SecurityFundamentalsModels.ppt
合集下载
《公司理财》斯蒂芬A罗斯英文》PPT课件讲义
• The rate should be appropriate to the risk presented by the security.
5.1 Definition and Example of a Bond
• A bond is a legally binding agreement between a borrower and a lender: – Specifies the principal amount of the loan. – Specifies the size and timing of the cash flows:
• In dollar terms (fixed-rate borrowing) • As a formula (adjustable-rate borrowing)
5.1 Definition and Example of a Bond
• Consider a U.S. government bond listed as 6 3/8 of December 2009.
N I/Y PV PMT FV
12
5
– 1,070.52
31.875 = 1,000
1,000×0.06375 2
5.3 Bond Concepts
1. Bond prices and market interest rates move in opposite directions.
2. When coupon rate = YTM, price = par value. When coupon rate > YTM, price > par value (premium bond) When coupon rate < YTM, price < par value (discount bond)
5.1 Definition and Example of a Bond
• A bond is a legally binding agreement between a borrower and a lender: – Specifies the principal amount of the loan. – Specifies the size and timing of the cash flows:
• In dollar terms (fixed-rate borrowing) • As a formula (adjustable-rate borrowing)
5.1 Definition and Example of a Bond
• Consider a U.S. government bond listed as 6 3/8 of December 2009.
N I/Y PV PMT FV
12
5
– 1,070.52
31.875 = 1,000
1,000×0.06375 2
5.3 Bond Concepts
1. Bond prices and market interest rates move in opposite directions.
2. When coupon rate = YTM, price = par value. When coupon rate > YTM, price > par value (premium bond) When coupon rate < YTM, price < par value (discount bond)
企业安全风险评估培训课件知识
硬件 文档 设备 人员 其它
简称
解释/示例
Data
存在电子媒介的各种数据资料,包括源代码、 数据库数据,各种数据资料、系统文档、运行
管理规程、计划、报告、用户手册等
Software 应用软件、系统软件、开发工具和资源库等
Service
业务流程和各种业务生产应用、操作系统、 WWW、 SMTP、 POP3、 FTP 、 MRPII、 DNS
第二阶段:蓝图阶段
蓝图系列文档
第三阶段:安全风险评估阶段
×××公司系统综合风险分析报告
15
项目阶段主要成果及标志(2)
第四阶段:综合评估和策略阶段
×××公司系统网络安全现状 ×××公司系统安全策略建议 ×××公司系统安全解决方案
第五阶段:项目评审
项目验收报告
16
风险评估的模式
精简型风险评估 标准型评估 大型评估
17
今日议题
安全风险评估介绍
信息安全介绍 工作环节 评估的模式
安全风险评估流程
安全风险评估工具介绍
安全风险评估工具
18
安全风险评估流程
• 信息资产界定 • 安全弱点和威胁的评估 • 风险量化和计算 • 安全评估报告 • 安全解决方案
评估流程图
19
信息资产分类列表
类别 数据
软件 服务
人工评估报告 顾问访谈备忘录 网络架构评估报告 策略文档评估报告
白客测试分析报告 安全问卷调查报告 业务流程评估报告 策略文档评估报告总结
方
案
安全风险评估报告
阶
网络安全策略评估和改进建议
段
网络安全解决方案
14
项目阶段主要成果及标志(1)
第一阶段:项目准备阶段
简称
解释/示例
Data
存在电子媒介的各种数据资料,包括源代码、 数据库数据,各种数据资料、系统文档、运行
管理规程、计划、报告、用户手册等
Software 应用软件、系统软件、开发工具和资源库等
Service
业务流程和各种业务生产应用、操作系统、 WWW、 SMTP、 POP3、 FTP 、 MRPII、 DNS
第二阶段:蓝图阶段
蓝图系列文档
第三阶段:安全风险评估阶段
×××公司系统综合风险分析报告
15
项目阶段主要成果及标志(2)
第四阶段:综合评估和策略阶段
×××公司系统网络安全现状 ×××公司系统安全策略建议 ×××公司系统安全解决方案
第五阶段:项目评审
项目验收报告
16
风险评估的模式
精简型风险评估 标准型评估 大型评估
17
今日议题
安全风险评估介绍
信息安全介绍 工作环节 评估的模式
安全风险评估流程
安全风险评估工具介绍
安全风险评估工具
18
安全风险评估流程
• 信息资产界定 • 安全弱点和威胁的评估 • 风险量化和计算 • 安全评估报告 • 安全解决方案
评估流程图
19
信息资产分类列表
类别 数据
软件 服务
人工评估报告 顾问访谈备忘录 网络架构评估报告 策略文档评估报告
白客测试分析报告 安全问卷调查报告 业务流程评估报告 策略文档评估报告总结
方
案
安全风险评估报告
阶
网络安全策略评估和改进建议
段
网络安全解决方案
14
项目阶段主要成果及标志(1)
第一阶段:项目准备阶段
金融机构英文课件 (22)
Lessons for Non-Financial Corporations (page 585-586)
l It is important to fully understand the products you trade
l Beware of hedgers becoming speculators l It can be dangerous to make the
l Separate the front middle and back office l Do not blindly trust models l Be conservative in recognizing inception
profits l Do not sell clients inappropriate products l Beware easy profits
Treasurer’s department a profit center
A Final Point (page 586-587)
l Three types of risk
l Known l Unknown l Unknowable
l Flexibility is important
l Beware when many are following the same strategy
l Do not make excessive use of short-term borrowings for long-term needs
l Market transparency is important
Risk Limits (page 577-579)
l Risk must be quantified and risk limits set l Exceeding risk limits not acceptableesult l Do not assume that you can outguess the
Fundamentals_of_Cybersecurity_-_NACUSO_4.4.2016
Sheets Suppression
High Availability
CFPB: UDAAP (Unfair/Deceptive Practice)
2016 first action by CFPB on cybersecurity: Online payment processor Accused of lying about PCI Compliance Accused of lying about their security procedures (encryption) Released apps without testing security Fined $100,000 Firewall Run System Change Respect & Best DR/BR Program System Change Cease Sheets and Desist Order Controls Service for our Controls Customers Fix application release process
“Does the board of directors approve of and oversee the development, implementation, and maintenance of the program, including assigning specific responsibility for its implementation and 05 06 01
Logical (Computer ) Security
Identify systems with member info
Regularly determine who has access
Unit 3 Security PPT课件
Body:
1) Doors are not left unlocked either in cities or in rural areas. 2) Dead-bolt locks, security chains, electronic alarm systems and trip wires are widely in use. 3) Suburban families have steel bars built in sliding glass doors. 4) Small notices warning against burglary are commonly seen pasted on the windows of the most pleasant of homes.
Safe Tips:
Avoid walking or running alone at night. Always walk in well-lighted areas. Avoid the use of short cuts. Keep away from large bushes or doorways where someone could be lurking. If someone in a vehicle stops and asks for directions, answer from a distance. Do not approach the vehicle. If followed, go immediately to an area with lights and people. If needed, turn around and walk in the opposite direction.
