z-logo
Premium
Beyond the Vulnerability Assessment
Author(s) -
Booth Ron,
Herbst Doug,
Ainslie Robert
Publication year - 2004
Publication title -
opflow
Language(s) - English
Resource type - Journals
eISSN - 1551-8701
pISSN - 0149-8029
DOI - 10.1002/j.1551-8701.2004.tb01756.x
Subject(s) - vulnerability (computing) , confidentiality , procurement , computer security , vulnerability assessment , risk analysis (engineering) , business , risk assessment , computer science , environmental planning , environmental science , marketing , psychology , psychological resilience , psychotherapist
This article addresses some of the issues and constraints that must be considered when upgrading a facility and its assets to reduce the risk of malevolent attacks. Topics covered include: a historical look at security; security solutions; risk reduction, mitigation, and costs; and, confidentiality and procurement considerations.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here