas is more complex in its use than one woul imagine when consiering how matter-of-factly we inhale an exhale every
Trace IP Packets by Flexible Deterministic Packet Marking (FDPM)
Trace P Packets by Flexible Deterministic Packet Marking (F) Yang Xiang an Wanlei Zhou School of nformation Technology Deakin University Melbourne, Australia {yxi, wanlei}@eakin.eu.au Abstract- Currently
Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany
Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik
Inventory of risk assessment and risk management methods
ENISA ad hoc working group on risk assessment and risk management Inventory of risk assessment and risk management methods Deliverable 1 Final version Version 1.0 30/03/2006 Content Preamble...4 1. Executive
Supporting Adaptive Workflows in Advanced Application Environments
Supporting aptive Workflows in vance pplication Environments Manfre Reichert, lemens Hensinger, Peter Daam Department Databases an Information Systems University of Ulm, D-89069 Ulm, Germany Email: {reichert,
Characterizing the Influence of Domain Expertise on Web Search Behavior
Characterizing the Influence of Domain Expertise on Web Search Behavior Ryen W. White Microsoft Research One Microsoft Way Remon, WA 98052 [email protected] Susan T. Dumais Microsoft Research One Microsoft
An Introduction to Event-triggered and Self-triggered Control
An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale
Gender Differences in Educational Attainment: The Case of University Students in England and Wales
Gener Differences in Eucational Attainment: The Case of University Stuents in Englan an Wales ROBERT MCNABB 1, SARMISTHA PAL 1, AND PETER SLOANE 2 ABSTRACT This paper examines the eterminants of gener
How To Understand The Structure Of A Can (Can)
Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the
Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues
Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan [email protected] Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan
Firewall Design: Consistency, Completeness, and Compactness
C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,
ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters
ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,
DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES
DECISION SUPPORT SYSTEM OR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES Svetlana Vinnik 1, Marc H. Scholl 2 Abstract Decision-making in the fiel of acaemic planning involves extensive analysis
Hybrid Model Predictive Control Applied to Production-Inventory Systems
Preprint of paper to appear in the 18th IFAC Worl Congress, August 28 - Sept. 2, 211, Milan, Italy Hybri Moel Preictive Control Applie to Prouction-Inventory Systems Naresh N. Nanola Daniel E. Rivera Control
BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart
CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications
A Monte Carlo Simulation of Multivariate General
A Monte Carlo Simulation of Multivariate General Pareto Distribution an its Application 1 1 1 1 1 1 1 1 0 1 Luo Yao 1, Sui Danan, Wang Dongxiao,*, Zhou Zhenwei, He Weihong 1, Shi Hui 1 South China Sea
How To Predict A Call Capacity In A Voip System
Paper Preictive Moeling in a VoIP System Ana-Maria Simionovici a, Alexanru-Arian Tantar a, Pascal Bouvry a, an Loic Dielot b a Computer Science an Communications University of Luxembourg, Luxembourg b
American Thoracic Society Documents
American Thoracic Society Documents An Official ATS Clinical Practice Guieline: Interpretation of Exhale Nitric Oxie Levels (FE NO ) for Clinical Applications Rae A. Dweik, Peter B. Boggs, Serpil C. Erzurum,
Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition
Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli
Bond Calculator. Spreads (G-spread, T-spread) References and Contact details
Cbons.Ru Lt. irogovskaya nab., 21, St. etersburg hone: +7 (812) 336-97-21 http://www.cbons-group.com Bon Calculator Bon calculator is esigne to calculate analytical parameters use in assessment of bons.
A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements
International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
Seeing the Unseen: Revealing Mobile Malware Hien Communications via Energy Consumption an Artificial Intelligence Luca Caviglione, Mauro Gaggero, Jean-François Lalane, Wojciech Mazurczyk, Marcin Urbanski
SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL
SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is
Feasibility of Implementation of Strategic Management on Brand Identity of Sepah Bank
Online Access: www.absronline.org/journals Management an Aministrative Sciences Review Volume 4, Issue 3 Pages: 635-646 May 2015 e-issn: 2308-1368 p-issn: 2310-872X Feasibility of Implementation of Strategic
Qualified Annuity Claimant s Statement
Qualifie Annuity Claimant s Statement The Lincoln National Life Insurance Company Service Office P.O. Box 7880 Fort Wayne, IN 46801-7880 Phone: 800-454-6265, Ext.*8200 www.lincolnfinancial.com Overnight
