Free Essay

Proj Mgmt

In:

Submitted By sixfeet84in
Words 3167
Pages 13
GIAC Enterprises

Security Controls Implementation Plan
Group Discussion and Written Project

John Hally, Erik Couture 08/07/2011

GIAC Enterprises – Security Controls Implementation Plan

Table of Contents
Executive Summary Introduction Security Controls Implementation Plan Incident Response Weekend Plan Conclusions References 3 3 4 6 9 9

2

GIAC Enterprises – Security Controls Implementation Plan

Executive Summary
The cyber-threat landscape has evolved significantly in recent years. From primarily a threat of denial of service and website vandalism in years past, to the currently advanced and well resourced adversaries employing complex technologies to achieve financial and political benefit. At GIAC Enterprises, we have observed huge increases in suspicious network activity directed at our corporate networks, sometimes even targeting key individuals. Due to the huge global increase in demand for fortune cookie messages, it is reasonable to expect that this undesired attention will only increase in the coming months and years as cyber-criminals and possibly corporate spies attempt to closely monitor our business activities and steal vital business information. This paper presents the recommendations of the tiger team, which was recently formed, with the goals of: 1. Developing a strategy for the implementation of the SANS Top 20 Security Controls, and in particular the creation of an incident response capability; and 2. Identifying and eradicating any possible current malware infections. We strongly recommend a focus on detection; the computer security adage goes: “Prevention is ideal, but Detection is a must”. We recommend the implementation of a phased implementation of the SANS Top 20 Controls over the next several months; first focusing on identifying and removing any existing malware, followed by the implementation of a robust incident handling process which will aim to detect and mitigate any future threats. This incident response capability will help allow time for additional security controls to be brought on line in a logical order to maximize their positive impact on the security of our networks and by extension, the profitability and continued success of GIAC Enterprises business.

Introduction
This tiger team was initiated partially in response to a briefing given to management from an outside security firm, outlining the possible threat of Advanced Persistent Threat (APT) malware; in particular the Shady RAT, a remote access tool or ‘trojan’ which has been deployed extensively and in a very targeted manner by elements of the APT. The scope of this paper extends not only to addressing our exposure, if any, to this specific threat but presents a high-level plan for the implementation of computer security best-practices throughout our enterprise. The selected set of best-practices are the “SANS Twenty Critical Security Controls for Effective Cyber Defense” which form an excellent guide for the securing of any computer network, providing general guidance and suggested quickaction/high-payoff items to mitigate some of the most critical vulnerabilities as rapidly as possible. This paper will first introduce the SANS 20 Security Controls and lay out a plan for their implementation, as appropriate. It will recommend a way forward in the creation of an incident response capability, including required procedural, technical and policy changes. Finally, it will outline a deliberate network analysis and incident handling process with the goal of detecting any existing breaches (but focused on Shady RAT in particular) to the corporate network and remedying the situation as required.

3

GIAC Enterprises – Security Controls Implementation Plan

Security Controls Implementation Plan
Computer security cannot be effectively addressed in a arbitrary manner. Rather, any effective long term defense must employ a well planned approach which considers the problem holistically; applying the principles of defense in depth, leveraging automation where possible, identifying and addressing the root causes of issues and providing measurable metrics of the effectiveness of the risk mitigation. It is in this spirit that the SANS 20 Critical Security Controls were developed as a framework to help guide organizations. The 20 Controls guidelines can appear somewhat overwhelming at first glance, as they seem to imply there are thousands of things to do, and most of it as a high priority. Clarity comes from the careful assessment of our organization’s risk profile and current in-place policies. We can then achieve measured, incremental improvements step by step. The first step is to undertake a gap assessment to determine our current security posture and risk profile. We will identify our most critical business information and map out where it resides, how it moves over the network, and who should have access to it. This will provide a baseline with which to identify the most critical security controls to implement. While the gap assessment has not yet been completed fully, a first draft of an order of priority is included in the Project Plan annex. Once the critical gaps in our security posture have been identified and priority has been assigned to the security controls we wish to implement the implementation of Quick Win controls will provide a rapid benefit in key area, picking the proverbial low-hanging fruit and significantly reducing our risk profile; in many cases for very little cost. Several of the security controls should be work on concurrently; each will be assigned to a relevant departmental lead, such that System Administrators, Security Administrators, and management can collaborate and move ahead on a number of initiatives concurrently. Security awareness and training, not just of technical staff but of all users, will pay dividends in faster identification of warning signs of possible network breaches. It will help reduce the danger of accidental or negligent internal threats and promote responsible and secure use of our corporate data and IT infrastructure. This training should be espoused at the highest level of management and afforded time and support to revisit on a regular basis. Over time, as the initial controls are implemented, successfully automated and regularly audited, we should move to implement lower priority but still important control over the next 12-24 months.

4

GIAC Enterprises – Security Controls Implementation Plan

Creating an incident response capability
The 18th Security Control involves the creation of an incident response (IR) capability. This capability is composed of much more then a group of individuals, which will respond to an incident. Such an incident handling (IH) team is certainly a key component of such a capability, but needs to be supported with a robust set of policies and processes to enable its success. Several of these supporting items are clearly outlined as Quick Wins (QWs) within the SANS Top 20. In the near term, GIAC Enterprises will implement the base of a holistic IR capability, whose first order of business will be to collaborate on a deliberate audit of our networks (described later in this document). The team will be comprised of: ● ● ● ● Team Lead - a member of senior management Technical Lead - CIO Senior Security Administrator Senior Network Administrator

This team will implement the following actions, as indicated on the timeline in the enclosed annex. ● ● ● Led by the Team Lead, the team will define and assign specific roles and responsibilities to the team members. Job titles and specific duties will be outlined, and alternative/backup members will be identified. Led by the CIO, the team will develop a clear IH process that will, in particular, define the critical points at which input and decisions are required. Details of the process are outlined in the following section. Led by the Senior Security Admin, a concise awareness document will be developed, targeted at the user base at large. The ‘cheat-sheet’ will educate the reader on what types of indicators of possible security issues to look for on the network, and when and how to report them. This document will be launched at an employee training session and will be revisited periodically. Led by the Senior Network Administrator, incident recovery standards will be developed and published. A thorough analysis of the networks, data centers and hosts will be conducted and estimates will be published indicated estimated time to repair and priority of repair. This document will form the basis for the response to any incident and will allow the IH team to rapidly allocate resources to recovering the most critical systems first.



The members of the IH Team must be carefully selected to possess the skills required for their effective leadership in preparation for, during and after a computer incident occurs. In particular, they must possess superior management skills, which will permit them to rapidly assess the situation and take sound action to minimize negative impacts. They must also possess strong technical and communications skills which will enable them to grasp the impact of the issue and concisely explain it to decision makers at relevant points in the incident response process. The incident response capability should be exercised regularly to ensure all concerned individuals and decision makers are aware of their parts. The IR Weekend, described in this document, will provide our IH team an opportunity to exercise the foundations of our IR plan, noting lessons learned and improving the process for future iterations.

5

GIAC Enterprises – Security Controls Implementation Plan

Incident Response Weekend Plan
A key assigned task of this tiger team is to develop a plan for the deliberate assessment of any current breaches of the network and conduct a thorough recovery over a planned weekend maintenance period. In particular, the tiger team has been assigned to assess the possibility of any breach by the Shady RAT malware. This strategy will involved significant pre-planning and coordination between all relevant parties and will be led by the IH Team as outlined above. In keeping with industry best practices, the six phases of incident response will be used as the basis for the incident response weekend plan. These phases are: 1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned

Preparation
The preparation phase for the incident response weekend plan will consist of the following: ● Form IH team ● Create reporting structure ● Create communication plan In close collaboration with the Detection tiger team, the IH team will leverage several tools and techniques for identifying advanced persistent threat (APT) behavior to seek out and eradicate Shady RAT, and any other infestations. Creating a clear reporting structure within IH team and between system owners and management is critical for the success of the response plan. The IH team will need to know who to contact should any issues arise with the plan execution. System owners and management will need to be kept up to date with regard to systems that have been identified as compromised to determine the impact and risk to the organization due to the remediation process. A communication plan will be created consisting of: ● Contact lists of key individuals from the reporting structure ● Phone bridge number(s) ● Fax numbers or other emergency methods of communication ● Email addresses and public encryption keys for encrypted communication This communications plan will be exercised during the incident response weekend activities.

Identification
Identification of Shady RAT compromised systems will leverage the existing work of the Detection tiger team’s implementation of correlation tools and network monitoring infrastructure. Because of the potential of the malware morphing as a result of direct attempts of identification (scanning, local system command execution, etc.), the identification process will be primarily passive in nature using network monitoring as the basis for detection. The identification process with consist of: ● Identify/implement new traffic signatures for Snort/Sguil detection (Emerging Threats) ● Identify infected systems based on IDS alerts, DNS queries, and correlation using the Security Onion installation. The following will be recorded for use during the containment and eradication phases of the response plan: ○ IP address

6

GIAC Enterprises – Security Controls Implementation Plan
○ ○ ○ MAC address Switch port locations (IP to MAC to CAM table associations) Wireless access point associations if applicable.

Systems that have been identified will be evaluated based on business and asset criticality, and prioritized for the remaining incident response phases. System owners and management will be contacted to communicate the impact of containment and eradication phases on systems and gain authorization for remediation of critical systems. In the absence of any clear asset criticality identification, the following ratings will be used: ● Data center servers providing business functionality - High ● High level executives/technologists/support personnel desktops/laptops/tablets - Medium ● End user desktops/laptops - Low Additionally, after consulting with forensics expert Rob Lee, the following additional steps should be taken in order to root out all malware infestations to have the best chance of eliminating the advanced persistent threat and mitigate reinfection from occurring: ● Live-image known systems that appear to be compromised. ● Complete a thorough forensic analysis of each image ● Use the information gleaned from the forensic analysis to develop additional detection mechanisms such as file hashes, registry keys and other malware threat intelligence. ● Process lists that have been statistically analyzed for ‘Frequency of Least Occurrence’. ● Use this information to actively scan the enterprise looking for additional systems that are infected but lay dormant. Using this approach iteratively to identify all infected systems, both active and dormant, will substantially increase the chances of successful elimination of the advanced persistent threat posed by malware used in Operation Shady RAT.

Containment
Once the compromised systems have been identified using the Detection tiger team’s network detection and correlation tools, methodologies, and countermeasures, the containment phase of the incident response plan will be initiated. The containment phase will consist of the following tasks: ● Backup/forensic image of systems for post remediation analysis ● Shut down switch port and/or remove network cable of the compromised hosts ● Add MAC filters to wireless access points for any identified compromised wireless clients, disable wireless cards. ● Apply firewall rules for identified malicious ingress/egress traffic. ● Enable Intrusion Prevention System functionality. ● Force web traffic through proxies allowing only HTTP/HTTPS traffic to/from the proxy addresses at the firewalls. ● Leverage access controls and other security functionality within the proxy to mitigate attack vectors ● Implement file attachment scanning and/or stripping at the mail servers where applicable to mitigate the malicious file attachment attack vectors. Close communication with the Detection tiger team during the containment phase will allow the IH team to determine containment progress based on alert generation or lack thereof. Additional anomalous behavior that is detected during this phase could indicate morphed malware that can be further analyzed and used for additional detection capabilities. Once alerts are no longer being generated for Shady RAT activity and a steady state has been reached, the eradication phase will begin. Additionally, system owners and management will be apprised of the execution and progress during this phase.

7

GIAC Enterprises – Security Controls Implementation Plan

Eradication
Based on current research and analysis available, there is no current way to thoroughly clean a compromised system and be completely certain of the system’s integrity. As such, the eradication phase requires a full disk wipe and reimage of the system. The following steps will be conducted to eradicate Shady RAT infections: ● Wipe system drive(s) ● Re-image systems/restore from backups ● Patch/harden Systems ● Install Anti-Virus, Anti-Malware, Host Intrusion Detection System (HIDS) Care must be taken when re-imaging and/or restoring systems from existing system images and backups. If the integrity of the backups or system images is in question, a full re-installation of the systems and applications from original media may be necessary. It is also important to fully patch and harden the operating systems as well as install enterprise Anti-Virus and AntiMalware packages to help mitigate future compromise. Current analysis by Symantec has indicated that their antivirus solution provides protection within their Trojan.Downbot family signatures against common threat vectors used by Shady RAT during the initial exploitation phase. Additionally, Symantec’s reputation based technologies can also be leveraged to proactively protect systems against the common files used in these attacks Host Intrusion Detection Systems such as OSSEC will also be installed to detect and correlate potential attacks and identify attack vectors for increased incident response capabilities in the future.

Recovery
Once the eradication phase has been completed, the recovery phase will be initiated. This phase returns the oncecompromised systems back to their normal state and function. The recovery phase will consist of the following: ● Validate systems function normally ● Restore operations/accessibility to systems ● Monitor systems using: ○ Network IDS ○ Host-based IDS ○ System log monitoring Monitoring of remediated systems during this phase is critical to determining if the incident has been completely mitigated or if there are still undiscovered attack vectors that allow for system compromise. Baselines should be taken and any anomalous traffic should be fully investigated in order to identify if additional remediation is required.

Lessons Learned
The final phase of the incident response plan will be to hold a Lessons Learned meeting with the IH and Detection tiger team. During this meeting any insights gained during the incident response plan execution can be distributed through the team members in order to increase the incident response capabilities of the team. The information and insights from these meetings will be used to initiate improvements to technology, processes and the incident handling capabilities of the response teams. A final formal report of all weekend incident response activities will be created and distributed to system owners and management for review.

8

GIAC Enterprises – Security Controls Implementation Plan

Conclusions
This report makes the following recommendations: 1. 2. An incident handling team should be created and enabled with the time and resources to develop and implement a robust IH plan. A planned outage should be conducted on an upcoming weekend in order to assess any possible exposure to threats and remedy as necessary. Significant time and resources will be required in the following days, prior to the planned outage to allow network security staff to conduct thorough passive analysis of the network traffic and develop the details of the weekend incident response plan. In the medium and long term, GIAC Enterprises should dedicate the time and resources to implementing the SANS Top 20 Controls, in a measured and deliberate fashion, focusing on the implementation of Quick Wins to maximize the return on investment.

3.

References
Revealed: Operation Shady RAT, Dmitri Alperovitch, Vice President, Threat Research, McAfee http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines (CAG), Version 3.0 April 15, 2011, http://www.sans.org/critical-security-controls/ Shady RAT Backgrounder: http://www.symantec.com/connect/blogs/truth-behind-shady-rat Shady RAT Code: http://read.pudn.com/downloads119/sourcecode/windows/network/508294/htran/htran.cpp__.htm Snort Signatures for Shady RAT behavior: Daily Update August 4th 2011, Signatures:2013361 2013362, 2803355, 2803356: http://blog.emergingthreatspro.com/2011/08/daily-update-summary-842011.html Sourcefire Vulnerability Research Team: http://www.sourcefire.com/security-technologies/snort/vulnerability-research-team/advisories Security Onion IDS: http://securityonion.blogspot.com/ Windows Incident Response, APT and Frequency of Least Occurrence: http://windowsir.blogspot.com/2010/01/thoughts-on-apt.html NIST Special Publication 800-61: http://csrc.nist.gov/publications/nistpubs/800-61- rev1/SP800-61rev1.pdf

9

Similar Documents

Premium Essay

Proj Mgmt

...THE IMPORTANCE OF TRANSACTIONAL LEADERSHIP IN SPORTS Coaches as the most important success factors utilize different leadership styles in orienting sport teams. If we consider sport teams as an organization and its members as the staff of an organization, in that case, the coaches play the role of managers and orient a team. Furthermore, one of their duties besides planning is to deploy players and control their performance and perform leadership. Confirming this ideal, Chelladurai (2001) and Kolaric, (2005) believe that coaches play the role of managers and they are supposed to do similar duties as managers do. The style which is displayed by coaches in leadership; according to most of researchers performed on effective coaches indicate the rate of their influence on performance, behaviour and ideal psychological performance (such as motivation, satisfaction and commitment) of sportsmen on one side and team integration on the other. Being an athlete most of my life I have been exposed to many transactional leaders in the form of coaches. The best example would be my current cricket coach because he relies on small goals to achieve a larger goal, top the national south championship. As the coach his role as a leader was to push us to our limits and slightly beyond, and he achieved this phenomenon by forcing us to set short and long term goals individually as well as for the team. By having individuals write down our personal goals my coach could hold us accountable...

Words: 1489 - Pages: 6

Premium Essay

Itm 423 - Module 1 Case Assignment (Sys Acq, Dev & Proj Mgmt)

...TRIDENT UNIVERSITY INTERNATIONAL ITM 423: System Acquisition, System Development and Project Management Module 1: IT Systems Planning and Acquisition Case Assignment May 2014 Term May 25, 2014 Assignment: Prepare a 4-6 page paper addressing the following issue: “Review the Challenges in IT System Planning and Discuss in Detail the Problem of Scope Creep” Review the Challenges in IT System Planning and Discuss in Detail the Problem of Scope Creep The overall goal of any project manager is to successfully deliver the project they are overseeing to the customer on time and within the budget that was allotted. This is a lofty goal when you consider that an overwhelming majority of projects do not meet this criteria. To put a figure to that, Claudia Vandermitt in her 2011 article on Managing Scope Creep makes a note to mention that only 32% of all projects were successful in completing on time and on budget. That is quite a shocking percentage, but when you think about how fast IT technology is advancing and creating solutions that encompass the whole enterprise then you can start to get a better picture of the internal and external factors that a project manager needs to plan for to make things not spiral out of control. This is what is going to set the backdrop of this assignment and here I will expand upon and analyze these concepts. For this assignment I’ll start out by discussing the challenges faced in IT systems planning and things the project manager will...

Words: 2477 - Pages: 10

Free Essay

Engl 230

...ACC 560,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 560,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 561,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 561,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 565,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 565,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACCT 346,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACCT 346,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACCT 434,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACCT 434,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACCT 567,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACCT 567,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, PHI 200,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, PHI 200,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, Res 301,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, Res 301,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford BA 215,Course...

Words: 4565 - Pages: 19

Free Essay

Hist 415

...,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 307,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 307,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 344,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 344,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 346,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 346,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 403,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 403,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 504,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 504,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 560,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 560,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 561,Course,Complete,All,Entire,final,Week,1,2,3,4,5,6, ACC 561,dq,discussion,question,assignment,midterm, ,exam,quiz,Strayer,Latest,New,Project,Keller,Homework,Phoenix,Ashford, ACC 565,Course,Complete,All...

Words: 5653 - Pages: 23

Premium Essay

Final Exam Schedule of Spring 2015-2016

...AMERICAN INTERNATIONAL UNIVERSITY-BANGLADESH Spring’ 2015-2016 FINAL EXAM SCHEDULE [Released on March 29, 2016] Day 1: April 23, 2016 (Saturday) TIME 9:3011:30 Building 1, 5 & 4 PRINCIPLES OF ECONOMICS ECONOMIC GEOGRAPHY EMBEDDED PROGRAMMING MEASUREMENT & INSTRUMENTATION PROFESSIONAL TRAINING BASIC PLANNING SELECTION AND STAFFING [HRM] Building 7 CHEMISTRY NEWSPAPER DESIGN, MAKE UP AND DESKTOP PUBLISHING DEVELOPMENT ECONOMICS GLOBAL FINANCE MODERN PHYSICS THEORY OF COMPUTATION FINANCIAL INSTITUTIONS AND MARKETS LEGAL ENVIRONMENT IN BUSINESS BRAND & PRODUCT MGMT.[MKT.] INTRO. TO SOCIOLINGUISTICS 12-2 3-5 PHYSICS 2 LEGAL SYSTEM OF BANGLADESH [LAW] BUILDING AND FINISH MATERIALS STRUCTURE-I (BASIC MECHANICS OF SOLIDS) CONTROL SYSTEM BASICS IN SOCIAL SCIENCE ENTREPRENEURSHIP DEVELOPMENT TRAINING & DEVELOPMENT [HRM] SOFTWARE REQUIREMENT ENG. RURAL MARKETING [MKT.] PROFESSIONAL PRACTICE STATISTICS & PROBABILITY STATISTICS & PROBABILITY CONTEMPORARY ISSUES IN GLOBAL ECONOMY INTRODUCTION TO ECONOMICS PUBLIC SPEAKING POWER STATIONS Released on March 29, 2016 SECTIONS A,B,C,D,E,F,G,H,I,J,K,L,M,O,P,Q,R A,B,C,D,E A A,B A A A,B A,C1,C2,C3,C4,C5,C6,C7,C8 A A A,B,C A,B,C,D,E,F,G,H A,B,C,D,E,F,G,H,I A,B,C B,C,D,I,J A,B A A,B,C,D,E,F,G,H,I,J,K,L,M,N,O F1 A A A,C,D A,B,C,E,F,G,H,I, A,B,C,E,F,G,H,I A A,B,C A A N,O,P,Q A,B,C,D,E,F,G,H,I,J,K,L,M A A A A,B,C,D,E,F,G Day 2: April 24, 2016 (Sunday) ...

Words: 1987 - Pages: 8

Premium Essay

Rough

...monitoring, and controlling projects. Project is an interrelated set of tasks Define and org projects: scope, manager/team [fsd/tsd], org structure [func, pure, matrix] Project planning [5 steps]: wbs, n/w, schedule, cost-time trade-offs, risks Scheduling: [----, -, |], path [sequence], ES [max EF], LF [min LS], gantt chart [proj. schedule, Est. St and finish and precedence relations] Cost-time trade-offs: finish early [more workers] but costs inc, indirect cost [depreciation, adminis], direct [labor, material]; crash time [shortest time to complete activity]-> crash cost associated. Risk: measure of prob. And conseq of not reaching project goal, ((risk-mgmt plan: identify key risks, ways to avoid them-> strategic fit [project not linked with org goals], product/serv attribute [new pro/serv, risks, competition, lawsuits], project team capability [size, complexity of project], operations [risks, less accuracy, comm, estimates])) Simulation-> use random no. see random variation on performance measure: 3 estimates op(a), most likely time(m), pes(b) Monitoring and controlling project- PROJECT STATUS: open issues [resolve it], risks [might delay proj], schedule status [chk slack time to maintain schedule]; PROJECT RESOURCES: Resource Leveling [chk ES LS and shift schedule], Allocation [take out from high slack and assign to most imp act] and Acquisition [add overloaded/ scarce resource]; CONTROLLING PROJECT: prep final report, give reco to imp processes. PLC [DOPE C] Excessive...

Words: 1664 - Pages: 7

Premium Essay

Chapter 17: Multinational Financial Management Test Banks

...CHAPTER 17 MULTINATIONAL FINANCIAL MANAGEMENT (Difficulty Levels: Easy, Easy/Medium, Medium, Medium/Hard, and Hard) Please see the preface for information on the AACSB letter indicators (F, M, etc.) on the subject lines. Multiple Choice: True/False (17-2) Multinational fin. mgmt. F T Answer: a EASY [i]. Multinational financial management requires that financial analysts consider the effects of changing currency values. a. True b. False (17-2) Multinational fin. mgmt. F T Answer: b EASY [ii]. Legal and economic differences among countries, although important, do NOT pose significant problems for most multinational corporations when they coordinate and control worldwide operations and subsidiaries. a. True b. False (17-3) Currency appreciation F T Answer: a EASY [iii]. When the value of the U.S. dollar appreciates against another country's currency, we may purchase more of the foreign currency with a dollar. a. True b. False (17-3) Floating exchange rates F T Answer: a EASY [iv]. The United States and most other major industrialized nations currently operate under a system of floating exchange rates. a. True b. False (17-4) Exchange rates F T Answer: b EASY [v]. Exchange rate quotations consist solely of direct quotations. a. True b. False (17-4) Cross rates F T Answer: a EASY [vi]. Calculating a currency cross rate involves determining the exchange...

Words: 5866 - Pages: 24

Premium Essay

Econ 125-Hk2. Economics for Managers Exam

...ECON 125-HK2. Economics for Managers Exam http://homeworkfy.com/downloads/econ-125-hk2-economics-for-managers-exam/ To Get this Tutorial Copy & Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com Visit our Site for More Tutorials: (http://homeworkfy.com/ ) > TAKE ASSESSMENT: EXAM 1 Question 1 2 points Save Which of the following economic systems abolishes all private property? communism socialism fascism all of the above Question 2 2 points Save The profit motive is one characteristic of a command economy. True False Question 3 2 points Save In a market system, the government enforces laws ensuring that private enterprises and conditions of competition will prevail. True False Question 4 2 points Save The most common type of business in the United States is the corporation. True False Question 5 2 points Save Laissez-faire is a policy of no government intervention in the economic activities of individuals and businesses. True False Question 6 2 points Save In a partnership, each partner’s liability is limited to his or her contribution to the partnership. True False Question 7 2 points Save There are no government-regulated markets in the U.S. economy. True False Question 8 2 points Save Which of the following is not among the United States’ economic goals? ...

