To see the other types of publications on this topic, follow the link: Vulnerability Management.

Journal articles on the topic 'Vulnerability Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Vulnerability Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ozyurt, Gulizar, Aysen Ergin, and Cuneyt Baykal. "COASTAL VULNERABILITY ASSESSMENT TO SEA LEVEL RISE INTEGRATED WITH ANALYTICAL HIERARCHY PROCESS." Coastal Engineering Proceedings 1, no. 32 (January 29, 2011): 6. http://dx.doi.org/10.9753/icce.v32.management.6.

Full text
Abstract:
This paper discusses a parameter based coastal vulnerability assessment model to sea level rise. The model integrates physical characteristics and human activities with expert perception through an application of analytical hierarchy process (AHP). The results of AHP enables to assign weights to parameters of the model which determine vulnerability of a coastal area to the impacts of sea level rise such as coastal erosion, inundation, flooding due to storm surges, saltwater intrusion to groundwater and rivers. The results of AHP also indicates that sea level rise is not considered as one of the main driving forces of the impacts that might be already present contrary to the reports that state that sea level rise will trigger many problems along coastal areas. The application of the coastal vulnerability assessment model to two different coastal areas of Turkey showed that there is a need for overall evaluation of coastal areas in terms of vulnerability to sea level rise considering all the impacts. It is seen that assessing overall vulnerability is an important tool for national assessments. On the other hand, impact vulnerabilities are important when regional to local planning are considered since a region having a low overall vulnerability might show higher vulnerability for individual impacts. The proposed vulnerability methodology integrated with expert perception enables a simple yet effective representation of the coastal system while enabling decision makers to come up with proactive adaptation measures.
APA, Harvard, Vancouver, ISO, and other styles
2

Sancho, Francisco, Filipa S. B. F. Oliveira, and Paula Freire. "COASTAL DUNES VULNERABILITY INDEXES: A NEW PROPOSAL." Coastal Engineering Proceedings 1, no. 33 (December 15, 2012): 68. http://dx.doi.org/10.9753/icce.v33.management.68.

Full text
Abstract:
In the present work it is proposed a new coastal dune vulnerability index based on its exposure (and resistance) to overwashing and erosion under storm events, focusing solely on the short-term events. The methodology is applied and validated against the available data for the Ria Formosa (Algarve, Portugal) coastal beaches. The overwash index is determined as a function of the dune crest height in relation with the maxima water levels for different return periods, and the storm-erosion index is computed as function of the remaining beach/dune volume after the impact of the 10-year return period extreme-wave conditions in relation to the pre-storm volume. It is discussed the results of this application, enhancing the necessity of further validation.
APA, Harvard, Vancouver, ISO, and other styles
3

Posada-Vanegas, Gregorio, Gerardo Durán-Valdez, Rodolfo Silva-Casarin, Maria Elena Maya-Magaña, and Jose Antonio Salinas-Prieto. "VULNERABILITY TO COASTAL FLOODING INDUCED BY TROPICAL CYCLONES." Coastal Engineering Proceedings 1, no. 32 (January 31, 2011): 19. http://dx.doi.org/10.9753/icce.v32.management.19.

Full text
Abstract:
Hurricanes are a recurrent feature on Mexican coasts; they create floods whose economic and social damages are evident. The necessity to evaluate the natural hazard related to storm surge is fundamental to reduce risk in coastal areas. In order to generate flooding hazard maps, storm surge associated to different return periods is computed with a 2D numerical model. The first part of this work is related with the data and numerical models used to calculate the storm surge, the second part contain the results obtained with the simulations. This work has been done for the entire Mexican coastline but only results for the Gulf of Mexico are presented
APA, Harvard, Vancouver, ISO, and other styles
4

Narayan, Siddharth, Robert J. Nicholls, Ekaterina Trifonova, Mariana Filipova – Marinova, Iliyan Kotsev, Stoyan Vergiev, Susan Hanson, and Derek Clarke. "COASTAL HABITATS WITHIN FLOOD RISK ASSESSMENTS: ROLE OF THE 2D SPR APPROACH." Coastal Engineering Proceedings 1, no. 33 (December 15, 2012): 12. http://dx.doi.org/10.9753/icce.v33.management.12.

Full text
Abstract:
Coastal habitats are highly threatened ecosystems that are sensitive to complex sets of natural and human drivers. Europe’s coastal habitats are protected from damage due to human activity by the EU Habitats Directive, and are required to be mapped within flood risk assessments by the EU Floods Directive. Ecological vulnerability and risk assessments are a common way of assessing the impacts on these habitats due to human and natural drivers. Coastal flood risk assessments therefore often include assessments of the vulnerability of coastal habitats. Flood risk assessments also evaluate, where relevant, the mitigation services provided by coastal habitats. The two aspects of coastal habitats – their flood mitigation service and their ecological vulnerability are strongly correlated; however these are usually treated separately within flood risk assessments. One of the goals of the EU THESEUS project is the integrated consideration of coastal habitats within flood risk assessments. This paper investigates the integration within flood risk assessments of the two aspects of coastal habitats using the 2D SPR conceptual model. The construction of the model is first illustrated by application to a generic study site. The model is then applied to a case-study where data on habitat elevations and vulnerabilities to flood events have been collected. The model provides a unique and robust means of combining information on ecological vulnerability indices for different habitat associations with information on their distribution and spatial relationships within the coastal floodplain. Used in conjunction with information on habitat vulnerability indices, the conceptual model serves as a powerful tool for integrated and structured consideration of coastal habitats within flood risk assessments
APA, Harvard, Vancouver, ISO, and other styles
5

Aleksic, Aleksandar, Hrvoje Puskaric, Danijela Tadic, and Miladin Stefanovic. "Project management issues: vulnerability management assessment." Kybernetes 46, no. 7 (August 7, 2017): 1171–88. http://dx.doi.org/10.1108/k-08-2016-0218.

Full text
Abstract:
Purpose The purpose of this paper is to investigate the vulnerability of projects implemented in enterprises. The paper focuses on the issue of vulnerability assessment in the planning stages of a project, before its realization. Design/methodology/approach In this paper, the realization of the project has been analyzed through the phases of delivery, and the fuzzy approach has been deployed for mathematical modeling of uncertainties. An appropriate expert and management team has assessed the variables of the project’s vulnerability by using linguistic expressions, as this way of assessment is close to the human way of thinking. The model of project’s vulnerability assessment has been verified on real life data by means of an illustrative example. Findings A very significant part of business operations in enterprises all over the world is realized through the practice of project management. In daily business practice, project activities may be exposed to different risk sources. These risks may be studied from different perspectives, but without reevaluation, risk sources increase the vulnerability of projects as well as of the whole enterprise. Originality/value The results of the analysis of the obtained data gives good direction to future research in the scope of vulnerability management in the enterprises oriented to long-term sustainability.
APA, Harvard, Vancouver, ISO, and other styles
6

Okuda, Takeshi, and Suguru Yamaguchi. "Lightweight Vulnerability Management System." Journal of Information Processing 16 (2008): 157–64. http://dx.doi.org/10.2197/ipsjjip.16.157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hardin, Eric, Helena Mitasova, and Margery Overton. "GIS-BASED ANALYSIS OF STORM VULNERABILITY CHANGE AT PEA ISLAND, NC." Coastal Engineering Proceedings 1, no. 33 (December 15, 2012): 75. http://dx.doi.org/10.9753/icce.v33.management.75.

Full text
Abstract:
In August 2011, Hurricane Irene opened multiple small breaches along the Outer Banks of North Carolina, USA. To predict storm damage to barrier islands, the United States Geological Survey (USGS) has developed the storm impact scale for barrier islands, which assesses vulnerability based on the configuration of the pre-storm terrain relative to storm characteristics. We present the vulnerability of Pea Island to Hurricane Isabel (2003) and Irene (2011) using an efficient GIS-based implementation of the storm impact scale. This implementation employs a least cost path approach to automated topographic feature extraction and a remote sensing approach to wrack line extraction for storm parameter estimation. The assessed vulnerability along with high-resolution topographic visualizations based on a decadal time-series of Light Detection and Ranging (LiDAR) data suggest that the location of the breach formation was a function of the pre-storm terrain. With the presented methodology, the geospatial information required to identify vulnerable areas can efficiently be extracted so that management strategies can be implemented before storm damage occurs.
APA, Harvard, Vancouver, ISO, and other styles
8

Walkowski, Michał, Jacek Oko, and Sławomir Sujecki. "Vulnerability Management Models Using a Common Vulnerability Scoring System." Applied Sciences 11, no. 18 (September 19, 2021): 8735. http://dx.doi.org/10.3390/app11188735.

Full text
Abstract:
Vulnerability prioritization is an essential element of the vulnerability management process in data communication networks. Accurate prioritization allows the attention to be focused on the most critical vulnerabilities and their timely elimination; otherwise, organizations may face severe financial consequences or damage to their reputations. In addition, the large amounts of data generated by various components of security systems further impede the process of prioritizing the detected vulnerabilities. Therefore, the detection and elimination of critical vulnerabilities are challenging tasks. The solutions proposed for this problem in the scientific literature so far—e.g., PatchRank, SecureRank, Vulcon, CMS, VDNF, or VEST—are not sufficient because they do not consider the context of the organization. On the other hand, commercial solutions, such as Nessus, F-Secure, or Qualys, do not provide detailed information regarding the prioritization procedure, except for the scale. Therefore, in this paper, the authors present an open-source solution called the Vulnerability Management Center (VMC) in order to assist organizations with the vulnerability prioritization process. The VMC presents all calculated results in a standardized way by using a Common Vulnerability Scoring System (CVSS), which allows security analysts to fully understand environmental components’ influences on the criticality of detected vulnerabilities. In order to demonstrate the benefits of using the the open-source VMC software developed here, selected models of a vulnerability management process using CVSS are studied and compared by using three different, real testing environments. The open-source VMC suite developed here, which integrates information collected from an asset database, is shown to accelerate the process of removal for the critical vulnerabilities that are detected. The results show the practicability and efficacy of the selected models and the open-source VMC software, which can thus reduce organizations’ exposure to potential threats.
APA, Harvard, Vancouver, ISO, and other styles
9

Podsevalov, Artem G., and Mikhail I. Kudinov. "Issues of using vulnerability prioritization algorithms when organizing the vulnerability management process." Digital technology security, no. 1 (March 26, 2024): 52–73. http://dx.doi.org/10.17212/2782-2230-2024-1-52-73.

Full text
Abstract:
The purpose of this scientific research is to analyze the possibilities of increasing the level of protection of an organization's defense against cyber threats by applying vulnerability prioritization algorithms. There are various approaches to creating vulnerability prioritization algorithms that take into account many metrics. For example, the potential impact on the information system when exploiting the vulnerability, the complexity of exploiting the vulnerability, the difficulty of eliminating it, etc. This article is devoted to the issues of organizing the process of managing vulnerabilities, in particular, various methods (algorithms) of their prioritization to determine the priority of elimination and the rational distribution of human resources of the organization. Various algorithms for prioritizing vulnerabilities were reviewed and analyzed, and conclusions were drawn about their advantages and disadvantages. In conclusion, the work proposes a version of the vulnerability prioritization algorithm that takes into account the most important metrics, as well as the recommendations of the FSTEC of Russia.
APA, Harvard, Vancouver, ISO, and other styles
10

Haerens, Piet, Paolo Ciavola, Óscar Ferreira, Ap Van Dongeren, Mark Van Koningsveld, and Annelies Bolle. "ONLINE OPERATIONAL EARLY WARNING SYSTEM PROTOTYPES TO FORECAST COASTAL STORM IMPACTS (CEWS)." Coastal Engineering Proceedings 1, no. 33 (October 25, 2012): 45. http://dx.doi.org/10.9753/icce.v33.management.45.

Full text
Abstract:
Extreme coastal storms have a destructive impact on coastal areas and directly affect people living in the coastal zone, being this emphasized by recent events (e.g. Katrina, Xynthia) which reminded the world of the vulnerability of coastal areas. The economic constraints and the increasing vulnerability of coastal areas (due to sea level rise and to increased occupation) make it impossible to continue with a coastal zone management strategy based solely on engineering schemes to protect vulnerable coastal areas across Europe. Development tools and methods that improve today’s forecasting, prediction and early warning capabilities in order to improve the assessment of coastal vulnerability and risks are strongly needed and should be part of future prevention, mitigation and preparedness measures. Within the MICORE project online operational storm early warning systems (CEWSs) using open-source models and tools for reliable predictions of the morphological impact of marine storm events were developed and demonstrated. The system makes use of existing off-the-shelf models as well as a state of the art open-source morphological model (XBeach). The project specifically targeted the development of early warning and information systems to support a short term emergency response in case of an extreme storm event (CEWS). The current paper describes the applied system architecture, the model set-up and the storm impact indicator (SII) oriented approach. It also highlights the need for further developments and application.
APA, Harvard, Vancouver, ISO, and other styles
11

Andreeva, Nataliya Kamenova, Nikolay Valchev, Bogdan Prodanov, Petya Eftimova, Iliyan Kotsev, and Lyubomir Dimitrov. "ASSESSMENT OF COASTAL RECEPTORS’ EXPOSURE VULNERABILITY TO FLOOD HAZARD ALONG VARNA REGIONAL COAST." Coastal Engineering Proceedings, no. 35 (June 23, 2017): 8. http://dx.doi.org/10.9753/icce.v35.management.8.

Full text
Abstract:
Storms and related disasters are phenomena producing coastal hazards and endangering human life and occupation. The study evaluates coastal receptors’ exposure and their vulnerability to storm-induced flooding hazard along Varna regional coast in Western Black Sea, Bulgaria. The assessment is performed employing the Coastal Risk Assessment Framework (CRAF) developed within EU FP7 RISC-KIT project. It constitutes a screening process that allows determination of susceptible alongshore sectors (hotspots) by assessing relevant hazard intensities, hazard extents and potential receptors’ exposure vulnerability within them by means of coastal indices approach. The ultimate goal is to evaluate potential risk posed by flooding in support to coastal managers, decision and policy makers. Assessment of coastal receptors’ exposure vulnerability is done by exposure indicators approach, using hazard intensities and flooding extents relevant to return period of 100 years. The approach consists of combining several indicators into a single index, thereby allowing a rapid comparison of coastal sectors. Five types of receptors are considered to formulate the relevant exposure indicators: Land Use, Population, Transport, Utilities and Business, which subsequently are combined into an Overall Exposure Indicator to evaluate potential direct and indirect impacts. Results show that the most vulnerable to coastal flooding in terms of exposure are coastal sectors located within Varna Bay, comprising port and industry facilities with regional, national and international significance.
APA, Harvard, Vancouver, ISO, and other styles
12

Merrell, Samuel A., and James F. Stevens. "Improving the Vulnerability Management Process." EDPACS 38, no. 1 (June 24, 2008): 13–22. http://dx.doi.org/10.1080/07366980802138673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Steinberger, Richard. "Vulnerability Management in Unix Environments." Information Security Technical Report 7, no. 1 (March 2002): 26–36. http://dx.doi.org/10.1016/s1363-4127(02)00104-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Arce, Iván. "Vulnerability management at the crossroads." Network Security 2008, no. 5 (May 2008): 11–13. http://dx.doi.org/10.1016/s1353-4858(08)70064-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Percebois, Jacques. "Energy vulnerability and its management." International Journal of Energy Sector Management 1, no. 1 (January 23, 2007): 51–62. http://dx.doi.org/10.1108/17506220710738597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sano, Marcello, Scott Baum, Marcus Bussey, RW Bill Carter, Florence Crick, Aliasghar Golshani, Darryl Low Choy, et al. "ADAPTING COASTS TO CLIMATIC FUTURES. AN AUSTRALIAN PERSPECTIVE." Coastal Engineering Proceedings 1, no. 33 (December 14, 2012): 21. http://dx.doi.org/10.9753/icce.v33.management.21.

Full text
Abstract:
In coastal management under climatic pressures, the final aim of vulnerability assessments, system thinking or scenario planning exercises is to inform the identification of the most appropriate adaptation options for communities under risk of coastal hazards and climate change. In this paper we show how we combined these techniques for coastal settlements adaptation in South East Queensland, one of the most populated Australian regions, including: (i) the use of suburb-level mapping and numerical modelling to identify and assess vulnerability hotspots (ii) the development and testing of systems thinking and bayesian modelling techniques to explore adaptation pathways and the adaptive capacity of coastal communities and (iii) the use of scenario planning techniques to test adaptation options in an uncertain future. We show how these outcomes were used to develop a range of research-based adaptation policies, programs and actions and to inform the preparation of practical guidance for councils across Queensland.
APA, Harvard, Vancouver, ISO, and other styles
17

Mohamad, Mohd Fauzi, Lee Hin Lee, and Mohd Kamarul Huda Samion. "Coastal Vulnerability Assessment towards Sustainable Management of Peninsular Malaysia Coastline." International Journal of Environmental Science and Development 5, no. 6 (2014): 533–38. http://dx.doi.org/10.7763/ijesd.2014.v5.540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Poddubnyi, V. O., and O. V. Severinov. "Vulnerability management using a formalized description." Radiotekhnika, no. 203 (December 23, 2020): 121–25. http://dx.doi.org/10.30837/rt.2020.4.203.11.

Full text
Abstract:
The article considers the main stages of vulnerability management and the problems arising in risk assessment and decision making during vulnerability management in the information and telecommunications system. It is assumed that modern techniques are not sufficient for effective vulnerability management. There is a need for creating a risk assessment system to improve decision-making procedures. The comparison of the formalized and informal description of the information and telecommunication system is described. The conclusion from the comparison results is that the formalized description has a number of advantages, so it is necessary that it should be built based on a formalized description of the information and telecommunication system. When adding qualitative vulnerability assessments (such as Common Vulnerability Scoring System vulnerabilities), this system will be unambiguous, clear, flexible, and easy to use. An additional advantage of such a system is the ability to automate assessment and decision-making processes, which will eliminate human influence and minimize the subjective factor in the management of vulnerabilities in the information and telecommunications system. Such a system will not exclude the influence of the security administrator, but will help him in decision-making, risk assessment, reduce the likelihood of errors, will help new staff in choosing decisions.
APA, Harvard, Vancouver, ISO, and other styles
19

Davidovac, Zoran, and Vanja Korać. "Vulnerability Management and Patching IT Systems." Arheologija i prirodne nauke 6 (2010): 271–86. http://dx.doi.org/10.18485/arhe_apn.2010.6.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Papadaki, Maria, and Steven Furnell. "Vulnerability management: an attitude of mind?" Network Security 2010, no. 10 (October 2010): 4–8. http://dx.doi.org/10.1016/s1353-4858(10)70124-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gupta, Alok. "Vulnerability and Disaster Management in India." Prehospital and Disaster Medicine 15, S2 (September 2000): S98. http://dx.doi.org/10.1017/s1049023x00032246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sapountzaki, Kalliopi. "Vulnerability management by means of resilience." Natural Hazards 60, no. 3 (August 14, 2011): 1267–85. http://dx.doi.org/10.1007/s11069-011-9908-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Johnson, Sheri L., Coral Ballister, and Thomas E. Joiner. "Hypomanic vulnerability, terror management, and materialism." Personality and Individual Differences 38, no. 2 (January 2005): 287–96. http://dx.doi.org/10.1016/j.paid.2004.04.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

San Cristóbal Ruiz, Elio, Rafael Pastor Vargas, Rosario Gil Ortego, Russ Meier, Hamadou Saliah-Hassane, and Manuel Castro. "Vulnerability Assessment of Learning Management Systems." IT Professional 25, no. 1 (January 2023): 60–67. http://dx.doi.org/10.1109/mitp.2022.3204640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Anand, Adarsh, Navneet Bhatt, and Deepti Aggrawal. "Modeling Software Patch Management Based on Vulnerabilities Discovered." International Journal of Reliability, Quality and Safety Engineering 27, no. 02 (September 13, 2019): 2040003. http://dx.doi.org/10.1142/s0218539320400033.

Full text
Abstract:
A software system deals with various security implications after its release in the market. Correspondingly, firm releases security patches to counter those flaws discovered in the software system. A vendor releases a patch only if a vulnerability has been discovered in a software. It is an important aspect that encompasses the prediction of potential number of patches to be released to maintain the stability of a software. Vulnerability Discovery Models (VDMs) help a software vendor to acknowledge the security trends, forecast security investments and to plan patches, but very few attempts have been made to model the Vulnerability Patch Modeling (VPM) based on the impact of vulnerabilities discovered over the time period. In this proposal, we deduce a novel approach that addresses trend in the sequential development of patches based on the vendor or reporters fetching out the vulnerabilities in a software. The vulnerability trends in a software significantly affect the discovery process and later trigger a patch deployment to suppress the possible likelihood of a breach. The integrative approach underlines the association of vulnerability patch modeling with the vulnerability discovery phenomenon. To exemplify the proposed systematic structure, a statistical analysis has been conducted using real life vulnerability and patch datasets.
APA, Harvard, Vancouver, ISO, and other styles
26

Forman, Harriet, and Frank S. Merrick. "Vulnerability Audits." JONA: The Journal of Nursing Administration 32, no. 10 (October 2002): 495–97. http://dx.doi.org/10.1097/00005110-200210000-00002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Chirenda, Tatenda Grace, Roman Tandlich, Viwe Krele, Catherine Diane Luyt, Chandra Sunitha Srinivas, and Chidinma Uche Iheanetu. "Legislation, Vulnerability and Disaster Risk Management of Waterborne Diseases in Zimbabwe." Information & Security: An International Journal 40, no. 1 (2018): 61–91. http://dx.doi.org/10.11610/isij.4005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Eichner, Thomas. "Mean Variance Vulnerability." Management Science 54, no. 3 (March 2008): 586–93. http://dx.doi.org/10.1287/mnsc.1070.0772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Brombacher, Aarnout. "Vulnerability." Quality and Reliability Engineering International 27, no. 1 (January 27, 2011): 1. http://dx.doi.org/10.1002/qre.1186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Oktaviana, Milenia, Adityas Widjajarto, and Ahmad Almaarif. "Analisis Vulnerability Management Pada Container Docker Menggunakan Opensource Scanner Berdasarkan Standar Cyber Resilience Review (CRR)." Jurnal Sistem Komputer dan Informatika (JSON) 4, no. 1 (September 30, 2022): 77. http://dx.doi.org/10.30865/json.v4i1.4787.

Full text
Abstract:
One of the most widely used container technologies to provide IT services is Docker. The vulnerability in container technology, namely Docker, requires special management. Management of this vulnerability can be done technically with a software vulnerability scanner and standard Cyber Resilience Review (CRR) guidelines. Experiments were carried out with Aquasec and Anchore scanners that performed vulnerability scanning on two Docker Images systems. The two vulnerable systems have different versions, namely version – 1 and version – 2. The software elements in version – 2 have a higher versioning level than version – 1. Experimental data in the form of vulnerability reports are analyzed based on Cyber Resilience Review (CRR) which focuses on four stages namely Define a Strategy, Develop a Plan, Implement the Capability, Assess and Improve the Capability. So that the results of Category Vulnerability are obtained, namely 30 Closed Vulnerability, 10 Open Vulnerability, and 13 Newly Vulnerability. Continuation of this research can use aspects of Patch Management with more varied software tools.
APA, Harvard, Vancouver, ISO, and other styles
31

Alam, Shaz, and Mohd Muqeem. "Modular responsibility distribution for vulnerability management process." International Journal of Advanced Technology and Engineering Exploration 5, no. 48 (November 21, 2018): 469–72. http://dx.doi.org/10.19101/ijatee.2018.c02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kanakoudis, V. K. "Vulnerability based management of water resources systems." Journal of Hydroinformatics 6, no. 2 (March 1, 2004): 133–56. http://dx.doi.org/10.2166/hydro.2004.0012.

Full text
Abstract:
Must the water networks be fail-proof or must they remain safe during a failure? What must water system managers try to achieve? The present paper introduces a methodology for the hierarchical analysis (in time and space) of the preventive maintenance policy of water supply networks, using water supply system performance indices. This is being accomplished through a technical–economic analysis that takes into account all kinds of costs referring to the repair or replacement of trouble-causing parts of the water supply network. The optimal preventive maintenance schedule suggested by the methodology is compared with the empirically based maintenance policy applied to the Athens water supply system.
APA, Harvard, Vancouver, ISO, and other styles
33

Szewrański, Szymon, and Jan K. Kazak. "Socio-Environmental Vulnerability Assessment for Sustainable Management." Sustainability 12, no. 19 (September 24, 2020): 7906. http://dx.doi.org/10.3390/su12197906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Vesper, Dorothy J. "Water in Karst: Management, Vulnerability, and Restoration." Groundwater 51, no. 5 (August 2, 2013): 656. http://dx.doi.org/10.1111/gwat.12094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Agarwal, Jitendra. "Improving resilience through vulnerability assessment and management." Civil Engineering and Environmental Systems 32, no. 1-2 (April 3, 2015): 5–17. http://dx.doi.org/10.1080/10286608.2015.1025065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lim, Mieng. "Avoiding the most common vulnerability-management pitfalls." Network Security 2020, no. 7 (July 2020): 12–14. http://dx.doi.org/10.1016/s1353-4858(20)30080-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ermoliev, Y., T. Ermolieva, G. Fischer, M. Makowski, S. Nilsson, and M. Obersteiner. "Discounting, catastrophic risks management and vulnerability modeling." Mathematics and Computers in Simulation 79, no. 4 (December 2008): 917–24. http://dx.doi.org/10.1016/j.matcom.2008.02.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Gray, Andy. "An historical perspective of software vulnerability management." Information Security Technical Report 8, no. 4 (April 2003): 34–44. http://dx.doi.org/10.1016/s1363-4127(03)00005-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Forte, Dario. "Vulnerability Management: One Problem, Several Potential Approaches." Network Security 2002, no. 5 (May 2002): 11–13. http://dx.doi.org/10.1016/s1353-4858(02)05013-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Arce, Ivan. "Vulnerability management at the crossroads, part 2." Network Security 2008, no. 6 (June 2008): 9–12. http://dx.doi.org/10.1016/s1353-4858(08)70076-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Geng, Yangyang, Rongkuan Ma, Qiang Wei, and Wenhai Wang. "Programmable logic controller memory management vulnerability analysis." Journal of Physics: Conference Series 2414, no. 1 (December 1, 2022): 012015. http://dx.doi.org/10.1088/1742-6596/2414/1/012015.

Full text
Abstract:
Abstract Programmable logic controller (PLC) is omnipresent in industrial control system (ICS), which plays an imperative part in critical infrastructures. However, once a PLC is compromised by an attacker, it will create destructive effects on critical infrastructures. The memory systems in PLCs are considered significant targets for attackers to disrupt real-world physical processes. In this paper, we proposed five types of attacks on the PLC memory management mechanism. Furthermore, we evaluated the feasibility of our memory attack generation approach on six PLCs from three leading controller vendors. A total of 22 memory attack payloads are implemented with several vulnerabilities on the target PLCs.
APA, Harvard, Vancouver, ISO, and other styles
42

Ćosić, Đorđe, Srđan Popov, Dušan Sakulski, Ana Pavlović, and Dunja Palić. "Importance of Vulnerability in Disaster Risk Management." International Journal of Industrial Engineering and Management 2, no. 2 (June 30, 2011): 51–60. http://dx.doi.org/10.24867/ijiem-2011-2-108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Anidah, Risa Rosita, and Riana Hartati. "Environment Vulnerability Decision Technology (EVDT) Mangrove Management." BIODIVERS - BIOTROP Science Magazine 1, no. 1 (January 31, 2022): 23–26. http://dx.doi.org/10.56060/bdv.2022.1.1.1970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Nyanchama, Matunda. "Enterprise Vulnerability Management and Its Role in Information Security Management." Information Systems Security 14, no. 3 (July 2005): 29–56. http://dx.doi.org/10.1201/1086.1065898x/45390.14.3.20050701/89149.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Mugavero, Roberto, Stanislav Abaimov, Federico Benolli, and Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." International Journal of Information Systems for Crisis Response and Management 10, no. 2 (April 2018): 49–78. http://dx.doi.org/10.4018/ijiscram.2018040103.

Full text
Abstract:
As cyberattacks are becoming the prevalent types of attacks on critical infrastructures, due protection and effective response are crucial in CBRN facilities. This article explores comprehensive cyber security vulnerability management related to CBRN Control Systems and Industrial Control Systems (ICS) and provides recommendations that will increase CBRN operational cyber security and ensure further platform for the research in the field of operational vulnerability detection and remediation. The article reviews several key issues related to ICS vulnerability management cycle, vulnerability sharing with security developers, patch and network management, cyber offensive threats and threat actors and related cyber security challenges. It covers such specific issues as ICS connectivity to private/public networks, critical ICS accessibility via Web Access, Wi-Fi and/or unauthorised software inside corporate networks. The proposed solutions refer to some areas of vulnerability management for the awareness and development of countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
46

Yunita, Desi, Nunung Nurwati, Wahyu Gunawan, and Azlinda Azman. "The Vulnerability Model of Water Resources Management in Forest Edge Communities in Sumedang Regency." Journal of Law and Sustainable Development 12, no. 1 (January 29, 2024): e2879. http://dx.doi.org/10.55908/sdgs.v12i1.2879.

Full text
Abstract:
Purpose: This study aims to explain the vulnerability of institutional management practices of water resources, agent practices, and system reproduction that can potentially cause social vulnerability in society. Theoretical reference: Structuration theory was chosen because this theory can explain structural or institutional vulnerability seen from practices in water resources management. Method: A qualitative approach using the participatory rural appraisal (PRA) method was employed to map the social vulnerability of management structures. NVivo mind map analysis and geographic information system analysis were used to strengthen the relationship between social practices and vulnerability information through drought maps. Results and Conclusion: The results of the study show that resource management is vulnerable to maintaining old patterns or habits because agents are unable to break through institutional systems and structures do not have authority, and have no bargaining position. Reproduction of social systems takes place in accordance with ongoing social structures that traverse space and time. The forestry organization KPH Sumedang has the authority to manage water resources around the forestry area. Vulnerability becomes a phenomenon of water user communities on the forest's edge. Discursive and recursive practices of actors/agents perpetuate the social structure of water users, such as the potential vulnerability of the social structure of water user communities and practices that encourage social vulnerability. Implications of research: This study has shed light on the community vulnerability related to the management of water resources by the forest edge communities. In addition, this study has given insight into the vulnerability of the social structure that can be seen from the practices of water users in village communities on the edge of the forest. Originality/value: The originality lies in how this research scrutinizes the social vulnerability model in managing water resources in communities in villages on the edge of the forest. So far, vulnerability has been studied more often after a disaster occurs.
APA, Harvard, Vancouver, ISO, and other styles
47

Nugraha, Gumilar Utamas, Karit Lumban Gaol, Priyo Hartanto, and Hendra Bakti. "Aquifer Vulnerability: Its Protection and Management—A Case Study in Pangkalpinang City, Indonesia." International Journal of Geophysics 2020 (December 29, 2020): 1–23. http://dx.doi.org/10.1155/2020/8887914.

Full text
Abstract:
Increased anthropogenic activity in urban areas has exacerbated the vulnerability of groundwater resources. The AVI, GOD, SINTACS, and DRASTIC methods were used to analyze groundwater vulnerability in Pangkalpinang City. Schlumberger vertical electrical sounding was used to determine the lithology and aquifer configuration in the study area. There are three vulnerability index areas in the city of Pangkalpinang. Low levels of aquifer vulnerability were generally found in the southeastern and northwestern parts of the study area, whereas high levels of aquifer vulnerability were discovered in the northern and southern parts of the study area. Areas with low aquifer vulnerability levels generally have low hydraulic conductivity values on the protective layer. In these areas, groundwater extraction is possible with a reasonable extraction pattern. Industrial areas can also be built by considering environmental aspects. In an area with high-level aquifer vulnerability, groundwater pollution must be considerably managed. The areas should not be designated for industrial areas and excess groundwater extraction.
APA, Harvard, Vancouver, ISO, and other styles
48

Tatekoji, Akifumi, Ryota Nakamura, and Tomoya Shibayama. "INFLUENCE OF HISTORICAL BATHYMETRIC CHANGES DUE TO URBANIZATION ON THE VULNERABILITY OF STORM SURGE IN TOKYO BAY." Coastal Engineering Proceedings, no. 35 (June 23, 2017): 22. http://dx.doi.org/10.9753/icce.v35.management.22.

Full text
Abstract:
In this study, the influence of historical changes on bathymetry to the intensity and features of the storm surge in the Tokyo Bay is evaluated using the meteorology-ocean-tide models. In detail, storm surge of 1917 is reproduced using an historical Taisho Typhoon of 1917 in order to quantify the influence of bathymetric changes. This paper possesses two important findings. The first is that past storm surge occurred mainly because of shallow water area spanning over the inner bay which can be characteristics of past bathymetry. The second is that the high vulnerable area affected by storm surge has been shifted from mudflat shallow area in the inner bay to the below-sea-level inland area, due to landfill and urbanization which have continued approximately 100 years after the storm. As a conclusion, the bathymetry shifting due to human activity has a great influence to changing the effects of coastal disasters even in the same location.
APA, Harvard, Vancouver, ISO, and other styles
49

Gavidia, Jorge, and Annalisa Crivellari. "Legislation as Vulnerability Factor." Open House International 31, no. 1 (March 1, 2006): 84–89. http://dx.doi.org/10.1108/ohi-01-2006-b0010.

Full text
Abstract:
A study conducted in Central America in 2003 shows that in the aftermath of Hurricane Mitch noticeable progress was made in introducing new legislation for disaster management, understood as covering the whole cycle from prevention, preparedness and relief, to reconstruction. The new legislation includes civil defence or disaster management laws and regulations to improve their effectiveness in responding to the threat of natural disasters. A similar situation can be observed in other countries like Cuba and the Dominican Republic. The study looks into existing urban and municipal laws, regulations and planning guidelines to assess the extent to which they respond to vulnerability reduction criteria. This paper focuses on aspects of prevention and risk reduction. An attempt was made to look into the complementarities and gaps between the two sets of regulations for disaster management and for municipal/urban management. It is found that despite the many elements of good practice included in them, the links between these instruments are weak or absent on issues ranging from planning to the actual supervision of interventions on the built environment. Thus, the main elements of the edifice were there, but they did not constitute a solid, interconnected, structure, therefore, bound to fail under the loads imposed by rapid urbanisation, speculation, emergencies and weak governance structures. Institutions are often left to fend themselves in discharging their tasks. Without a coherent normative framework, and the capacity to apply it, their work is primarily driven by institutional initiative, leading to problems of underperformance, overlaps, gaps, and non-constructive competition. Thus, the institutional setup and normative framework become important factors in increasing vulnerability, as real as a building with the wrong foundations. The article reviews the mentioned aspects drawing from the experience in Central America, Cuba and Dominican Republic.
APA, Harvard, Vancouver, ISO, and other styles
50

Huang, Bo. "The Design of Information System Vulnerability Management Software Based on CVSS." Applied Mechanics and Materials 378 (August 2013): 499–503. http://dx.doi.org/10.4028/www.scientific.net/amm.378.499.

Full text
Abstract:
The purpose of information system vulnerability analysis is to find loophole and to prevent endangering the information system security. Based on principles of information security risk assessment and Common Vulnerability Scoring System (CVSS), this paper presents a system model for information system vulnerability management. The function models are analyzed respectively; the technology features are also summarized in this paper.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography