To Be Secure or Not to Be?
Author: COMAP
Background:
You probably know about computer hackers and computer viruses. Unless your computer has been targeted by one, you may not know how they could affect an individual or an organization. If a computer is attacked by a hacker or virus, it could lose important personal information and software.
The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (IT) security for this proposed university. The narrative below provides some background to help develop a framework to examine IT security. Specific tasks are provided at the end of this narrative.
Problem Download

Mathematics Topics:
Application Areas:
You must have a Mathmodels Membership to download Student Papers and Commentary.
If you're already a member, login here.