نتایج جستجو برای: vulnerability assessment

تعداد نتایج: 598326  

2006
William H. King Robert F. Mills Michael R. Grimaila

Trusted employees pose a major threat to information systems. Despite advances in prevention, detection, and response techniques, the number of malicious insider incidents and their associated costs have yet to decline. There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization’s malicio...

2002
Franck Veysset Olivier Courtay Olivier Heen

Information gathering is an essential part of acute vulnerability assessment, especially when the whole process is automated. In this context, host Operating System detection must be precise, even when networks are well defended. We present an original Operating System detection method, based on temporal response analysis. As a proof of concept, we release the open source tool called RING – for...

Journal: :Global change biology 2017
Christopher J Wheatley Colin M Beale Richard B Bradbury James W Pearce-Higgins Rob Critchlow Chris D Thomas

Climate change vulnerability assessments are commonly used to identify species at risk from global climate change, but the wide range of methodologies available makes it difficult for end users, such as conservation practitioners or policymakers, to decide which method to use as a basis for decision-making. In this study, we evaluate whether different assessments consistently assign species to ...

2013
Vivek Kumar Yadav B. M. Mehtre

Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open gates of a building through which any one can get into. Network scanning is perform...

Journal: :Journal of Multimedia 2013
Xiaoling Tang

IP multimedia subsystems bring huge security threats to the IMS-based next-generation networks although they bring IMS-based network integration and business ability enhancement. Therefore, the research on the vulnerability of IP multimedia subsystems attracts widespread attention recently. In this article, the security threats of next-generation core networks are discussed first. And then we a...

Journal: :The Science of the total environment 2005
Insaf S Babiker Mohamed A A Mohamed Tetsuya Hiyama Kikuo Kato

Vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and land use planning. This contribution aims at estimating aquifer vulnerability by applying the DRASTIC model as well as utilizing sensitivity analyses to evaluate the relative importance of the model parameters for ...

2016
Junxu Chen Jun Xia Zhifang Zhao Fei Zhao Hongyan Li

Performing a multiscale assessment of water resource vulnerability on the basis of political boundaries and watersheds is necessary for adaptive water resources management. Using the Risk-Exposure-Sensitivity-Adaptability model (RESC model), the water resource vulnerability of the Huai River Basin was assessed using four scales, namely, Class II, Class III, Province-Class II, and Municipality-C...

Disaster Management and current approaches in this field in one hand only has focused to physicalvulnerabilities and in the other hand has included consequential action to reduce vulnerability and improve physicalpreparation as well as resistance institutional insignificant during the disaster. Therefore, these approaches usually haveignored the capabilities and capacities of residents to reduc...

2016
Emma E. Hodgson Timothy E. Essington Isaac C. Kaplan

Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to ex...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید