Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security risk information

Domain 1. Collecting Safety, Health, Environmental, and Security Risk Information... [Pg.69]

Example President Kennedy was well aware of the security risks that his trip to Dallas posed for both himself and his staff However, in a briefing to his cabinet on the day before he left he said, I thank you all for the detailed information you have provided for me, and I am grateful for the work that you have all undertaken in keeping me up to date about current security concerns. However, after evaluating all the facts at hand and openly acknowledging the risks involved in such a campaign trip at this moment, I have decided to go to Dallas. Ultimately, it is in the best interests of the American people if I go. ... [Pg.100]

Another annoying feature of most audit assessment tools is that they provide information about the vulnerabilities found, and not the ones that do not exist in the information system. It is therefore difficult to practice anticorrelation and degrade the severity of events that are not security risks for the information system. To obtain this effect, we currently manually maintain a set of simple rules indicating which vulnerability sets cannot be found in our corporate network. For example, we exclude all IIS vulnerabilities from events coming from hosting zones, as we do not offer this platform in our services. Note that we do not consider here the case where the vulnerability assessment tool fails to discover the vulnerability. Audit information is considered trusted. [Pg.363]

The first main need, in order to prioritize tasks related to handling spent nuclear fuel (SNF), remains information. If the information needed does not exist, there has to be funding to investigate and obtain that information. Then the information must be shared to be useful - not with the public, if that would create new security risks, but among all relevant parties doing work in this area. This is the only way to identify potential problems, whether they are bottlenecks, security concerns, potential political problems, or dangerous gaps. [Pg.240]

As discnssed in Chapter 3, the results of the initial company-level prioritization were based solely on the chemical hazards and identified facihties whose transportation operations would require a facihty/operational level review. The focus of this example is on the security of the hazardous materials in and out of a single XYZ Chemical facihty, and is the same Asian plant that was evaluated for safety issues in Chapters 4 and 5. In addition to the corporate directive to evaluate transportation safety risk at this facihty, the site security manager was informed of the need to complete a security risk analysis of the hazardous materials in transit. To inihate the security review, the security manager and health and safety manager met to review the findings of the safety analysis. In addition to focusing on chemicals and hazards from the initial safety prioritizahon, the security prioritization process also considers ... [Pg.132]

Robert Jarrow and Stuart Turnbull, Pricing Derivatives on Financial Securities Subject to Default Risk, Journal of Finance 50, no. 1 (1995), pp. 53-86. Kamakura Risk Information Services Credit Risk Overview Kamakura s Press Release, Kamakura Launches Basel II Default Probability Service and Announces First Client, October 31, 2002. [Pg.719]

Comprehensive risk assessments can reduce HSE and security risks and mitigate the consequences of incidents by providing essential information for decision-making. [Pg.677]

Traditionally risks are analyzed by risk types, i.e. separated into environmental risks, safety and security risks, financial risks, etc. Risk analyses based on risk types are suitable for SMEs if the problem area has already been identified. In Finland a risk management toolkit for SMEs has been developed containing checklists for different risk types (Mikkonen, Uusitalo 2005). This toolkit covers a wide range of risks and it offers tools and information about the different risk types. [Pg.405]

Andresen et al. (2006,10) stress that digital infrastructure should be characterized as critical infrastructure, in the sense that both break downs and infrastructure capacity reductions may have serious consequences for HSE, information security of information, and/or economy, lohnsen (2008) shows how ICT and Safety- and Automation systems (SAS) creates high complexity and tight coupling that creates an increased risk for major accidents for petroleum activities at the NCS. It is also emphasized that the coupling of ICT and SAS produces a new threat related to information security incidents (lohnsen, Ask and RoisU, 2007). [Pg.2062]

There has been considerable IS research interest in decision under uncertainty and the impacts of onUne security risks. However, there has not been a systematic model and approach available to address the impacts of variant uncertainties of knowledge of onUne information security risks on consumer decision making in the B2C e-commerce context. The theoretical basis for prior research on decision under risk and uncertainty primarily falls into three categories utility theoiy, attitudinal theories, and the psychometric paradigm. [Pg.208]

Figure 2. Model of supply chain information security risk... Figure 2. Model of supply chain information security risk...
Because the chief purpose of this survey was to validate the concept supply chain information security risk concept, survey respondents were... [Pg.156]

Baker, W.H., Rees, L.R (2006). Necessary measures Metric-driven information security risk assessment and decision-making. Communications of the ACM, (forthcoming). [Pg.159]


See other pages where Security risk information is mentioned: [Pg.271]    [Pg.43]    [Pg.242]    [Pg.408]    [Pg.29]    [Pg.631]    [Pg.224]    [Pg.1070]    [Pg.142]    [Pg.143]    [Pg.143]    [Pg.144]    [Pg.145]    [Pg.146]    [Pg.147]    [Pg.148]    [Pg.149]    [Pg.150]    [Pg.151]    [Pg.152]    [Pg.152]    [Pg.153]    [Pg.153]    [Pg.154]    [Pg.155]    [Pg.156]    [Pg.156]    [Pg.157]    [Pg.158]    [Pg.159]    [Pg.160]    [Pg.161]    [Pg.284]   


SEARCH



Information security

© 2024 chempedia.info