World Leading Hi-Tech Research Defining World Leading Risk Management & Risk Analytics Practices
*Projects *Goldman Sachs *JP Morgan *Wall Street Hedge Funds *Princeton Quant Presentations *Model Risk Management *SR11-7 & OCC2011-12
*Research *Future of Finance *Bayesian vs. VaR *Markov Chain Monte Carlo Models *Cyber Finance *Future of Risk *Cyber Risk *Bitcoin Protocol

Current Research Projects at www.FinRM.org. Below: Historical Archive of Prior Research, Intelligence, and, Analysis Tools.
IT Security and Information Assurance Glossary of 4,000 Terms: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z
*
@brint.com
IT Security, Information Assurance, Controls, and Compliance: Portals-Glossary on 4,000 Topics: S
"Best site for information technology and business information" - Computerworld
*

Research Analyst Wizard: Click on a term to create most-updated research microsite on that topic.


S
S FTP or Secure FTP S/FTP · S HTTP · S HTTP or Secure HTTP S/HTTP · S HTTP: Secure HTTP · S MIME or Secure MIME S/MIME · S/Key · S/MIME: Secure/Multipurpose Internet Mail Extensions · SACL: System access control list · Sacrificial Host · Sacrificial lamb · Sadmind · Safe Architecture · Safe Harbor · Safe Harbor Agreement · Safe Harbor Principles · Safeguard · Safeguarding Statement · Safety · SAINT: Security Administratorís Integrated Network Tool · Salami Slicing · Salami Technique · Sales Droid · salt · Sam Spade · SAM: Security Accounts Manager · SAML · SAML: Security Assertion Markup Language · Sampling Risk · Samurai · Sandbox · Sanitize · Sanitized name · Sanity Check · SANS Institute · SANS Top Ten List · SARA: Security Auditorís Research Assistant · SAS: Secure attention sequence · SATAN: System Administrator Tool for Analyzing Networks · SB 1386 · SCA: Subordinate Certification Authority · Scan · Scanning · scareware · Scavenging · Scheduling · Scope Creep · Scoping Process · SCR: Screen Saver Files · Screamer · Screen Capture · Screen Grab · Screen Savers · Screen Scraping · Screen Widow · screened subnet · Screening router · Screening Routers · script kiddie · script kiddy · Script Vulnerability · Scripts · Scunthorpe Test · SD Card: Secure Digital Cardt · SDDL · SDK (Software Development Kit) · seat management · Sechole · Second Site · Secondary data uses · Secondary logon · secret key · secret key algorithm · Secret Key Encryption · Sector · Secure Area (on a system) · Secure Communications · Secure Electronic Transaction · Secure Hash Algorithm · Secure Hash Standard · Secure HTTP · Secure Shell · Secure Socket Shell · Secure Sockets Layer (SSL) · Secure State · Secure Subsystem · SecurID Token System · Security Accounts Manager · Security Accreditation Scheme · Security Administrator · Security Algorithms Group of Experts · Security Assertion Markup Language · Security Association · security audit · Security Awareness · Security Awareness Campaign · Security Awareness Coordinator · Security Awareness Program · Security Breach · security certification · security clearance · Security Configuration and Analysis · Security context · Security Controls · Security descriptor · Security Descriptor Definition Language · Security Fault Analysis · Security Features Users Guide · Security Filter · Security for Electronic Transactions SET · Security Forum · security ID · security identifier · Security In Depth · Security Incident · security information management (SIM) · Security Inspection · Security Kernel · Security Label · Security log · Security Management · Security Metrics · Security Net Control Station · Security Officer · Security Perimeter · Security Plan · security policy · Security principal · Security Procedures · Security Range · Security Requirements · Security Requirements Baseline · Security Risk · Security rollup package · Security Safeguards · Security Software · Security Specification · Security Specifications · Security Standards · Security Target · Security template · Security Test and Evaluation · Security Testing · security token · Security zone · SED · Seed Key · Segregation of Duties · Sender ID · sender permitted from · Sender Policy Framework · SendIP · Sensitive Compartmented Information · Sensitive Compartmented Information Facility · Sensitive data · Sensitive Information · Sensitive Personal Data · Sensitivity · Sensitivity Label · Separation of Duties · Sequence Check · Sequential File · Serial Processing · Serious Organized Crime Agency · Serpent · Server · server accelerator card · Server certificate · Service account · Service Bureau · Service Delivery Objective (SDO) · Service Desk · Service Level Agreement (SLA) · Service Level Agreement SLA · Service Order · Service pack · Service Packs · Service Provider · Service Set Identifier (SSID) · Service User · Serving Network · Servlet · Session · Session Border Controller (SBC) · Session Hijacking · session ID · session key · SET: Secure Electronic Transaction · SGC: Server gated cryptography · SHA or SHA 1: Secure Hash Algorithm · SHA 2 · shadow password file · Shadow Passwords · Share · Share level security · Shared Key Authentication (SKA) · Shared secret · Shareware · sheep · Sheep Dip · sheep dipping · Sheep Dipping or Sheepdip · sheepdip · sheepdip computer · Shell · shell command injection · Shell Programming · Shielded Enclosure · Short Message Service · Short Message Service Center · Short Title · shoulder surfing · ShowAcls · ShowPriv · SHS: Secure Hash Standard · SID · Sid2user · SID: security identifier (ID) · Sign Off · Sign on Procedure · Signaling System 7 · Signals Analysis · Signature · Signature Detection · Signed Response · Simple Fail over · Simple Integrity Property · Simple Mail Transport Protocol (SMTP) · Simple Object Access Protocol (SOAP) · Simple Security Property · Simulation · Single Point Keying · Single Point of Failure · single sign on · single sign on · single factor authentication (SFA) · Sircam · Site certificate · Six/Four · Sizing · Skipjack · Slack Time (Float) · Slag · slag code · Slammer · Slashdot Effect · SMARRT · smart building · smart card · smart home · smart home or building · Smartphone · SMB signing · SMBRelay · Smoke Emitting Diode · Smoke Test · SMS spam · SMTP (Simple Mail Transfer Protocol) · smurf · Smurf Attack · Smurfing · Snail Mail · snake oil · snarf attack · Sniff · Sniffer · sniffer keystroke logger · Sniffers · Sniffing · sniper sniffing robot · SNMP Attack · SNMP: Simple Network Management Protocol · snoop server · snooping · Snort · SnortSnarf · SOCA · Social engineering · social engineering · Socket · Socket Pair · SOCKS · Soft Copy · softlifting · Software · Software Assurance · Software Copyright · Software Inventory · Software Licensing · software piracy · Software Release · Software Support / Maintenance Contract · Software System Test And Evaluation Process · Software Version Control · SORM · Source code · Source Code Compare Programs · Source Documents · Source Lines of Code (SLOC) · Source Port · SP: Service pack · SPA: Security Posture Assessment · Spam · spam blog · spam cocktail · spam over Internet telephony · Spam trap · Spambot · Spamdexing · Spanning Port · Spanning Tree Protocol Manipulation · SPAP: Shiva PAP · Spar · spear phishing · spear phishing · spearphishing · Special Access Program · Special Access Program Facility · Special identities · SPF · SPF: Sender Policy Framework · SPI: Security Parameter Index · Spillage · spim · SPIM: Spam Through Instant Messaging · sPING · SPIT · SPIT: Spam over Internet Telephony · Split Data Systems · Split DNS · Split Horizon · Split Key · Split Knowledge · splog · Splog or Spam Blog · splogger · spoof · Spoof Mail · Spoof or Spoofing · Spoof website · spoofing · spoofing · Spool (Simultaneous Peripheral Operations Online) · Spot Check · Spread Spectrum · Spyware · SQL Injection · SRVTAB · SSCP: Systems Security Certified Practitioner · SSH · SSH: Secure Shell or Secure Socket Shell · SSID: Service Set Identifier · SSL accelerator · SSL card · SSL Card: Server Accelerator Card · SSL Man in the Middle Attacks · SSL VPN: Secure Socket Layer Virtual Private Network · SSL: Secure Sockets Layer · SSO · SSO: Single Sign On or Signon · SSO: System Security Officer · SSPI: Security support provider interface · SST virus · Stability · Stacheldraht · Stack Mashing · stack smashing · Stage Gate · Standard · Standard ACLs (Cisco) · Standing Data · Star Property · Star Topology · Start of Day · Start Up KEK · stateful inspection · Static Analysis · Static Host Tables · Statistical Sampling · stealth · Stealth Bomb · Stealth scanning · stealth virus · Stealthing · Steganalysis · steganographic · steganography · Stimulus · Storage Area Networks (SANs) · storage encryption · Storage Object · storage security · Store And Forward Switching · Store and Forward · Store and Forward Switch · STPP: Microsoft Strategic Technology Protection Program · Straight Through Cable · Strategic Planning · stream cipher · Strengths Weaknesses Opportunities and Threats ( · Stress Testing · Stripping · Strong Authentication · Strong encryption · strong password · Strong Star Property · Structured Programming · Structured Query Language (SQL) · Stunnel · Su · Sub Network · Subassembly · Subject · Subject Matter · Subject Security Level · Subnet Mask · Subordinate CA · Subscriber Controlled Input · Subscriber Identification Module · SubSeven · Substantive Testing · Sudo · Sufficient Audit Evidence · SUID root · Suit · Suite · Super Computer · Super User · Superencryption · Supersession · SuperUser · Supervisor State · Supply Chain Management (SCM) · Suppression · Suppression Measure · Surge Suppressor · Surgery · Surrogate Access · Survivability · SUS: Software Update Services · Suspense File · SVGA · Swatch · Sweeping · SWI: Secure Windows Initiative · Switch CAM Table Overflow · Switches · Switching System · Syllabary · symetric key · Symlink: Symbolic Links · Symmetric Cryptography · Symmetric Key · Symmetric key algorithm · Symmetric key encryption · Syn Attack · Syn Flood · SYN Flood or Syn Flooding · SYN flooding · Syn Scanning · Synchronize (SYN) · Synchronous Crypto Operation · Synchronous Transmission · SYNdrop · Syskey · Syslog · System · System Administrator · System Assets · System Availability · System development life cycle (SDLC) · System Development Methodologies · System disk · System Exit · System files · System Flowcharts · System Hardening · System High · System High Mode · System High Security Mode · System Indicator · System Integrity · System Integrity Service · System Low · System Low Security Mode · system monitor · System Narratives · System of Record · System Owner · System Profile · System registry · System registry key · System Requirements · System Security · System Security Engineering · System Security Officer · System Security Plan · System Software · System Testing · System Specific Policy · Systems Acquisition Process · Systems Analysis · Systems Development · Systems Development Life Cycle (SDLC) · systems management · Systems Operations ·

Research Portals and Glossary of 4,000 IT Security and Information Assurance Terms
A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z

SAMPLE OF FinTech PROJECTS LEADING GLOBAL FIRMS & NATIONAL ECONOMIES

FinTech Enterprise Risk-Model Risk Management meet Penetration Testing-Ethical Hacking

2015 National CSO-CxO Cybersecurity Conference

Cybersecurity & Cyber-Finance Risk Management: Strategies, Tactics, Operations, &, Intelligence: Enterprise Risk Management to Model Risk Management: Understanding Vulnerabilities, Threats, & Risk Mitigation

CSO-CxO Plenary Keynote, National Cybersecurity Summit, Altria Group Inc. Headquarters, VA, 2015

New York Cyber Security and Engineering Technology Association (NYSETA) Conference
A Framework for Pen Testing Network Protocols for Global Banking & Finance Call Centers: Bridging Networks, Systems, and, Controls Frameworks for Cybersecurity Curricula & Standards Development
(Innovative Design and Development Practices)

New York Cyber Security and Engineering Technology Association (NYSETA) Conference, 2015.




29 SSRN Top-10 Paper Rankings in FinTech Quant Risk Analytics-Model Risk Management
  1. SSRN's Top-10 Paper: CGN: Risk Management Practice: January 2016.
  2. SSRN's Top-10 Paper: CGN: Risk Management, Including Hedging & Derivatives: January 2016.
  3. SSRN's Top-10 Paper: Corporate Governance Practice Series eJournal: January 2016.
  4. SSRN's Top-10 Paper: IRPN: Innovation & Cyberlaw & Policy: January 2016.
  5. SSRN's Top-10 Paper: Econometrics: Mathematical Methods & Programming eJournal: May 2015.
  6. SSRN's Top-10 Paper: Computational Techniques: May 2015.
  7. SSRN's Top-10 Paper: Information Systems & Economics eJournal: May 2015.
  8. SSRN's Top-10 Paper: Econometrics: Mathematical Methods & Programming eJournal: April 2015.
  9. SSRN's Top-10 Paper: ERN: Computational Techniques (Topic): April 2015.
  10. SSRN's Top-10 Paper: Econometric Modeling: Risk Management eJournal: March 2015.
  11. SSRN's Top-10 Paper: Econometric Modeling: Capital Markets - Risk eJournal: March 2015.
  12. SSRN's Top-10 Paperr: Econometric Modeling: Capital Markets - Risk eJournal: March 2015.
  13. SSRN's Top-10 Paper: MRN Operations Research Network eJournal: March 2015.
  14. SSRN's Top-10 Paper: OPER Subject Matter eJournal: March 2015.
  15. SSRN's Top-10 Paper: Systemic Risk (Topic): March 2015.
  16. SSRN's Top-10 Paper: Econometrics: Mathematical Methods & Programming eJournal: March 2015.
  17. SSRN's Top-10 Paper: Econometric & Statistical Methods - Special Topics eJournal: February 2015.
  18. SSRN's Top-10 Paper: Microeconomics: Decision-Making under Risk & Uncertainty eJournal: February 2015.
  19. SSRN's Top-10 Paper: VaR Value-at-Risk (Topic): February 2015.
  20. SSRN's Top-10 Paper: ERN: Uncertainty & Risk Modeling (Topic): February 2015.
  21. SSRN's Top-10 Paper: ERN: Econometric & Statistical Methods (Topic): February 2015.
  22. SSRN's Top-10 Paper: Computational Techniques (Topic): February 2015.
  23. SSRN's Top-10 Paper: OPER: Analytical (Topic): February 2015.
  24. SSRN's Top-10 Paper: ERN: Mathematical Methods & Programming (Topic): February 2015.
  25. SSRN's Top-10 Paper: Stochastic Models eJournal: February 2015
  26. SSRN's Top-10 Paper: Econometric Modeling: Capital Markets - Risk eJournal: January 2015.
  27. SSRN's Top-10 Paper: Microeconomics: Decision-Making under Risk & Uncertainty eJournal: January 2015.
  28. SSRN's Top-10 Paper: Uncertainty & Risk Modeling (Topic): January 2015.
  29. SSRN's Top-10 Paper: VaR Value-at-Risk (Topic): January 2015.



Princeton University Invited FinTech Research Presentation on Model Risk Management
Pioneering the FinTech Future of Global Cyber Finance and Cyber Risk Insurance

'"It is this "true" uncertainty, and not risk, as has been argued, which forms the basis of a valid theory of profit and accounts for the divergence between actual and theoretical competition... It is a world of change in which we live, and a world of uncertainty...If we are to understand the workings of the economic system we must examine the meaning and significance of uncertainty; and to this end some inquiry into the nature and function of knowledge itself is necessary."
-- Frank H. Knight
in
Risk, Uncertainty, and Profit

(Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co), 1921.

Risk, Uncertainty, and Profit: Frank Knight
(Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co), 1921.

2015 Princeton Quant Trading Conference
'Knight Reconsidered':
Risk, Uncertainty, and, Profit for the Cyber Era: Model Risk Management of Cyber Insurance Models using Quantitative Finance and Advanced Analytics

(Global Risk Management Network, LLC, 2015).




Top Wall Street Banks' Model Risk Management Beyond VaR for Extreme Risks
FinTech Technical Expert to Top MDs Team for World's Largest Investment Bank


Cryptanalytic Algorithms and Quantum ComputingBeyond 'Bayesian vs. VaR' Dilemma to Empirical Model Risk Management: How to Manage Risk (After Risk Management Has Failed).
(Global Risk Management Network, LLC, 2012, 2014)

Cryptanalytic Algorithms and Quantum Computing

Measuring & Managing Financial Risks with Improved Alternatives Beyond Value-At-Risk (VaR)
(Global Risk Management Network, LLC, 2012).


FinTech Markov Chain Monte Carlo Models and Bitcoin Block Chain Encryption Protocols

Markov Chain Monte Carlo Models, Gibbs Sampling, and, Metropolis-Hastings Algorithms

Markov Chain Monte Carlo Models,
Gibbs Sampling, and, Metropolis-Hastings Algorithms

(Global Risk Management Network, LLC, 2013).
Complex Stochastics Hi-Dimensional Statistical Analysis

Bitcoin Protocol: Model of ‘Cryptographic Proof’ Based Global Crypto-Currency & Electronic Payments System
Bitcoin Protocol: Model of 'Cryptographic Proof' Based Global Crypto-Currency & Electronic Payments System
(Global Risk Management Network, LLC, 2013).
First Report on the Bitcoin Cryptographic-Proof-of-Work



FinTech Computational Quantitative Cryptanalytic Algorithms for Cyber-Quantum Era


Cryptanalytic Algorithms and Quantum ComputingFuture of Bitcoin & Statistical Probabilistic Quantitative Methods: Interview by Hong Kong Institute of Certified Public Accountants
(Global Risk Management Network, LLC, January 20, 2014.)

Cryptanalytic Algorithms and Quantum Computing
Cryptology beyond Shannon’s Information Theory: Preparing for when the ‘Enemy Knows the System’: Beyond NSF Cryptanalytic Algorithms
(Global Risk Management Network, LLC, 2013.)


AACSB Recognizes Real Impact among Nobel Laureates such as Black-Scholes
Pioneered Anticipatory Risk Analytics Frameworks Applied by Top Investment Banks 

“There are many examples illustrating that advances in basic research have had a substantial impact on practice. Exemplars of this phenomenon can be seen in finance through academic publications on the theories of portfolio selection (Markowitz, 1952), irrelevance of capital structure (Modigliani and Miller, 1958), capital asset pricing (Sharpe, 1964), efficient markets (Fama, 1965 and 1970), option pricing (Black and Scholes, 1973), and agency theory (Jensen and Meckling, 1976). All are well-known for their substantial impact on both theory and practice. In information systems, the research of Malhotra (Malhotra, 2004) has helped companies to understand why knowledge management systems fail...

AACSB logoAACSB

MORE...

Cryptanalytic Algorithms and Quantum Computing

“The new business model of the Information Age, however, is marked by fundamental, not incremental, change. Businesses can't plan long-term; instead, they must shift to a more flexible "anticipation-of-surprise" model.”
-- Yogesh Malhotra in CIO Magazine interview, Sep. 15, 1999.


 

Leading Global Enterprise Risk Management and Model Risk Management Practices

"The future is moving so quickly that you can’t anticipate it… We have put a tremendous emphasis on quick response instead of planning. We will continue to be surprised, but we won't be surprised that we are surprised. We will anticipate the surprise."
*
20-Years of the Model Risk Management Program
  “The new business model of the Information Age, however, is marked by fundamental, not incremental, change. Businesses can't plan long-term; instead, they must shift to a more flexible "anticipation-of-surprise" model.”
-- Yogesh Malhotra in CIO Magazine interview, Sep. 15, 1999.
[A Decade Later... Wall Street CEO, CFOs, & CROs know so... ]
Model Risk Management Program

 

Global-National Expert Panels of Computer Scientists & Quantitative Economists
Global-National Thought Leader for UN, NSF, US & World Governments & Parliaments

National Science Foundation  IBM

  USA Federal Government
US Dept. of Veteran Affairs

Government and Cabinet Of Mexico

United Nations

Government and Cabinet Of Netherlands

Nation of South Korea
Maeil Business TV

ACM  IEEE HP
TiE Silicon Valley  Accenture
Intel  Philips
British Telecom  Institute for Supply Management
The Conference Board

MORE...

Digital Transformation Research in Global Business & Technology Press

CIO Magazine
CIO Insight
Inc.
Fortune
Wall Street Journal
MORE...


Digital Transformation Ventures in Global Business & Technology Press

Media Coverage Media Coverage
MORE...


Digital Transformation Venture Clients, Patrons, & Subscribers

A sample of our corporate and organizational clients, patrons, and users is listed below:

FinTech Firms: Goldman Sachs, Google, HP, IBM, Intel, Microsoft, Ogilvy, Wells Fargo

Consulting Firms: Accenture, Ernst & Young, McKinsey, PricewaterhouseCoopers

World Governments: Australia, Canada, European Union, United Kingdom, United States

U.S. Defense: AFRL, Air Force, Army, CCRP, Comptroller, DISA, DoD, NASA, Navy, RAND

World Defense: Australia (Air Force), Canada (Defence R&D), UK (Ministry of Defence)

Business Schools: Harvard, MIT, Princeton, Stanford, UC Berkeley, Wharton

Associations
: AACSB, ABA, ACM, AICPA, AOM, APICS, ASTD, ISACA, IEEE, INFORMS

"Founder Yogesh Malhotra says his vision is to fill the gaps between business and technology, data and knowledge, and, theory and practice..."
-
Dr. Yogesh Malhotra in Fortune
Interview

MORE...


Cyber Transformation Practices Guiding US DoD Commanders & CxOs
("Obsolete what you know before others obsolete it..."
- Dr. Yogesh Malhotra in Inc. Interview)

United States Army United States Navy United States Air Force United States Marine Corps AFRL
"If you spend some time at [the digital research lab] founded by Dr. Malhotra youwill be blessed by some of the world's most astute thinking on the nature of knowledge and its value." 
- U.S. Army Knowledge Symposium, Theme: "Knowledge Dominance: Transforming the Army...from Tooth to Tail", US Department of Defense, United States Army.

"There are many definitions of knowledge management. It has been described as "a systematic process for capturing and communicating knowledge people can use." Others have said it is "understanding what your knowledge assets are and how to profit from them." Or the flip side of that: "to obsolete what you know before others obsolete it." (Malhotra) "
- U.S. Department of Defense, Office of the Under Secretary of Defense (Comptroller)

"KM is obsoleting what you know before others obsolete it and profit by creating the challenges and opportunities others haven't even thought about -- Dr. Yogesh Malhotra, in Inc. Technology Interview"
- U.S. Defense Information Systems Agency Interoperability Directorate

MORE...

Top-3 Most Influential Scholars-Practitioners
in Knowledge Management
(Ranked in Drexel University Global Survey of IS Practice)

Vision Korea Campaign Keynotes
Dr. Yogesh Malhotra among other 'Vision Korea' National Campaign Keynote Speakers in Vision Korea National Campaign (2000): Dr.Charles Lucier of Booz Allen Hamilton, Dr.David Snowden of IBM, Dr.Robert H. Buckman of Buckman Labs, Dr.Hubert Saint-Onge of Canadian Imperial Bank of Commerce, Professor Dr.Ikujiro Nonaka of Hitotsubashi University

MORE...

Pioneered Knowledge Management Digital Transformation Practices
Led Global Virtual Team of 200-PhD Experts & CxOs to Publish Pioneering Research

CyberspaceOrganizations
Published in 2000
CyberspaceBusinessModels
Published in 2001

CyberspaceBusinessModels
Journal Articles & Reports 1993-Present

Published independent Study paper on computer graphics image compression standards for hypermedia computing technologies, the precursor of WWW, on MBA graduate research fellowship with B2B pioneer and full tuition scholarship in 1993.

MORE...



Developed Top Digital Research Site, Search Engine, & Social Network

Top-Ranked Digital Research Site: Computerworld Best Web Site Award


Top-3 Search Engine: Carnegie Mellon University Industry.Net National Awards


Top-10 Social Network: Popular Rankings after LinkedIn

Led Global Virtual Community of Practice of 130,000+ to Pioneer Digital Transformation Practices
Millions of worldwide users included Global-2000 Corporations and G-20 World Governments.

Top3SearchEngineBRINT

Top-3 Search Engines Ranked in the Carnegie Mellon University: National Industry.Net Awards


Top of Page

Global Risk Management Network: 'Your Survival Network for The Brave New World Of Business'tm

Global RISK Management Network | Help & FAQs

Terms of Use | Privacy | © Copyrights 2012
Global Risk Management Network, LLC, Cornell Business and Technology Park, Ithaca, NY 14852-4892, U.S.A.