Vulnerability assessment

Ze'ele Wikipiidiya

'A vulnerability assessment' de la sɛla ti dɔla bini baŋera, kaala, gee yɛlegera 'systems' sɛba n gã yɛɛ (vulnerable). 'Systems' la asi'a ti tu wan ta'am tum geele wa de la Lasebaarɛ yɛla (information technology systems), ko'om bu'a yɛla (water supply systems), sɔa zuo kinɛ yɛla (transportation systems) la sɔsega yɛla (communication systems). Tigera to'ore to'ore ta'am iŋɛ geelekuna wa mɛ zɛ'ɛta koosebibesi (small Business) ta paara koosekãra tigera (large Regional infrastructures). Dɛŋa gu'a tigere (disaster Management) duma yeti'Vulnerability' vuurɛ de la tu geele yelesi'a n wan daaŋɔ wa'am na bo nɛreba la deto. La ta'am doose la Gɔmena nalɛgerɛ, tu buuri yɛla 'economic' bii 'environmental fields'

Vulnerability geelego wa tari la yɛla zo'e zo'e n ŋwɔni taaba la dɛŋa geelego. Sosina wa puan ti geelego duma wa ta'am tum. 1. Digesɛ lɔgerɔ la si n wan ta'am tum paɛ zi'an beene tagelɛ taaba 'systems puan. 2. Dikera sɛla n de kãlɛ wan ta'am yelege (bii ba pu ba yɛsera sɛla n gani puan)la sɛla n de nimmu'urɛ bɔ'ɔra lɔgerɔ la. 3. Baŋera yelesi'a n de vulnerabilities la bii yelesi'a n de dɛŋa bɔ'ɔra lɔgerɔ la. 4. 'mitigating' bii yɛsera nimmu'urɛ yelesi'a n de 'vulnerabilities' bɔ'ɔra lɔgerɔ la. classical risk analysis' de la sɛla n eere baŋerɛ yɛsera dɛnsesi n ni kaɛ tia (bii lɔkɔ deeni) mum, ka n ani se'em la ka n tuni se'em. Sɔsekaŋa kɔ'ɔm bisera la sɛla n ta'aseri bala la, la ba'asegɔ puan ti la wan ana se'em bɔ'ɔra zugesɛka ti ba zamesera la. 'Vulnerability analysis' me de la sɛla n biseri la ba'asegɔ pɔan bɔ'ɔra zugɔ la la ka kinkɛleŋa za'a. Di me kelu5m bisera la sɛla ti basɛ ti daaŋɔ la kan zo'e gee bisera sɛla n wan ta suŋɛ beere yele.(Lovkvist-Andersen et alo., 2004)[1] Solemintinsɛka ti ba yi'ira ti United States la puan, tigera zo'e zo'e magesi wuu 'Department of energy, Environmental protection agency, United States Department of Transportation, la asi'a me tari gu'a mɛ la sɔsi'a ti ba dɔla geela tuunɛ wa. Gɔnɔ zo'e zo'e ta pa'asɛ la Tuner et al. (2003), Ford la Smith (2004),[2] Adger (2006),[3] Fraser (2007),[4] la Patt et alo.(2010) [5] ta pa'asɛ basɛba me garesɛ pa'alɛ yɛla zo'e zo'e n boi la 'epistemologies' la viisegɔ sɔa (Methodologies) bɔna 'vulnerability analysis' Magese wuu Tuner et al.(2003)[1] n yuun dikɛ 'Framework' la dikeri la 'nested flowcharts' pa'ala tu vom la bɔŋa zi'an 'forces interact ' naana yɛla n de vulnerable bɔ'ɔra teere n iti atɔtɔ. Ford la Smith (2004), yuun pa'alɛ la viisegɔ n de 'analytical framework, ti la dɔla la Canada duma arctic tisi la puan. Ba yuun bo ba puti'irɛ ti, sɛla n de yiadaana de la vulnerability geelego n wan basɛ ti la bɔna gɔŋɔ puan ti an yɛɛ yelasi'a n de sose'ere ti n wan dɔla. Sɛla me wan tagelɛ buyi de la sɛla n kaali teese'ere n boi yelesi'a n tuni nananewa dɛna dɛŋa yɛla bɔ'ɔra nɛreba la ba bɔŋa zi'an. Ford la Smith (2004) 'framework' iti la tuusum yɛla n de lasebaarɛ ta ta la tisi n tari baŋerɛ se'em gee tuna sɛla yɛsera Yileŋa sageŋɔ lɔgerɔ la lasebaarɛ yɛsera yelesi'a n wan basɛ ti teere la sɛla n de gu'a la yɔ'ɔ bɔ'ɔra beere yele Gɔmena 'vulnerability' geelego tuuma, GSA(Kelum dɛna 'General Service Administration) basɛ mɛ ti vulnerability geelego dɛŋa sirege tiŋa ("Risk and vulnerability Assessment) RVA" n de suŋerɛ ti ba yi'ira ti 'pre-vetted support service' la ti la iŋɛ geelego bisera 'thread' la 'vulnerabilities' baŋera gbelegere yɛsera sɛla n de ma'a bii wara si'a n boi kɔrenkɔrum, gɛɛla dɛŋa n zuni se'em gee pa'alɛ sɛla n de maalegɔ sore bɔna sɛla n de 'operational' la sɛla n dagi 'operational' Tuundina wa n tari sɛla yɛsera 'pre-vetted service' la asi'a n ŋwana

"Network mapping Vulnerability scanning Phishing Assessment Wireless Assessment Web Applicatio Assessment Operating System Security Assessment (OSSA) Database Assessment Penetration Testing Ba yi'iri tuunsina wa la 'Highly Adaptive Cyber security Services (HACS) gee ti ba Gulesɛ a biŋɛ la US GSA 'advantage website' la puan. Tuundina wa baŋe la yelezura n ti ba gelese baŋɛ ti di tuni tuundina wa. GSA tigere la yeti di basɛ mɛ ti tuundina wa tole nɛŋa gee basɛ ti US Gɔmena 'contract duplication' sige tiŋa, gu gee suŋɛ US deto suŋese'ere n wan yue gee ana suŋa.

132-45D dɛŋa la vulnerability geelego [7] baŋeri, kaala, gee yɛlesera dɛsi la la vulnerabilities sɛba n boi yele puan. Dɛŋa geelego n baŋeri yɛla la yɛla la n wan basɛ ti ba'asegɔ puan dɛŋa Lua.

Vulnerability to Climate Change[demese | demesego zia]

Vulnerability' geelego iti bɔ'ɔra la tisi ti ba baŋɛ zi'an la la wan iŋɛ se'em ti tisi bii lɔgerɔ wan dɛna 'vulnerable' bɔ'ɔra tinteere. Lasebasina wa boi la tɔka tɔka yɛsera si n zuni se'em --magesi wuu dunia wa za'a ligeri biŋere zi'an ti ba yi'ira ti World Bank la 'Ministry of Economy' bɔna 'Fiji Commissioned', lasebaarɛ bɔ'ɔra tiŋa la za'a 2017 yuunɛ la puan ta paɛ 2018[8] gee ti Rochester, n boi New York me yuun 'commission' Yileŋa (Climate) teere 'vulnerability' geelego bo zinnyɔgereba n boi United States.[10]

Fu ta'am le bisɛ[demese | demesego zia]

Vulnerability Vulnerability index Vulnerability scanner Vulnerability assessment (computing)


Viisegɔ Lɔgerɔ[demese | demesego zia]

  1. Lövkvist-Andersen, et al., 2004 https://www.researchgate.net/publication/242256695_Modelling_Society's_Capacity_to_Manage_Extraordinary_Events_Developing_a_Generic_Design_Basis_GDB_Model_for_Extraordinary_Societal_Events_using_Computer-Aided_Morphological_Analysis
  2. US Department of Energy. (2002). Vulnerability Assessment Methodology, Electric Power Infrastructure. [1]
  3. Turner, B. L. (5 June 2003). "Science and Technology for Sustainable Development Special Feature: A framework for vulnerability analysis in sustainability science". Proceedings of the National Academy of Sciences 100 (14): 8074–8079. DOI:10.1073/pnas.1231335100. PMID 12792023.