+1-415-670-9189
info@expertsmind.com
Computer networks and security against hackers
Course:- Computer Network Security
Reference No.:- EM1386




Assignment Help
Assignment Help >> Computer Network Security

This assignment in Management is a case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems.

Question:

I. A one-page summary on the company. Set it up with the following sub-headings

using point form.

 Company name, company mission statement or statement of purpose

 Industry area (technology, entertainment etc.)

 Major products or services

 Location of the head office, the geographic area served by this company(local, domestic, global-be specific)

 The revenue for 2008 and the loss or profit for 2007 or 2008 if available(do not print the financial statements)

II. Using complete sentences, include the following:

 A brief summary of a recent company press release (written by someone inthe company) and attach the document

 A brief summary of a third party news report on this company (written bysomeone outside the company) and attach the document

 A brief explanation on why you chose this company

III. A one to two page analysis in essay format which details your insights and

opinions on the company. For instance you might want to discuss the company's

operations, trends/challenges, social responsibility, future plans, financial stability,

investment risks, recent awards, investigations or charges against the company,

the CEO, employees, or board members.Your report must relate directly to factual information you obtained from any of the

following:

 The company web site

 Company annual report (2008 or 2009)

 Your personal association with the company if appropriate (e.g. customer,employee, actual stock holder)

 Current news articles (i.e. at least one third party report - independent ofcompany press release)

IV. A closing paragraph, which explains what you learned from this assignment.What is the stock's gain or loss as a percentage on OCTOBER 15, 2010?

V. Attach last 5 year history of this stock (high & low in the past 5 years)What events caused the rise and/or fall of the share prices?

VI. Would you invest in this company? Why or why not? 

VII. A one page document citing your sources. You must use proper MLA citation

format.

Risk Factor Checklist - All stocks are risky!

Here are some factors to help you identify how risky!

For each category BOLD the word that best describes your stock.

What other factors contribute to the risk of your stock?

 Did large amounts of stock get sold? Did an individual or company buy a largeamount of stock in this company? (answer this at the end - from October 15, 2010 October 31, 2010)

 Is there talk of mergers, acquisitions, takeovers?

 Did the company announce plans for a major launch or expansion? Did they announcethat they are paying off debt, restructuring the company?

 Any negative press (company press release or third party)?

Which categories mentioned above have a greater influence of your stock's performance?

Explain.

With reference to the Risk Factor Checklist (page 5), do you think this stock is a high risk,medium risk or low risk? Why?

 

 




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Develop an attack tree for stealing a Twitter handle that encompasses the basics of these attacks, as well as other threat vectors you can think of. Your tree should include
Explain how you could use one or more of the Windows log files to investigate a potential malware infection on a system. What types of information are available to you in yo
Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value on
Describe the key differences between a network-based attack and client-based attack. Give some examples of each and determine which deserves the most attention at this point
Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as yo
Why is network security critical to financial institutions? The Blog topic is based on ‘Banks Banking on Network Security' (Closing Case Study Two, Section 11/Plug in B5 - In
Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the followi
Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored d