Evaluation of the Self-Assessment Process for Information System Security
ثبت نشده
چکیده
The RRB administers comprehensive retirement/survivor and unemployment/sickness benefit programs for railroad workers and their families under the Railroad Retirement Act (RRA) and Railroad Unemployment Insurance Act (RUIA). These programs provide income protection to railroad workers and their families during old age and in the event of disability, death, temporary unemployment, or sickness. The RRB paid over $8.8 billion in benefits during fiscal year (FY) 2002.
منابع مشابه
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملDevelopment and validation of work permit system performance assessment questionnaire, a case study in an Iranian oil refinery
Background: Permit-to-work system is a process used to prevent accidents in the process industries. Evaluation and monitoring of the performance of a permit to work system reveal its inherent weaknesses and reduce accidents in process industries. Since there exists no local tool for monitoring the performance of permit-to-work system in refineries and process industries, such as petrochemicals,...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملA Practical Self-Assessment Framework for Evaluation of Maintenance Management System based on RAMS Model and Maintenance Standards
A set of technical, administrative and management activities are done in the life cycle of equipment, to be located in good condition and have proper and expected functioning. This is refers to be, maintenance management system (MMS). The framework and models of assessment in order to enhance effectiveness of a MMS could be proposed in two categories: qualitative and quantitative. In this resea...
متن کاملEvaluation of Outpatient Electronic Prescription System Capabilities from the Perspective of Physicians in Specialized Polyclinics of Urmia Social Security Organization
Background and Aim: Electronic prescription systems can improve patient safety and the quality of health care services. These systems must provide the capabilities required to reduce medical errors and enhance the performance of health care providers. The purpose of this study is to evaluate the capabilities of the e-prescription system from the perspective of physicians in the polyclinics of t...
متن کامل