نتایج جستجو برای: threat assessment
تعداد نتایج: 609945 فیلتر نتایج به سال:
posttraumatic stress disorder (ptsd) is a common response to traumatic events. a cognitive model proposed that ptsd becomes chronic when individuals process the trauma in a way that leads to a sense of serious, current threat. the sense of threat arises as an outcome of excessively negative appraisals of the trauma and its sequel and a disturbance of autobiographical memory. variations in the n...
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in software as it is developed. Because the focus on software security has increased only recently, software development teams often do not have expertise in techniques for identifying security risk, understanding the impact of...
In order to perform the analysis and mitigation efforts related with the information security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially req...
Worldwide Interoperability for Microwave Access (WiMAX) is going to be an emerging wireless technology for the future. With the increasing popularity of Broadband internet, wireless networking market is thriving. Wireless network is not fully secure due to rapid release of new technologies, market competition and lack of physical infrastructure. In the IEEE 802.11 technolo...
Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which open...
The development of a psycholinguistic measure of insider threat risk faces many challenges. Prior research suggests that psycholinguistic analysis has potential for identifying individuals who are high risks for insider/criminal activity, but testing and validation of proposed methods is hampered by lack of available data. For example, analytic tools can discriminate text samples authored by kn...
Three independent non-food Scientific Committees provide the Commission with the scientific advice it needs when preparing policy and proposals relating to consumer safety, public health and the environment. The Committees also draw the Commission's attention to the new or emerging problems which may pose an actual or potential threat. SCHER Questions relating to examinations of the toxicity an...
We outline a framework for the risk assessment of information infrastructures that generalizes the notion of dependency with respect to attributes such as confidentiality, integrity or availability. Dependencies are used to model an infrastructure at distinct abstraction levels and to discover attack strategies as well as risk mitigation plans. A plan is formulated in terms of set of countermea...
Small and Medium scale Enterprises (SMEs) playing a vital role in nation’s economy. Many studies have demonstrated the positive impact of Total Quality Management (TQM) practices on Small and Medium scale enterprises. These have relied on manager’s self assessment of performance in reaching the objectives of study. It is also observed that many SMEs are ineffective and some are closed down. The...
To show context appropriate antipredator behaviour, animals require information about a predators' motivation to hunt, and consequently the level of danger to which they are exposed at any given moment. In addition to deterring a predator, mobbing behaviour, in which animals approach a potential predator, might also provide information useful in predation risk assessment. Here we present the re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید