2014
DOI: 10.46687/jsar.v5i1.115
|View full text |Cite
|
Sign up to set email alerts
|

Approaches to Identify Vulnerabilities in the Security System of the Social Organization and Computer Resources

Abstract: Essential component of organizing stage of the counteraction for the en-croachment against the business organization is to identify vulnerabilities of the social organization. The purpose of this stage is to identify all existing and potential weaknesses and disadvantages of the security system of the organization, creating a circumstance for adversely effects on the sources of threat.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…Climate and geography features define as potential threats the dangers of earthquakes, floods, landslides, forest fires, heavy snowfalls, blizzards, icings, extreme temperatures and drought, hail, strong winds and tornadoes [1,4,5].…”
Section: Potential Threats To Bulgariamentioning
confidence: 99%
“…Climate and geography features define as potential threats the dangers of earthquakes, floods, landslides, forest fires, heavy snowfalls, blizzards, icings, extreme temperatures and drought, hail, strong winds and tornadoes [1,4,5].…”
Section: Potential Threats To Bulgariamentioning
confidence: 99%
“…Any secured military computer network that store and process secured information or provide access to secured services requires incensement of security measures. [5], [8], [14].…”
Section: Iintroductionmentioning
confidence: 99%