scispace - formally typeset
Book ChapterDOI

Vulnerability Assessment Tools

Susan Snedakar
- pp 37-52
Reads0
Chats0
TLDR
This chapter explains and demonstrates the different tools available for performing vulnerability assessments, and provides examples from the most common industry-leading tools on the market today.
Abstract
This chapter explains and demonstrates the different tools available for performing vulnerability assessments. It provides examples from the most common industry-leading tools on the market today. Vulnerability is defined as a software or hardware bug or misconfiguration that a malicious individual can exploit, thereby impacting a system's confidentiality and integrity. It is the assessment tool's job to identify these bugs and misconfigurations. A vulnerability assessment tool probes a system for a specific condition that represents vulnerability. Some tools operate by using an agent , which is a piece of software that must run on every system to be scanned; other tools operate without the use of agents, and some use a combination of the two configurations. The architecture of the scanning engines, agents, and systems will vary from product to product, but it is this architecture that affects overall scanning performance.

read more

Citations
More filters
Journal ArticleDOI

Framing vulnerability, risk and societal responses: the MOVE framework

TL;DR: The framework presented enhances the discussion on how to frame and link vulnerability, disaster risk, risk management and adaptation concepts and shows key linkages between the different concepts used within the disaster risk management (DRM) and climate change adaptation research.
Book ChapterDOI

Determinants of risk: Exposure and vulnerability

TL;DR: This chapter aims to provide a rigorous understanding of the dimensions of exposure and vulnerability, as well as a proper assessment of changes in those dimensions, by further detailing the determinants of risk as presented in Chapter 1.
Journal ArticleDOI

Indicator-based assessment of climate-change impacts on coasts: A review of concepts, methodological approaches and vulnerability indices

TL;DR: The most widely adopted analytical approaches to vulnerability assessment are described, including spatial scales, the need for hybrid approaches comprising both biophysical and social dimensions of vulnerability, and the gradual incorporation of resilience aspects into such methodologies.
Journal ArticleDOI

Developing systems to control food adulteration

TL;DR: In this article, the authors explore the current strategies available to monitor and detect the economically and criminally motivated adulteration of food, identifying their strengths and weaknesses and recommend new approaches and policies to strengthen future capabilities to counter adulterations in a globalized food environment.
Journal ArticleDOI

Empirical approaches for assessing impacts of climate change on agriculture: The EcoCrop model and a case study with grain sorghum

TL;DR: In this article, the impact of the SRES-A1B 2030s climate on sorghum climatic suitability was analyzed and negative impacts were predicted by 2030s.
Related Papers (5)