Words: 8412 - Pages: 34

Premium Essay

Acquisition Law

...Principles of Project Management Course Outline Volume I About the Microsoft Project Screens .........................................................................iv Segment 1. The Background of Project Management (Includes PMBOK® Guide Chapter 1 & 2) ....................................................................................................... 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 Introductions, course materials, housekeeping & homework Definition, examples and characteristics of projects About Project Management Institute & other PM organizations Projects and emerging industries Programs & portfolios and project management office Environmental enterprise factors and organizational process assets Project & product life cycles Stakeholders Organizational structures & influences Segment 1 questions......................................................................... 22 Segment 2. The Gospel According to PMBOK® Guide (Includes PMBOK® Guide Chapter 3) ........................................................................................................... 27 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 3.1 PMBOK® Guide Organization Initiation processes Planning processes Execution processes Monitoring & controlling processes Closing processes Course Guide Exercise: Memorize the process matrix ............................................... 46 Project Assessment 3.1.1 Benefit Measurement Methods 3.1.1.1 Life Cycle Costing & Net Present Value 3.1.1.2 Internal Rate of Return...

Words: 67153 - Pages: 269

Premium Essay

Remediation Market

...This page intentionally left blank Office of Solid Waste And Emergency Response (5102G) EPA 542-R-04-015 September 2004 www.epa.gov/tio clu-in.org/marketstudy Cleaning Up the Nation’s Waste Sites: Markets and Technology Trends 2004 Edition This page intentionally left blank Notice Preparation of this report has been funded wholly or in part by the United States Environmental Protection Agency (EPA) under contract number 68-W-03-038. Mention of trade names or commercial products does not constitute endorsement or recommendations for use. This document is intended for information purposes and does not create new nor alter existing Agency policy or guidance. The document does not impose any requirements or obligations on EPA, states, other federal agencies, or the regulated community. A limited number of printed copies of Cleaning Up the Nation’s Waste Sites: Markets and Technology Trends, 2004 Edition is available free of charge by mail or by facsimile from: U.S. EPA/National Service Center for Environmental Publications (NSCEP) P.O. Box 42419 Cincinnati, OH 45242-2419 Telephone: 513-489-8190 or 800-490-9198 Fax: 513-489-8695 A portable document format (PDF) version of this report is available for viewing or downloading from the Hazardous Waste Cleanup Information (CLU-IN) web site at http://clu-in.org/marketstudy. Printed copies can also be ordered through that web address, subject to availability. For More Information For more information about remediation...

Words: 87601 - Pages: 351

Free Essay

Management Information Systems

...Find more on www.studymaterial.ca ADMS 2511 MIS Notes Ch 1 – Modern Organization in the Global, Web-Based Environment Management information systems (MIS)- deals with the planning of info tech to help people perform tasks related to info processing and management Information technology (IT)- any computer-based tool used with info to support the needs of an org Importance of Planning for IT -a new info system can apply to the whole org, or a specific area of the org Application portfolios- are groups of new system proposals (apps that have to be added/modified) IT Planning -begins with an organizational strategic plan -states  the  firm’s  mission,  goals,  and  steps  to  reach  those  goals -IT architecture describes  the  way  an  org’s  info  resources  should  be  used  to  accomplish  its  mission -includes both technical (hardware operating systems) and managerial aspects (managing the IT dpt, how area managers will be involved) IT strategic plan- LT goals that describe the IT infrastructure and major IT initiatives to achieve the organization’s  goals -it must meet three main objectives: -must  be  aligned  with  the  org’s  strategic  plan -must provide for an IT architecture that networks users, apps, and databases -must efficiently allocate IS resources among different projects so they can all be completed on time, within budget, and function properly IT steering committee- composed of managers/staff who rep diff organizational units -they  establish  IT  priorities...

Words: 24496 - Pages: 98

Premium Essay

Usaid in Bangladesh

...[pic] Information Technology Enabled Services (ITES) – Bangladesh ELEMENTS OF A NATIONAL STRATEGY FOR DEVELOPMENT OF AN INFORMATION TECHNOLOGY ENABLED SERVICES SECTOR IN BANGLADESH USAID Bangladesh IT Enabled Services Project SETA Task Order Number: 4002-345-001 Subcontract Number: 011227001/4000 Contract Number: GSOOK97AFD2185 Table of Contents Executive Summary 3 1. Introduction 10 2. The Market for IT Enabled Services 13 Market Characteristics 13 Factor Requirements to be Competitive 15 3. Bangladesh Market Advantages and Disadvantages 19 Costs and Efficiency 19 Productive capacity 21 General business environment 25 4. A Bangladesh ITES strategy 28 Potential ITES Market Segments 29 Building Productive Capacity 32 Lowering Costs 37 Building a Competitive Environment 38 Marketing of Bangladesh ITES sector 40 5. Recommended Actions 42 Improving Productive Capacity 42 Lowering Cost, Improving Efficiency 44 Marketing and Business Environment 45 Focus on Growth 47 Annex A: Analysis of Market Segments 49 Annex B: ITES Workshop Report 63 Annex C: The opinion surveys of this study 68 Annex D: Summary of the Philippines Case Study 81 Executive Summary Information Technology Enabled Services (ITES) is a large, fast-growing worldwide industry fueled by customers seeking efficiency...

Words: 28016 - Pages: 113

Premium Essay

Aaaa

...J.P. Morgan M&A Reference Manual  J.P. Morgan M&A Reference Manual This “M&A bible” is meant to serve as a training guide for newcomers to M&A, as well as a technical reference manual for experienced (and not so experienced) M&A practitioners. It incorporates what a number of people in M&A believe to be essential or useful basic knowledge to perform the tasks required in the daily routine of the strategic advisory business. As the financial, legal and tax environment in which the M&A Group operates is forever changing, periodic updates of this publication are intended. As such, any suggestions for improvement would be appreciated. Please direct your comments for improvement, but not your requests for copies of the book, to Eileen Smith at (77)6-8305. An online version of the book is available to Investment Banking professionals on the IB M&A Research database in Lotus Notes or through IB Today. The book is confidential, proprietary and the sole property of J.P. Morgan and should not be passed along to colleagues outside of Investment Banking or to people at competitor firms. Copyright © 1997 Morgan Guaranty Trust Company of New York. All rights reserved. June 1998 82890cl6 J.P. Morgan M&A Reference Manual  Contents Valuation methodologies overview ............................................................... 1 Advantages and disadvantages ........................................................................ 1 Comparable company trading analysis ...................

Words: 47063 - Pages: 189

Premium Essay

Quality Award Application

...2009 Malcolm Baldrige National Quality Award Application TABLE OF CONTENTS Glossary of Terms and Abbreviations Organizational Profile i Responses Addressing All Criteria Items Category 1: Leadership 1 Category 2: Strategic Planning 6 Category 3: Customer Focus 10 Category 4: Measurement, Analysis, and Knowledge Management 14 Category 5: Workforce Focus 18 Category 6: Process Management 23 Category 7: Results 7.1: Best Quality (Healthcare Outcomes) 27 7.2: Best Customer Service (Customer Focused Outcomes) 32 7.3: Best Financial Performance & Growth (Financial & Market Outcomes) 35 7.4: Best People and Workplace (Workforce Focused Outcomes) 38 7.5: Best 5 Bs (Process Effectiveness Outcomes) 41 7.6: Best 5 Bs (Leadership Outcomes) 45 GLOSSARY OF TERMS AND ABBREVIATIONS APP: Annual Planning Process 5Bs: AtlantiCare’s five “Bests” or performance excellence commitments – Best People and Workplace, Best Quality, Best Customer Service, Best Financial Performance, Best Growth ARMC : AtlantiCare Regional Medical Center ASC: Ambulatory Surgery Center ASPP: Annual Strategic Planning Process A AAAHC: Accreditation Association for Ambulatory Health Care AAI: AtlantiCare Administrators Incorporated AAP: Annual Action Plan B BFP: Best Financial Performance Big Dots: The system-level measurements or targets for each of the 5 Bs (performance excellence commitments). Business units...

Words: 41167 - Pages: 165

Free Essay

Arabizi

...Sections Found Accounting Select CRN Subj Crse Sec Cmp Cred NR 21138 ACC 201 01 M 3.000 Title Fund of Financial Accounting Days Time TRU Instructor Date Location Attribute (MM/DD) 02/03-06/01 SBM 009 Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective 09:00 Marian I. Mason am-09:50 (P) am NR 21139 ACC 201 02 M 3.000 Fund of Financial Accounting TRU Ronald D. 12:00 pm-12:50 Williams (P) pm 02/03-06/01 SBM 012 ...

Words: 48244 - Pages: 193