نتایج جستجو برای: threat assessment

تعداد نتایج: 609945  

2003
Jesper M. Johansson

Threat Modeling Threat modeling is an important risk assessment and mitigation practice that provides the capability to secure a network environment. Threat modeling includes understanding and communicating the threats to the network computing environment. It is critical to be aware of the types of threats and how to reduce or mitigate the risk both in systems and applications on network aware ...

Journal: :journal of advances in computer research 2014
amin sardeh moghadam behzad moshiri

service availability is important for any organization. this has become more important with the increase of dos attacks. it is therefore essential to assess the threat on service availability. we have proposed a new model for threat assessment on service availability with a data fusion approach. we have selected three more important criteria for evaluating the threat on service availability and...

Journal: :journal of advances in computer research 2015
amin sardeh moghadam behzad moshiri ali payandeh

threat assessment in the computer networks of organizations can reduce damage caused by attacks and unexpected events. data fusion models such as the jdl model provide efficient and adequate sensors to gather the right information at the right time from the right components. this information then is refined and normalized to provide situational awareness and assess events that may be intended a...

2013
Henry Prakken Dan Ionita Roel Wieringa

This paper explores the idea that IT security risk assessment can be formalized as an argumentation game in which assessors argue about how the system can be attacked by a threat agent and defended by the assessors. A system architecture plus assumptions about the environment is specified as an ASPIC argumentation theory, and an argument game is defined for exchanging arguments between assessor...

2008

Today many NATO nations use national risk analysis methodologies (for example EBIOS for France, CRAMM for UK, ITSG-04 for Canada, MAGERIT for Spain). These methodologies, even if based on similar principles, use different threat and vulnerabilities classification. The increase of interoperability between national and NATO systems requires building up a common risk analysis methodology. A Canadi...

2001

First, we described an illustrative notional planning magnitude for each threat based on a stylized threat and risk assessment, while noting that a more comprehensive threat and risk assessments could reveal that these illustrative magnitudes were either too high or too low. Our illustrative threat assessments relied on historical data revealing observed frequencies and consequences of each thr...

2014
Robert Schrag Edward Wright Robert Kerr Bryan Ware

Assessing entity (e.g., person) risk from entity-related events requires appropriate techniques to address the relevance of events (individually and/or in aggregate) relative to a prevailing temporal frame of reference—for continuous risk monitoring, a running time point representing “the present.” We describe two classes of temporal relevance techniques we have used towards insider threat dete...

2011
Jeffrey P. Landry J. Harold Pardue Tom Johnsten Matt Campbell Priya Patidar

This paper begins a process of organizing knowledge of health information security threats into a comprehensive catalog. We begin by describing our risk management perspective of health information security, and then use this perspective to motivate the development of a health information threat tree. We describe examples of three threats, breaking each down into its key risk-related data attri...

Journal: :IJCIP 2010
Mark G. Stewart

The paper describes risk-informed decision support for assessing the costs and benefits of counter-terrorism (CT) protective measures for infrastructure. Such a decision support framework needs to consider threat scenarios and probabilities, value of human life, physical (direct) damage, indirect damage, risk reduction and protective measure costs. Probabilistic terrorism risk assessments that ...

1999
Randy Borum Robert Fein Bryan Vossekuil John Berglund

Although the ®eld of risk assessment has made tremendous advances in the past 20 years, assessments of targeted violence continue to pose a signi®cant challenge to law enforcement, mental health, and other professionals. These speci®c and critical assessments require an innovative approach. The threat assessment model, developed and re®ned by the U.S. Secret Service, provides a useful framework...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید