SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Company: Facebook
Calculating the Weighted Average Cost of Capital (WACC)
for your Company
For use in Conjunction with the Firm Valuation Project
First ensure that you have read relevant pages in the text. Some
important sections would include the following, but you may
also double-check the references in the text by using the index
[see: Cost of Capital and Target (optimal) Capital Structure,
etc.]:
The important Chapter in the text is the one entitled "The Cost
of Capital," – with a particular focus on the section entitled
“The Weighted Average Cost of Capital” and the section “Four
Mistakes to Avoid” at the end of the chapter.
The WACC formula discussed below does not include Preferred
Stock. Should your company use PS, be sure to adjust the
equation for it, and see the section in the chapter on the Cost of
Preferred Stock.
The WACC formula that we use is:
WACC = wdrd(1-T) + wsrs
We need to know how to calculate:
1. rsthe cost of common equity. Use the Security Market
Line (SML) – this is why you learn how to calculate a
company’s beta and also why you learn how to find the
appropriate risk-free rate and market-risk premium. For a
review, see the section the text, The CAPM Approach.
2. The weights (wd and ws – note that: wd + ws = 1; so you
only have to calculate one of them). We need to calculate the
weight of debt and the weight of equity (for the cost of debt,
this simply means: what proportion of the firm’s financing is by
debt?). There is a lot to say here, simplified as Theory 1,
Theory 2 and Practice:
a. Theory 1: Theory says that we should use the target
weights along with the market values of both debt and equity
(see the Four Mistakes to Avoid). But the market value of debt
is typically difficult to calculate, because we need to know the
YTM (which is rd) for all of the company’s debt, but we cannot
calculate the YTM without having the current prices of the
company’s outstanding bonds, and most company’s bonds do
not trade (i.e., they will not have up-to-date or current prices –
remember how to calculate the price (value) of a bond on your
calculators?!). As a result, at least for the group project, we go
to Theory 2.
b. Theory 2: Theory also says that we should use the
TARGET weights, but this is a management decision, and as
“outsiders” we do not have access to the thoughts of the CFO or
CEO. So we should look instead to the historical pattern of the
use of debt (mix of debt and equity), and this is one reason that
you should have about 10 years of financial data.
c. Practice: Since we cannot “work” according to the strict
theory of finance, we have to estimate the relevant weights. As
a result, we will use the formula:
wd = Book Value of Debt / [Market Value of Equity + Book
Value of Debt]
The book value of debt is calculated by adding up ALL of the
debt on the balance sheet. This will typically be the sum of
Notes Payable, Current Portion of LT Debt and Long-Term
Debt.
The market value of equity is the “Market Cap,” and equals the
number of (common) shares outstanding multiplied by the
price/share. Note that the “timing” of this value should
coincide with the book value of debt. For example, if you
calculate the book value of debt as of 12/31/14, then the market
cap should also be calculated for that date. Be very careful
about using the reported Market Cap on Yahoo.finance – it may
not have the same “timing.”
3. r d; the cost of debt. There may be more than one
acceptable approach to calculate or estimate a company’s cost
of debt (be sure to read the text!). One relatively
straightforward method is to discover the company’s debt rating
(e.g., by Moodys). This can usually be found on the company’s
10K (see the link on my homepage) and doing a word search for
‘rating’ or ‘debt rating.’ For a discussion of bond ratings, see
the text (look in the index). If you can find the debt rating for
your company then you can carry out the following steps (if you
cannot find a bond rating for your company, you might try to
estimate/guess what it is by considering your company’s beta
and comparing the bond ratings for companies with similar
betas). If you are not able to find a bond rating readily, you can
register (forfree) at Standard & Poor's and at Moody's to find
company ratings. You may also find other interesting and
useful information there. For a general discussion of what the
ratings mean, see the information from these rating agencies on
my homepage at the Bond Rating link.
Once you have the actual bond rating or an estimate you can
then find or estimate your company’s cost of debt by going to
Yahoo.finance and clicking on the Bonds/Rates
link(http://bonds.yahoo.com/rates.html). Look at the yields for
the 20 year Corporate Bonds by rating. If your company’s bond
rating is listed, you’re in luck. If it is not listed then you can
estimate the cost of debt. For example, if the AAA yield is
6.50%, the AA yield is 6.75% and the A yield is 7.00%, you can
see a pattern (equation). For every increase in risk (from AAA
to AA), there is a 0.25% increase in the yield. If your company
has a BB rating, then it is two steps “below” the A rating, so
you should add approximately 0.50% more to the 7.00% for the
A rating, giving you a cost of debt for your company of about
7.50%. Note that this approach assumes a linear equation for
the cost of debt (which may not be strictly true).
4. The corporate tax rate ( T ). Be sure to read the section in
the text on Corporate Income Taxes (Chapter 2). The correct
tax rate for a company is the marginal tax rate for the future! If
you expect your company to be very profitable for a long time
into the future, then the tax rate ( T ) for your company should
probably be the highest marginal tax rate applicable for
corporations. But there are times when companies can obtain
long-term tax breaks so that their tax rates may be lower than
the stated (regulated) tax rate. Consequently you may want to
calculate several/many historical effective tax rates for you
company. The effective tax rate is the actual taxes paid divided
by earnings before taxes (on the income statement). You can
calculate/consider these rates for the past 5-10 years and then
compare this effective tax rate to the legally mandated highest
marginal corporate tax rate. If the past historical effective rate
is lower than the marginal tax rate, there may be a good reason
for using that lower rate in your pro formas.
5. r cs; the cost of common stock
You can use CAPM model to predict the cost of common
stock. The equation runs as followings:
ri = rRF + (RPM) bi
In order to use this model, first you should estimate the beta
of your stock. Please refer to the guidelines of beta calculation
for more information.
.
Rubric Name: Critical Thinking Paper
Justin, please see my comments to your paper attached.
Overall you have some good content but we really must talk
about the paper structure -- I do see some improvement but in
this case had you added the required headings the content would
have a different perspective.
Let's chat at our next face-to-face this coming Monday, 21 Nov.
If you are unable to attend, please email me so we can
coordinate a day/time to go over this assignment.
Associated Learning Objectives
1.1.1: Present material in clear and/or logical order appropriate
to task.
Assessment Method: Score on Criteria - 1.1: Organize
document or presentation clearly in a manner that promotes
understanding and meets the requirements of the assignment.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.1.2: Articulate thesis and purpose clearly.
Assessment Method: Score on Criteria - 1.1: Organize
document or presentation clearly in a manner that promotes
understanding and meets the requirements of the assignment.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.1.3: Support thesis and purpose fully.
Assessment Method: Score on Criteria - 1.1: Organize
document or presentation clearly in a manner that promotes
understanding and meets the requirements of the assignment.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.1.4: Transition smoothly and develop connections from point
to point.
Assessment Method: Score on Criteria - 1.1: Organize
document or presentation clearly in a manner that promotes
understanding and meets the requirements of the assignment.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.1.5: Create coherent progress from introduction through
conclusion.
Assessment Method: Score on Criteria - 1.1: Organize
document or presentation clearly in a manner that promotes
understanding and meets the requirements of the assignment.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.1.6: Complete assignment in accordance with instructions.
Assessment Method: Score on Criteria - 1.1: Organize
document or presentation clearly in a manner that promotes
understanding and meets the requirements of the assignment.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.2.1: Create meaningful topic sentence for each paragraph or
point.
Assessment Method: Score on Criteria - 1.2: Develop coherent
paragraphs or points so that each is internally unified and so
that each functions as part of the whole document or
presentation.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
1.2.2: Develop each paragraph's single topic to the appropriate
depth.
Assessment Method: Score on Criteria - 1.2: Develop coherent
paragraphs or points so that each is internally unified and so
that each functions as part of the whole document or
presentation.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
1.2.3: Supply relevant and original supporting detail.
Assessment Method: Score on Criteria - 1.2: Develop coherent
paragraphs or points so that each is internally unified and so
that each functions as part of the whole document or
presentation.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
1.3.1: Use a variety of credible sources to support, extend, and
inform an original thesis or idea, integrating source material
smoothly.
Assessment Method: Score on Criteria - 1.3: Provide sufficient,
correctly cited support that substantiates the writer’s ideas.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
1.3.2: Summarize, paraphrase, and quote accurately.
Assessment Method: Score on Criteria - 1.3: Provide sufficient,
correctly cited support that substantiates the writer’s ideas.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
1.3.3: Cite sources properly.
Assessment Method: Score on Criteria - 1.3: Provide sufficient,
correctly cited support that substantiates the writer’s ideas.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
1.4.1: Identify target audience.
Assessment Method: Score on Criteria - 1.4: Tailor
communications to the audience.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.4.2: Explain unfamiliar terms and material.
Assessment Method: Score on Criteria - 1.4: Tailor
communications to the audience.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.4.3: Employ precise, appropriate language.
Assessment Method: Score on Criteria - 1.4: Tailor
communications to the audience.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.4.4: Use audience-appropriate, consistent tone.
Assessment Method: Score on Criteria - 1.4: Tailor
communications to the audience.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.4.5: Avoid language which indicates bias against
individuals/groups their affiliations, orientations and beliefs.
Assessment Method: Score on Criteria - 1.4: Tailor
communications to the audience.
Required Performance: Meets Performance Requirements
Level Achieved: Does Not Meet Performance Requirements
1.5.1: Demonstrate variation in sentence structure.
Assessment Method: Score on Criteria - 1.5: Use sentence
structure appropriate to the task, message and audience.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
1.5.2: Express ideas clearly and concisely.
Assessment Method: Score on Criteria - 1.5: Use sentence
structure appropriate to the task, message and audience.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
1.5.3: Eliminate sentence-level errors such as run-ons/comma
splices and sentence fragments.
Assessment Method: Score on Criteria - 1.5: Use sentence
structure appropriate to the task, message and audience.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
1.6.1: Adhere to standard usage rules of grammar.
Assessment Method: Score on Criteria - 1.6: Follow
conventions of Standard Written English.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
1.6.2: Adhere to standard usage rules of word choice.
Assessment Method: Score on Criteria - 1.6: Follow
conventions of Standard Written English.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
1.6.3: Adhere to standard usage rules of spelling.
Assessment Method: Score on Criteria - 1.6: Follow
conventions of Standard Written English.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.1.1: Summarize the issue or problem, using supporting details
to enable a deeper understanding of the issue or problem.
Assessment Method: Score on Criteria - 2.1: Identify and
clearly explain the issue, question, or problem under critical
consideration.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.1.2: Identify potential underlying causes or conditions
contributing to the issue or problem and consider the context.
Assessment Method: Score on Criteria - 2.1: Identify and
clearly explain the issue, question, or problem under critical
consideration.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.1.3: Pose significant questions to inform the direction of the
investigation of the problem or question.
Assessment Method: Score on Criteria - 2.1: Identify and
clearly explain the issue, question, or problem under critical
consideration.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.1.4: Scan the environment for cues to inform and direct search
for information relevant to the issue or problem.
Assessment Method: Score on Criteria - 2.1: Identify and
clearly explain the issue, question, or problem under critical
consideration.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.2.1: Explore information sources to increase familiarity and
achieve a manageable focus.
Assessment Method: Score on Criteria - 2.2: Locate and access
sufficient information to investigate the issue or problem.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.2.2: Develop and implement a search strategy that employs
search engines, databases, and inquiries to access the needed
information.
Assessment Method: Score on Criteria - 2.2: Locate and access
sufficient information to investigate the issue or problem.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.2.3: Assess the search results to determine if there are
remaining gaps; revisit strategy as necessary.
Assessment Method: Score on Criteria - 2.2: Locate and access
sufficient information to investigate the issue or problem.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.2.4: Identify contradictory information or inconsistent data
and seek to reconcile contradictions.
Assessment Method: Score on Criteria - 2.2: Locate and access
sufficient information to investigate the issue or problem.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.4.1: Articulate clearly and fairly others' alternative viewpoints
and the basis of reasoning.
Assessment Method: Score on Criteria - 2.4: Consider and
analyze information in context to the issue or problem.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.4.2: Identify significant, potential implications, and
consequences of alternative points of view.
Assessment Method: Score on Criteria - 2.4: Consider and
analyze information in context to the issue or problem.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.4.3: Evaluate assumptions underlying other analytical
viewpoints, conclusions, and/or solutions.
Assessment Method: Score on Criteria - 2.4: Consider and
analyze information in context to the issue or problem.
Required Performance: Meets Performance Requirements
Level Achieved: Exceeds Performance Requirements
2.5.1: Present and explain those inferences and deductions that
follow logically from the evidence provided.
Assessment Method: Score on Criteria - 2.5: Develop well-
reasoned ideas, conclusions or decisions, checking them against
relevant criteria and benchmarks.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
2.5.2: Assert logical conclusions only when sufficient evidence
supports them, and distinguish between attainable and
unattainable solutions.
Assessment Method: Score on Criteria - 2.5: Develop well-
reasoned ideas, conclusions or decisions, checking them against
relevant criteria and benchmarks.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
2.5.3: Incorporate legal and ethical reasoning when formulating
ideas, conclusions, and decisions.
Assessment Method: Score on Criteria - 2.5: Develop well-
reasoned ideas, conclusions or decisions, checking them against
relevant criteria and benchmarks.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
2.5.4: Complete assignment in accordance with instructions.
Assessment Method: Score on Criteria - 2.5: Develop well-
reasoned ideas, conclusions or decisions, checking them against
relevant criteria and benchmarks.
Required Performance: Meets Performance Requirements
Level Achieved: Meets Performance Requirements
Running head: CYBER SECURITY 1
CYBER SECURITY 2
Challenges in Cyber Security
Basagic, Justin
UMUC
Abstract
In this paper, I am writing about how the relationship between
cyber security has changed with innovation over time. I will
also be covering that there is such a thing as good hacking
instead of only shining a negative light on the subject.
Keywords: Cyber security, hacking
Cyber Security and Innovation
Innovations over time has resulted in the creation of devices
such as computers, laptops, and iPods. This has had positive
effects in communications since people can now chat on line,
thus making communication easier, faster, and cheaper. Besides
these benefits, the companies involved in the creation of these
devices have benefited financially due to higher sales they make
over a short period. However, there are significant challenges
that are encountered in cyber security which continue to evolve
over time due to massive growth in the telecom and the
explosion of the internet. Growing with innovations and
technology is paramount to being successful as a cyber security
analyst.
The problems in cyber security are threats, vulnerabilities, and
effects caused by attacks (Hansen & Nissenbaum, 2009). Other
challenges include inadequate funds and lack of visibility
control. According to Hansen & Nissenbaum (2009), cyber
security is the act of taking care of ICT devices. The targets for
cybercriminal are intellectual property, trade secrets, and
contact negotiations. People who perform cyber-attacks, for
instance, cause threats,, and they are categorised into five
subheadings. These are Criminals intentioned on gaining money
from crimes such as theft, hacking and extort. The second type
is spies’ intention to access crucial government information or
private entities while the third group is state warriors who
perform cyber-attacks supporting a country's strategic plans and
objectives. In addition, "hacktivists" who would cyber-attack
for no monetary gain as well as terrorists who use cyber-attacks
as a tool for non-state or state-funded warfare form the fifth
category. These groups of people perform cyber-attacks to bring
organisations to the economic loss to a nation or a firm and
psychological problem to workers in various organizations.
Therefore, data stolen from companies can be alleged on
innocent citizens (Lipman, 2015).
Moreover, there has been a rapid growth of threats per day. It
has been discovered that there was a quarter a million-ransom
ware variants in the past year (Lipman, 2015). However, it has
been understood that the number is growing at the rapid rate of
60,000 new variants every day. Ransom ware acts like a
trawling net which cast broadly to share as a large number of
victims as possible in single attempt (Lipman, 2015). The
threats have been sophisticated though they are conducted in
combination. Conversely, there are aimed threats, which are
designed to attack a certain organisation or even a particular
individual (Lipman, 2015). These risks are tough to block with
traditional security products.
The second challenge facing cyber security is vulnerabilities.
This is because cyber security is in many ways related between
the cyber criminals and the defenders (Fischer, 2016). For
instance, ICT devices are complex, and criminals are always
looking for any weaknesses occurring at most points. However,
defenders can shield these ICT systems against this weakness
though there are significant challenges accompanied by this
move. These may include intentional actions by criminals able
to access a system; supply chain vulnerabilities, which can
allow the use of malicious software during the installation
process; and previously unknown, vulnerabilities without
established solution (Kaminsky, 2006). On the contrary, where
vulnerabilities are known, the implementation may be hindered
by operational constraints.
The third challenge facing cyber security is the impact brought
by the attack. A well-planned attack is capable of destroying the
formality; availability as well as the integrity of an ICT system
with the data it handles. Additionally, cyber attacks can result
in the loss of financial, proprietary, or personal information
without the knowledge of the victim (Fischer, 2016). For
example, denial-of-service cyber attacks affect legitimate users
while accessing an individual system (Fischer, 2016).
Therefore, the user of an ICT system may continue using some
systems while others are inaccessible yet some may not realise
this effect. Though the manufacturing companies are trying to
reduce cyber-attack in conjunction with awareness given to ICT
users, botnet malware constitutes to the growth of this crime.
This is because it gives an attacker the direction of a system for
use in cyber-attacks in other systems.
Besides these effects, most cyber-attacks have little impact
while a bigger attack on some systems with critical
infrastructure (CI), might have significant consequences on
country’s security, it’s economy as well as the livelihood and
safety of the citizens (Fischer, 2016). Although it is widely
recognised that cyber-attacks are costly to individuals and
organisations, economic impacts can be difficult to measure
while estimates vary widely. A cited figure for the annual cost
to the global economy from cybercrime is $400 billion (Fischer,
2016). However, some observers have argued that this cost is
substantially increasing with the expansion of the ICT
infrastructure. The increase could also be attributed to the
transition in customers’ preferences as most of the youths are
purchasing the gadgets.
Besides these challenges, the insufficient fund is also an
inconvenience in cyber security. According to recent statistics,
the local government agencies spend less than five percent of its
IT budget on cyber crime (Lipman, 2015). This figure is half of
what is allocated to the typical commercial enterprise. If the
world's prominent companies have been affected by cyber
attacks, it is evident that both the state and local agencies'
efforts remain underfunded. Because of this, the team mandated
with ensuring cyber safety lack enough resources to implement
their goals. Therefore, because of this, the attackers get an
opportunity to manoeuvre to their benefit. In addition,
government agencies are facing a shortage of cyber security
staff and in case they have, the staff lack knowledge (Lipman,
2015). With the rapid growth in the cyber threats over the last
few years, the increasing demand has created a significant
premium on security skills. This is because the public sector
organisational is required to compete for talent due to the
diverse nature in compensation level across the world. The most
talented organisation has a competitive advantage since the
cyber criminals will not be able to hack any information from
such a firm hence ensuring confidentiality of the information.
The last challenge facing cyber security has limited visibility
and limited control. However, one of the unfortunate by-
products within the IT environment is an avalanche of security
events. Controlling security through alerts has been described as
a thing of the past: it is not only misleading, but it is ultimately
likely to end in a disaster for all involved (Lipman, 2015).
Since this method has been disregarded, this shows that there
are no plans on how to curb this vice. Many people even those
in authority; have been unable to come up with rules and
regulations against this device. The criminals undertaking this
vice have therefore been encouraged to go on by the fact that
there are no rules in the constitution that outline the punishment
for this vice.
Some ways can be used to manage the challenges in cyber
security. Some of the recommended ways are removing the
threat source by closing down botnets or cutting down
incentives for cybercriminals (Fischer, 2016). Secondly, the
manufacturing companies need to address vulnerabilities by
hardening the ICT assets they manufacture by patching software
and training employees. In addition, the users need to lessen
impacts by reducing damage and restoring functions to ensure
continuity of operations in response to attack. The level of risk
reduction will thus vary among sectors and organisations. For
instance, the level of cyber security that customers expect may
be lower for a company in the entertainment industry than for a
bank, a hospital or a government agency (Fischer, 2016).
In conclusion, it is the role of everyone to ensure that cyber
professional and the cyber industry grows and evolves with the
challenges it faces. The government has a substantial
responsibility to make sure that the organisations that fall under
it to provide cyber security are well funded. If this is put into
practice, cyber security will be in a much better place.
References
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber
security, and the CopenhagenSchool. International Studies
Quarterly, 53(4), 1155-1175.
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE:
WHITE-HAT HACKING ACROSS THE DOMAIN NAME
SYSTEM. Communications Of The ACM, 49(6), 62-68.
Lipman P., 19th August 2015. The cyber security challenges
facing state and local governments.
Fischer E. A., 12th August 2016. “Cyber security issue and
challenges: in brief.” Congressional research service.
Running head: CYBER SECURITY 1
CYBER SECURITY 8
Challenges in Cyber Security
Basagic, Justin
UMUC
Abstract
In this paper, I am writing about how the relationship between
cyber security has changed with innovation over time. I will
also be covering that there is such a thing as good hacking
instead of only shining a negative light on the subject.
Keywords: Cyber security, hacking
Cyber Security and Innovation
Innovations over time has resulted in the creation of devices
such as computers, laptops, and iPods. This has had positive
effects in communications since people can now chat on line,
thus making communication easier, faster, and cheaper. Besides
these benefits, the companies involved in the creation of these
devices have benefited financially due to higher sales they make
over a short period. However, there are significant challenges
that are encountered in cyber security which continue to evolve
over time due to massive growth in the telecom and the
explosion of the internet. Growing with innovations and
technology is paramount to being successful as a cyber security
analyst.Comment by Diana Lucas: I’d like you to revise this
area a bit. Keep in mind this is a research paper therefore I
need to have a clear idea of what the ISSUE or PROBLEM is
and what YOU as the researcher see as an area of interest to
further investigate.
That said, is this your RESEARCH QUESTION? It should be
clearly stated as such.
Also, what is your HYPOTHESIS? What do you foresee as the
answer to your research question?
Discussion of FindingsComment by Diana Lucas: Per project
instructions you were supposed to add this 1st level heading to
your paper, exactly like this….
The problems in cyber security are threats, vulnerabilities, and
effects caused by attacks (Hansen & Nissenbaum, 2009). Other
challenges include inadequate funds and lack of visibility
control. According to Hansen & Nissenbaum (2009), cyber
security is the act of taking care of ICT devices. The targets for
cybercriminal are intellectual property, trade secrets, and
contact negotiations. People who perform cyber-attacks, for
instance, cause threats,, and they are categorised into five
subheadings. These are Criminals intentioned on gaining money
from crimes such as theft, hacking and extort. The second type
is spies’ intention to access crucial government information or
private entities while the third group is state warriors who
perform cyber-attacks supporting a country's strategic plans and
objectives. In addition, "hacktivists" who would cyber-attack
for no monetary gain as well as terrorists who use cyber-attacks
as a tool for non-state or state-funded warfare form the fifth
category. These groups of people perform cyber-attacks to bring
organisations to the economic loss to a nation or a firm and
psychological problem to workers in various organizations.
Therefore, data stolen from companies can be alleged on
innocent citizens (Lipman, 2015).Comment by Diana Lucas: We
need to get your in-text citations to ‘blend’ into the rest of the
paper – it should not be a different font with a hyperlink.
I went ahead and changed this for you – I’d like to see you
change the rest of your in-text citations to Times New Roman,,
12-pitch.
Moreover, there has been a rapid growth of threats per day. It
has been discovered that there was a quarter a million-ransom
ware variants in the past year (Lipman, 2015). However, it has
been understood that the number is growing at the rapid rate of
60,000 new variants every day. Ransom ware acts like a
trawling net which cast broadly to share as a large number of
victims as possible in single attempt (Lipman, 2015). The
threats have been sophisticated though they are conducted in
combination. Conversely, there are aimed threats, which are
designed to attack a certain organisation or even a particular
individual (Lipman, 2015). These risks are tough to block with
traditional security products.
The second challenge facing cyber security is vulnerabilities.
This is because cyber security is in many ways related between
the cyber criminals and the defenders (Fischer, 2016). For
instance, ICT devices are complex, and criminals are always
looking for any weaknesses occurring at most points. However,
defenders can shield these ICT systems against this weakness
though there are significant challenges accompanied by this
move. These may include intentional actions by criminals able
to access a system; supply chain vulnerabilities, which can
allow the use of malicious software during the installation
process; and previously unknown, vulnerabilities without
established solution (Kaminsky, 2006). On the contrary, where
vulnerabilities are known, the implementation may be hindered
by operational constraints.
The third challenge facing cyber security is the impact brought
by the attack. A well-planned attack is capable of destroying the
formality; availability as well as the integrity of an ICT system
with the data it handles. Additionally, cyber attacks can result
in the loss of financial, proprietary, or personal information
without the knowledge of the victim (Fischer, 2016). For
example, denial-of-service cyber attacks affect legitimate users
while accessing an individual system (Fischer, 2016).
Therefore, the user of an ICT system may continue using some
systems while others are inaccessible yet some may not realise
this effect. Though the manufacturing companies are trying to
reduce cyber-attack in conjunction with awareness given to ICT
users, botnet malware constitutes to the growth of this crime.
This is because it gives an attacker the direction of a system for
use in cyber-attacks in other systems.
Besides these effects, most cyber-attacks have little impact
while a bigger attack on some systems with critical
infrastructure (CI), might have significant consequences on
country’s security, it’s economy as well as the livelihood and
safety of the citizens (Fischer, 2016). Although it is widely
recognised that cyber-attacks are costly to individuals and
organisations, economic impacts can be difficult to measure
while estimates vary widely. A cited figure for the annual cost
to the global economy from cybercrime is $400 billion (Fischer,
2016). However, some observers have argued that this cost is
substantially increasing with the expansion of the ICT
infrastructure. The increase could also be attributed to the
transition in customers’ preferences as most of the youths are
purchasing the gadgets.
Besides these challenges, the insufficient fund is also an
inconvenience in cyber security. According to recent statistics,
the local government agencies spend less than five percent of its
IT budget on cyber crime (Lipman, 2015). This figure is half of
what is allocated to the typical commercial enterprise. If the
world's prominent companies have been affected by cyber
attacks, it is evident that both the state and local agencies'
efforts remain underfunded. Because of this, the team mandated
with ensuring cyber safety lack enough resources to implement
their goals. Therefore, because of this, the attackers get an
opportunity to manoeuvre to their benefit. In addition,
government agencies are facing a shortage of cyber security
staff and in case they have, the staff lack knowledge (Lipman,
2015). With the rapid growth in the cyber threats over the last
few years, the increasing demand has created a significant
premium on security skills. This is because the public sector
organisational is required to compete for talent due to the
diverse nature in compensation level across the world. The most
talented organisation has a competitive advantage since the
cyber criminals will not be able to hack any information from
such a firm hence ensuring confidentiality of the information.
The last challenge facing cyber security has limited visibility
and limited control. However, one of the unfortunate by-
products within the IT environment is an avalanche of security
events. Controlling security through alerts has been described as
a thing of the past: it is not only misleading, but it is ultimately
likely to end in a disaster for all involved (Lipman, 2015).
Since this method has been disregarded, this shows that there
are no plans on how to curb this vice. Many people even those
in authority; have been unable to come up with rules and
regulations against this device. The criminals undertaking this
vice have therefore been encouraged to go on by the fact that
there are no rules in the constitution that outline the punishment
for this vice.
Some ways can be used to manage the challenges in cyber
security. Some of the recommended ways are removing the
threat source by closing down botnets or cutting down
incentives for cybercriminals (Fischer, 2016). Secondly, the
manufacturing companies need to address vulnerabilities by
hardening the ICT assets they manufacture by patching software
and training employees. In addition, the users need to lessen
impacts by reducing damage and restoring functions to ensure
continuity of operations in response to attack. The level of risk
reduction will thus vary among sectors and organisations. For
instance, the level of cyber security that customers expect may
be lower for a company in the entertainment industry than for a
bank, a hospital or a government agency (Fischer, 2016).
Comment by Diana Lucas: I recommend you move this entire
paragraph to the next section titled “Conclusion and
Recommendations”
Conclusion and RecommendationsComment by Diana Lucas: Per
project instructions you were supposed to add this 1st level
heading to your paper, exactly like this….
In conclusion, it is the role of everyone to ensure that cyber
professional and the cyber industry grows and evolves with the
challenges it faces. The government has a substantial
responsibility to make sure that the organisations that fall under
it to provide cyber security are well funded. If this is put into
practice, cyber security will be in a much better place.Comment
by Diana Lucas: I’d like you to revise this area a bit. Similar to
my comments made to your introduction – here in the
Conclusion I should clearly understand what your RESEARCH
question and HYPOTHESIS was and the overall outcome of
your research. Did your research support or not support your
hypothesis?
I recommend you restate the ISSUE or PROBLEM is and what
YOU as the writer learned from the research itself.
Lastly, you had some good recommendations earlier – throw
them in this section…
ReferencesComment by Diana Lucas: This is NOT supposed to
be bolded per APA format. Please go back and look at the
example papers provided and the slides posted in the
Announcements page.
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber
security, and the CopenhagenSchool. International Studies
Quarterly, 53(4), 1155-1175.Comment by Diana Lucas: This is
correct but needs to be double-spaced
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE:
WHITE-HAT HACKING ACROSS THE DOMAIN NAME
SYSTEM. Communications Of The ACM, 49(6), 62-
68.Comment by Diana Lucas: Each of these are NOT correctly
cited. I need for you to review the example papers, slides, and
UMUC help site on citations:
http://sites.umuc.edu/library/libhow/gethelp-citing.cfm
Lipman P., 19th August 2015. The cyber security challenges
facing state and local governments.
Fischer E. A., 12th August 2016. “Cyber security issue and
challenges: in brief.” Congressional research service.
Running head: A SOLUTION TO CYBERTECH’S DILEMMA1
A SOLUTION TO CYBERTECH’S DILEMMA 2
A
Solution
to CyberTech’s Dilemma
Basagic, Justin
UMUC
CourseComment by Diana Lucas: Why is this here?
Recommend that you always do a quality review check of your
papers BEFORE you submit them – this is a MASTER’s
academic program therefore you are not expected to have these
types of errors/oversights in your papers.
Date
A
Company FacebookCalculating the Weighted Average Cost of Capi.docx

Weitere ähnliche Inhalte

Ähnlich wie Company FacebookCalculating the Weighted Average Cost of Capi.docx

Acc finl brief
Acc finl briefAcc finl brief
Acc finl briefwyinsam
 
Assignment - Financial Ratio Analysis
Assignment - Financial Ratio AnalysisAssignment - Financial Ratio Analysis
Assignment - Financial Ratio AnalysisKai Yun Pang
 
Acc30205 basic accounting assignment jan 2015
Acc30205 basic accounting assignment   jan 2015Acc30205 basic accounting assignment   jan 2015
Acc30205 basic accounting assignment jan 2015Trace96
 
ACC30205 Basic Accounting Assignment - Jan 2015-2.doc
ACC30205 Basic Accounting Assignment - Jan 2015-2.docACC30205 Basic Accounting Assignment - Jan 2015-2.doc
ACC30205 Basic Accounting Assignment - Jan 2015-2.docChloe Ling
 
Capital Readiness and Pre-Money Valuation
Capital Readiness and Pre-Money ValuationCapital Readiness and Pre-Money Valuation
Capital Readiness and Pre-Money ValuationJeff Greenspan
 
A Guide to Strategic Case AnalysisEach group is responsible for .docx
A Guide to Strategic Case AnalysisEach group is responsible for .docxA Guide to Strategic Case AnalysisEach group is responsible for .docx
A Guide to Strategic Case AnalysisEach group is responsible for .docxsleeperharwell
 
Discussion paper series iteration or circularity in wacc calculation
Discussion paper series iteration or circularity in wacc calculationDiscussion paper series iteration or circularity in wacc calculation
Discussion paper series iteration or circularity in wacc calculationFuturum2
 

Ähnlich wie Company FacebookCalculating the Weighted Average Cost of Capi.docx (9)

Acc finl brief
Acc finl briefAcc finl brief
Acc finl brief
 
Assignment - Financial Ratio Analysis
Assignment - Financial Ratio AnalysisAssignment - Financial Ratio Analysis
Assignment - Financial Ratio Analysis
 
Acc30205 basic accounting assignment jan 2015
Acc30205 basic accounting assignment   jan 2015Acc30205 basic accounting assignment   jan 2015
Acc30205 basic accounting assignment jan 2015
 
ACC30205 Basic Accounting Assignment - Jan 2015-2.doc
ACC30205 Basic Accounting Assignment - Jan 2015-2.docACC30205 Basic Accounting Assignment - Jan 2015-2.doc
ACC30205 Basic Accounting Assignment - Jan 2015-2.doc
 
muthu.shree
muthu.shreemuthu.shree
muthu.shree
 
Beta
BetaBeta
Beta
 
Capital Readiness and Pre-Money Valuation
Capital Readiness and Pre-Money ValuationCapital Readiness and Pre-Money Valuation
Capital Readiness and Pre-Money Valuation
 
A Guide to Strategic Case AnalysisEach group is responsible for .docx
A Guide to Strategic Case AnalysisEach group is responsible for .docxA Guide to Strategic Case AnalysisEach group is responsible for .docx
A Guide to Strategic Case AnalysisEach group is responsible for .docx
 
Discussion paper series iteration or circularity in wacc calculation
Discussion paper series iteration or circularity in wacc calculationDiscussion paper series iteration or circularity in wacc calculation
Discussion paper series iteration or circularity in wacc calculation
 

Mehr von donnajames55

KATIES POST The crisis case I chose to discuss this week is th.docx
KATIES POST The crisis case I chose to discuss this week is th.docxKATIES POST The crisis case I chose to discuss this week is th.docx
KATIES POST The crisis case I chose to discuss this week is th.docxdonnajames55
 
Kate Chopins concise The Story of an Hour.  What does Joseph.docx
Kate Chopins concise The Story of an Hour.  What does Joseph.docxKate Chopins concise The Story of an Hour.  What does Joseph.docx
Kate Chopins concise The Story of an Hour.  What does Joseph.docxdonnajames55
 
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docxKadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docxdonnajames55
 
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docxK-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docxdonnajames55
 
JWI 505 Business Communications and Executive Presence Lect.docx
JWI 505 Business Communications and Executive Presence Lect.docxJWI 505 Business Communications and Executive Presence Lect.docx
JWI 505 Business Communications and Executive Presence Lect.docxdonnajames55
 
Just Walk on By by Brent Staples My firs.docx
Just Walk on By by Brent Staples               My firs.docxJust Walk on By by Brent Staples               My firs.docx
Just Walk on By by Brent Staples My firs.docxdonnajames55
 
Just make it simple. and not have to be good, its the first draft. .docx
Just make it simple. and not have to be good, its the first draft. .docxJust make it simple. and not have to be good, its the first draft. .docx
Just make it simple. and not have to be good, its the first draft. .docxdonnajames55
 
JUST 497 Senior Seminar and Internship ExperienceInternationa.docx
JUST 497 Senior Seminar and Internship ExperienceInternationa.docxJUST 497 Senior Seminar and Internship ExperienceInternationa.docx
JUST 497 Senior Seminar and Internship ExperienceInternationa.docxdonnajames55
 
July 2002, Vol 92, No. 7 American Journal of Public Health E.docx
July 2002, Vol 92, No. 7  American Journal of Public Health E.docxJuly 2002, Vol 92, No. 7  American Journal of Public Health E.docx
July 2002, Vol 92, No. 7 American Journal of Public Health E.docxdonnajames55
 
Journals are to be 2 pages long with an introduction, discussion and.docx
Journals are to be 2 pages long with an introduction, discussion and.docxJournals are to be 2 pages long with an introduction, discussion and.docx
Journals are to be 2 pages long with an introduction, discussion and.docxdonnajames55
 
Judgement in Managerial Decision MakingBased on examples fro.docx
Judgement in Managerial Decision MakingBased on examples fro.docxJudgement in Managerial Decision MakingBased on examples fro.docx
Judgement in Managerial Decision MakingBased on examples fro.docxdonnajames55
 
Joyce is a 34-year-old woman who has been married 10 years. She .docx
Joyce is a 34-year-old woman who has been married 10 years. She .docxJoyce is a 34-year-old woman who has been married 10 years. She .docx
Joyce is a 34-year-old woman who has been married 10 years. She .docxdonnajames55
 
Journal Write in 300-500 words about the following topic.After .docx
Journal Write in 300-500 words about the following topic.After .docxJournal Write in 300-500 words about the following topic.After .docx
Journal Write in 300-500 words about the following topic.After .docxdonnajames55
 
Journal Supervision and Management StyleWhen it comes to superv.docx
Journal Supervision and Management StyleWhen it comes to superv.docxJournal Supervision and Management StyleWhen it comes to superv.docx
Journal Supervision and Management StyleWhen it comes to superv.docxdonnajames55
 
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55 Ava.docx
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55  Ava.docxJournal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55  Ava.docx
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55 Ava.docxdonnajames55
 
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docxJournal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docxdonnajames55
 
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docxJournal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docxdonnajames55
 
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docx
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docxJournal of Personality 862, April 2018VC 2016 Wiley Perio.docx
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docxdonnajames55
 
Journal of Personality and Social Psychology1977, Vol. 35, N.docx
Journal of Personality and Social Psychology1977, Vol. 35, N.docxJournal of Personality and Social Psychology1977, Vol. 35, N.docx
Journal of Personality and Social Psychology1977, Vol. 35, N.docxdonnajames55
 
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docxJournal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docxdonnajames55
 

Mehr von donnajames55 (20)

KATIES POST The crisis case I chose to discuss this week is th.docx
KATIES POST The crisis case I chose to discuss this week is th.docxKATIES POST The crisis case I chose to discuss this week is th.docx
KATIES POST The crisis case I chose to discuss this week is th.docx
 
Kate Chopins concise The Story of an Hour.  What does Joseph.docx
Kate Chopins concise The Story of an Hour.  What does Joseph.docxKate Chopins concise The Story of an Hour.  What does Joseph.docx
Kate Chopins concise The Story of an Hour.  What does Joseph.docx
 
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docxKadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
 
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docxK-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
 
JWI 505 Business Communications and Executive Presence Lect.docx
JWI 505 Business Communications and Executive Presence Lect.docxJWI 505 Business Communications and Executive Presence Lect.docx
JWI 505 Business Communications and Executive Presence Lect.docx
 
Just Walk on By by Brent Staples My firs.docx
Just Walk on By by Brent Staples               My firs.docxJust Walk on By by Brent Staples               My firs.docx
Just Walk on By by Brent Staples My firs.docx
 
Just make it simple. and not have to be good, its the first draft. .docx
Just make it simple. and not have to be good, its the first draft. .docxJust make it simple. and not have to be good, its the first draft. .docx
Just make it simple. and not have to be good, its the first draft. .docx
 
JUST 497 Senior Seminar and Internship ExperienceInternationa.docx
JUST 497 Senior Seminar and Internship ExperienceInternationa.docxJUST 497 Senior Seminar and Internship ExperienceInternationa.docx
JUST 497 Senior Seminar and Internship ExperienceInternationa.docx
 
July 2002, Vol 92, No. 7 American Journal of Public Health E.docx
July 2002, Vol 92, No. 7  American Journal of Public Health E.docxJuly 2002, Vol 92, No. 7  American Journal of Public Health E.docx
July 2002, Vol 92, No. 7 American Journal of Public Health E.docx
 
Journals are to be 2 pages long with an introduction, discussion and.docx
Journals are to be 2 pages long with an introduction, discussion and.docxJournals are to be 2 pages long with an introduction, discussion and.docx
Journals are to be 2 pages long with an introduction, discussion and.docx
 
Judgement in Managerial Decision MakingBased on examples fro.docx
Judgement in Managerial Decision MakingBased on examples fro.docxJudgement in Managerial Decision MakingBased on examples fro.docx
Judgement in Managerial Decision MakingBased on examples fro.docx
 
Joyce is a 34-year-old woman who has been married 10 years. She .docx
Joyce is a 34-year-old woman who has been married 10 years. She .docxJoyce is a 34-year-old woman who has been married 10 years. She .docx
Joyce is a 34-year-old woman who has been married 10 years. She .docx
 
Journal Write in 300-500 words about the following topic.After .docx
Journal Write in 300-500 words about the following topic.After .docxJournal Write in 300-500 words about the following topic.After .docx
Journal Write in 300-500 words about the following topic.After .docx
 
Journal Supervision and Management StyleWhen it comes to superv.docx
Journal Supervision and Management StyleWhen it comes to superv.docxJournal Supervision and Management StyleWhen it comes to superv.docx
Journal Supervision and Management StyleWhen it comes to superv.docx
 
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55 Ava.docx
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55  Ava.docxJournal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55  Ava.docx
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55 Ava.docx
 
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docxJournal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
 
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docxJournal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
 
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docx
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docxJournal of Personality 862, April 2018VC 2016 Wiley Perio.docx
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docx
 
Journal of Personality and Social Psychology1977, Vol. 35, N.docx
Journal of Personality and Social Psychology1977, Vol. 35, N.docxJournal of Personality and Social Psychology1977, Vol. 35, N.docx
Journal of Personality and Social Psychology1977, Vol. 35, N.docx
 
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docxJournal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
 

Kürzlich hochgeladen

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Company FacebookCalculating the Weighted Average Cost of Capi.docx

