In: Computer Science
Discussion about strategies to identify critical satiations in informatics systems
Technological security system are components of modern informatic systems. The homeland security at of 2002 and other administration documents have assigned the department of homeland security specific duties associated with coordintaing the nation's effforts to protecct its critical infrastructure, including using a risk management approach to set priorities . Many of these duties have been deligated to what is now called the NATIONAL PROTECTION AND PROGRAMS DIRECTORATE.
Risk assessment involves the integration of threat, vulnerability and cinsequence information. Many models have been developed by which threats, vulnerabilty and cosequences are integrated to determine risks and then used to inform the allocation of resources to reduce those risks. For the most part, these methodologies consist of the following elements performed, more or less, in following: