Free Essay

Week 2 Lecture

In:

Submitted By Strangeling06
Words 1687
Pages 7
Threats and Vulnerabilities

Introduction
Note: There’s a covert channel in this lecture. Can you find it before it is revealed?

Iatrogenic Software Security Problems
Iatrogenic is a great word except for the fact that it really applies only in a medical context: harm caused by the physician’s treatment.
Here's an example: a patient goes into the hospital with a broken leg and gets an infection from being in a contaminated hospital environment; it’s called an iatrogenic infection and it was caused by the treatment. Given the medical terminology used for malware, such as viruses, it seems reasonable to consider a program made vulnerable by a coding flaw and victimized by a virus as having an iatrogenic infection.
Vendors take it as a fact of life that they can expect a certain number of bugs for a certain number of lines of code. Having 10 bugs per 1,000 lines of code is considered common. It does seem strange that, with all our digital expertise, we still can’t expect consistently accurate code.
One of the most successful attacks, the buffer overflow, is based on the failure of developers to properly constrain the assignment of memory. This is not meant to imply that it is all the fault of developers. The resources required to eliminate this problem make the task formidable.
However, much of the fault with software security is the result of a hasty development cycle, as mentioned above.
Although it is considerably more difficult to correct coding problems after an application is complete, the trend is to work quickly (to maintain market share) and then patch problems as they surface. To date, this has been acceptable to customers. There is little will to fight the battle to make software vendors liable for damage caused by programming errors. If software vendors were as liable for flaws as automobile makers are, it would be a very different story.

Software Vulnerabilities
One benefit of ubiquitous global communication is that information about vulnerabilities can be shared as they are discovered. Bugtraq is an excellent example. The website, maintained by
SecurityFocus, is a very well‐respected source in the InfoSec community for information on the latest software vulnerabilities. However, rapid communication is not always enough to protect corporate networks, not to mention individual users. Depending on how a particular vulnerability is discovered, the person or team who identifies the flaw may be hesitant to reveal

it to the vendor for fear of legal reprisal. The prosecution of those who access remote systems is getting easier as the laws get tougher. Even when there do not appear to be legal obstacles, there can be trouble. It has long been the contention of many hackers that vendors do not want to spend time and money on patching existing systems and programs. They would rather use their resources for the development of new products. Many feel that it is only when confronted with the possibility of public exposure that they act. Clearly, the ethical thing for hackers
(meaning ethical experimenters, not malicious crackers) to do when they discover a vulnerability is to notify the vendor. The disagreement arises when the hacker thinks the vendor is not acting fast enough. How much time should a vendor have in order to produce a security patch? Hackers feel that a matter of a few weeks is usually adequate, and they become frustrated when vendors hesitate to act for months. Hackers point to the risk that many companies and individuals are unknowingly exposed while vulnerability remains unpatched, and thus, discoverable by crackers.
CISCOGATE
This tension between security investigators and vendors was dramatically demonstrated in
2005 when a researcher with Internet Security Systems got so frustrated with months of inaction by Cisco after his company had informed them of a buffer overflow exploit in their routers that he finally demonstrated the attack at a Black Hat convention, hoping to force Cisco to act. Just before making the presentation, the researcher resigned from Internet Security
Systems in order to protect them from legal action. Instead, both Cisco and Internet Security
Systems took action against the researcher, preventing any further dissemination of information about the bug. Cisco did, however, act quickly to address the flaw.
Technical attacks on computer systems that achieve administrative control of the target computer are almost always based on the exploitation of a software flaw. Can programming flaws be eliminated or even substantially reduced? There are a number of approaches to combating programming flaws, such as enforcing secure development policies and operational assurance procedures to test, maintain, and review software usage; but the devilish detail – metrics – raises its insidious head. How do you measure security, interoperability, recoverability, and other important qualities?

External Software Security Problems
Although exploitation of software flaws is a big problem, so, too, are malware and other types of software attacks. A virus, code that is attached to a program and that replicates itself, and a worm, malware that spreads copies of itself throughout networks, are both examples of common attacks. The fact is that malicious, or foolish, people can write and distribute harmful software. Even those who do know how to write code can cause a lot of trouble. Script

kiddies are unskilled crackers who use automated programs created by others to spread mischief. Many tools that can be used for scanning networks, testing for vulnerabilities, exploiting vulnerabilities, and delivering payloads are readily available on the Internet for free. Keystroke loggers have had great commercial success; parents can use them to monitor their children’s Internet activity. One of the most interesting software attacks is the use of a covert channel. A covert channel is designed to send confidential information along with innocent‐appearing data. For example, if you go back to the heading in this lecture called
Iatrogenic Software Security Problems, and took the first letter of every sentence that contains within it a punctuation mark other than a comma or an apostrophe, you could reconstruct my naughty message which is carried in an innocent‐looking couple of paragraphs. Software vulnerabilities are probably the most serious in all of information technology. It’s probably easier to protect the person of the president than it is to protect his itinerary.

Solutions and Confusion
One of the main thrusts of the industry’s efforts to secure software is developing and, perhaps more importantly, enforcing software assurance policies during development and implementation. Policies are general statements that describe required outcomes. Procedures provide the step‐by‐step methods of implementing policy. Even in a mid‐sized company, the time, money, and downright pain associated with the development of a complete and appropriate security policy are immense, and that’s not even considering implementation and enforcement. In order for security policies to be optimally effective, there must be tremendous corporate will, and the reality is that most business organizations lack this will. For some companies, it is relatively painless to create and enforce physical security policies, authentication policies, and other macro‐policies that are easy to audit; but when it comes to enforcing less controllable policies such as complete, parallel, third‐party assurance testing during the coding stage of software development, or consistent intrusion detection response procedures, there may not be sufficient will to overcome the scarceness in personnel, funding, and time. Even when not created as optimally as might be desired, however, a well‐designed and realistic security policy and procedure program can lower an organization’s exposure to risk significantly. In the risk analysis process, assets must be identified and prioritized. It is critically important to understand which business processes are supported by which assets. Some servers will have a higher priority than others based on the business processes they support. At the same time, not all business processes are equal. Business processes that are mission‐critical will have a higher priority than others. This is why it is so important to have IT leaders and managers who are knowledgeable about business priorities. Yes, information technology departments have priorities too, but when it comes to prioritizing policy development, capital expenses,

scheduling, and many other elements of management, business objectives always outweigh IT convenience. The all‐too‐common separation between IT workers and upper‐level management when it comes to information security is an artificial one. Without revenue and without profit, there is nothing to argue about. IT managers need to speak the language of business and understand that, despite the attraction of new technologies and the doomsday disciples
(security vendors), a good, sound risk analysis will answer many questions regarding the need for security controls. It’s not an easy process; it’s very hard to put a value on intangibles, but it can be done. Insurance companies do it all the time.
Today, most business organizations have become completely dependent on digital information storage and communications. The consequences of violating the trust and privacy of clients, business partners, and employees – not to mention the growing number of state and federal regulatory mandates – are potentially catastrophic to the point of threatening the organization’s existence. Meeting the legal and ethical expectations of due diligence in the management of information is an ongoing responsibility, but these responsibilities and challenges can be met dispassionately and logically. This is the ongoing task for managers in information technology and for managers in production and service.

Something to Think About
How can you tell how much exposure to risk you can tolerate? Sure, you can crunch some numbers and come up with the likelihood that something bad will happen, the cost to your company if it does happen, and the cost to implement a control that will decrease the likelihood that the catastrophe will cause damage, but on what do you base your decision whether to implement the control or not? Is it easier to decide based on the cost of the control or on the cost of the potential damage? Which type of event is hardest to assess – the server going down or the building going flat in an earthquake? If you were on the board of directors, how would you determine the degree of accountability when assessing managements' actions or lack of action before a catastrophe?

Similar Documents

Free Essay

Professor of Philosophy

... (Revised 4/2/14)    Course Number  PTS 509  PTS 510  PTS 512  PTS 520  PTS 521    PTS 516  PTS 517  PTS 523  PTS 524  PTS 525  PTS 526  PTS 527  PTS 528  PTS 535  PTS 536        Format  Lecture   Seminar  Lecture  Lecture   Seminar    Lecture  Seminar  Lecture  Seminar  Lecture  Seminar  Lecture  Seminar  Lecture  Seminar      Contact Hours/Semester  42  84  56  14  56    Credits  3  3  4  1  2  Summer I (10 weeks)  Title  Human Gross Anatomy       Applied Human Gross Anatomy  Medical Physiology  Intro to PT Practice & Evaluation Techniques   Applied Intro to PT Prac & Eval Tech      Summer I: Total 252/semester; 25hr/wk    14  28  28  28  28  28  42  56  28  28  13   1  1  2  1  2  1  3  2  2  1  Fall I (14 weeks)  Physiological Regulation of Exertion & Disease   Applied Physiol Reg of Exertion & Disease  Physical Agents   Applied Physical Agents  Biomechanics & Kinesiology  of Movement  Applied Biomechanics & Kinesiology  Foundations of the PT Exam     Applied Foundations of the PT Exam  Functional Neuroanatomy   Applied Functional Neuroanatomy        Fall I: Total 308/semester; 22hr/wk   16   Winter (2 weeks)  PTS 651      PTS 518  PTS 519  PTS 545  PTS 546  PTS 611  PTS 619  PTS 620  PTS 625  PTS 626  PTS 627  PTS 628  PTS 631      PTS 542  PTS 543  PTS 544  PTS 623  PTS 624  PTS 728  PTS 729  Fieldwork: Introduction  Winter: Total   Fieldwork   Lecture  Seminar  Lecture  Seminar  Lecture  Lecture  Seminar  Lecture  Seminar  Lecture  Seminar  Lecture/Lab ...

Words: 817 - Pages: 4

Premium Essay

Che101 Ip

...Lovely Professional University,Punjab Format For Instruction Plan [for Courses with Lectures and Tutorials Course No CHE101 Course Category Cours Title CHEMISTRY Courses with numerical focus Course Planner 14863 :: Ashish Kumar Pandey Lectures Tutorial Practical Credits 3 1 0 4 Text Book: 1 Zumdahl,S., Chemistry: Concepts and applications, Cengage Learning,Indian Edition-2011 Other Specific Book: 2 Suba Ramesh, S.Vairam, Pradnya Tej Godbole ,Engineerig Chemistry, John Wiley, Ist edition ,2011 3 R.T. Morrison and R.N. Boyd, S.K.Bhattacharjee, Organic Chemistry, 7th Edition, Pearson Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) 4 http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-4601 5 http://www.springer.com/chemistry/electrochemistry/journal/10800 6 http://www.sciencedirect.com/science/journal/13882481 7 http://www.springerlink.com/content/100224/ 8 http://www.sciencedirect.com/science/journal/00108545 9 http://pubs.acs.org/journal/joceah 10 http://www.sciencedirect.com/science/journal/00323861 Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 11 http://www.klte.hu/~lenteg/animate.html 12 http://dwb4.unl.edu/chemAnime/atomic_orbits.htm Salient Features Chemistry animation and videos Atomic orbital animations 13 http://www.mhhe.com/physsci/chemistry/essentialchemistry/fla Hybridization animation sh/hybrv18.swf 1 Approved for Spring Session 2011-12 14 http://www.mhhe.com/physsci/chemistry/animations/chang_7e...

Words: 1906 - Pages: 8

Premium Essay

Micro Economic

...Lovely Professional University,Punjab Format For Instruction Plan [for Courses with Lectures and Tutorials ] Course No. ECO111 Course Title: MICRO ECONOMICS L: 4 T: 1 P: 0 Cr: 5 Course Planner :- 13612 :: Chander Shekhar Dogra TextBook 1. Geetika, Ghosh Piyali, Purba Roy Choudhury, Managerial Economics, Tata McGraw Hill, New Delhi, 2008 Other Specific Books 2. 3. 4. Other Readings Ahuja, H.L,”Modern Microeconomics Theory and Applications,” Sultan Chand, 2008 Misra and Puri, Economic Environment of Business, 4th Edition, 2007. Samuelson, P.A. and W.D. Nordhaus (1998), Economics, Tata McGraw Hill, New Delhi 2008 Dominick Salvatore, Managerial Economics, Oxford University Press, Sixth Edition Sr. No. Jouranls atricles as compulsary readings (specific articles, Complete reference) 5 6 7 8 Competition and the cartel crusade, Alan Moran. Review - Institute of Public Affairs. Melbourne:Jan 2008. Vol. 59, Iss. 4, p. 57-59 Supply and Demand Irena Asmundson. Finance & Development. Washington:Jun 2010. Vol. 47, Iss. 2, p. 48-49 Impact of Anti dumping measures on Indian Industry by Swati Jain, Sudhir K. Jain, Decision, Vol 35, No 1, January-June, 2008, p 3. The New Global Opportunity by Michael Elliot, Fortune, July 5, 2010, Vol 162, No 1, Relevant Websites Sr. No. Web adress (only if relevant to the courses) Salient Features 9 10 11 www.ecommerce-guide.com www.bloomberg.co.uk www.mit.edu Excellent source of reference...

Words: 2227 - Pages: 9

Free Essay

Term Papers

...Courses with Lectures and Tutorials Course No ECE210 Cours Title ANALOG CIRCUITS AND LINEAR ICS Course Planner 14649 :: Mohina Kharbanda Lectures Tutorial Practical Credits 3 1 0 4 Text Book: 1 Microelectronics Circuits: Analysis and design by Muhammad H Rashid Other Specific Book: 2 Ramakant A.Gayakwad,”Op-Amps and Linear Integrated Circuits,”4th edition,Pearson Education 3 Electronic Devices and circuits by Millman-Halkias, Tata Mcgraw Hill 4 Roy Choudhary and Shail Jain,”Linear Integrated Circuits”, Wiley Eastern Ltd. Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 5 http://www.rosehulman.edu/.../Rose_Classes/ECE351/Notes/Differential Amplifier Notes.pdf 6 http://en.wikipedia.org/wiki/Electronic_amplifier 7 http://www.doctronics.co.uk/555.htm 8 http://focus.ti.com/lit/an/sboa092a/sboa092a.pdf Salient Features Introduction to differential amplifiers Introduction and Classification of Electronics amplifier 555 Introduction and Application Applications of operational amplifiers Detailed Plan For Lectures 1 Approved for Spring Session 2011-12 Week Number Lecture Number Lecture Topic Chapters/Sections of Pedagogical tool Textbook/other Demonstration/case reference study/images/anmatio n ctc. planned Part 1 Week 1 Lecture 1 Lecture 2 Lecture 3 Week 2 Lecture 4 Lecture 5 Lecture 6 Week 3 Lecture 7 Lecture 8 Lecture...

Words: 1382 - Pages: 6

Premium Essay

Instruction Plan

...Lovely Professional University,Punjab Format For Instruction Plan [for Courses with Lectures and Labs Course No CAP510 Cours Title COMPUTER NETWORKS Course Planner 15946 :: Gunit Kaur Lectures Tutorial Practical Credits 4 0 0 4 Text Book: 1 Behrouz A. Forouzan, Data Communication and networking, 4th Ed., Tata McGraw Hills year of publication 2006 Other Specific Book: 2 Andrew S. Tanenbaum,Computer Network 2nd Edition, PHI, Third Edition 1997 3 Comer E. Doughlas,Computer Networks and Internets, 2nd Ed., Pearson, 2000 4 W. Stallings,Data and Computer Communications, 7th Ed., Pearson, 2002. 5 Black U,Computer Networks-Protocols, Standards and Interfaces, PHI 1996 Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 6 http://authors.phptr.com/tanenbaumcn4/ 7 http://williamstallings.com/DCC6e.html 8 http://www.mhhe.com/forouzan/dcn4sie 9 http://en.wikipedia.org/wiki/Computer_network Salient Features Website on reference book Website on reference book website on text book Provides information on basic concepts of networking 10 http://compnetworking.about.com/od/basicnetworkingconcepts Networking Basics - Key Concepts in Computer Networking /Networking_Basics_Key_Concepts_in_Computer_Networking .htm 1 Approved for Spring Session 2011-12 11 http://www.cisco.com/web/learning/netacad/course_catalog/P Tools required to understand...

Words: 1513 - Pages: 7

Premium Essay

Priyanka

...Course Code ECO111 Course Category Course Title MICRO ECONOMICS Courses with conceptual focus Course Planner 12526::Pooja Kansra Lectures 4.0 Tutorials Practicals Credits 1.0 0.0 5.0 TextBooks Sr No T-1 Title Microeconomics Theory and Applications Reference Books Sr No R-1 R-2 R-3 Other Reading Sr No OR-1 OR-2 OR-3 OR-4 OR-5 OR-6 OR-7 Journals articles as Compulsary reading (specific articles, complete reference) Kwang Ng,Yew,Why Is a Financial Crisis Important? The Significance of the Relaxation of the Assumption of Perfect Competition,International Journal of Business and Economics,2009,Vol.8,No.2,91-114 , Roman Indrest and Tommasso Valletti,Price Discrimination in input markets,The Rand Journal of Economics,Vol. 40,No.1,Spring 2009,1-19 , Cordtz,Dan,Car wars: A global report on Auto Industry,FInancial World,August 22,1989;158,17;ABI/INFORM Global , S.k.Mishra,A Brief History of Production Functions,The IUP Journal of Managerial Economics,November,2010,Vol. VIII,No. 4,pp.6-34 , Monika Jain,Paradox of Plenty,with Special Reference to Inelastic Demand for Apples,The IUP Journal of Managerial Economics,May,2011,Vol. IX,No. 2,pp.4455 , Cathy Locke Bee Staff Writer. The Sacramento Bee ,"EID report reveals household water use on rise An analysis of supply, demand recommends holding off on meters" http://search.proquest.com/docview/246565304?accountid=80692 , Yeung; Vincent Mok,Regional monopoly and interregional and intraregional competition :The parallel trade in coca cola between...

Words: 3278 - Pages: 14

Free Essay

Biomimicry

...Courses with Numerical focus Course Planner 16423::Harsimran Kaur Lectures 3.0 Tutorials Practicals Credits 2.0 0.0 4.0 TextBooks Sr No T-1 Title Advanced Engineering Mathematics Reference Books Sr No R-1 R-2 Other Reading Sr No OR-1 Journals articles as Compulsary reading (specific articles, complete reference) Journals atricles as compulsory readings (specific articles, Complete reference) , Title Higher Engineering Mathematics Advanced Modern Engineering Mathematics Author Grewal, B. S. Glyn James Edition 40th 3rd Year 2007 2011 Publisher Name Khanna Publishers Pearson Author Jain R. K. and Iyenger S. R. K. Edition 3rd Year 2007 Publisher Name Narosa Relevant Websites Sr No RW-1 RW-2 (Web address) (only if relevant to the course) www2.latech.edu/~schroder/comp_var_videos.htm freescienceonline.blogspot.com/2010_04_01_archive.html Salient Features Topic videos available Complex Analysis Reference Material Available LTP week distribution: (LTP Weeks) Weeks before MTE Weeks After MTE Spill Over 7 6 2 Detailed Plan For Lectures Week Number Lecture Number Broad Topic(Sub Topic) Chapters/Sections of Text/reference books Other Readings, Lecture Description Relevant Websites, Audio Visual Aids, software and Virtual Labs Introduction Functions of a Complex Variable Learning Outcomes Pedagogical Tool Demonstration/ Case Study / Images / animation / ppt etc. Planned Lecturing Week 1 Lecture 1 Functions of a Complex Variable and Analyticity(Introduction) ...

Words: 3054 - Pages: 13

Premium Essay

Academic Session

...2012) Session 1 : September 2012 — January 2013 Activity Lecture Mid-semester + Eidul Adha Break Lecture Revision Week Examination Semester Break Date 10 September — 25 October 2012 26 October – 4 November 2012 (Eidul Adha : 26 Oktober 2012) 5 November – 21 December 2012 22 December 2012 – 2 January 2013 3 – 21 January 2013 22 January – 3 Mac 2013 Length of time 7 weeks 1 week 7 weeks 1 week 19 days 6 weeks Session 2 : March 2013 – July 2013 Activity Lecture Mid-semester Break Lecture Date 4 March – 19 April 2013 22 – 28 April 2013 29 April – 24 May 2013 27 May 2013 – 2 Jun 2013 (Harvest Festival : 30-31 May 2013) (Gawai : 1-2 June 2013) 3 – 21 Jun 2013 22 – 25 Jun 2013 26 Jun – 14 July 2013 15 July 2013 – 8 September 2013 Length of time 7 week 1 week 4 weeks Special Leave (Harvest Festival & Gawai) 1 week Lecture Revision Week Examination Semester Break 3 weeks 4 days 19 days 8 weeks Notes: 1. The sessions above are applicable to all Degree, Master and Doctoral programmes in UiTM. 2. There are two (2) sessions per academic year. Each session consists of: . Lectures 14 weeks . Mid Semester Break 1 week . Revision Week ½ - 1 week - Examination 2½ - 3 weeks Approved by UiTM Senate Academic Sessions 2012-2013 Universiti Teknologi MARA Pre-Diploma, Diploma and Asasi Programmes (Updated: 12 April 2012) Session 1 : June — October 2012 Activity Lecture Mid-semester Break Lecture Revision Examination Supplementary Examination Semester Break...

Words: 451 - Pages: 2

Premium Essay

How to Get Yourself

...2012) Session 1 : September 2012 — January 2013 Activity Lecture Mid-semester + Eidul Adha Break Lecture Revision Week Examination Semester Break Date 10 September — 25 October 2012 26 October – 4 November 2012 (Eidul Adha : 26 Oktober 2012) 5 November – 21 December 2012 22 December 2012 – 2 January 2013 3 – 21 January 2013 22 January – 3 Mac 2013 Length of time 7 weeks 1 week 7 weeks 1 week 19 days 6 weeks Session 2 : March 2013 – July 2013 Activity Lecture Mid-semester Break Lecture Date 4 March – 19 April 2013 22 – 28 April 2013 29 April – 24 May 2013 27 May 2013 – 2 Jun 2013 (Harvest Festival : 30-31 May 2013) (Gawai : 1-2 June 2013) 3 – 21 Jun 2013 22 – 25 Jun 2013 26 Jun – 14 July 2013 15 July 2013 – 8 September 2013 Length of time 7 week 1 week 4 weeks Special Leave (Harvest Festival & Gawai) 1 week Lecture Revision Week Examination Semester Break 3 weeks 4 days 19 days 8 weeks Notes: 1. The sessions above are applicable to all Degree, Master and Doctoral programmes in UiTM. 2. There are two (2) sessions per academic year. Each session consists of: . Lectures 14 weeks . Mid Semester Break 1 week . Revision Week ½ - 1 week - Examination 2½ - 3 weeks Approved by UiTM Senate Academic Sessions 2012-2013 Universiti Teknologi MARA Pre-Diploma, Diploma and Asasi Programmes (Updated: 12 April 2012) Session 1 : June — November 2012 Activity Lecture Mid-semester Break Lecture Revision Examination Supplementary Examination Semester Break...

Words: 451 - Pages: 2

Premium Essay

Netw 202 Week 2 Quiz

...NETW202 Week 2 Quiz #1 Grade Details - All Questions | Question 1. | Question : | (TCO 1) _____ service delivers the fastest connections available at an economical megabit-per-second price. | |   | Student Answer: | | Dedicated leased line |   | | | DSL |   | | | Fiber-optic Ethernet |   | | | Satellite |   | Instructor Explanation: | Chapter 1.2.4.3, Week 1 Lecture | | |   | Points Received: | 5 of 5 |   | Comments: | | | | Question 2. | Question : | (TCO 1) With _____, message priorities are matched with the type of communication and its importance to the organization. | |   | Student Answer: | | fault tolerance |   | | | server pathways |   | | | quality of service |   | | | scalability |   | Instructor Explanation: | Chapter 1.3.2.1, Week 1 Lecture | | |   | Points Received: | 5 of 5 |   | Comments: | | | | Question 3. | Question : | (TCO 1) Redundant connections allowing for alternate paths if a link or device fails is known as _____. | |   | Student Answer: | | fault tolerance |   | | | server pathways |   | | | quality of service |   | | | scalability |   | Instructor Explanation: | Chapter 1.3.2.1, Week 1 Lecture | | |   | Points Received: | 5 of 5 |   | Comments: | | | | Question 4. | Question : | (TCO 1) Which of the Internet connection options provides the lowest bandwidth? | |   | Student Answer: | | Cable |   | | | DSL |   | | | Leased lines |   | | |...

Words: 545 - Pages: 3

Premium Essay

Mars Company

... |Academic Year: 2015/2016 | |(please tick “(”) | | |Hours/Week: Lecture __2__ , Tutorial __1.5__ , Laboratory/Practical ___-____ | |Week | |Topics |Reference Material |Remarks* | | | | |(Books/Titles, Journals, Web articles, etc.) | | |Week 1 |Lecture |Introduction to Services Marketing (1) |Essentials of Services Marketing - | | |...

Words: 763 - Pages: 4

Premium Essay

Doc 1

...[pic] |Quantitative Methods – MAT 540 | |Student Course Guide | |Prerequisite: MAT 300 | |INSTRUCTIONAL MATERIAL – Required | |( including all mandatory software) | |Taylor, B. M. (2010). Introduction to management science (10th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. | |Treeplan add-on for Excel. This software is available in the Open Lab at Strayer campuses, and can also be downloaded from the textbook's | |companion Website. http://wps.prenhall.com/bp_taylor_introms_10/112/28870/7390752.cw/-/7390754/index.html | | | |COURSE DESCRIPTION | |Applies quantitative methods to systems management...

Words: 2976 - Pages: 12

Premium Essay

Acc 212

...Financial Accounting ACCT212 – Week 1 Live Lecture Goals of this Week’s Lecture • Present you with the information you need to begin succeeding in Financial Accounting • Provide a forum for question and answer regarding this week’s material • Begin satisfying our weekly TCO and key concepts ACCT212 Week 1 Lecture 2 How to be Successful? • All the information you need to be successful in this course comes from four primary sources: 1. 2. 3. 4. Your textbook eCollege This lecture, and Your instructor ACCT212 Week 1 Lecture 3 Financial Accounting – Week 1 • • • • • • • • • • Terminal Course Objective for the Week Key Concepts of the Week Business Decisions Accounting is the Language of Business Accounting Principles and Concepts The Accounting Equation The Financial Statements Relationships Among Financial Statements Account Types Getting Started on Project 1A ACCT212 Week 1 Lecture 4 TCO of the Week • TCO 1: “Given financial statements, explain the financial statements’ purpose and components relative to accounting history, assumptions, concepts, principles, and standards.” ACCT212 Week 1 Lecture 5 Key Concepts of the Week • Use accounting vocabulary • Learn accounting concepts and principles • Apply the accounting equation to business organizations • Evaluate business operations • Use financial statements ACCT212 Week 1 Lecture 6 Business Decisions • Suppose you are an investor with $10,000 to invest in any company you choose...

Words: 1937 - Pages: 8

Free Essay

Ape Nta

...(Updated: 20 January 2012) Session 2 : March — July 2012 Activity Lecture Mid-semester Break Lecture Revision Examination Intersession Eid Break Intersession Intersession Examination Semester Break Date 5 March — 20 April 2012 21 — 29 April 2012 30 April — 15 June 2012 16 — 24 June 2012 25 June — 15 July 2012 23 July — 17 August 2012 18 — 26 August 2012 (Eid : 20 August 2012) 27 August — 30 August 2012 3 — 7 September 2012 16 July — 9 September 2012 Length of time 7 weeks 1 week 7 weeks 1 week 3 weeks 4 weeks 1 week 1 week 5 days 8 weeks Session 1 : September 2012 — January 2013 Activity Lecture Mid-semester + Eidul Adha Break Lecture Revision Week Examination Semester Break Date 10 September — 25 Oktober 2012 29 Oktober – 4 November 2012 (Eidul Adha : 26 Oktober 2012) 5 November — 21 December 2012 24 December 2012 - 1 January 2013 3 - 20 January 2013 21 January - 3 March 2013 Length of time 7 weeks 1 week 7 weeks 1 week 3 weeks 6 weeks Notes: 1. The sessions above are applicable to all Degree, Master and Doctoral programmes in UiTM. 2. Student registration according to group occurs within the period of 3 weeks before the lecture commences. The details are given in the Academic Calendar of each session which can be viewed from the Academic Affairs portal. 3. There are two (2) sessions per academic year. Each session consists of: . Lectures 14 weeks . Mid Semester Break 1 week . Revision Week ½ - 1 week . Examination 2½ - 3 weeks To Be Approved by UiTM Senate ...

Words: 478 - Pages: 2

Premium Essay

Capstone

...Lovely Professional University, Punjab Course Code MGT519 Course Category Course Title OPERATIONS MANAGEMENT Courses with numerical and conceptual focus Course Planner 16031::Gurpreet Kaur Lectures 3.0 Tutorials Practicals Credits 1.0 0.0 4.0 TextBooks Sr No T-1 Title Operations Management Reference Books Sr No R-1 R-2 Other Reading Sr No OR-1 OR-2 OR-3 OR-4 OR-5 OR-6 OR-7 OR-8 OR-9 OR-10 OR-11 OR-12 Journals articles as Compulsary reading (specific articles, complete reference) The four things that a service Business must get right HBR Article , Bang & Olufsen Design Driven Innovation : HBR , Smart Product Design : HBR , Mishina, Kazuhiro. Toyota Motor Manufacturing, U.S.A., Inc. HBS Case No. 9-693-019. Harvard Business School Publishing, Boston, 1995. , Hammond, Janice H. Barilla SpA (A). HBS Case No. 9-694-046. Harvard Business School Publishing, Boston, 1994. , Latour, Almar. Nokia Handles Supply Shock with Aplomb as Ericsson of Sweden Gets Burned. The Wall Street Journal. Dow Jones & Company, Inc., 2001. , National Cranberry Cooperative HBS #688122. From Case Map , John Crane UK Ltd Case : The CAD CAM Link . HBS #691021,24p , To Move or not to Move .Case of Cathay Pacific Airways . University of Hong Kong HBS #HKU003,22p , Note on Quality: The Views of Deming, Juran, and Crosby HBS .687011 , Process Control at Polaroid , HBS, #693047 , LL Bean Item Forecasting and Inventory Management HBS, #893003, 5p , Johson Control Automotive Systems , HBS,#69308623p , Title Operations...

Words: 3895 - Pages: 16