Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Vulnerability Assessment

Decision Support Methods for Assessing Flood Risk and Vulnerability
Vulnerability assessment is a well-defined process which helps to ranking and classifying the problem or target. It provides the basic knowledge, background of risk, infrastructure information, awareness, environmental threats, and proper action.
Published in Chapter:
Flood Hazard Casting and Predictions of Climate Change Impressions
Vartika Singh (Amity University, India)
DOI: 10.4018/978-1-5225-9771-1.ch010
Abstract
Climate change is a word that we have heard hundreds of times, but what is it? Is it happening or is it something made by us? There are thousands of such questions, thoughts, doubt which come to our minds as soon as we hear the words “climate change.” Even though there are hundreds of research works and many more proofs stating that the climate change is happening, there is a side which has been generally overlooked, and that is what if the climate change that we look is just something made by us. Climate change refers to long-lasting changes in temperature, clouds, humidity, and rainfall around the world. Both local and global factors cause regional climate change. This difference is significant because if a regional climate change occurs on account of local factors, then these changes can be mitigated by local actions. This chapter explores flood hazard casting prediction of climate change impressions.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Evaluating Cyber Attacks in Rail Transit
A formal assessment of a system’s vulnerabilities and the development of corrective measures to prevent these occurrences.
Full Text Chapter Download: US $37.50 Add to Cart
Introduction to Computer Forensics in the Age of Information Warfare
The process of identifying technical vulnerabilities in computers and networks as well as weaknesses in policies and practices relating to the operation of these systems.
Full Text Chapter Download: US $37.50 Add to Cart
Seismic Vulnerability of Historic Centers: A Methodology to Study the Vulnerability Assessment of Masonry Building Typologies in Seismic Area
It is a process that defines, identifies, and classifies the security holes (vulnerabilities) in an existing building or in a group of buildings like historic centers. In addition, it can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. A key component of the vulnerability assessment is properly defining the ratings for impact of loss and vulnerability.
Full Text Chapter Download: US $37.50 Add to Cart
A Cybersecurity Skills Framework
The assessment of an IT system, infrastructure, or application to identify potential public domain vulnerabilities. Vulnerability assessment differs from penetration testing in that no attempt is made to exploit the identified vulnerabilities.
Full Text Chapter Download: US $37.50 Add to Cart
Security Framework for Supply-Chain Management
It is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR