نتایج جستجو برای: vulnerability risk

تعداد نتایج: 976669  

2012
Meghan Alexander Christophe Viavattene Hazel Faulkner Sally Priest

This report is intended to be used by researchers working on decision support tools in flood risk management. It describes the construction of a GIS-based flood risk assessment tool and reviews each feature in turn, making up the hazard, vulnerability and risk interface of the tool. Feedback from emergency professionals is presented in a companion report, alongside some practical recommendation...

2016
Eli Weintraub

Risk scoring models assume that confidentiality evaluation is based on user estimations. Confidentiality evaluation incorporates the impacts of various factors including systems' technical configuration, on the processes relating to users' confidentiality. The assumption underlying this research is that system users are not capable of estimating systems' confidentiality since they lack the know...

2010
Piya Shedden Wally Smith Atif Ahmad

Information security risk assessments (ISRAs) are of great importance for organisations. Current ISRA methods identify an organisation’s security risks and provide a measured, analysed security risk profile of critical information assets in order to build plans to treat risk. However, despite prevalent use in organisations today, current methods adopt a limited view of information assets during...

2011
Su Zhang Xinming Ou Anoop Singhal John Homer

Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating such metrics. We developed a quantitative model that can be used to aggregate vulnerability metrics in an enterprise network, with a sound comp...

2004
Gunter Stephan Georg Müller-Fürstenberger

1. Economies differ in their vulnerability to climate change. How does climate change– both in terms of market and non-market damages – affect economic growth, structure and distribution of income? 2. Climate change stipulates capital flows and migration. How does this affect regional economies? 3. The risk of climate disruption induces mitigation as well as on anticipated adaptation to climate...

2013
Zhendong Ma Paul Smith

Industrial Control Systems (ICS) monitor and control industrial processes, and enable automation in industry facilities. Many of these facilities are regarded as Critical Infrastructures (CIs). Due to the increasing use of Commercial-Off-The-Shelf (COTS) IT products and connectivity offerings, CIs have become an attractive target for cyberattacks. A successful attack could have significant cons...

2010
Nayan Sharma Fiifi Amoako Johnson Craig W. Hutton Mike Clark

The authors present an assessment of risk from river bank erosion in the Brahmaputra river basin. The concept of risk is conceptualised in the context of socio-economic vulnerability, and the potential for exposure to hazard. By addressing both the physical hazard and the variations across the socio-economic surface the approach presented attempts to spatially combine these parameters to provid...

ژورنال: طب کار 2018
, ,

Background and purpose: Vulnerability introduces the sensitivity of a system versus internal faults or external threats. A vulnerable system cannot recover itself after shocks and may disable to provide services. I in this study in order to achieve a resilient city gate station (CGS), vulnerability of the system identified via SVA procedure. Moreover, using the resilience engineering approach s...

Aims & Backgrounds: Physical indicators of urban texture such as the age of buildings, microstructure, number of floors and type of building materials have a determinant role in the intensity and extent of the cities vulnerability in the face of earthquakes. Many Iranian cities are located on areas with moderate and high risk of earthquakes. Hence, Special attention to the elements qualities an...

2014
A. M. Algarni

Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید