Results 361 to 370 of about 6,055,547 (381)
Some of the next articles are maybe not open access.
Useful vulnerability assessment
Information Security Technical Report, 2003Abstract It is a commonly held view that the goal of vulnerability testing is to uncover as many vulnerabilities as possible, and ideally to uncover all vulnerabilities in the tested systems. In my opinion this is incorrect; the main point of vulnerability testing should be to enable an organization to fix the vulnerabilities that their risk ...
openaire +2 more sources
2016
Risk assessment analysis is determined for specific locations/regions with a history of being targeted by one or more primary hazards or triggered events, the probability of recurrence, the magnitude, the frequency of occurrence in a damaging/destructive magnitude range, and the projected estimates of injury, deaths, and damage and destruction.
openaire +2 more sources
Risk assessment analysis is determined for specific locations/regions with a history of being targeted by one or more primary hazards or triggered events, the probability of recurrence, the magnitude, the frequency of occurrence in a damaging/destructive magnitude range, and the projected estimates of injury, deaths, and damage and destruction.
openaire +2 more sources
Assessing vulnerability in families
1999The identification of children in need and the needs of their families is critically important in view of the requirements of the Children Act 1989 and the recommendations of the Department of Health (DoH) (1995) and the NHS Executive (NHSE) (1996). Furthermore, since the introduction of the NHS and Community Care Act 1990, the issue of health needs ...
openaire +2 more sources
Vulnerability and Risk Assessment
2013Using census and spatial databases, this chapter demonstrates the assessment of flood vulnerability and risk zoning in the megacity of Dhaka. A place-based approach was adopted to evaluate flood vulnerability at the community level. A method comprising the AHP and the WLC was used to operationalize the conceptual model within a GIS framework.
openaire +2 more sources
WITHDRAWN: Vulnerability Assessment
2016This chapter outlines how to properly assess an organization’s vulnerabilities or the weak points of a target. This chapter outlines the seven factors used in the process of assessing these vulnerabilities. This chapter also demonstrates how to complete a Vulnerability Worksheet, which contributes to an organization’s threat rating.
openaire +2 more sources
Physical vulnerability assessment
2012Effective infrastructure (security) Vulnerability Assessments require creative and resourceful personnel, whichever methods are employed. It is essential for vulnerability assessors to try to assume the mind-set of the adversaries and to look at vulnerabilities, attacks, and possible countermeasures from their perspective.
openaire +2 more sources
Ontological Vulnerability Assessment
2008Vulnerability assessment is a vital part of the risk management process. The accuracy and reliability of calculated risk depends on comprehensive and correct assessment of system vulnerabilities. Current vulnerability assessment techniques fail to consider systems in their entirety and consequently are unable to identify complex vulnerabilities (i.e ...
openaire +2 more sources
2000
Abstract : This report describes a methodology that provides a practical and simple process for applying classical risk analysis/assessment theory to the vulnerability analysis/assessment of military systems in particular and generally to any hazard analysis desired.
openaire +1 more source
Abstract : This report describes a methodology that provides a practical and simple process for applying classical risk analysis/assessment theory to the vulnerability analysis/assessment of military systems in particular and generally to any hazard analysis desired.
openaire +1 more source