...Investment Fund and Security Analysis Assignment Question 1 There are several examples of the various types of mutual funds. In fact the list is listless but the most common ones include; Aggressive growth funds, Growth funds, Growth and Income Funds, Value Funds, International Equity Funds, US Government Income Funds, Municipal Bond Funds, Corporate Bond Funds, High Yield Bond Funds, Treasury Bills, Money Market Funds among many more. Load Mutual Funds are funds that have a sales charge or commission attached when they are purchased. The charge is used to compensate or pay for the services of the intermediary their time and expertise in selecting the appropriate mutual fund. Such charge is either paid while buying the funds or when selling them. On the other hand, No-Load Mutual Funds are either purchased directly or indirectly through a mutual fund company. These funds may have a small 12b-1 fee i.e. the cost of distribution which is incorporated into the fund as expense ratio. The expense ratio is paid by the shareholder of the fund on Daily basis through reduction of the price of the fund. Most investors prefer no-load funds since there is no more expenses required to pay for the broker services. Question 2 There are several types of mutual funds and they include the following; Stock Funds Stock Funds are at times referred as equity funds is a fund that invests in stocks which at times are also known as equity securities. These types of fund mainly consist of stock though...
Words: 1382 - Pages: 6
...Wise investments to Reach Financial Security by: Jannie Gracelyn P. Aviles Financial security is what all people hoped for. It isn’t making or having a certain amount of money. It is also not limited to being independently wealthy. Being debt-free, able to control your expenses, able to increase your savings, and not being forced at a work you dislike are some signs that you are financially secured. Reaching a point of financial security is a progress that takes time, effort and some sacrifices. After all the sacrifices you made, the results are worth it. On an article of Howard University entitled “Starting on the Road to Financial Security” said that reaching financial security is like building a house. You start with a foundation, you add the floors as you go on, you put on a roof, you finish the inside and then you move in. For most people, the only way to attain financial security is to save and invest over a long period of time. You just need to have your money work for you and that’s what you call investing. You become an investor when you put your money into things that can grow in value. You can invest your money in term deposit, the safest kind of investment that most people are more likely to be engage with. This kind of investment are very appealing to conservative, low risk investors because of the fact that there is no risk of losing your money. But wait, do term deposits give you a big return from the money you invested after waiting a long period of time? If...
Words: 1006 - Pages: 5
...Richman Investments Security Outline Welcome to Richman Investments (RI) where we strive to bring you the most secure, reliable, and available resources that we can offer. We know that work needs to be done and that most of you aren’t aware of the security procedures taking place behind the scenes. We have devised a summary of the seven domains of the company and its security model. Please take the time to read this over and understand the implications of not following company guidelines, procedures, and policies. The user domain contains the users and/or employees that will be accessing resources within the organizations information system. A user can access systems, applications and data within the rights and privileges defined by the AUP (acceptable use policy). The AUP must be followed or the user may be dismissed or have their contracts terminated. With the user domain being one of the most vulnerable aspects of any organization, there are a wide variety of user related threats ranging from lack of awareness to blackmail and extortion. Employees are responsible for their own actions when using company assets and the HR department will be doing background checks on all employees within the company to ensure integrity within the workforce. Enforcement of the user level domain will include the use of RFID badges and pins for all areas of the facility and rooms that require special access. The workstation domain is where most users connect to the organizations infrastructure...
Words: 1016 - Pages: 5
...Investment analysis November 2015 Jaime J. Delgado Code Unit STR364 Student Num. Q12576077 TABLE OF CONTENTS 1. Introduction…….………………………………………………………................... 2 p 2. Overview of Land Securities..…….................................................................... 2 p 3. The market trends, opportunities and risks..…...…………................................ 2 p a. Housing in London 2 p b. Commercial real estate in the UK 3 p 4. Strategy for management and marketing.……………………………………….. 3 p c. Business model .……........................................................................... 3 p d. Performance.……................................................................................ 4 p 5. Specific project analysis …………....…………………........................................ 4 p e. Stakeholders aspirations …………………………………………………... 4 p f. Operational performance …………………………………………………… 5 p 6. Conclusion and recommendation ………………………………………….............. 8 p 7. References …………………………………………………………………………….. 9 p 8. Appendix………………………………………………………..…..............…..…....... 11 p 1. INTRODUCTION This report aspires to critically evaluate the performance of Land Securities and provide enough evidence to allow non-professional investors to understand the Company performance, the market where it operates and decide if investing in Land Securities is...
Words: 6796 - Pages: 28
...Security Plan Outline for Richman Investments User Domain • Restrict access to data and applications that is not required for employee to do their job. • Review and Revise user conduct and security polices every six months. • Conduct annual security training seminars with system users and staff. Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP) for which users will be informed of what is and what is not acceptable use of the system. Workstation Domain • In house testing of operating system updates prior to user workstation deployment. • Strict access control policies and procedures for user access to system and data. • 72 Day password renewal for workstation and 180 day user password renewal. • Content filtering and anti-virus scanning of all incoming data. Quarantine of unknown file types. Securing a user workstation with approved updates will help prevent potential system corruption and in house data from being exposed. LAN Domain • Proper identification and two key turners to be granted access to Data Centers and wiring closets with 24/7 CCTV monitoring. • Periodic LAN vulnerability assessments. Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. LAN to WAN Domain • Disable ping, probing, and port scanning of exterior devices. • Strict monitoring for intrusion detection on inbound IP...
Words: 501 - Pages: 3
...David Girten Jr 05 Aug 2013 Multi-Layered Security Plan for Richman Investments User Domain: Main concern at this domain is lack of user knowledge on what different attacks look like and proper response protocols. Here are a few solutions: A) Training: send emails on security best practices; alerts on common and new attack vectors; hold company-wide training segmented throughout the day; place Infosec, Opsec posters and incident response procedures in every space B) Auditing of user activity: Setup a script to run on the proxy server utilizing a dirty word list to search user internet usage Workstation Domain: Main concern here is unauthorized access and out-of-date anti-virus software. Here are some solutions: A) Anti-virus/Anti-malware: Keep up-to-date with latest patches from vendor websites B) Passwords; Technical Controls: Enable password policies through GPO’s and screen-saver passwords for extra access protection LAN Domain: Main concern here is physical access to network assets. Here are some solutions: A) Securing high-priority systems: Establish access lists; combo/cipher locks for server and switch rooms; also have a sign-in sheet for contractors and tech-reps working on-site B) Implement Kerberos as another secure means of identifying users over a non-secure network LAN to WAN Domain: Main concern here is the attempt for attackers to scan the network. Here are some solutions: A) Install IDS/IPS on the network to monitor and combat network anomalies; also...
Words: 390 - Pages: 2
...Richmond Investments Security Outline User Domain: * Establish an Acceptable Use Policy that clearly defines access rights * Educate and inform your employees of their responsibilities and duties that must be performed * Perform a thorough background investigation on new employees Workstation Domain: * Install current anti-virus protection software * Install the latest software, security patches and system configurations * Make sure logon ID’s and passwords are compliant with company policy LAN Domain: * Apply proper permissions to servers, directories and folders * Use unshielded twisted-pair or comparable wiring that complies with IEEE standards * Make sure switches and routers are properly placed and applied * Use current NIC cards and apply interface security * Use company access rights in management of physical components and wireless access points LAN to WAN: * Apply web content filter * Apply email content filter and quarantine system * Use IPS and IDS security systems * Apply the use of a proxy server and closing ports not in use * Encrypt files and packets when using TCP and UDP * Proper use of IP Stateful Firewalls * Use of SSH for secure encrypted transmission WAN Domain: * Proper router and security appliance management (24x7x365) * Apply dedicated internet access * Observe managed services for customer routers and firewalls * Apply IP Stateful Firewall * Maintain...
Words: 315 - Pages: 2
...Richman Investment’s Remote Access Security Policy 1) Wireless Access At Richman Investment’s when the network is accessed remotely via wireless appropriate wireless security standards will be used. • Wired Equivalency Protocol (WEP) will be used as standard on Wi-Fi connections. • A WEP encryption key will be used. • The network will be configured not to advertise its presence. • The power of access points will be turned down to a minimum that still allows the access point to function. • Due to the possibility of cracking Wireless Encryption Protocol using sniffing software such as AirSnort all wireless access points will be outside the firewall. • Wi-Fi Protected Access (WPA) will be used where it is available. 2) Secure Access via VPN Access from remote users to the corporate network will be via secure IPSEC VPN or SSL VPN connections only. This is necessary to secure the connection from the remote device to the corporate network. 3) Prevention of Data Loss All laptops and PDA’s that are taken off site will have the following security configured, to prevent data loss in the event of theft. • The hardware password will be enabled if available. • All corporate data on the laptop or PDA will be encrypted using appropriate encryption software. • Sensitive documents will be accessed remotely and not downloaded to the laptop or PDA. 4) Remote Device Protection To prevent remote PC’s, laptops, PDA’s etc from compromising...
Words: 349 - Pages: 2
...people and businesses evaluate investments and raise capital to fund them. (It is how large firms or the government manage large sums of money). 2. Efficient market: An efficient market is a market in which all the available information is fully incorporated into securities prices, and the returns investors will earn on their investments cannot be predicted. (Past data stock prices cannot help in predicting future stock prices). 3. Primary market: A primary market is a market in which new, as opposed to previously issued, securities are bought and sold for the first time. In this market, firms issue new securities to raise money that they can then use to help finance their businesses. The key feature of the primary market is that the firms that raise money by selling securities actually receive the money. (Primary markets are done by underwriting groups like investment banks, they set a beginning price range and ensure its sales goes to investors.) 4. Secondary market: The secondary market is where all subsequent trading of previously issued securities takes place. In this market the issuing firm does not receive any new financing, as the securities it has sold are simply being transferred from one investor to another. (An easy way an investor can sell or liquidate investments.) 5. Risk: The chance that the investment’s actual return will be different. (The possibility of losing some or all of the original investment.) 6. Security: A negotiable instrument that...
Words: 692 - Pages: 3
...The return from holding an investment over some period of time is simply any cash payments received due to ownership, plus the change in market price usually expressed as a percent of the beginning market price of the investment. Return comes to you mainly from two sources – income or dividend plus any price appreciation (capital gain or loss) Dt + ( Pt – Pt-1) R = Pt-1 Suppose, you buy for Tk. 100 a security that would pay Tk. 7 in cash to you and be worth Tk. 106 one year later. This return would be (7 +6)/ 100 = 13%. Risk can be defined as the variability of return from those that are expected. In financial decisions it is often helpful to have an objective measure of risk. The main reason for having measuring of risk is to enable us to make better decisions. To be useful, a risk measure should enable us to rank alternative risky ventures. If there are two possibilities being analyzed, A and B, it is often important to know whether A is riskier than B or not. A good measure of risk should also tell us how much more risky A is than B. Is A twice as risky or ten times as risky as B? Is risky at all? Risk measurement procedures are usually based on a particular method of organizing financial problem -through probability distribution. (A set of possible values that a random variable can assume and their associated probabilities of occurrence.) Suppose you are thinking about purchasing stock A, which has a current...
Words: 4352 - Pages: 18
...Identify and describe an appropriate set of investment objects and investment constraints for Dr. and Mrs. Mason, and prepare a comprehensive investment policy statement based on these investment objectives and constraints. Facts: - Dr. Mason will receive $1,000,000 payment on 6/7/2006 - Will receive royalties of $100,000 in first year and up to $500,000 in subsequent years - Will receive $55,000 in salary for 2006 through 2010. - Will receive $10,000 to $25,000 per year from 2006 to 2010 from speaking fees - Couple has no other savings - Retirement consists of Social Security and a small pension - Have 3 children, grown and married, the Mason’s desire to provide for education of grandchildren - Their wills divide their estate among the children and grandchildren - If the royalty payments are as projected, Mrs. Mason desires to setup a scholarship fund in name of Dr. Mason for engineering students - Priorities are: Provide for retirement, provide for education of grandchildren, setup scholarship fund Step 1 – Define investment objectives and constraints - Objectives: o Primary objective is to provide steady, sufficient retirement income to the Masons who are within 5 years of retirement. Since the Masons will receive Social Security and a small pension, this lowers the amount needed to provide for retirement o The second objective is to provide funds for education of grandchildren. o The third objective is to establish a scholarship fund for engineering...
Words: 1142 - Pages: 5
...Investment Basics Stephanie M. Council Professor Bartorillo Investments – FIN 320 July 22, 2011 We will discuss the investment process, describe and evaluate four investments for consideration in any investment portfolio. These four investment considerations are bonds (corporate and municipal), stocks (commom and preferred), mutual funds and derivatives. We will analye the risk and return issues associated with each for a portfolio. Finally, we will provide rationale for each of the portfolio selections. The investment process is an investor’s portfolio of his or her assets. We know assets are “anything tanible or intangible that is capable of being owned or controlled to produce value and that is held to have positive economic value” (“Assets,”). As the portfolio is established, it starts to update once the investor begins to sell securities, buy securities and get additional funds to increase the size of its portfolio. However, investors do sell securities to decrease their portfolio. There are a few key points an investor should note when making investments. One should always create a portfolio based on asset classes which have long term up trends. Secondly, an investor should not buy investments at random and believing for the best. Thirdly, the investor should always monitor the funds. This can be done quarterly to optimize returns on their holdings, returns rankings and etc… Finally, but nottheless, an investor should utilize monitioring organizations...
Words: 1272 - Pages: 6
...305 : ESSENTIALS OF INVESTMENTS CHAPTER 1: Investments: Background and Issues. REAL ASSETS – assets used to produce goods and services. FINANCIAL ASSETS – claims on real assets or income generated by them. FIXED INCOME (DEBD) SECURITIES – are securities that pay a specified cash flow over and specific period. EQUITY – an ownership share in a corporation. DERIVATIVE SECURITIES – securities providing pay offs that depend on the value of other assets. AGENCY PROBLEMS – conflicts of interest between management and stockholders. ASSET ALLOCATION – allocation of an investment across broad asset classes. SECURITY SELECTION – choice of specific securities within each asset class. SECURITY ANALYSES – analyses of the value of securities. RISK-RETURN TRADE-OFF – assets with higher expected returns entail greater risk. PASSIVE MANAGEMENT – buying and holding a diversified portfolio without attempt to identify mispriced securities. ACTIVE MANAGEMENT – attempting to identify misplaces securities or to forecast broad future trends. FINANCIAL INTERMEDIARIES – institutions that connect borrowers and lenders by accepting funds from lenders and loaning funds to borrowers. INVESTMENT COMPANIES – company that manages funds for investors. An investment company can manage several mutual funds. INVESTMENT BANKERS – firms specializing in the sale of new securities to the public, typically by underwriting the issue. PRIMARY MARKET – a market in which new securities are offered to the...
Words: 3207 - Pages: 13
...incorporated market prices reflecting associated information completely. Keeping values current is the role efficient markets play by keeping market price fair and prohibiting anyone to make a high returns unless he or she buys a much high risk investment. 3) Primary Market A primary market is a marketplace where securities are distributed for the first time. The government, businesses, and other groups issue debt or equity-based securities permissible to raising finance. In primary market prices are the same for every buyer; however, investors in a primary market do not purchase securities from other investors. 4) Secondary Market A Secondary Markets is a marketplace where securities that already issued are sold or purchased by investors. Prices in a secondary market vary from the issue price and prices can vary from the original cost, although prices are affected by market sentiments in a secondary market issuers are not affected because of the changes in pricing. 5) Risk Risks are the probabilities of differences in the total investments earned on an annual return. These risks are divided in three different groups, market, credit, and operational risk. In finance risk plays a role in the return on investment. If the risk are low the return is low if...
Words: 844 - Pages: 4
...1. INTRODUCTION 2.1. COUNTRY OF JAPAN Japan is an island nation in East Asia. Located in the Pacific Ocean, it borders China, North Korea, South Korea, Russia, Taiwan, the Sea of Japan, the Sea of Okhotsk, and the East China Sea. It is an archipelago of 6,852 islands, most of which are mountainous and many are volcanic. The government system is a parliamentary government with a constitutional monarchy. The chief of state is the Emperor and the head of government is the Prime Minister. Japan has a market economy in which the prices of goods and services are determined in a free price system. Japan is a member of the Asian Pacific Economic Cooperation (APEC). Japan's main export goods are cars, electronic devices and computers. Most important trade partners are China and the USA, followed by South Korea, Taiwan, Hong Kong, Singapore, Thailand and Germany. Japan has a surplus in its export or import balance. The most important import goods are raw materials such as oil, foodstuffs and wood. The industries of Japan are manufacturing, construction, distribution, real estate, services, and communication are Japan's major industries today. Agriculture makes up only about two percent of the GNP. Most important agricultural product is rice. Resources of raw materials are very limited and the mining industry rather small. Japan's service sector accounts for about three-quarters of its total economic output. Banking, insurance, real estate, retailing, transportation, and telecommunications...
Words: 2304 - Pages: 10