Warnings of a possible virus attack on a particular laptop can be modeled as a Poisson process with 1 warning per hour. a) A person received 3 warnings in the last 1 hour of which 1 warning was 15 minutes back. What is the probability that this person has to wait for more than 3 hours for his next warning? b) In a 3-hour software update going on a laptop of 200 people, what is the probability that less than 4 of them will have no warnings during the course of the software update?
Answer:
a)
a.) Probability such that the person has to wait for more than 3 hrs for next warning
Let P(E1) be the probability of getting one warning per hour
Let P(E2) be the probability of getting two warning per hour
Let P(E3) be the probability of getting three warning per hour
Let P(E4) be the probability of getting four warning per hour
and so on...
Let P(En) be the probability of getting 'n' warning per hour
Therefore,
Probability such that the person has to wait for more than 3 hrs for next warning = P(E3)*(1-P(E1))*(1-P(E1))*(1-P(E1))
=P(E3)*(1-P(E1))3
b)
The required probability is =
Warnings of a possible virus attack on a particular laptop can be modeled as a Poisson process with 1 warning per hour. a) A person received 3 warnings in the last 1 hour of which 1 warning was 15 min...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...
And there was a buy-sell arrangement which laid out the conditions under which either shareholder could buy out the other. Paul knew that this offer would strengthen his financial picture…but did he really want a partner?It was going to be a long night. read the case study above and answer this question what would you do if you were Paul with regards to financing, and why? ntroductloh Paul McTaggart sat at his desk. Behind him, the computer screen flickered with...