Results 361 to 370 of about 6,055,547 (381)
Some of the next articles are maybe not open access.

Useful vulnerability assessment

Information Security Technical Report, 2003
Abstract It is a commonly held view that the goal of vulnerability testing is to uncover as many vulnerabilities as possible, and ideally to uncover all vulnerabilities in the tested systems. In my opinion this is incorrect; the main point of vulnerability testing should be to enable an organization to fix the vulnerabilities that their risk ...
openaire   +2 more sources

Risk Assessment/Vulnerability

2016
Risk assessment analysis is determined for specific locations/regions with a history of being targeted by one or more primary hazards or triggered events, the probability of recurrence, the magnitude, the frequency of occurrence in a damaging/destructive magnitude range, and the projected estimates of injury, deaths, and damage and destruction.
openaire   +2 more sources

Assessing vulnerability in families

1999
The identification of children in need and the needs of their families is critically important in view of the requirements of the Children Act 1989 and the recommendations of the Department of Health (DoH) (1995) and the NHS Executive (NHSE) (1996). Furthermore, since the introduction of the NHS and Community Care Act 1990, the issue of health needs ...
openaire   +2 more sources

Vulnerability and Risk Assessment

2013
Using census and spatial databases, this chapter demonstrates the assessment of flood vulnerability and risk zoning in the megacity of Dhaka. A place-based approach was adopted to evaluate flood vulnerability at the community level. A method comprising the AHP and the WLC was used to operationalize the conceptual model within a GIS framework.
openaire   +2 more sources

WITHDRAWN: Vulnerability Assessment

2016
This chapter outlines how to properly assess an organization’s vulnerabilities or the weak points of a target. This chapter outlines the seven factors used in the process of assessing these vulnerabilities. This chapter also demonstrates how to complete a Vulnerability Worksheet, which contributes to an organization’s threat rating.
openaire   +2 more sources

Physical vulnerability assessment

2012
Effective infrastructure (security) Vulnerability Assessments require creative and resourceful personnel, whichever methods are employed. It is essential for vulnerability assessors to try to assume the mind-set of the adversaries and to look at vulnerabilities, attacks, and possible countermeasures from their perspective.
openaire   +2 more sources

Ontological Vulnerability Assessment

2008
Vulnerability assessment is a vital part of the risk management process. The accuracy and reliability of calculated risk depends on comprehensive and correct assessment of system vulnerabilities. Current vulnerability assessment techniques fail to consider systems in their entirety and consequently are unable to identify complex vulnerabilities (i.e ...
openaire   +2 more sources

Vulnerability Risk Assessment

2000
Abstract : This report describes a methodology that provides a practical and simple process for applying classical risk analysis/assessment theory to the vulnerability analysis/assessment of military systems in particular and generally to any hazard analysis desired.
openaire   +1 more source

Home - About - Disclaimer - Privacy