• Home
  • Vulnerability Assessment
    • List of Articles Vulnerability Assessment

      • Open Access Article

        1 - Developing management strategies using a new method for vulnerability assessment of wetland ecosystems (Case study: Choghakhor wetland)
        fateme jahani shakib Bahram Malekmohamadi Elham Yusefi Mehdi Alipour
        Background and Objective: In order to understand the condition of ecosystems it is essential to asses the threats and disturbances affecting the ecosystems and to develope suitable strategies for environmental management, monitoring and assessment. Especially, sustainab More
        Background and Objective: In order to understand the condition of ecosystems it is essential to asses the threats and disturbances affecting the ecosystems and to develope suitable strategies for environmental management, monitoring and assessment. Especially, sustainable management of wetlands, in terms of their terrestrial and aquatic ecosystems composition and characteristics, requires scientific and multidisciplinary approaches. Due to the impacts of these threats, characteristics of ecosystems have become vulnerable. Method: This study has been done to provide a new method for vulnerability assessment of Choghakhorwetland at fine scale in order to develop management strategies. At first, by using the Driver, Pressure, State, Impact and response (DPSIR) model the threatening factors and values including ecological, hydrological, economic and social factors were investigated. Then the threats, values and links between threats and values were assessed. Vulnerability assessment is done through combination of their scores. Conclusion: Results of this research indicated that main threats impact on ecological values included loss of birds and wildlife habitat. Increase of the height of constructed dam and drought have undesirable and severe impact on water supply for Gandoman wetland located in downstream lands. Finally, the strategies were presented as response to each factor of the analytical DPSIR model. Manuscript profile
      • Open Access Article

        2 - Strategic, Tactical, Technical, and Operational Requirements of Executive Organizations for Developing Cyber Security Vulnerability Calculator
        Iman Rajabizadeh Nasser Modiri
        Introduction: Vulnerability analysis is of particular importance as a point of entry into the system and gaining unauthorized access by the attacker. As a result, one of the basic steps in creating the security of organizations is to be aware of the vulnerabilities in i More
        Introduction: Vulnerability analysis is of particular importance as a point of entry into the system and gaining unauthorized access by the attacker. As a result, one of the basic steps in creating the security of organizations is to be aware of the vulnerabilities in information technology systems and planning to fix these vulnerabilities. Also, one of the most important indicators of cyber security is the existence of an organizational gem (coordinated incident response groups) in the executive bodies of the country, which is responsible for preventing, dealing with, and dealing with all security incidents that occur in the space of information production and exchange. One of the requirements for creating an organizational gem in executive bodies is to have a vulnerability management unit and as a result, the existence of a deficiency calculator.Method: In this article, in order to adapt the CIS security controller, we cover this issue by applying two new variables in the basic and environmental criteria of CVSS. These criteria are as follows: the amount of time it takes to detect unauthorized access resulting from a vulnerability in the network and the amount of time it takes to block detected unauthorized access.Findings: In order to more accurately assess the severity of the vulnerabilities in the environment, the third version of the conventional vulnerability scoring system (CVSS) according to one of the critical components in cyber defense, i.e. the duration of vulnerability detection and cutting off the unauthorized access resulting from them was developed, and then the performance of the tool was evaluated by examining the vulnerability severity of CVE-2019-1690 and CVE-2019-1758 in order to evaluate the impact and performance of the first controller. The results show the proposed metrics lead to higher performance.Discussion: The developed CVSS tool is capable of more accurate evaluation of vulnerabilities and providing a suitable score according to the most important CIS control, i.e. creation and management of authorized and unauthorized equipment warehouse. Using the proposed tool Organizations can limit and effectively correct cyber threats more quickly. The proposed method is able to reduce the existing challenges in the field of cyber security of organizations. Manuscript profile
      • Open Access Article

        3 - Seismic Fragility Analysis of a RC Bridge with Uniform and Non-Uniform Random Scour Patterns
        Ali Raoof Mehrpour Hosseini Mehran Seyedrazzaghi Nasser Shamskia
        Previous natural disaster assessments had identified bridges as vulnerable structures against hydraulic hazards, particularly scouring. Additionally, in areas with high seismic activity, bridges are exposed to minor damage to complete collapse, in most cases requiring i More
        Previous natural disaster assessments had identified bridges as vulnerable structures against hydraulic hazards, particularly scouring. Additionally, in areas with high seismic activity, bridges are exposed to minor damage to complete collapse, in most cases requiring immediate occupancy structural performance levels in the event of an earthquake. Previous studies have focused on vulnerability assessments by considering the effects of simultaneous hazards. This study examines a simply supported RC bridge model with a discontinuous deck-girder superstructure installed on cap beams via elastomers. Seismic vulnerability assessments were conducted by developing fragility curves through nonlinear time history analyses on scoured models. One of the study's objectives is to consider the effects of non-uniform patterns in different foundations of the four-span model by generating random depth samples. The study also evaluated even depths as the uniform scenario for vulnerability assessment. The results indicate that, in all limit states considered in the study, the uniform has a higher probability of exceeding the limit states than the non-uniform scenario. However, in evaluating critical scoured models, the uniformly maximum credible scoured pattern did not necessarily have a higher probability of exceeding all limit states. In other words, the non-uniform scenario, which had pier(s) with the maximum credible scour depth, had a more critical vulnerability in some limit states. Manuscript profile
      • Open Access Article

        4 - Seismic Assessment And Strengthening Of An Existing Steel Bridge In Portugal
        Catarina Fernandes Humberto Varum