《社会保障水平》
(2)保障水平超度:“不效率”
① 社会保障支出增长过快,加之人口
老龄化加剧和经济周期波动,使国民经济不
堪重负,危及社会保障制度的生存与发展;
② 政府财政赤字和债务增加,影响政
So府cia信l S誉ecu,rity使负担代际精选转ppt 嫁;
19
③ 作为消费支出,对于资本积累产生影 响,导致社会总投资不足;
Social Security
精选ppt
14
二、社会保障适度水平的测定
(一)社会保障水平“适度”的标准
1.社会保障水平是质和量的统一
社会保障水平适度标准既包括量的内容, 也包括质的特征。“度”是多少,是高低, 反应量的状况;“适”,是道德评价,是好 坏、优劣(相对于经济和社会发展及自身要 求是否适当),反应质的状况。所以说社会 保障水平是质和量的统一即质量标准。
中国:家庭养老“多子多孙”、“子 孙绕膝”、“天伦之乐”、“养儿防老” 等。
案例
Social Security
精选ppt
10
2.社会保障水平在多因素共同作用下的 特点
① 动态性特征:随经济发展、人口结构 变动、制度成熟而变动。
② 刚性特征:刚性增长,缺乏弹性或者 只具单向度的弹性,表现为规模只能扩不能 缩,项目只能上(增加)不能下(减少), 水平只能提高不能降低,缺乏灵活性和适应 性。
③避免社会保障资源供给不足所造成的危机, 以及由于过高水平而引发的资源浪费,有利于实现 社会保障制度自身的可持续发展,保证其良性运转;
④ 有助于发挥社会保障制度的调控经济的杠杆
作用,有利于经济发展和社会进步。
Social Security
精选ppt
18
2.社会保障水平的“不适度”的负面影 响
公司理财罗斯英文原书第九版第十一章.ppt
Chapter Outline
11.1 Individual Securities 11.2 Expected Return, Variance, and Covariance 11.3 The Return and Risk for Portfolios 11.4 The Efficient Set for Two Assets 11.5 The Efficient Set for Many Assets 11.6 Diversification 11.7 Riskless Borrowing and Lending 11.8 Market Equilibrium 11.9 Relationship between Risk and Expected Return (CAPM)
The rate of return on the portfolio is a weighted average of the returns on the stocks and bonds in the portfolio:
r w r w r P B B S S
5 % 50 % ( 7 %) 50 % ( 17 %)
“Deviation” compares return in each state to the expected return.
“Weighted” takes the product of the deviations multiplied by the probability of that state.
1 1 1 E ( r ) ( 7 %) ( 12 %) ( 28 % S 3 3 3 E ( r ) 11 % S
Variance
Scenario
CAPM(资本资产定价模型英文教程)PPT课件
22
结束语
当你尽了自己的最大努力时,失败也是伟大的, 所以不要放弃,坚持就是正确的。
When You Do Your Best, Failure Is Great, So Don'T Give Up, Stick To The End
23
谢谢大家
荣幸这一路,与你同行
It'S An Honor To Walk With You All The Way
market beta
14
Portfolio Betas
Weighted average of the individual asset's betas
May be more stable than individual stock betas
15
How Characteristic Line leads to CAPM?
6
Beta Coefficients
7
Interpretation of the Numerical Value of Beta
Beta = 1.0 Stock's return has same volatility as the market return
Beta > 1.0 Stock's return is more volatile than the market return
20
Beta Coefficients and The Security Market Line
The figure relating systematic risk (beta) and the return on a stock
21
Beta Coefficients and The Security Market Line
结束语
当你尽了自己的最大努力时,失败也是伟大的, 所以不要放弃,坚持就是正确的。
When You Do Your Best, Failure Is Great, So Don'T Give Up, Stick To The End
23
谢谢大家
荣幸这一路,与你同行
It'S An Honor To Walk With You All The Way
market beta
14
Portfolio Betas
Weighted average of the individual asset's betas
May be more stable than individual stock betas
15
How Characteristic Line leads to CAPM?
6
Beta Coefficients
7
Interpretation of the Numerical Value of Beta
Beta = 1.0 Stock's return has same volatility as the market return
Beta > 1.0 Stock's return is more volatile than the market return
20
Beta Coefficients and The Security Market Line
The figure relating systematic risk (beta) and the return on a stock
21
Beta Coefficients and The Security Market Line
Section 15 Security Flowmaster英文PPT的教程
• Enables many sections to be scrutinized quickly
• Can be set up to match case, or search for words near to each other
• Can perform Boolean Algebra on searches
Displays the first page
Toolbar
Displays the previous page Displays the next page Displays the last page Goes to the previous page Returns to the next view
NUT 6.3 Slide 13 of 32
Contents Page
Select ‘Introduction’ to view AC Family Introduction
NUT 6.3 Slide 14 of 32
Family Sections
Thumbnails
Select here to return to the contents page
Section 15 : Security
NUT 6.3 Slide 1 of 32
Security
• There are 3 levels of security :
• Administrator
• Has complete control over entire system
• Project Owner
NUT 6.3 Slide 23 of 32
Adding Indexes to Search
Also add the Transient section to the list
• Can be set up to match case, or search for words near to each other
• Can perform Boolean Algebra on searches
Displays the first page
Toolbar
Displays the previous page Displays the next page Displays the last page Goes to the previous page Returns to the next view
NUT 6.3 Slide 13 of 32
Contents Page
Select ‘Introduction’ to view AC Family Introduction
NUT 6.3 Slide 14 of 32
Family Sections
Thumbnails
Select here to return to the contents page
Section 15 : Security
NUT 6.3 Slide 1 of 32
Security
• There are 3 levels of security :
• Administrator
• Has complete control over entire system
• Project Owner
NUT 6.3 Slide 23 of 32
Adding Indexes to Search
Also add the Transient section to the list
第二十九章 信用管理
第二十九章 信用管理
29.2 The Decision to Grant Credit: Risk and Information
•The NPV of the cash only strategy is
•The NPV of the credit strategy is
PPT文档演模板
• The decision to grant credit depends on four factors:
increased speed and rate of collection of receivables. • An example would be “3/10 net 30”
– The customer can take a 3% discount if he pays within 10 days.
第二十九章 信用管理
PPT文档演模板
2020/12/9
第二十九章 信用管理
Introduction
• A firm’s credit policy is composed of:
– Terms of the sale – Credit analysis – Collection policy
• This chapter discusses each of the components of credit policy that makes up the decision to grant credit.
end of the first period:
(Probability = h)
•Do not
•Give
give credit
credit •Custome
•Our first decision:
29.2 The Decision to Grant Credit: Risk and Information
•The NPV of the cash only strategy is
•The NPV of the credit strategy is
PPT文档演模板
• The decision to grant credit depends on four factors:
increased speed and rate of collection of receivables. • An example would be “3/10 net 30”
– The customer can take a 3% discount if he pays within 10 days.
第二十九章 信用管理
PPT文档演模板
2020/12/9
第二十九章 信用管理
Introduction
• A firm’s credit policy is composed of:
– Terms of the sale – Credit analysis – Collection policy
• This chapter discusses each of the components of credit policy that makes up the decision to grant credit.
end of the first period:
(Probability = h)
•Do not
•Give
give credit
credit •Custome
•Our first decision:
CHAPTER4 Option Pricing Models,The Binomial Model (《衍生工具与风险管理》PPT课件)
Conditions and assumptions
One period, two outcomes (states) S = current stock price u = 1 + return if stock goes up d = 1 + return if stock goes down r = risk-free rate
h
Cu Su
Cd Sd
,
hu
Cu2 Su 2
Cud Sud
,
hd
Cud Sud
Cd2 Sd2
THE TWO-PERIOD BINOMIAL MODEL (CONTINUED)
An Illustrative Example
Su2 = 100(1.25)2 = 156.25 Sud = 100(1.25)(.80) = 100 Sd2 = 100(.80)2 = 64 The call option prices are as follows
Value of investment: V = 556($100) 1,000($14.02) = $41,580. (This is how much money you must put up.)
Stock goes to $125
Value of investment = 556($125) - 1,000($25) = $44,500
V(1+r) = Vu (or Vd)
Substituting for V and Vu
(hS - C)(1+r) = hSu - Cu
THE ONE-PERIOD BINOMIAL MODEL (CONTINUED)
One period, two outcomes (states) S = current stock price u = 1 + return if stock goes up d = 1 + return if stock goes down r = risk-free rate
h
Cu Su
Cd Sd
,
hu
Cu2 Su 2
Cud Sud
,
hd
Cud Sud
Cd2 Sd2
THE TWO-PERIOD BINOMIAL MODEL (CONTINUED)
An Illustrative Example
Su2 = 100(1.25)2 = 156.25 Sud = 100(1.25)(.80) = 100 Sd2 = 100(.80)2 = 64 The call option prices are as follows
Value of investment: V = 556($100) 1,000($14.02) = $41,580. (This is how much money you must put up.)
