نتایج جستجو برای: through risk assessment process

تعداد نتایج: 3635871  

2016
Mingxiang He Xin An

Abstract Information security risk assessment was an important component of information systems security engineering and the selection of assessment method had a direct impact on the final results of the assessment. But there were too many elements in the process of information security risk assessment. How to find the optimal elements from many elements to simplify the calculation of risk valu...

Journal: :Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 2016

Journal: :Information Technology and Management Science 2016

Journal: :Progress in Biophysics and Molecular Biology 2005

Abstract Background and aims: Nowadays with increasing global competition, companies apply several scientific methods to identify, assess and remove potential failures in production process. The main goal of this study was identification and analysis of potential failure modes in a hydraulic pump manufacturing company by using combination of interval valued fuzzy Analytic network process (IVF-...

2014
Natalie Lehr

derived for cyberinsurance. TSC Advantage (TSC), an enterprise risk consultancy, is enhancing cyber risk assessment for commercial organizations, critical infrastructure and the public sector. Through its partnership with leading global insurance underwriters and brokers, TSC is transforming the pre-binding process leveraging its patented Threat Vector ManagerTM (TVM) assessment, which supports...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید