Lesssons Learned from Experience Dealing with Risks of Extreme Events: Part II
by Joost Santos,Document Type: Proceeding Paper
Part of: Risk-Based Decisionmaking in Water Resources X
Abstract:
For every known IS vulnerability, there is a matching countermeasure. However, we do not know all IS vulnerabilities. The following tasks are geared towards identifying IS vulnerabilities, which ultimately can aid in pinpointing the potential threats and challenges to IS: improving the response time (alert services and user awareness) possibly via increased use of SCADA and standardized platforms; updating the procedures and educating the workforce; and indentifying the uknowns via defense-in-depth strategies highlighting the importance of IS resources (people, processes/operations, technology).
Subject Headings: Infrastructure vulnerability | Information Technology (IT) | Dynamic models | Risk management | Infrastructure | Employees | Disasters and hazards
Services: Buy this book/Buy this article
Return to search