نتایج جستجو برای: vulnerability assessment
تعداد نتایج: 598326 فیلتر نتایج به سال:
Trusted employees pose a major threat to information systems. Despite advances in prevention, detection, and response techniques, the number of malicious insider incidents and their associated costs have yet to decline. There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization’s malicio...
Information gathering is an essential part of acute vulnerability assessment, especially when the whole process is automated. In this context, host Operating System detection must be precise, even when networks are well defended. We present an original Operating System detection method, based on temporal response analysis. As a proof of concept, we release the open source tool called RING – for...
Climate change vulnerability assessments are commonly used to identify species at risk from global climate change, but the wide range of methodologies available makes it difficult for end users, such as conservation practitioners or policymakers, to decide which method to use as a basis for decision-making. In this study, we evaluate whether different assessments consistently assign species to ...
Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open gates of a building through which any one can get into. Network scanning is perform...
IP multimedia subsystems bring huge security threats to the IMS-based next-generation networks although they bring IMS-based network integration and business ability enhancement. Therefore, the research on the vulnerability of IP multimedia subsystems attracts widespread attention recently. In this article, the security threats of next-generation core networks are discussed first. And then we a...
Vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and land use planning. This contribution aims at estimating aquifer vulnerability by applying the DRASTIC model as well as utilizing sensitivity analyses to evaluate the relative importance of the model parameters for ...
Performing a multiscale assessment of water resource vulnerability on the basis of political boundaries and watersheds is necessary for adaptive water resources management. Using the Risk-Exposure-Sensitivity-Adaptability model (RESC model), the water resource vulnerability of the Huai River Basin was assessed using four scales, namely, Class II, Class III, Province-Class II, and Municipality-C...
Disaster Management and current approaches in this field in one hand only has focused to physicalvulnerabilities and in the other hand has included consequential action to reduce vulnerability and improve physicalpreparation as well as resistance institutional insignificant during the disaster. Therefore, these approaches usually haveignored the capabilities and capacities of residents to reduc...
Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to ex...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید