Lesssons Learned from Experience Dealing with Risks of Extreme Events: Part II

by Joost Santos,

Document Type: Proceeding Paper

Part of: Risk-Based Decisionmaking in Water Resources X


For every known IS vulnerability, there is a matching countermeasure. However, we do not know all IS vulnerabilities. The following tasks are geared towards identifying IS vulnerabilities, which ultimately can aid in pinpointing the potential threats and challenges to IS: improving the response time (alert services and user awareness) possibly via increased use of SCADA and standardized platforms; updating the procedures and educating the workforce; and indentifying the uknowns via defense-in-depth strategies highlighting the importance of IS resources (people, processes/operations, technology).

Subject Headings: Disasters and hazards | Infrastructure vulnerability | Dynamic models | Information Technology (IT) | Employees | Risk management | Infrastructure

Services: Buy this book/Buy this article


Return to search