نتایج جستجو برای: vulnerability risk
تعداد نتایج: 976669 فیلتر نتایج به سال:
Managing cyber security has become increasingly important due to the growing interconnectivity of computerized systems and their use in society. A comprehensive assessment of cyber security can be challenging as its spans across different domains of knowledge and expertise. For instance, identifying cyber security vulnerabilities requires detailed technical expertise and knowledge, while the as...
Today’s universities are on the forefront of technological advancement which makes University’ computing environment vulnerable because of its large open networks. This paper analyzed the security threats specifically evolve in University’s network, and with consideration of these issues, proposed risk assessment framework for University computing environment. The proposed framework reduces the...
A conceptual area is divided into units or barangays, each was allowed to evolve under a physical constraint. A risk assessment method is then used to identify the flood risk in each community using the following risk factors: the area's urbanized area ratio, literacy rate, mortality rate, poverty incidence, radio/TV penetration, and state of structural and non-structural measures. Vulnerabilit...
Many firms implemented various initiatives such as outsourced manufacturing which could make a supply chain (SC) more vulnerable to various types of disruptions. So managing risk has become a critical component of SC management. Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer only point-based solutions that deal with a limited set...
Public policies to mitigate the impacts of extreme events such as hurricanes or terrorist attacks will differ depending on whether they focus on reducing risk or reducing vulnerability. Here we present and defend six assertions aimed at exploring the benefits of vulnerability-based policies. (1) Risk-based approaches to covering the costs of extreme events do not depend for their success on red...
In this article, we present the results of a study investigating the influence of vulnerability to climate change as a function of physical vulnerability, sensitivity, and adaptive capacity on climate change risk perception. In 2008/2009, we surveyed Nevada ranchers and farmers to assess their climate change-related beliefs, and risk perceptions, political orientations, and socioeconomic charac...
In quantitative risk assessment, risk is expressed as a function of the hazard, the elements at risk and the vulnerability. From a natural sciences perspective, vulnerability is defined as the expected degree of loss for an element at risk as a consequence of a certain event. The resulting value is dependent on the impacting process intensity and the susceptibility of the elements at risk, and ...
The objective of this paper is the definition of a new methodology for carrying out security risk assessment in the air traffic management (ATM) domain so as to enhance security awareness and integrate secure and cost-effective design objectives. This process is carried out by modelling the system, identifying the assets, threats and vulnerabilities, prioritizing the threats and proposing cost-...
his article focuses on risks to information technology (IT) systems. Technically speaking, risk to an IT system is a function of the likelihood that some threat will attack, or exploit, some vulnerability in the system and a calculation of the potential impact resulting from these attacks or exploitations. Two ways exist to calculate risk to an IT system: quantitatively and qualitatively. Each ...
The field of disaster management in South Africa has developed dramatically over the past seven years. The paradigm shift from civil protection to disaster risk management brought with it the realisation that the nianagemeni of disaster risk is paramount to reducing successfully the vulnerability of these communities mo.st at risk. The resilience and coping mechanisms of communities affected by...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید