Threat Prioritization Process for the Czech Security Strategy Making

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Risk Decision-making for Chemical Process Security

INTRODUCTION In the preceding years to the terrorist attacks in the United States of September 11th, 2001, the chemical industry focused its process safety activities on accidental release risks. Rarely, if ever, was consideration given to the risk of intentional release, or beyond that, the differences in the nature of such a release. This was most likely due to a perception that these risks w...

متن کامل

Strategy-making Process and Firm Performance in Iranian Pharmaceutical Industry

This study investigated the relationship between main dimensions in the strategy-making process, environmental complexity, and performance in pharmaceutical companies of Iran. Results argue that pharmaceutical companies like other industries place differing emphasis on strategy-making and employ different modes of strategy-making. It offers a typology of different modes of strategy-making that ...

متن کامل

Strategy-making Process and Firm Performance in Iranian Pharmaceutical Industry

This study investigated the relationship between main dimensions in the strategy-making process, environmental complexity, and performance in pharmaceutical companies of Iran. Results argue that pharmaceutical companies like other industries place differing emphasis on strategy-making and employ different modes of strategy-making. It offers a typology of different modes of strategy-making that ...

متن کامل

Fuzzy Logic Approach for Threat Prioritization in Agile Security Framework using DREAD Model

For a qualitative system sound security practices must be a crucial part throughout the entire software lifecycle. Furthermore, agile software development has paved the way for overcoming the problems faced by developers during traditional development process. In the given paper we are using an Agile Security Framework that is compatible with practices of agile processes and inherit in it the b...

متن کامل

Threat Modeling: A Process To Ensure Application Security

This paper discusses the importance of implementing application security at design time. It introduces threat modeling as a process to ensure that application security is implemented at design time. This paper also outlines and defines the process of creating a using a threat model. 1.0 Introduction Application security has become a major concern in rec nt years. Hackers are using new technique...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Obrana a strategie (Defence & Strategy)

سال: 2012

ISSN: 1214-6463,1802-7199

DOI: 10.3849/1802-7199.12.2012.01.005-014