Book ChapterDOI
Vulnerability Assessment Tools
Susan Snedakar
- pp 37-52
Reads0
Chats0
TLDR
This chapter explains and demonstrates the different tools available for performing vulnerability assessments, and provides examples from the most common industry-leading tools on the market today.Abstract:
This chapter explains and demonstrates the different tools available for performing vulnerability assessments. It provides examples from the most common industry-leading tools on the market today. Vulnerability is defined as a software or hardware bug or misconfiguration that a malicious individual can exploit, thereby impacting a system's confidentiality and integrity. It is the assessment tool's job to identify these bugs and misconfigurations. A vulnerability assessment tool probes a system for a specific condition that represents vulnerability. Some tools operate by using an agent , which is a piece of software that must run on every system to be scanned; other tools operate without the use of agents, and some use a combination of the two configurations. The architecture of the scanning engines, agents, and systems will vary from product to product, but it is this architecture that affects overall scanning performance.read more
Citations
More filters
Journal ArticleDOI
Framing vulnerability, risk and societal responses: the MOVE framework
Joern Birkmann,Joern Birkmann,Omar D. Cardona,M. L. Carreño,Alex H. Barbat,Mark Pelling,Mark Pelling,Stefan Schneiderbauer,Stefan Kienberger,Margreth Keiler,David Alexander,Peter Zeil,Torsten Welle +12 more
TL;DR: The framework presented enhances the discussion on how to frame and link vulnerability, disaster risk, risk management and adaptation concepts and shows key linkages between the different concepts used within the disaster risk management (DRM) and climate change adaptation research.
Book ChapterDOI
Determinants of risk: Exposure and vulnerability
Omar D. Cardona,Maarten van Aalst,Jörn Birkmann,Maureen Fordham,Glenn R. McGregor,Rosa Perez,Roger S. Pulwarty,E. Lisa F. Schipper,Bach Tan Sinh,Henri Décamps,Mark Keim,Ian Davis,Kristie L. Ebi,Allan Lavell,Reinhard Mechler,Virginia Murray,Mark Pelling,Jürgen Pohl,Anthony-Oliver Smith,Frank Thomalla +19 more
TL;DR: This chapter aims to provide a rigorous understanding of the dimensions of exposure and vulnerability, as well as a proper assessment of changes in those dimensions, by further detailing the determinants of risk as presented in Chapter 1.
Journal ArticleDOI
Indicator-based assessment of climate-change impacts on coasts: A review of concepts, methodological approaches and vulnerability indices
TL;DR: The most widely adopted analytical approaches to vulnerability assessment are described, including spatial scales, the need for hybrid approaches comprising both biophysical and social dimensions of vulnerability, and the gradual incorporation of resilience aspects into such methodologies.
Journal ArticleDOI
Developing systems to control food adulteration
Louise Manning,Jan Mei Soon +1 more
TL;DR: In this article, the authors explore the current strategies available to monitor and detect the economically and criminally motivated adulteration of food, identifying their strengths and weaknesses and recommend new approaches and policies to strengthen future capabilities to counter adulterations in a globalized food environment.
Journal ArticleDOI
Empirical approaches for assessing impacts of climate change on agriculture: The EcoCrop model and a case study with grain sorghum
Julian Ramirez-Villegas,Julian Ramirez-Villegas,Julian Ramirez-Villegas,Andy Jarvis,Andy Jarvis,Peter Läderach +5 more
TL;DR: In this article, the impact of the SRES-A1B 2030s climate on sorghum climatic suitability was analyzed and negative impacts were predicted by 2030s.