  • 1. Company: Facebook Calculating the Weighted Average Cost of Capital (WACC) for your Company For use in Conjunction with the Firm Valuation Project First ensure that you have read relevant pages in the text. Some important sections would include the following, but you may also double-check the references in the text by using the index [see: Cost of Capital and Target (optimal) Capital Structure, etc.]: The important Chapter in the text is the one entitled "The Cost of Capital," – with a particular focus on the section entitled “The Weighted Average Cost of Capital” and the section “Four Mistakes to Avoid” at the end of the chapter. The WACC formula discussed below does not include Preferred Stock. Should your company use PS, be sure to adjust the equation for it, and see the section in the chapter on the Cost of Preferred Stock. The WACC formula that we use is: WACC = wdrd(1-T) + wsrs We need to know how to calculate: 1. rsthe cost of common equity. Use the Security Market Line (SML) – this is why you learn how to calculate a company’s beta and also why you learn how to find the
  • 2. appropriate risk-free rate and market-risk premium. For a review, see the section the text, The CAPM Approach. 2. The weights (wd and ws – note that: wd + ws = 1; so you only have to calculate one of them). We need to calculate the weight of debt and the weight of equity (for the cost of debt, this simply means: what proportion of the firm’s financing is by debt?). There is a lot to say here, simplified as Theory 1, Theory 2 and Practice: a. Theory 1: Theory says that we should use the target weights along with the market values of both debt and equity (see the Four Mistakes to Avoid). But the market value of debt is typically difficult to calculate, because we need to know the YTM (which is rd) for all of the company’s debt, but we cannot calculate the YTM without having the current prices of the company’s outstanding bonds, and most company’s bonds do not trade (i.e., they will not have up-to-date or current prices – remember how to calculate the price (value) of a bond on your calculators?!). As a result, at least for the group project, we go to Theory 2. b. Theory 2: Theory also says that we should use the TARGET weights, but this is a management decision, and as “outsiders” we do not have access to the thoughts of the CFO or CEO. So we should look instead to the historical pattern of the use of debt (mix of debt and equity), and this is one reason that you should have about 10 years of financial data. c. Practice: Since we cannot “work” according to the strict theory of finance, we have to estimate the relevant weights. As a result, we will use the formula: wd = Book Value of Debt / [Market Value of Equity + Book Value of Debt]
  • 3. The book value of debt is calculated by adding up ALL of the debt on the balance sheet. This will typically be the sum of Notes Payable, Current Portion of LT Debt and Long-Term Debt. The market value of equity is the “Market Cap,” and equals the number of (common) shares outstanding multiplied by the price/share. Note that the “timing” of this value should coincide with the book value of debt. For example, if you calculate the book value of debt as of 12/31/14, then the market cap should also be calculated for that date. Be very careful about using the reported Market Cap on Yahoo.finance – it may not have the same “timing.” 3. r d; the cost of debt. There may be more than one acceptable approach to calculate or estimate a company’s cost of debt (be sure to read the text!). One relatively straightforward method is to discover the company’s debt rating (e.g., by Moodys). This can usually be found on the company’s 10K (see the link on my homepage) and doing a word search for ‘rating’ or ‘debt rating.’ For a discussion of bond ratings, see the text (look in the index). If you can find the debt rating for your company then you can carry out the following steps (if you cannot find a bond rating for your company, you might try to estimate/guess what it is by considering your company’s beta and comparing the bond ratings for companies with similar betas). If you are not able to find a bond rating readily, you can register (forfree) at Standard & Poor's and at Moody's to find company ratings. You may also find other interesting and useful information there. For a general discussion of what the ratings mean, see the information from these rating agencies on my homepage at the Bond Rating link. Once you have the actual bond rating or an estimate you can then find or estimate your company’s cost of debt by going to Yahoo.finance and clicking on the Bonds/Rates
  • 4. link(http://bonds.yahoo.com/rates.html). Look at the yields for the 20 year Corporate Bonds by rating. If your company’s bond rating is listed, you’re in luck. If it is not listed then you can estimate the cost of debt. For example, if the AAA yield is 6.50%, the AA yield is 6.75% and the A yield is 7.00%, you can see a pattern (equation). For every increase in risk (from AAA to AA), there is a 0.25% increase in the yield. If your company has a BB rating, then it is two steps “below” the A rating, so you should add approximately 0.50% more to the 7.00% for the A rating, giving you a cost of debt for your company of about 7.50%. Note that this approach assumes a linear equation for the cost of debt (which may not be strictly true). 4. The corporate tax rate ( T ). Be sure to read the section in the text on Corporate Income Taxes (Chapter 2). The correct tax rate for a company is the marginal tax rate for the future! If you expect your company to be very profitable for a long time into the future, then the tax rate ( T ) for your company should probably be the highest marginal tax rate applicable for corporations. But there are times when companies can obtain long-term tax breaks so that their tax rates may be lower than the stated (regulated) tax rate. Consequently you may want to calculate several/many historical effective tax rates for you company. The effective tax rate is the actual taxes paid divided by earnings before taxes (on the income statement). You can calculate/consider these rates for the past 5-10 years and then compare this effective tax rate to the legally mandated highest marginal corporate tax rate. If the past historical effective rate is lower than the marginal tax rate, there may be a good reason for using that lower rate in your pro formas. 5. r cs; the cost of common stock You can use CAPM model to predict the cost of common stock. The equation runs as followings:
  • 5. ri = rRF + (RPM) bi In order to use this model, first you should estimate the beta of your stock. Please refer to the guidelines of beta calculation for more information. . Rubric Name: Critical Thinking Paper Justin, please see my comments to your paper attached. Overall you have some good content but we really must talk about the paper structure -- I do see some improvement but in this case had you added the required headings the content would have a different perspective. Let's chat at our next face-to-face this coming Monday, 21 Nov. If you are unable to attend, please email me so we can coordinate a day/time to go over this assignment. Associated Learning Objectives 1.1.1: Present material in clear and/or logical order appropriate to task. Assessment Method: Score on Criteria - 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. Required Performance: Meets Performance Requirements
  • 6. Level Achieved: Does Not Meet Performance Requirements 1.1.2: Articulate thesis and purpose clearly. Assessment Method: Score on Criteria - 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.1.3: Support thesis and purpose fully. Assessment Method: Score on Criteria - 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.1.4: Transition smoothly and develop connections from point to point. Assessment Method: Score on Criteria - 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
  • 7. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.1.5: Create coherent progress from introduction through conclusion. Assessment Method: Score on Criteria - 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.1.6: Complete assignment in accordance with instructions. Assessment Method: Score on Criteria - 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.2.1: Create meaningful topic sentence for each paragraph or point. Assessment Method: Score on Criteria - 1.2: Develop coherent paragraphs or points so that each is internally unified and so
  • 8. that each functions as part of the whole document or presentation. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements 1.2.2: Develop each paragraph's single topic to the appropriate depth. Assessment Method: Score on Criteria - 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements 1.2.3: Supply relevant and original supporting detail. Assessment Method: Score on Criteria - 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements
  • 9. 1.3.1: Use a variety of credible sources to support, extend, and inform an original thesis or idea, integrating source material smoothly. Assessment Method: Score on Criteria - 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements 1.3.2: Summarize, paraphrase, and quote accurately. Assessment Method: Score on Criteria - 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements 1.3.3: Cite sources properly. Assessment Method: Score on Criteria - 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements 1.4.1: Identify target audience.
  • 10. Assessment Method: Score on Criteria - 1.4: Tailor communications to the audience. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.4.2: Explain unfamiliar terms and material. Assessment Method: Score on Criteria - 1.4: Tailor communications to the audience. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.4.3: Employ precise, appropriate language. Assessment Method: Score on Criteria - 1.4: Tailor communications to the audience. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.4.4: Use audience-appropriate, consistent tone. Assessment Method: Score on Criteria - 1.4: Tailor communications to the audience.
  • 11. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.4.5: Avoid language which indicates bias against individuals/groups their affiliations, orientations and beliefs. Assessment Method: Score on Criteria - 1.4: Tailor communications to the audience. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements 1.5.1: Demonstrate variation in sentence structure. Assessment Method: Score on Criteria - 1.5: Use sentence structure appropriate to the task, message and audience. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 1.5.2: Express ideas clearly and concisely. Assessment Method: Score on Criteria - 1.5: Use sentence structure appropriate to the task, message and audience. Required Performance: Meets Performance Requirements
  • 12. Level Achieved: Exceeds Performance Requirements 1.5.3: Eliminate sentence-level errors such as run-ons/comma splices and sentence fragments. Assessment Method: Score on Criteria - 1.5: Use sentence structure appropriate to the task, message and audience. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 1.6.1: Adhere to standard usage rules of grammar. Assessment Method: Score on Criteria - 1.6: Follow conventions of Standard Written English. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 1.6.2: Adhere to standard usage rules of word choice. Assessment Method: Score on Criteria - 1.6: Follow conventions of Standard Written English. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements
  • 13. 1.6.3: Adhere to standard usage rules of spelling. Assessment Method: Score on Criteria - 1.6: Follow conventions of Standard Written English. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.1.1: Summarize the issue or problem, using supporting details to enable a deeper understanding of the issue or problem. Assessment Method: Score on Criteria - 2.1: Identify and clearly explain the issue, question, or problem under critical consideration. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.1.2: Identify potential underlying causes or conditions contributing to the issue or problem and consider the context. Assessment Method: Score on Criteria - 2.1: Identify and clearly explain the issue, question, or problem under critical consideration. Required Performance: Meets Performance Requirements
  • 14. Level Achieved: Exceeds Performance Requirements 2.1.3: Pose significant questions to inform the direction of the investigation of the problem or question. Assessment Method: Score on Criteria - 2.1: Identify and clearly explain the issue, question, or problem under critical consideration. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.1.4: Scan the environment for cues to inform and direct search for information relevant to the issue or problem. Assessment Method: Score on Criteria - 2.1: Identify and clearly explain the issue, question, or problem under critical consideration. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.2.1: Explore information sources to increase familiarity and achieve a manageable focus. Assessment Method: Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem.
  • 15. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.2.2: Develop and implement a search strategy that employs search engines, databases, and inquiries to access the needed information. Assessment Method: Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.2.3: Assess the search results to determine if there are remaining gaps; revisit strategy as necessary. Assessment Method: Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.2.4: Identify contradictory information or inconsistent data and seek to reconcile contradictions. Assessment Method: Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem.
  • 16. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.4.1: Articulate clearly and fairly others' alternative viewpoints and the basis of reasoning. Assessment Method: Score on Criteria - 2.4: Consider and analyze information in context to the issue or problem. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.4.2: Identify significant, potential implications, and consequences of alternative points of view. Assessment Method: Score on Criteria - 2.4: Consider and analyze information in context to the issue or problem. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.4.3: Evaluate assumptions underlying other analytical viewpoints, conclusions, and/or solutions. Assessment Method: Score on Criteria - 2.4: Consider and analyze information in context to the issue or problem.
  • 17. Required Performance: Meets Performance Requirements Level Achieved: Exceeds Performance Requirements 2.5.1: Present and explain those inferences and deductions that follow logically from the evidence provided. Assessment Method: Score on Criteria - 2.5: Develop well- reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements 2.5.2: Assert logical conclusions only when sufficient evidence supports them, and distinguish between attainable and unattainable solutions. Assessment Method: Score on Criteria - 2.5: Develop well- reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements 2.5.3: Incorporate legal and ethical reasoning when formulating ideas, conclusions, and decisions.
  • 18. Assessment Method: Score on Criteria - 2.5: Develop well- reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements 2.5.4: Complete assignment in accordance with instructions. Assessment Method: Score on Criteria - 2.5: Develop well- reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements Running head: CYBER SECURITY 1 CYBER SECURITY 2 Challenges in Cyber Security Basagic, Justin UMUC
  • 19. Abstract In this paper, I am writing about how the relationship between cyber security has changed with innovation over time. I will also be covering that there is such a thing as good hacking instead of only shining a negative light on the subject. Keywords: Cyber security, hacking Cyber Security and Innovation Innovations over time has resulted in the creation of devices such as computers, laptops, and iPods. This has had positive effects in communications since people can now chat on line, thus making communication easier, faster, and cheaper. Besides these benefits, the companies involved in the creation of these devices have benefited financially due to higher sales they make over a short period. However, there are significant challenges that are encountered in cyber security which continue to evolve over time due to massive growth in the telecom and the explosion of the internet. Growing with innovations and technology is paramount to being successful as a cyber security analyst.
  • 20. The problems in cyber security are threats, vulnerabilities, and effects caused by attacks (Hansen & Nissenbaum, 2009). Other challenges include inadequate funds and lack of visibility control. According to Hansen & Nissenbaum (2009), cyber security is the act of taking care of ICT devices. The targets for cybercriminal are intellectual property, trade secrets, and contact negotiations. People who perform cyber-attacks, for instance, cause threats,, and they are categorised into five subheadings. These are Criminals intentioned on gaining money from crimes such as theft, hacking and extort. The second type is spies’ intention to access crucial government information or private entities while the third group is state warriors who perform cyber-attacks supporting a country's strategic plans and objectives. In addition, "hacktivists" who would cyber-attack for no monetary gain as well as terrorists who use cyber-attacks as a tool for non-state or state-funded warfare form the fifth category. These groups of people perform cyber-attacks to bring organisations to the economic loss to a nation or a firm and psychological problem to workers in various organizations. Therefore, data stolen from companies can be alleged on innocent citizens (Lipman, 2015). Moreover, there has been a rapid growth of threats per day. It has been discovered that there was a quarter a million-ransom ware variants in the past year (Lipman, 2015). However, it has been understood that the number is growing at the rapid rate of 60,000 new variants every day. Ransom ware acts like a trawling net which cast broadly to share as a large number of victims as possible in single attempt (Lipman, 2015). The threats have been sophisticated though they are conducted in combination. Conversely, there are aimed threats, which are designed to attack a certain organisation or even a particular individual (Lipman, 2015). These risks are tough to block with traditional security products. The second challenge facing cyber security is vulnerabilities. This is because cyber security is in many ways related between the cyber criminals and the defenders (Fischer, 2016). For
  • 21. instance, ICT devices are complex, and criminals are always looking for any weaknesses occurring at most points. However, defenders can shield these ICT systems against this weakness though there are significant challenges accompanied by this move. These may include intentional actions by criminals able to access a system; supply chain vulnerabilities, which can allow the use of malicious software during the installation process; and previously unknown, vulnerabilities without established solution (Kaminsky, 2006). On the contrary, where vulnerabilities are known, the implementation may be hindered by operational constraints. The third challenge facing cyber security is the impact brought by the attack. A well-planned attack is capable of destroying the formality; availability as well as the integrity of an ICT system with the data it handles. Additionally, cyber attacks can result in the loss of financial, proprietary, or personal information without the knowledge of the victim (Fischer, 2016). For example, denial-of-service cyber attacks affect legitimate users while accessing an individual system (Fischer, 2016). Therefore, the user of an ICT system may continue using some systems while others are inaccessible yet some may not realise this effect. Though the manufacturing companies are trying to reduce cyber-attack in conjunction with awareness given to ICT users, botnet malware constitutes to the growth of this crime. This is because it gives an attacker the direction of a system for use in cyber-attacks in other systems. Besides these effects, most cyber-attacks have little impact while a bigger attack on some systems with critical infrastructure (CI), might have significant consequences on country’s security, it’s economy as well as the livelihood and safety of the citizens (Fischer, 2016). Although it is widely recognised that cyber-attacks are costly to individuals and organisations, economic impacts can be difficult to measure while estimates vary widely. A cited figure for the annual cost to the global economy from cybercrime is $400 billion (Fischer, 2016). However, some observers have argued that this cost is
  • 22. substantially increasing with the expansion of the ICT infrastructure. The increase could also be attributed to the transition in customers’ preferences as most of the youths are purchasing the gadgets. Besides these challenges, the insufficient fund is also an inconvenience in cyber security. According to recent statistics, the local government agencies spend less than five percent of its IT budget on cyber crime (Lipman, 2015). This figure is half of what is allocated to the typical commercial enterprise. If the world's prominent companies have been affected by cyber attacks, it is evident that both the state and local agencies' efforts remain underfunded. Because of this, the team mandated with ensuring cyber safety lack enough resources to implement their goals. Therefore, because of this, the attackers get an opportunity to manoeuvre to their benefit. In addition, government agencies are facing a shortage of cyber security staff and in case they have, the staff lack knowledge (Lipman, 2015). With the rapid growth in the cyber threats over the last few years, the increasing demand has created a significant premium on security skills. This is because the public sector organisational is required to compete for talent due to the diverse nature in compensation level across the world. The most talented organisation has a competitive advantage since the cyber criminals will not be able to hack any information from such a firm hence ensuring confidentiality of the information. The last challenge facing cyber security has limited visibility and limited control. However, one of the unfortunate by- products within the IT environment is an avalanche of security events. Controlling security through alerts has been described as a thing of the past: it is not only misleading, but it is ultimately likely to end in a disaster for all involved (Lipman, 2015). Since this method has been disregarded, this shows that there are no plans on how to curb this vice. Many people even those in authority; have been unable to come up with rules and regulations against this device. The criminals undertaking this vice have therefore been encouraged to go on by the fact that
  • 23. there are no rules in the constitution that outline the punishment for this vice. Some ways can be used to manage the challenges in cyber security. Some of the recommended ways are removing the threat source by closing down botnets or cutting down incentives for cybercriminals (Fischer, 2016). Secondly, the manufacturing companies need to address vulnerabilities by hardening the ICT assets they manufacture by patching software and training employees. In addition, the users need to lessen impacts by reducing damage and restoring functions to ensure continuity of operations in response to attack. The level of risk reduction will thus vary among sectors and organisations. For instance, the level of cyber security that customers expect may be lower for a company in the entertainment industry than for a bank, a hospital or a government agency (Fischer, 2016). In conclusion, it is the role of everyone to ensure that cyber professional and the cyber industry grows and evolves with the challenges it faces. The government has a substantial responsibility to make sure that the organisations that fall under it to provide cyber security are well funded. If this is put into practice, cyber security will be in a much better place. References Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the CopenhagenSchool. International Studies Quarterly, 53(4), 1155-1175. Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE: WHITE-HAT HACKING ACROSS THE DOMAIN NAME SYSTEM. Communications Of The ACM, 49(6), 62-68. Lipman P., 19th August 2015. The cyber security challenges facing state and local governments. Fischer E. A., 12th August 2016. “Cyber security issue and challenges: in brief.” Congressional research service.
  • 24. Running head: CYBER SECURITY 1 CYBER SECURITY 8 Challenges in Cyber Security Basagic, Justin UMUC Abstract In this paper, I am writing about how the relationship between cyber security has changed with innovation over time. I will also be covering that there is such a thing as good hacking
  • 25. instead of only shining a negative light on the subject. Keywords: Cyber security, hacking Cyber Security and Innovation Innovations over time has resulted in the creation of devices such as computers, laptops, and iPods. This has had positive effects in communications since people can now chat on line, thus making communication easier, faster, and cheaper. Besides these benefits, the companies involved in the creation of these devices have benefited financially due to higher sales they make over a short period. However, there are significant challenges that are encountered in cyber security which continue to evolve over time due to massive growth in the telecom and the explosion of the internet. Growing with innovations and technology is paramount to being successful as a cyber security analyst.Comment by Diana Lucas: I’d like you to revise this area a bit. Keep in mind this is a research paper therefore I need to have a clear idea of what the ISSUE or PROBLEM is and what YOU as the researcher see as an area of interest to further investigate. That said, is this your RESEARCH QUESTION? It should be clearly stated as such. Also, what is your HYPOTHESIS? What do you foresee as the answer to your research question? Discussion of FindingsComment by Diana Lucas: Per project instructions you were supposed to add this 1st level heading to your paper, exactly like this…. The problems in cyber security are threats, vulnerabilities, and effects caused by attacks (Hansen & Nissenbaum, 2009). Other challenges include inadequate funds and lack of visibility control. According to Hansen & Nissenbaum (2009), cyber security is the act of taking care of ICT devices. The targets for cybercriminal are intellectual property, trade secrets, and
  • 26. contact negotiations. People who perform cyber-attacks, for instance, cause threats,, and they are categorised into five subheadings. These are Criminals intentioned on gaining money from crimes such as theft, hacking and extort. The second type is spies’ intention to access crucial government information or private entities while the third group is state warriors who perform cyber-attacks supporting a country's strategic plans and objectives. In addition, "hacktivists" who would cyber-attack for no monetary gain as well as terrorists who use cyber-attacks as a tool for non-state or state-funded warfare form the fifth category. These groups of people perform cyber-attacks to bring organisations to the economic loss to a nation or a firm and psychological problem to workers in various organizations. Therefore, data stolen from companies can be alleged on innocent citizens (Lipman, 2015).Comment by Diana Lucas: We need to get your in-text citations to ‘blend’ into the rest of the paper – it should not be a different font with a hyperlink. I went ahead and changed this for you – I’d like to see you change the rest of your in-text citations to Times New Roman,, 12-pitch. Moreover, there has been a rapid growth of threats per day. It has been discovered that there was a quarter a million-ransom ware variants in the past year (Lipman, 2015). However, it has been understood that the number is growing at the rapid rate of 60,000 new variants every day. Ransom ware acts like a trawling net which cast broadly to share as a large number of victims as possible in single attempt (Lipman, 2015). The threats have been sophisticated though they are conducted in combination. Conversely, there are aimed threats, which are designed to attack a certain organisation or even a particular individual (Lipman, 2015). These risks are tough to block with traditional security products. The second challenge facing cyber security is vulnerabilities. This is because cyber security is in many ways related between the cyber criminals and the defenders (Fischer, 2016). For
  • 27. instance, ICT devices are complex, and criminals are always looking for any weaknesses occurring at most points. However, defenders can shield these ICT systems against this weakness though there are significant challenges accompanied by this move. These may include intentional actions by criminals able to access a system; supply chain vulnerabilities, which can allow the use of malicious software during the installation process; and previously unknown, vulnerabilities without established solution (Kaminsky, 2006). On the contrary, where vulnerabilities are known, the implementation may be hindered by operational constraints. The third challenge facing cyber security is the impact brought by the attack. A well-planned attack is capable of destroying the formality; availability as well as the integrity of an ICT system with the data it handles. Additionally, cyber attacks can result in the loss of financial, proprietary, or personal information without the knowledge of the victim (Fischer, 2016). For example, denial-of-service cyber attacks affect legitimate users while accessing an individual system (Fischer, 2016). Therefore, the user of an ICT system may continue using some systems while others are inaccessible yet some may not realise this effect. Though the manufacturing companies are trying to reduce cyber-attack in conjunction with awareness given to ICT users, botnet malware constitutes to the growth of this crime. This is because it gives an attacker the direction of a system for use in cyber-attacks in other systems. Besides these effects, most cyber-attacks have little impact while a bigger attack on some systems with critical infrastructure (CI), might have significant consequences on country’s security, it’s economy as well as the livelihood and safety of the citizens (Fischer, 2016). Although it is widely recognised that cyber-attacks are costly to individuals and organisations, economic impacts can be difficult to measure while estimates vary widely. A cited figure for the annual cost to the global economy from cybercrime is $400 billion (Fischer, 2016). However, some observers have argued that this cost is
  • 28. substantially increasing with the expansion of the ICT infrastructure. The increase could also be attributed to the transition in customers’ preferences as most of the youths are purchasing the gadgets. Besides these challenges, the insufficient fund is also an inconvenience in cyber security. According to recent statistics, the local government agencies spend less than five percent of its IT budget on cyber crime (Lipman, 2015). This figure is half of what is allocated to the typical commercial enterprise. If the world's prominent companies have been affected by cyber attacks, it is evident that both the state and local agencies' efforts remain underfunded. Because of this, the team mandated with ensuring cyber safety lack enough resources to implement their goals. Therefore, because of this, the attackers get an opportunity to manoeuvre to their benefit. In addition, government agencies are facing a shortage of cyber security staff and in case they have, the staff lack knowledge (Lipman, 2015). With the rapid growth in the cyber threats over the last few years, the increasing demand has created a significant premium on security skills. This is because the public sector organisational is required to compete for talent due to the diverse nature in compensation level across the world. The most talented organisation has a competitive advantage since the cyber criminals will not be able to hack any information from such a firm hence ensuring confidentiality of the information. The last challenge facing cyber security has limited visibility and limited control. However, one of the unfortunate by- products within the IT environment is an avalanche of security events. Controlling security through alerts has been described as a thing of the past: it is not only misleading, but it is ultimately likely to end in a disaster for all involved (Lipman, 2015). Since this method has been disregarded, this shows that there are no plans on how to curb this vice. Many people even those in authority; have been unable to come up with rules and regulations against this device. The criminals undertaking this vice have therefore been encouraged to go on by the fact that
  • 29. there are no rules in the constitution that outline the punishment for this vice. Some ways can be used to manage the challenges in cyber security. Some of the recommended ways are removing the threat source by closing down botnets or cutting down incentives for cybercriminals (Fischer, 2016). Secondly, the manufacturing companies need to address vulnerabilities by hardening the ICT assets they manufacture by patching software and training employees. In addition, the users need to lessen impacts by reducing damage and restoring functions to ensure continuity of operations in response to attack. The level of risk reduction will thus vary among sectors and organisations. For instance, the level of cyber security that customers expect may be lower for a company in the entertainment industry than for a bank, a hospital or a government agency (Fischer, 2016). Comment by Diana Lucas: I recommend you move this entire paragraph to the next section titled “Conclusion and Recommendations” Conclusion and RecommendationsComment by Diana Lucas: Per project instructions you were supposed to add this 1st level heading to your paper, exactly like this…. In conclusion, it is the role of everyone to ensure that cyber professional and the cyber industry grows and evolves with the challenges it faces. The government has a substantial responsibility to make sure that the organisations that fall under it to provide cyber security are well funded. If this is put into practice, cyber security will be in a much better place.Comment by Diana Lucas: I’d like you to revise this area a bit. Similar to my comments made to your introduction – here in the Conclusion I should clearly understand what your RESEARCH question and HYPOTHESIS was and the overall outcome of your research. Did your research support or not support your hypothesis? I recommend you restate the ISSUE or PROBLEM is and what YOU as the writer learned from the research itself.
  • 30. Lastly, you had some good recommendations earlier – throw them in this section… ReferencesComment by Diana Lucas: This is NOT supposed to be bolded per APA format. Please go back and look at the example papers provided and the slides posted in the Announcements page. Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the CopenhagenSchool. International Studies Quarterly, 53(4), 1155-1175.Comment by Diana Lucas: This is correct but needs to be double-spaced Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE: WHITE-HAT HACKING ACROSS THE DOMAIN NAME SYSTEM. Communications Of The ACM, 49(6), 62- 68.Comment by Diana Lucas: Each of these are NOT correctly cited. I need for you to review the example papers, slides, and UMUC help site on citations: http://sites.umuc.edu/library/libhow/gethelp-citing.cfm Lipman P., 19th August 2015. The cyber security challenges facing state and local governments. Fischer E. A., 12th August 2016. “Cyber security issue and challenges: in brief.” Congressional research service. Running head: A SOLUTION TO CYBERTECH’S DILEMMA1 A SOLUTION TO CYBERTECH’S DILEMMA 2
  • 31. A Solution to CyberTech’s Dilemma Basagic, Justin UMUC CourseComment by Diana Lucas: Why is this here? Recommend that you always do a quality review check of your papers BEFORE you submit them – this is a MASTER’s academic program therefore you are not expected to have these types of errors/oversights in your papers. Date A