• Title/Summary/Keyword: Redundancy Asset

Search Result 2, Processing Time 0.015 seconds

Systematic Risk Factors Implied in the Return Dynamics of KOSPI 200 Index Options (KOSPI 200 지수(옵션)의 수익률생성과정에 내재된 체계적 위험요인)

  • Kim, Moo-Sung;Kang, Tae-Hun
    • The Korean Journal of Financial Management
    • /
    • v.25 no.2
    • /
    • pp.69-101
    • /
    • 2008
  • We empirically investigate the option leverage property that should be priced under much more general conditions than the Black-Scholes assumptions and the option redundancy property that is based on the assumption that the underlying asset price follows a one-dimensional diffusion process and examine the systematic risk factors implied in the return dynamics of KOSPI 200 index options. We find that the option leverage pattern is similar to the theoretical result but the options are not redundant securities and in the nonlinear structure of option payoffs, the traders of KOSPI 200 index options price the systematic higher-moments and the negative volatility risk premium significantly affects delta-hedged gains, even after accounting for jump fears. But the empirical evidence on jump risk preference is less conclusive.

  • PDF

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.