نتایج جستجو برای: threat assessment

تعداد نتایج: 609945  

Journal: :The Journal of clinical psychiatry 2013
Menachem Ben-Ezra Yuval Palgi Yaira Hamama-Raz Or Aviel Yonit Dubiner Evelyn Baruch Yechiel Soffer Amit Shrira

To the Editor: On March 11, 2011, Japan was struck by a magnitude 9.0 Mw earthquake. The results were severe, as more than 15,000 people were killed by the earthquake and the following tsunami.1 The aftermath of the disaster was a level 7 nuclear meltdown in Fukushima, matching only the Chernobyl disaster.1,2 However, a recent report of the World Health Organization showed that, to date, no dea...

2016
Richard P. Lippmann James F. Riordan

Protecting enterprise networks requires continuous risk assessment that automatically identifies and prioritizes cybersecurity risks, enables efficient allocation of cybersecurity resources, and enhances protection against modern cyberthreats. Lincoln Laboratory developed a foundational network security maturity model to guide development of such risk assessments and has developed practical ris...

2015
Hannah Ewing

There is abundant evidence that demonstrates that individuals’ intellectual performance is undermined in situations that remind them that they are stereotyped which is causing them to underperform (Schmader, 2010). This phenomenon has been identified as stereotype threat (ST). Research shows that students from disadvantaged minority groups experience poorer achievement outcomes than students wh...

2002
S Vidalis A Blyth Stilianos Vidalis Andrew Blyth

The wide development of the mobile Internet technology is creating the opportunity for companies to utilise Electronic Payment Systems for the delivery of services. Due to that, organisations have been forced to allocate considerable resources for protecting their information assets. Unfortunately the opportunity still exists for systems to be exploited with catastrophic results. Modern securit...

2002
S Vidalis A Blyth Stilianos Vidalis Andrew Blyth

The wide development of the mobile Internet technology is creating the opportunity for companies to extensively utilise computer systems for the delivery of services. New business models, which rely on electronic payment systems, are emerging and each one is creating a vulnerability to the Critical National Information Infrastructure (CNII). The opportunity for deploying offensive information w...

Journal: :Behavioral sciences & the law 2011
J Reid Meloy Mary Ellen O'Toole

Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a p...

2015

The information available indicates that most of the 27 cases are likely to have been exposed to body lice infestations and louse-borne relapsing fever during their journey to Europe. Symptoms of the three cases reported in Sicily occurred shortly after entry, suggesting an infection with Borrelia recurrentis near to the time they arrived in Italy. The transmission of Borrelia recurrentis to th...

2006
Melissa Danforth

Central to computer security are detecting attacks against systems and managing computer systems to mitigate threats to the system. Attacks exploit vulnerabilities in the system such as a programming flaw. Threats are vulnerabilities which could lead to an attack under certain circumstances. The key to the detection of attacks is discovering an ongoing attack against the system. Mitigating thre...

2004
Dah-Jye Lee Pengcheng Zhan Aaron Thomas Robert B. Schoenberger

Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید