154,779 Hits in 5.6 sec

Development of Risk Assessment Specifications for Analysing Terrorist Attacks Vulnerability on Metro and Light Rail Systems

Emmanuel Matsika, Conor O'Neill, Umberto Battista, Mony Khosravi, Antonio de Santiago Laporte, Eduardo Munoz
2016 Transportation Research Procedia  
This information fed into development of a risk assessment methodology (RAMPART Methodology) specifically addressing metro and light rail systems (mass transit).  ...  With terrorist security of critical assets becoming a vital aspect of railway systems, this paper reviews the existing international policy frameworks and also risk assessment methodologies.  ...  Acknowledgements The authors would like to thank their respective institutions for the support rendered.  ... 
doi:10.1016/j.trpro.2016.05.207 fatcat:35b3j4eyezfdnjpcnte5ikavlq

Design and Implementation of Risk Analysis system for ISP Network

Ho-Kun Moon, Jin Gi Choe, Dae-Hyun Ryu
2004 Pacific Asia Conference on Information Systems  
However, most existing risk analysis tools provide only methodological analysis procedures, and cannot reflect continually changing vulnerability and threat information concerning individual network systems  ...  The need for more effective ways to analyze network risks in real time has been recognized by security planners.  ...  At this stage, risk analysis methodology [1] [2] [3] [4] [5] [6] [7] [8] , which utilizes information about elements of vulnerability and threats to the network assets, is applied as a means to determine  ... 
dblp:conf/pacis/MoonCR04 fatcat:ep46sl5i6vbwjcraawjp7jcap4

Fuzzy-Based Methodology for Integrated Infrastructure Asset Management

Mohamed Marzouk, Ahmed Osama
2017 International Journal of Computational Intelligence Systems  
Another risk model is developed for assets' failure in order to evaluate the risk associated with each segment in the network for the three infrastructure types.  ...  Also, it is capable to assess the risk and perform the life cycle cost analysis for the integrated infrastructure assets.  ...  After the segments' analysis for the city networks based on the LOS it is found that most assets within the city were in good to very good level. Fig. 5.  ... 
doi:10.2991/ijcis.2017.10.1.50 fatcat:dpdd7fwdyrbz3kc3d77ukvbwgi

D2.4 Cascading risks in the multimodal transportation platforms [article]

Kostas Maliatsos, Christos Lyvas, Costas Labrinoudakis, Andreas Menegatos, Christos Kalloniatis, Thrasyvoulos Giannakopoulos
2022 Zenodo  
In order to carry out the development of the new methodology, during this task: • the assets for the CPaaS system architectures were identified based on the use case definition from Task 2.1 of the CitySCAPE  ...  However, during the first stages of the analysis it was concluded that the methodology for analysis and modelling of cascading threats should be included in the final version of the risk analysis.  ...  methodology for cascading threat analysis, The results of D2.4 will be integrated into the complete risk and threat analysis methodology that is currently developed in Task 2.2 "Cross-domain threat analysis  ... 
doi:10.5281/zenodo.6866048 fatcat:pc33riwzmbhy7k4uzdrho6v674

Security Risk Assessment for Internet Of Things based Forest Fires Detection System

2020 International Journal of Advanced Trends in Computer Science and Engineering  
Hence, we can use the research result for developing the security policy and the security requirements of Fires Detection System.  ...  In this context, this article applies the (OCTAVE) Operationally Critical Threat, Asset, and Vulnerability Evaluation methodology, to specify the security risks, to highlight the various security vulnerabilities  ...  The authors would like to thank the president of Mohamed First University for financially supporting this work, as part of the PARA project.  ... 
doi:10.30534/ijatcse/2020/315952020 fatcat:33jkpmj3gbafllqy446thiybie

Methodologies and applications for critical infrastructure protection: State-of-the-art

Jose M. Yusta, Gabriel J. Correa, Roberto Lacal-Arántegui
2011 Energy Policy  
Network Security Risk Assessment modelling (NSRAM) The NSRAM methodology has been developed by the Institute for Infrastructure and Information Assurance at James Madison University.  ...  The risk analysis focuses on the probability of an event and the impact it may have, while the vulnerability assessment evaluates the safeguards in place for the corresponding risks for the various assets  ...  Methodology The mission of the JRC is to provide customer-driven scientific and technical support for the conception, development, implementation and monitoring of EU policies.  ... 
doi:10.1016/j.enpol.2011.07.010 fatcat:svrcwcimpfhgdo734fpntmsqrq


Sevilay Beken, Mete Eminağaoğlu
2019 Ege Stratejik Araştırmalar Dergisi  
The proposed model is developed to analyse test processes for a software services company in order to evaluate the information security risks.  ...  The assets are the main objects for organizations that need to be protected based on information security policies (Dhillon, 2007) .  ...  On the other hand, "risk analysis methods based on qualitative measures, are more suitable for today's complex risk environment of information systems" (Karabacak and Soğukpınar, 2005) .  ... 
doi:10.18354/esam.507794 fatcat:vpmurfj35bbw7brzvsdvjyvbpq

EU-CIRCLE methodological approach for assessing the resilience of the interconnected critical infrastructures of the virtual city scenario to climate change

Theodoros Katopodis, Athanasios Sfetsos, Vasiliki Varela, Stelios Karozis, Georgios Karavokyros, Georgios Eftychidis, Ilias Gkotsis, Georgios Leventakis, Ralf Hedel, Ifigenia Koutiva, Christos Makropoulos
2018 Energetika  
This paper introduces a methodological approach for identifying the resilience of interconnected EU critical infrastructures to climate change.  ...  The proposed study provides a description of the virtual city's forest fire and smoke reference scenario with their optional damages to the electricity transmission and distribution network.  ...  DEVELOPMENT OF THE METHODOLOGICAL FRAMEWORK The main idea of the proposed approach is that any asset within a CI can cause several implications to the interdependent assets or networks.  ... 
doi:10.6001/energetika.v64i1.3725 fatcat:wfc376j22jextkrskzfx2toccm

Critical Infrastructure Asset Identification: Policy, Methodology and Gap Analysis [chapter]

Christine Izuakor, Richard White
2016 IFIP Advances in Information and Communication Technology  
Nominated assets are validated by mission owners and are then submitted to the joint staff for additional analysis and development of the initial task critical asset (TCA) list.  ...  Methodology Element Description Asset Identification Means for identifying and representing assets for the purpose of criticality analysis Criteria List of factors against which asset criticality is  ... 
doi:10.1007/978-3-319-48737-3_2 fatcat:lhfexysll5a73crcfghefo6tna

Assessing information security risk in healthcare organizations of different scale

Johnathan Coleman
2004 Excerpta Medica: International Congress Series  
This observation supports the concept of a decentralized decision making approach to information security in the healthcare industry, allowing organizations to prioritize risks for mitigation according  ...  The evaluation of risks in terms of organizational impact was found to be critically important and was the most influential factor considered when prioritizing risks for mitigation.  ...  The OCTAVE Risk Assessment Methodology The Software Engineering Institute at Carnegie Mellon University developed OCTAVE sm , a risk assessment methodology, as part of the Defense Health Information Assurance  ... 
doi:10.1016/j.ics.2004.03.136 fatcat:hammx2nkyvcvde5mkjjcxxjsuq

OHL assessment and risk evaluation based on environmental and inspection data

Francisco Azevedo, João Gomes-Mota, Luís Campos-Pinto, Nélio Machado, Susana de Almeida de Graaff
2015 International Journal of Electrical Power & Energy Systems  
Risk indices provide an insight to operators of the network state and of the constraints that operators face. Different optimization tools are also being developed.  ...  A methodology to evaluate operational risk was developed, taking into account the probabilistic nature of contingencies and their severity under specific operating conditions.  ...  Risk Factors We are currently considering the following main risk factors for operation of OHLs:  Equipment: in fact, one of the risk factors for electrical power transmission using OHLs comes from assets  ... 
doi:10.1016/j.ijepes.2014.11.002 fatcat:cbq63skmszfvzowkjzy5iudc3y

A process-based dependency risk analysis methodology for critical infrastructures

Dimitris Gritzalis, George Stergiopoulos, Vasilis Kouktzoglou, Marianthi Theocharidou
2017 International Journal of Critical Infrastructures  
Reference to this paper should be made as follows: Stergiopoulos et al. (2017) 'A process-based dependency risk analysis methodology for Critical  ...  The proposed methodology dynamically assesses the evolution of cascading failures over time between assets involved in a business process of an infrastructure.  ...  The proposed methodology for process-based asset dependency analysis was implemented in Java and tested on the IT systems of a real-world Critical Infrastructure.  ... 
doi:10.1504/ijcis.2017.10009258 fatcat:njytwmu3ljglvozptrj6rye33a

Asset management for Virginia highways and roads

J.C. Beauvais, J.C. Lam, M.J. Lee, V.C. Reis, Y.Y. Haimes, J.H. Lambert
2003 IEEE Systems and Information Engineering Design Symposium, 2003  
, and incorporation of risk analysis in the decision making process.  ...  The Center for Risk Management of Engineering Systems and the project team have developed a risk assessment and management framework to address these problems.  ...  We would like to extend our thanks to Professor Lambert for his assistance on this project. We are grateful for the extensive involvement of Wayne Ferguson and Dan Roosevelt at VTRC.  ... 
doi:10.1109/sieds.2003.158034 fatcat:3qjur7c76bhwlnihhtld2wo5pu

Security requirements, risks and recommendations for small enterprise and home‐office environments

D. Spinellis, S. Kokolakis, S. Gritzalis
1999 Information Management & Computer Security  
In this paper we apply a risk analysis methodology to representative examples of the emerging ubiquitous networking environment, analyse the associated risks, and provide an overview of approaches for  ...  The adoption of a systematic approach and a standard methodology for the establishment of a baseline on security practices for the emerging ubiquitous networking environment allows the stakeholders of  ... 
doi:10.1108/09685229910371071 fatcat:x7l2rvuv6nggfpslr4eatsgbo4

MePRiSIA: Risk Prevention Methodology for Academic Information Systems

Isabel Cristina Verdugo-Torres, Universidad Antonio Nariño, Nancy María Acevedo-Quintana, Universidad de Pamplona
2018 Revista Facultad de Ingeniería  
This methodology has four steps to be considered in the process: setting the context, risk identification, risk analysis, and risk prevention.  ...  In conclusion, after applying MePRiSIA to ACADEMUSOFT, the human factor was part of its most important assets and involved in the very high-level risks identified.  ...  Lack of risk identification and risk assessment procedures • Develop procedures for risk identification, assessment and analysis.  ... 
doi:10.17533/udea.redin.n89a11 fatcat:xj4x2g6bgzh4rbhfmulki7jezm
« Previous Showing results 1 — 15 out of 154,779 results