How to conduct this event study? This event study is trying to know what is the impact of changing the monetary policy in Egypt and how this affect the Egyptian stock market. The strategy in our research is to concentrate on 125 days for our event study and the data for the stocks w will select it will be 15days before the event and 10 days after the event. The first -120 days will be estimated window and from -5 to +10 will be the event window. We will use Market model in this study to discover if there is any up normal returns. We will analyse the selected data as follow. Rit = ln (pt/pt-1) Rit = the return of the security each day Pt = the closing price each day Pt-1 = the closing price and time minus 1 Rmt = ln (lt /lt-1) Rmt = the average return during the day Lt = the closing price of the market Lt -1 = the price of the last day index Ri =αi + βiRmt + Ɛi Ri = the return of the security in the day Rm = the return of the market Ɛ = the error that affected the security αI and βI = show the liner relationship between the securities and the market return we will measure the up normal return. We can get the up normal return by knowing the deference between the actual return and the normal return that’s why we will use CAPM model ARit=Rit-αi-βiRmt The main reason of this research is to find if this event has an impact on the stock market and if this announcement increased the volume of the stock market. This event study will measure how the Egyptian stock market will react after the announcing of changing the monetary policy and change it to floating change rate. The hypothesis fore this research will be: H0: changing the monetary policy in Egypt has effected the performance of the Egyptian stock market. H1: changing the monetary policy in Egypt does not effected the performance of the Egyptian stock market. In this research, we will collect data from the Egyptian stock market, yahoo finance and Bloomberg. Regression model is important to use in this event study and we will use software like SPSS or gretl to do T test for the three large sectors in the stock market. Each sector we will choose 10 companies from each of them. Trying to measure the up normal return on each sector after the announcement of changing the monetary policy. According to Polinsky and Shavell (2007) The event study has main points. The first thing is to define the event. Second measuring the returns on the stocks that we will choose, third calculating the up normal return and knowing if it significant or not.

Search the web for news on computer security breaches that occurred during April-August 2017. Research one such reported incident (Excluding the May 2017 ransomware cyber-attack). Prepare a report on the following: !>What the problem was? 2>How occurred? 3>How and why it occurred? 4>What are the possible solutions. Words: 900 Words Due Date: 19 August 2017 I have chosen the following: security breach: Topic: Deep dive into the Edmodo data breach 1>https://medium.com/4iqdelvedeep/deep-dive-into-the-edmodo-data-breach-f1207c415ffb 2>https://motherboard.vice.com/en_us/article/ezjbwe/hacker-steals-millions-of-user-account-details-from-education-platform-edmodo 3>https://www.grahamcluley.com/edmodo-hackers-breached-education-platform-stole-user-data-hashed-passwords/ 4>https://www.infosecurity-magazine.com/news/learning-platform-edmodo/ 5>https://www.the74million.org/article/77-million-edmodo-users-are-hacked-as-widespread-cyber-attacks-hit-the-ed-tech-world Rationale This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious software, and operating system security. The assessment task is aligned with the following learning outcomes of the subject:   be able to justify security goals and the importance of maintaining the secure computing environment against digital threats; be able to explain the fundamental concepts of cryptographic algorithms; be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats. be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system; Assessment criteria PART A : 10 marks Assessable Components HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0   Search the web for news on computer security breaches that occurred during April-August 2017. Research one such reported incident (Excluding the May 2017 ransomware cyber-attack). Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.   1. Comprehensive report addressing all criteria. Evidence of in-depth research. (Value: 95%) 2. Referenced a wide range of appropriate sources. Referencing style correctly used. (Value: 5%)   1. Comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only. (Value: 95%) 2. Referenced a range of appropriate sources. Referencing style correctly used. Minor errors only. (Value: 5%) 1. Mostly well-researched and well-presented report addressing all criteria. Some omissions. (Value: 95%) 2. Referenced a range of appropriate sources. Referencing style correctly used. Some errors and omissions. (Value: 5%)   1. Partially complete report addressing most of the criteria. Evidence of research. Some omissions. (Value: 95%) 2. Referenced some appropriate sources. Referencing style mostly correctly used. Some errors and omissions. (Value: 5%) 1. Major omissions or incorrect answers. (Value: 95%) 2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set. Major errors in referencing style. (Value: 5%) Possible marks 10.0 – 8.5 8.4-7.5 7.49 – 6.5 6.49 –5.0 4.99 – 0 Presentation You are recommended to write the answers in a word document.. Your answers to the questions should be precise but complete and informative. Each question should be answered individually with the corresponding label to indicate the tasks completed e.g. Task 1 a. APA reference style must be used throughout the document with the bibliography not counted in the page limit.