Stock goes to $125
Value of investment = 556($125) - 1,000($25) = $44,500
V(1+r) = Vu (or Vd)
Substituting for V and Vu
(hS - C)(1+r) = hSu - Cu
THE ONE-PERIOD BINOMIAL MODEL (CONTINUED)
风险管理英文课件 (18)
Standardized Approach (pages based on weighted sensitivities, which is the sum of
l Delta measure l Vega measure l Curvature measure
l The weights are standard deviations or volatilities of daily changes in stressed markets multiplied by a factor to give confidence level over the liquidity horizon
l Basel II.5:
l Capital based on 10-day 99% VaR and 10-day 99% stressed VaR
l Incremental risk charge for credit instruments to prevent regulatory arbitrage between banking book and trading book
charge is determined by making a single parallel shift
Curvature Risk Charge Calculation
Curvature risk charge = AB
No curvature risk charge
Default Risk Charge
1. All variables are changed (ES1) 2. All variables except those with a time horizon of 10 days
公司理财(罗斯)第5章(英文)
1 C F PV = 1 + T r (1+ r) (1+ r)T
To value bonds and stocks we need to:
Estimate future cash flows:
Size (how much) and Timing (when)
Discount future cash flows at an appropriate rate:
The rate should be appropriate to the risk presented by the security.
$31.875 $31.875
$31.875
$1,031.875
12 / 31/ 09
1/1/ 05 6 / 30 / 05
McGraw-Hill/Irwin Corporate Finance, 7/e
12 / 31/ 05
6 / 30 / 09
2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
McGraw-Hill/Irwin Corporate Finance, 7/e 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
5-6
5.2 How to Value Bonds
We now consider how to value following different types of bonds: Pure discount bonds Level-coupon bonds Consols
2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
证券投资分析第十二章 证券衍生产品与风险管理简明教程PPT课件
6
12.1 股价指数期货
3 股指期货的停滞期(1988-1990)
(1)1987 年10 月19 日星期一,美国华尔街股市单日暴跌近25%,从 而引发全球股市重挫 ,此次金融风暴的原因很多,但股指期货也被认为 是元凶之一,典型如《布莱迪报告》中的”瀑布理论“等。
(2)为了防范股票市场价格的大幅下跌,包括各证券交易所和期货交易 所均采取了多项限制措施 ,其中包括涨跌停板制度。
国债期货试行的两周内,交易清淡,仅成交19 口; 1993年7月10日,财政部颁布了《关于调整国 库券发行条件的公告》,参照中央银行公布的 保值贴补率给予一些国债品种的保值补贴; 1993年10月25日,上交所重新设计了国债期货 合约的品种和交易机制,国债期货交易向社会 公众开放,北京商品交易所在期货交易所中率 先推出国债期货交易;
8
12.1 股价指数期货
世界主要股票指数期货
美国 标准普尔500和电子小型标准普尔500股指期货(开盘价 格限制,熔断机制)
英国
韩国 日本 香港 中国
金融时报100股指期货(无涨跌限制)
韩国KOSP1200股指期货 日经225股指期货和小型日经225股指期货(无涨跌限制) 恒生指数股指期货和小型恒指股指期货(无涨跌限制) 沪深300股票指数期货
(3)自此股灾后,股指期货进入了停滞期。尽管如此,这个时期期货交 易所制定的涨跌幅度限制为以后股指期货的发展奠定了重要基础。
7
12.1 股价指数期货
4 蓬勃发展阶段(1990年-至今)
(1)进入20世纪90年代之后,股指期货应用的争议逐渐消失,投资者的投资 行为更为理智,发达国家和部分发展中国家相继推出股指期货交易,配合全球 金融市场的国际化程度的提高交易规模迅速扩大,交易品种不 断增加。06年统计数据显示股指期货已经是所有期货交易品种中的第一大品 种,在全球期货交易中,股指期货占比38%。
12.1 股价指数期货
3 股指期货的停滞期(1988-1990)
(1)1987 年10 月19 日星期一,美国华尔街股市单日暴跌近25%,从 而引发全球股市重挫 ,此次金融风暴的原因很多,但股指期货也被认为 是元凶之一,典型如《布莱迪报告》中的”瀑布理论“等。
(2)为了防范股票市场价格的大幅下跌,包括各证券交易所和期货交易 所均采取了多项限制措施 ,其中包括涨跌停板制度。
国债期货试行的两周内,交易清淡,仅成交19 口; 1993年7月10日,财政部颁布了《关于调整国 库券发行条件的公告》,参照中央银行公布的 保值贴补率给予一些国债品种的保值补贴; 1993年10月25日,上交所重新设计了国债期货 合约的品种和交易机制,国债期货交易向社会 公众开放,北京商品交易所在期货交易所中率 先推出国债期货交易;
8
12.1 股价指数期货
世界主要股票指数期货
美国 标准普尔500和电子小型标准普尔500股指期货(开盘价 格限制,熔断机制)
英国
韩国 日本 香港 中国
金融时报100股指期货(无涨跌限制)
韩国KOSP1200股指期货 日经225股指期货和小型日经225股指期货(无涨跌限制) 恒生指数股指期货和小型恒指股指期货(无涨跌限制) 沪深300股票指数期货
(3)自此股灾后,股指期货进入了停滞期。尽管如此,这个时期期货交 易所制定的涨跌幅度限制为以后股指期货的发展奠定了重要基础。
7
12.1 股价指数期货
4 蓬勃发展阶段(1990年-至今)
(1)进入20世纪90年代之后,股指期货应用的争议逐渐消失,投资者的投资 行为更为理智,发达国家和部分发展中国家相继推出股指期货交易,配合全球 金融市场的国际化程度的提高交易规模迅速扩大,交易品种不 断增加。06年统计数据显示股指期货已经是所有期货交易品种中的第一大品 种,在全球期货交易中,股指期货占比38%。
CHAPTER6 Insurance as a Risk Management Technique (《风险管理与保险》PPT课件)
Pooling: The sharing of total losses among a group Risk reduction: A decrease in the total amount of uncertainty present in a
particular situation
Insurers accomplish this by combining a group of objects situated so that the aggregate losses become predictable within narrow limits
The holder of a contract to receive royalties Legal liability resulting from contracts Secured creditors Building contractors, etc.
8
WHAT CONSTITUTES INSURABLE INTEREST
distinguishing legal characteristics of insurance contracts Differentiate between insurance agents and brokers and describe
the sources for their authority Define social insurance and explain the basic principles that
The legal owner of property having its value diminished by loss
Other rights exist that are sufficient to establish an insurable interest in addition to ownership
particular situation
Insurers accomplish this by combining a group of objects situated so that the aggregate losses become predictable within narrow limits
The holder of a contract to receive royalties Legal liability resulting from contracts Secured creditors Building contractors, etc.
8
WHAT CONSTITUTES INSURABLE INTEREST
distinguishing legal characteristics of insurance contracts Differentiate between insurance agents and brokers and describe
the sources for their authority Define social insurance and explain the basic principles that
The legal owner of property having its value diminished by loss
Other rights exist that are sufficient to establish an insurable interest in addition to ownership
精品课程《公司金融》ppt全套课件第4章 风险衡量
i 1 n
(R 1i R 1 ) 证券1在经济状态i下收益率对期望值的离差
( R2i R2 ) 证券2在经济状态i下收益率对期望值的离差
Pi
经济状态i发生的概率 经济状态可能情况的个数
n
经济 状况 萧条 衰退
Supertech
概率 收益 率 -20% 10% 收益率 离差 -0.375 -0.075
R2 (0.05 0.2 0.12 0.09) 0.25 5.5%
第二步: 计算投资组合的期望收益率;
Rp Wi Ri 0.6 17.5% 0.4 5.5% 12.7%
i 1
2
二、投资组合风险的度量
(一) 协方差与相关系数 (二) 两项资产组成的投资组合的方差 (三) 多项资产组成的投资组合的方差
2. 相关系数(Correlation Coefficient)
相关系数等于两种资产收益率的协方差除 以两种资产收益率标准差的乘积。通常表 示为Corr(R1,R2)或ρ 12。 12 Corr ( R1 , R2 ) 12 1 2
12 —两种资产收益率的协方差
1
2
2 p 2 1 2 1 2 2
2 2
公式表明:投资组合的方差取决于组合中各种
证券的方差和每两种证券之间的协方差。 每种证券的方差度量每种证券收益的变动程度, 协方差度量两种证券收益之间的相互关系。
举例:计算投资组合的标准差
(0.6) (0.2586) 2 0.6 0.4 (0.004875)
2.公司债券 k 0.05 0.12 0.2 0.1 0.5 0.09 0.2 0.08 0.05 0.08 9.2%
(R 1i R 1 ) 证券1在经济状态i下收益率对期望值的离差
( R2i R2 ) 证券2在经济状态i下收益率对期望值的离差
Pi
经济状态i发生的概率 经济状态可能情况的个数
n
经济 状况 萧条 衰退
Supertech
概率 收益 率 -20% 10% 收益率 离差 -0.375 -0.075
R2 (0.05 0.2 0.12 0.09) 0.25 5.5%
第二步: 计算投资组合的期望收益率;
Rp Wi Ri 0.6 17.5% 0.4 5.5% 12.7%
i 1
2
二、投资组合风险的度量
(一) 协方差与相关系数 (二) 两项资产组成的投资组合的方差 (三) 多项资产组成的投资组合的方差
2. 相关系数(Correlation Coefficient)
相关系数等于两种资产收益率的协方差除 以两种资产收益率标准差的乘积。通常表 示为Corr(R1,R2)或ρ 12。 12 Corr ( R1 , R2 ) 12 1 2
12 —两种资产收益率的协方差
1
2
2 p 2 1 2 1 2 2
2 2
公式表明:投资组合的方差取决于组合中各种
证券的方差和每两种证券之间的协方差。 每种证券的方差度量每种证券收益的变动程度, 协方差度量两种证券收益之间的相互关系。
举例:计算投资组合的标准差
(0.6) (0.2586) 2 0.6 0.4 (0.004875)
2.公司债券 k 0.05 0.12 0.2 0.1 0.5 0.09 0.2 0.08 0.05 0.08 9.2%
风险管理英文课件 (25)
Model Risk for Actively Traded Products
l Little pricing risk in most cases l Hedging performance can depend on the
model used and should be carefully investigated
l The model is a communication tool (e.g., implied volatilities are quoted for options)
l It is also an interpolation tool (e.g., a tool for interpolating between strike prices and maturities)
Models for Pricing Actively Traded Products
l We do not usually need a model to know the price of an actively traded product. The market tells us the price.
l Model development, testing, and documentation
l The role of model validation groups l The use of vendor models
Finance vs. Physics (page 572)
l The models of physics describe physical processes and are highly accurate. Their parameters do not change through time.
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
IBM TJ Watson Research Center 1996-Present
– Operating Systems Research 1996-2001
L4 microkernel-based systems: L4Linux, Lava, JavaOS, SawMill Security policy: graphical access control, constraint models
Access Control is Hard Because
Access control requirements are domain-specific
– Generic approaches over-generalize
Access control requirements can change
– Anyone could be an administrator
The Safety Problem [HRU76]
– Can only know what is leaked right now
Access is fail-safe, but Constraints are not
– And constraints must restrict all future states
Prof Alice wants certain guarantees
– Students cannot modify objects written by Prof Alice – Students cannot read/modify objects of other groups
Prof Alice must be able to maintain access policy
– Ensure that individual rights do not violate guarantees – However, exceptions are possible – students may distribute their
results from previous assignments for an exam
Why are we still talking about access control?
An access control policy is a specification for an access decision function
The policy aims to achieve
– Systems Security Research 2001-Present
Linux Security: based on the Linux Security Modules framework Linux Security Analysis Project: source code and policy analysis –
Security Fundamentals: Models
Trent Jaeger January 12, 2004
Trent Jaeger -- Background
Graduated from UM with PhD
– Flexible Control of Downloaded Executable Content – Research Thread That Led to Java 2 Security Model
– Permit the principal’s intended function (availability) – Ensure security properties are met (integrity, confidentiality)
Limit to “Least Privilege,” Protect system integrity, Prevent unauthorized leakage, etc.
Compare to Other CS Problems
Processor design
– Hard, but can get some smart people together to construct one, fixed, testable design
/vali
Conference chair, programming chair of ACM SACMAT, CCS PC member of IEEE S&P, USENIX, ESORICS, etc.
Access Control
Determine whether a principБайду номын сангаасl can perform a requested operation on a target object
Also known as ‘constraints’
– Enable administration of a changeable system (simplicity)
“Simple” example
Prof Alice manages access to course objects
– Assign access to individual (principal: Bob) – Assign access to aggregate (course-students) – Associate access to relation (students(course)) – Assign students to project groups (student(course, project, group))
Principal: user, process, etc. Operation: read, write, etc. Object: file, tuple, etc. Lampson defined the familiar access matrix
and its two interpretations ACLs and capabilities [Lampson70]
– Operating Systems Research 1996-2001
L4 microkernel-based systems: L4Linux, Lava, JavaOS, SawMill Security policy: graphical access control, constraint models
Access Control is Hard Because
Access control requirements are domain-specific
– Generic approaches over-generalize
Access control requirements can change
– Anyone could be an administrator
The Safety Problem [HRU76]
– Can only know what is leaked right now
Access is fail-safe, but Constraints are not
– And constraints must restrict all future states
Prof Alice wants certain guarantees
– Students cannot modify objects written by Prof Alice – Students cannot read/modify objects of other groups
Prof Alice must be able to maintain access policy
– Ensure that individual rights do not violate guarantees – However, exceptions are possible – students may distribute their
results from previous assignments for an exam
Why are we still talking about access control?
An access control policy is a specification for an access decision function
The policy aims to achieve
– Systems Security Research 2001-Present
Linux Security: based on the Linux Security Modules framework Linux Security Analysis Project: source code and policy analysis –
Security Fundamentals: Models
Trent Jaeger January 12, 2004
Trent Jaeger -- Background
Graduated from UM with PhD
– Flexible Control of Downloaded Executable Content – Research Thread That Led to Java 2 Security Model
– Permit the principal’s intended function (availability) – Ensure security properties are met (integrity, confidentiality)
Limit to “Least Privilege,” Protect system integrity, Prevent unauthorized leakage, etc.
Compare to Other CS Problems
Processor design
– Hard, but can get some smart people together to construct one, fixed, testable design
/vali
Conference chair, programming chair of ACM SACMAT, CCS PC member of IEEE S&P, USENIX, ESORICS, etc.
Access Control
Determine whether a principБайду номын сангаасl can perform a requested operation on a target object
Also known as ‘constraints’
– Enable administration of a changeable system (simplicity)
“Simple” example
Prof Alice manages access to course objects
– Assign access to individual (principal: Bob) – Assign access to aggregate (course-students) – Associate access to relation (students(course)) – Assign students to project groups (student(course, project, group))
Principal: user, process, etc. Operation: read, write, etc. Object: file, tuple, etc. Lampson defined the familiar access matrix
and its two interpretations ACLs and capabilities [Lampson70]