نتایج جستجو برای: vulnerability risk
تعداد نتایج: 976669 فیلتر نتایج به سال:
This paper presents work for the development of a framework to assure the security of networked medical devices being incorporated. The paper focuses on one component of the framework, which addresses system development processes, and the assurance of these through the use of a Process Assessment Model with a major focus on the security risk management process. With the inclusion of a set of sp...
This case study is about preparing the urban communities for earthquake hazard through organizing the communities and activating the service providers (organizations responsible for responding to earthquake hazard). Being a pilot initiative, the project was intervened in 16 communities / wards of Dhaka City that were selected based on their receptivity and vulnerability through community partic...
Drought is a one of the most important natural disasters that have high socio-economic and environmental impacts. However, drought is more than a physical phenomenon or natural event. Its impact results from the relation between a natural event and demands on the water supply, and it is often exacerbated by human activities. The traditional approach to drought management has been reactive, re...
Power networks are among the most important infrastructures that without them, industrial, economic and social procedures will halt. Therefore, they should be planned for the most difficult conditions to provide services with minimum disruption. Power substations are of great importance to a power network, because any disruption in their components can produce extensive problems through the net...
IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [GLLR06] demonstrates. According to the survey, many companies consider it important to quantify the losses attacks against their IT systems cause but are unable to do so. In service-oriented architectures, we see a promi...
This paper explores the use of risk management techniques to promote the design of resilient services. Success in achieving any benefit from a new service will be directly affected by the resiliency of the supporting service architecture including technical and non-technical domains. The concept of resiliency in services and enterprises is examined. We present a framework to analyze risks and t...
We introduce the notion of cross-risk vulnerability to generalize the concept of risk vulnerability introduced by Gollier and Pratt (1996). While risk vulnerability captures the idea that the presence of an unfair financial background risk should make risk-averse individuals behave in a more risk-averse way with respect to an independent financial risk, cross-risk vulnerability extends this ide...
چکیده ندارد.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید