نتایج جستجو برای: vulnerability risk

تعداد نتایج: 976669  

2015
Jürgen Großmann Fredrik Seehusen

Managing cyber security has become increasingly important due to the growing interconnectivity of computerized systems and their use in society. A comprehensive assessment of cyber security can be challenging as its spans across different domains of knowledge and expertise. For instance, identifying cyber security vulnerabilities requires detailed technical expertise and knowledge, while the as...

Journal: :I. J. Network Security 2017
Umesh Kumar Singh Chanchala Joshi

Today’s universities are on the forefront of technological advancement which makes University’ computing environment vulnerable because of its large open networks. This paper analyzed the security threats specifically evolve in University’s network, and with consideration of these issues, proposed risk assessment framework for University computing environment. The proposed framework reduces the...

Journal: :CoRR 2013
Vena Pearl Bongolan Florencio C. Ballesteros Joyce Anne M. Banting Aina Marie Q. Olaes Charlymagne R. Aquino

A conceptual area is divided into units or barangays, each was allowed to evolve under a physical constraint. A risk assessment method is then used to identify the flood risk in each community using the following risk factors: the area's urbanized area ratio, literacy rate, mortality rate, poverty incidence, radio/TV penetration, and state of structural and non-structural measures. Vulnerabilit...

2010
P. Moeinzadeh A. Hajfathaliha

Many firms implemented various initiatives such as outsourced manufacturing which could make a supply chain (SC) more vulnerable to various types of disruptions. So managing risk has become a critical component of SC management. Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer only point-based solutions that deal with a limited set...

Journal: :Risk analysis : an official publication of the Society for Risk Analysis 2003
Daniel Sarewitz Roger Pielke Mojdeh Keykhah

Public policies to mitigate the impacts of extreme events such as hurricanes or terrorist attacks will differ depending on whether they focus on reducing risk or reducing vulnerability. Here we present and defend six assertions aimed at exploring the benefits of vulnerability-based policies. (1) Risk-based approaches to covering the costs of extreme events do not depend for their success on red...

Journal: :Risk analysis : an official publication of the Society for Risk Analysis 2012
Ahmad Saleh Safi William James Smith Zhnongwei Liu

In this article, we present the results of a study investigating the influence of vulnerability to climate change as a function of physical vulnerability, sensitivity, and adaptive capacity on climate change risk perception. In 2008/2009, we surveyed Nevada ranchers and farmers to assess their climate change-related beliefs, and risk perceptions, political orientations, and socioeconomic charac...

2007
S. Fuchs

In quantitative risk assessment, risk is expressed as a function of the hazard, the elements at risk and the vulnerability. From a natural sciences perspective, vulnerability is defined as the expected degree of loss for an element at risk as a consequence of a certain event. The resulting value is dependent on the impacting process intensity and the susceptibility of the elements at risk, and ...

2014
Francesca Matarese Patrizia Montefusco José Neves André Rocha

The objective of this paper is the definition of a new methodology for carrying out security risk assessment in the air traffic management (ATM) domain so as to enhance security awareness and integrate secure and cost-effective design objectives. This process is carried out by modelling the system, identifying the assets, threats and vulnerabilities, prioritizing the threats and proposing cost-...

Journal: :Information Systems Security 2005
Edwin Covert Fran Nielsen

his article focuses on risks to information technology (IT) systems. Technically speaking, risk to an IT system is a function of the likelihood that some threat will attack, or exploit, some vulnerability in the system and a calculation of the potential impact resulting from these attacks or exploitations. Two ways exist to calculate risk to an IT system: quantitatively and qualitatively. Each ...

2004
Jaco Vermaak Dewald van Niekerk

The field of disaster management in South Africa has developed dramatically over the past seven years. The paradigm shift from civil protection to disaster risk management brought with it the realisation that the nianagemeni of disaster risk is paramount to reducing successfully the vulnerability of these communities mo.st at risk. The resilience and coping mechanisms of communities affected by...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید