2004年美国大学生数学建模竞赛题目.pdf

上传人:赵** 文档编号:21127641 上传时间:2022-06-18 格式:PDF 页数:7 大小:561.02KB
返回 下载 相关 举报
2004年美国大学生数学建模竞赛题目.pdf_第1页
第1页 / 共7页
2004年美国大学生数学建模竞赛题目.pdf_第2页
第2页 / 共7页
点击查看更多>>
资源描述

《2004年美国大学生数学建模竞赛题目.pdf》由会员分享,可在线阅读,更多相关《2004年美国大学生数学建模竞赛题目.pdf(7页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、2004 年美国大学生数学建模竞赛题目2004 Mathematical Contest in Modeling (MCM)Problems原文下载网址:http:/ 题: 指纹是独一无二的吗?人们普遍相信每个人的指纹都是不同的。 请研制并分析能评估这种说法是正确的可能性的模型,然后把你们在这个问题中发现的指纹识别错误率与 DNA 识别错误率相比较。PROBLEM A: Are Fingerprints Unique?It is a commonplace belief that the thumbprint of every human who has ever lived is diffe

2、rent.Develop and analyze a model that will allow you to assess the probability that this is true.Compare the odds (that you found in this problem) of misidentification by fingerprint evidenceagainst the odds of misidentification by DNA evidence.B 题: 更快的快通系统无论是在收费站、 游乐场或其他地方正出现着越来越多的“快通”系统以减少人们排队等候的时

3、间。请考虑一家游乐场的快通系统的设计。这家游乐场已经为几种受欢迎的乘骑项目提供快通系统的服务作为试验。该系统的设计思想是对某些受欢迎的乘骑项目,游客可以到该娱乐项目旁边的一个机器前并将当天的门票插入, 该机器将返回给你一张纸条,上面写着你可以在某个特定的时间段回来。比如说你把你的门票在 1:15pm 插到机器里,快通系统就告诉你可以在 3:304:30pm 回来,你可以凭你的纸条第二次排队,这时队伍可能比较短,你就可以较快进入景点. 为了防止游客同时在几个乘骑娱乐项目上使用这个系统。一个顾客在同一时刻只能得到一次快通系统的服务。为改进快通系统的运作你们队被聘为几个合格的顾问之一 . 游客一直在

4、抱怨该试验系统的一些异常现象. 比如说, 顾客有时看到快通系统提供的回到景点时间是 4 小时以后. 但是才过一小会,在相同的景点系统所提供的回到景点的时间只有 1 小时或稍多一点时间。 有时按照快通系统安排的游客的人数和等待时间几乎和正常排队的人数和所花费的时间一样多。于是问题就是要提出并检验能提高快通系统效率的方案以使人们可以更多地享受在游乐场的休闲时光。问题的一部分是要确定评估各种可供选择的方案的评价准则。你们的报告中要包括一份非技术性的概述, 以便游乐场主管从各个顾问所提出的可供选择的方案中作出选择。第极指纹测试中心 http:/PROBLEM B: A Faster QuickPass

5、 SystemQuickPass systems are increasingly appearing to reduce peoples time waiting in line,whether it is at tollbooths, amusement parks, or elsewhere. Consider the design of a QuickPasssystem for an amusement park. The amusement park has experimented by offering QuickPassesfor several popular rides

6、as a test. The idea is that for certain popular rides you can go to a kiosknear that ride and insert your daily park entrance ticket, and out will come a slip that states thatyou can return to that ride at a specific time later. For example, you insert your daily park entranceticket at 1:15 pm, and

7、the QuickPass states that you can come back between 3:30 and 4:30 pmwhen you can use your slip to enter a second, and presumably much shorter, line that will get youto the ride faster. To prevent people from obtaining QuickPasses for several rides at once, theQuickPass machines allow you to have onl

8、y one active QuickPass at a time.You have been hired as one of several competing consultants to improve the operation ofQuickPass. Customers have been complaining about some anomalies in the test system.Forexample, customers observed that in one instance QuickPasses were being offered for a returnti

9、me as long as 4 hours later. A short time later on the same ride, the QuickPasses were given fortimes only an hour or so later. In some instances, the lines for people with Quickpasses are nearlyas long and slow as the regular lines.The problem then is to propose and test schemes for issuing QuickPa

10、sses in order to increasepeoples enjoyment of the amusement park. Part of the problem is to determine what criteria to usein evaluating alternative schemes. Include in your report a non-technical summary for amusementpark executives who must choose between alternatives from competing consultants.200

11、4 年美国大学生交叉学科建模竞赛题目2004 Interdisciplinary Contest in Modeling (ICM) Problem原文下载网址:http:/ 除非你的计算机遭到过黑客或病毒的攻击你或许不知道它们能怎样影响个人或机构的。如果一台计算机受到黑客或者病毒攻击,那么其中重要的个人信息和软件就有可能丢失。正在考虑创建一所新的大学校园,你们的任务是对这所大学的信息技术(IT)安全性的风险评估建立模型。下面的叙述给出了一些背景材料以帮助你形成有关检验 IT 安全性的方案。明确的任务将在后面给出。通过多个防御层来防止计算机系统遭受恶意活动的攻击。包括政策层和技术层(图 1,

12、预防性的防御措施(略)两者在内的这些防御层将会对机构的风险类型产生各种不同的影响(图2, IT 系统经济风险的示意图(略)。管理和使用方面的政策处理用户怎样和机构的计算机和网络相互作用以及员工(系统管理员)怎样维护网络。这些政策可以包括密码验证,正式的安全审核,使用跟踪,无线设备的使用,有关可移动媒体的关注,个人应用的限制和用户培训。一种实例性的密码政策可以包括对密码的长度和密码所用字母的要求,更改密码的频率以及允许登录错误的次数。每一个政策方案都包含与其执行相关联的直接的费用以及影响到生产效率和安全性的因素。 在图1 中,只对最高层面作了详细说明,其实每个层面的结构都是同样的。安全状况的第二

13、个方面就是检测、 减轻和挫败来自内部和外部两方面用户的未经授权的活动的一组技术方案。这些技术方案涵盖了软件和硬件两个方面,还包括入侵检测系统(IDS= Intrusion Detection Systems),防火墙,防病毒系统,易受攻击的扫描仪和冗余备份等。比如说,IDS 监视并记录某一特定计算机或来自具有调查数据并能提供识别可疑活动“犯罪之后”的侦破能力的网络上的重要事件。SNORT(www.snort.org)是一个广受欢迎的 IDS 方案。图 1 提供了一个关键防御措施的样本(管理/使用的政策和技术解决方案)。和政策一样, 技术解决方案也有其直接的费用以及影响到生产效率和安全性的因素。

14、To Be Secure or Not to Be?You probably know about computer hackers and computer viruses. Unless your computer hasbeen targeted by one, you may not know how they could affect an individual or an organization. Ifa computer is attacked by a hacker or virus, it could lose important personal information

15、andsoftware.The creation of a new university campus is being considered. Your requirement is to modelthe risk assessment of information technology (IT) security for this proposed university. Thenarrative below provides some background to help develop a framework to examine IT security.Specific tasks

16、 are provided at the end of this narrative.Computer systems are protected from malicious activity through multiple layers of defenses.These defenses, including both policies and technologies (Figure 1 Preventative DefensiveMeasures), have varying effects on the organizations risk categories (Figure

17、2 Economic RiskSchematic for IT Systems).Management and usage policies address how users interact with the organizations computersand networks and how people (system administrators) maintain the network. Policies may includepassword requirements, formal security audits, usage tracking, wireless devi

18、ce usage, removablemedia concerns, personal use limitations, and user training. An example password policy wouldinclude requirements for the length and characters used in the password, how frequently they mustbe changed, and the number of failed login attempts allowed. Each policy solution has direc

19、t costsassociated with its implementation and factors that impact productivity and security. In Figure 1,only the topmost branch is fully detailed. The structure is replicated for each branch.The second aspect of a security posture is the set of technological solutions employed todetect, mitigate, a

20、nd defeat unauthorized activity from both internal and external users.Technology solutions cover both software and hardware and include intrusion detection systems(IDS), firewalls, anti-virus systems, vulnerability scanners, and redundancy. As an example, IDSmonitors and records significant events o

21、n a specific computer or from the network examiningdata and providing an “after the fact” forensic ability to identify suspect activity. SNORT(www.snort.org) is a popular IDS solution. Figure 1 provides a sample of key defensive measures(management/usage policies and technology solutions). As with a

22、 policy, a technology solutionalso has direct costs, as well as factors that impact productivity and security.信息安全风险的来源包括(但并不限于)机构内部或者外部的人或硬件(图 2)。不同的预防性防御措施(图 1)可能在防御内部威胁比防御来自计算机黑客的威胁更有效。另外,外部威胁的动机往往不同,这也可能需要不同的安全措施。比如说,对付一个正试图检索私人数据或客户数据库的入侵者和对付一个正试图瘫痪网络的入侵者很可能要采取极不同的斗法。属于机构可能要面对信息安全方面的潜在费用包括机会成本(

23、图 2) (校注: 企业管理当局没有作出一项决策或未能利用一个能带来更多收益的机会(例如投资项目), 失去的收益就是机会成本)、人员费用和预防性防御措施的费用。重要的机会成本主要包括:诉讼的赔偿金,私人数据的丢失,消费者的信心,直接收入的丢失,重建数据,重建服务。每种花费根据机构规模的不同而不同。比如说,大学的卫生保健院由于在应诉、病人医疗记录可用性方面的损失比之于重建服务系统需要更大的潜在费用。机构可以通过风险分析来评价潜在的机会成本。风险可以被分成三个风险类型; 机密性,完整性和可用性。组合起来,这些分类确定了机构的安全状况。每种风险类型都会对取决于机构的任务和要求的费用产生影响。机密性指

24、的是保护数据不向未经授权的访问者公开。 如果卫生保健院的记录数据因疏忽而被公开或者被盗,那么该院可能面临严重的诉讼。数据的完整性是指数据的状态不被改变。 如果入侵者修改了某些产品的定价信息或者删除了全部的数据集,机构将会面临的代价是:与改正由于受错误数据影响的交易相关联的费用、与重新建立正确价值相关联的费用以及消费者信心以及收入方面的可能的损失。最后, 可用性是指包括数据和服务的资源对授权用户的可利用的。这种风险可以用和机密性、完整性类似的方式从财政上表明自己。为增加机构安全状况所执行的每一种措施都会(正面或反面地)影响到这三种风险类型。每当实施一种新的防御安全措施时, 它将会改变当前的安全状

25、况以及紧随其后的潜在的机会成本。 机构所面临的一个复杂的问题是怎样在他们的潜在的机会成本对保护其 IT 基本设施(预防性的保护措施)费用的平衡。第极指纹测试中心 http:/Sources of risk to information security include, but are not limited to, people or hardwarewithin or outside the organization (Figure 2). Different preventive defensive measures (Figure 1)may be more effective aga

26、inst an insider threat than a threat from a computer hacker. Additionally,an external threat may vary in motivation, which could also indicate different security measures.For example, an intruder who is trying to retrieve proprietary data or customer databases probablyshould be combated much differe

27、ntly from an intruder who is trying to shut down a network.Potential costs due to information security that an organization may face (Figure 2) includeopportunity cost, people, and the cost of preventative defensive measures. Significant opportunitycosts include: litigation damages, loss of propriet

28、ary data, consumer confidence, loss of directrevenue, reconstruction of data, and reconstruction of services. Each cost varies based on theprofile of the organization. For example, a health care component of the university might have agreater potential for loss due to litigation or availability of p

29、atient medical records than withreconstruction of services.An organization can evaluate potential opportunity costs through a risk analysis. Risks can bebroken down into three risk categories;confidentiality,integrity, andavailability. Combined, thesecategories define the organizations security post

30、ure. Each of the categories has different impactson cost depending on the mission and requirements of the organization.Confidentialityrefers tothe protection of data from release to sources that are not authorized with access. A health careorganization could face significant litigation if health car

31、e records were inadvertently released orstolen. Theintegrityof the data refers to the unaltered state of the data. If an intruder modifiespricing information for certain products or deletes entire data sets, an organization would facecosts associated with correcting transactions affected by the erro

32、neous data, the costs associatedwith reconstructing the correct values, and possible loss of consumer confidence and revenue.Finally,availabilityrefers to resources being available to an authorized user, including both dataand services. This risk can manifest itself financially in a similar manner a

33、s confidentiality andintegrity.Each measure implemented to increase the security posture of an organization will impacteach of the three risk categories (either positively or negatively). As each new defensive securitymeasure is implemented, it will change the current security posture and subsequent

34、ly the potentialopportunity costs. A complicated problem faced by organizations is how to balance their potentialopportunity costs against the expense of securing their IT infrastructure (preventative defensivemeasures).任务 1:Rite-On 咨询公司交给你们的任务是要研制一个模型,该模型可以用来确定一所新大学适当的 IT 安全水平所需要的正确的政策和技术增强。当要申请开张一

35、所新大学时的即刻需要是确定能使和采购、 维护与系统管理员的培训等各项费用一起极小化机会成本的各种预防性防御措施的最佳组合。 Rite-On 签约了一批技术人员去搜集用来支持 IT 安全规划的当前的技术规范。一些可能采取的防御措施编目的详细技术数据包含在附件中的表格 A 与表格 B 中。 准备这些数据表的技术人员提示说,当你组合这些防御措施时,在机密性、完整性和可用性及其相互之间的累积效应不能只是简单的相加。打算新建的大学系统有 10 个学术系,一个校际体育部,一个招生办公室,一家书店,一个教务办公室(成绩和学术状况管理),一个可容纳 15,000 名学生的综合宿舍楼。大学预期有 600 名职员

36、和教员(不包括IT 支持人员)来完成日常的工作。学术系将维护 21 个计算机实验室(每个实验室有 30 台计算机)以及 600 名职员和教员所使用的计算机(每个雇员一台计算机)。宿舍中的每个房间配备两个可以高速接入校园网的接口。预计每个学生都将有一台计算机。 其他部门/机构所需的计算机数量现时还无法预测。已知书店将有一个 WEB 站点并能提供网上售书服务, 教务办公室将维护一个 WEB站点便于学生可以查询付费情况和成绩。另外,行政办公室、学生健康中心和体育部也将各自维护一个 WEB 站点。行政人员的平均年薪为$38,000,教员的平均年薪为$77,000。当前的行业通常认为,管理每个局域网需要

37、雇佣 3 到 4 个系统管理员,另外, 每 300 台计算机需要雇佣 1 个系统管理员(桌面支持)。另外,(WEB 主机或者数据管理系统的)每个独立的计算机系统一般也是由 1 名系统管理员来管理的。表1列出了当前没有防御措施的 IT机会成本的预测. 各种不同风险类型(C表示机密性、I 表示完整性而 A 表示可用性)在给定成本中所占的比例也在表 1 给出。Task 1: You have been tasked by the Rite-On Consulting Firm to develop a model that can beused to determine an appropriate

38、 policy and the technology enhancements for the proper level ofIT security within a new university campus. The immediate need is to determine an optimal mixof preventive defensive measures that minimizes the potential opportunity costs along with theprocurement, maintenance, and system administrator

39、 training costs as they apply to the opening ofa new private university. Rite-On contracted technicians to collect technical specifications oncurrent technologies used to support IT security programs. Detailed technical data sheets thatcatalogsomepossible defensive measures are contained in Enclosur

40、es A and B. The technicianwho prepared the data sheets noted that as you combine defensive measures, the cumulativeeffects within and between the categories confidentiality, integrity, and availability cannot just beadded.The proposed university system has 10 academic departments, a department of in

41、tercollegiateathletics, an admissions office, a bookstore, a registrars office (grade and academic statusmanagement), and a dormitory complex capable of housing 15,000 students. The universityexpects to have 600 staff and faculty (non IT support) supporting the daily mission. The academicdepartments

42、 will maintain 21 computer labs with 30 computers per lab, and 600 staff and facultycomputers (one per employee). Each dorm room is equipped with two (2) high speed connectionsto the university network. It is anticipated that each student will have a computer. The totalcomputer requirements for the

43、remaining department/agencies cannot be anticipated at this time. Itis known that the bookstore will have a Web site and the ability to sell books online. TheRegistrars office will maintain a Web site where students can check the status of payments andgrades. The admissions office, student health ce

44、nter, and the athletic department will maintainWeb sites.The average administrative employee earns $38,000 per year and the average facultyemployee earns $77,000 per year. Current industry practice employs three to four systemadministrators (sys admin) per sub-network and there is typically one (1)

45、sys admin (help desksupport) employee per 300 computers. Additionally, each separate system of computers (for webhosting or data management) is typically managed by one (1) sys admin person.The current opportunity cost projection (due to IT) with no defensive measures is shown inTable 1. The contrib

46、ution of various risk categories (Confidentiality Integrity, and Availability) toa given cost is also shown in Table 1.表 1 当前机会成本和风险类型的贡献(归因于 IT 的)机会成本数额风险类型的贡献诉讼私人数据的丢失消费者的信心数据重建服务重建直接收入的损失任务 2:我们知道技术性的规范随时间变化很快。但费用,风险类型和风险的来源之间的关系和相互影响的变化则比较慢一些。请针对任务 1 中的问题建立一个模型,并使得这个模型有足够的灵活性,既可以适应技术能力的迅速变化,又可以移

47、植应用于不同的机构。 精心描述你在设计模型时所做的假设。另外, 提供一个例子说明大学怎样利用你的模型来确定其最初的 IT 安全系统并定期对它进行更新。任务 3:为大学校长准备一个 3 页左右的描述你在任务 2 中所建模型的优点、弱点和灵活性的立场声明。另外,解释一下从你的模型能推断什么以及不应该推断什么。任务 4:如果你为一家提供 WWW 搜索引擎的商业公司 (例如 Google, Yahoo,AltaVista, )建立 IT 安全模型,解释两者在初始风险类型贡献方面(表 1)可能存在的差异。你为大学建立的模型同样适用于这些商业性公司吗?任务 5: Honeynets 是为搜集广泛的 IT

48、安全威胁信息而设计的。给你的主管写一份两页的备忘录对大学或者搜索引擎公司是否应该考虑使用honeynet 提出建议. (校注: HoneynetProject 是一个由献身于信息安全的安全专业人员的非盈利性研究组织 . 它创建于 1999 年 4月, 其全部工作就是开放资源(OpenSource)并与安全界共享.)任务 6:要想成为一个 IT 安全咨询方面的领导者,Rite-On 咨询公司必须能够有效地预见到信息技术的未来发展方向,并能够向其他公司提出如何应对未来信息安全风险的建议。在完成你的分析之后,为 Rite-On 咨询公司的总裁写一份两页的备忘录,告诉他信息安全的未来。另外,描述一下怎

49、样用你的模型来预测和应对不确定的未来。注:原题中的图 1、图 2 和附录 1、附录 2 略Task 2: We know that technical specifications will change rapidly over time. However, therelations and interplay among costs, risk categories, and sources of risk will tend to change moreslowly. Create a model for the problem in Task 1 that is flexible en

50、ough to adapt to changingtechnological capabilities and can be applied to different organizations. Carefully describe theassumptions that you make in designing the model. In addition, provide an example of how theuniversity will be able to use your model to initially determine and then periodically

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 教育专区 > 高考资料

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