نتایج جستجو برای: vulnerability assessment
تعداد نتایج: 598326 فیلتر نتایج به سال:
Tamper-indicating devices, also called security seals, are widely used to detect tampering or unauthorized entry. We studied 94 different security seals, both passive and electronic, developed either commercially or by the United States Government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low...
As vulnerabilities keep increasing exponentially every year, the need to efficiently classify, manage, and analyse them also increases. Many of the previous attempts at managing vulnerabilities have not been so successful because of the use of taxonomy approach. Few of the recent approaches have used ontologies for vulnerability management. Ontologies are real world concepts that are modelled u...
In this modern world, all of the persons are using the facility of internet. SECURITY is one of the major issue of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested named Vulnerability Assessment and Penetration Testing (VAPT). Vulnerability Assessment i...
The seismic vulnerability of an urban area is of a great deal for local authorities especially those facing earthquakes. So, it is important to have an efficient tool to assess the vulnerability of existing buildings. The use of the VIP (Vulnerability Index Program) and the GIS (Geographic Information System) let us to identify the most vulnerable districts of an urban area. The use of the vuln...
Many existing bridges were designed without adequate consideration of seismic risk. The full or partial collapse of even one major bridge in a city or community would have destroying results. There has been focuses on developing fragility-based seismic vulnerability of existing usual bridges in Iran or support decision making on seismic upgrade. This article focuses on developing performance b...
background: groundwater nitrate pollution is an important environmental problem in water resources management. in this regard, specific measures aiming at prevention of water pollution will be helpful to managers and decision-makers. identification of aquifers’ vulnerable areas and determination of groundwater protection zones using most widely used models, such as drastic and cd, are one of th...
Water scarcity and pollution have arisen as global issues in the twenty-first century [...]
Sandia National Laboratories, under the direction of the Office of Science and Technology, National Institute of Justice, conducted the chemical facility vulnerability assessment (CFVA) project. The primary objective of this project was to develop, test and validate a vulnerability assessment methodology (VAM) for determining the security of chemical facilities against terrorist or criminal att...
Security on Grid computing is often an afterthought. However assessing security of middleware systems is of the utmost importance because they manage critical resources owned by different organizations. To fulfill this objective we use First Principles Vulnerability Assessment (FPVA), an innovative analystic-centric (manual) methodology that goes beyond current automated vulnerability tools. FP...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید