Figure 3 - uploaded by David Jonathan Brooks
Content may be subject to copyright.
Security risk management cycle, with security decay (Adjusted from the Trusted Information Sharing Network, 2008, p. 4)

Security risk management cycle, with security decay (Adjusted from the Trusted Information Sharing Network, 2008, p. 4)

Contexts in source publication

Context 1
... number of discrete steps were taken within the evaluation methodology (Figure 3), comprising of evaluation mapping, commercial evaluation, performance testing, defeat testing and resulting final report. These steps commenced with documenting a defined approach to evaluation, ensuring priori testing criteria and that proceeding stages are mapped. ...
Context 2
... (2008, p. 1) supported this view, stating that it is the gradual erosion of seemingly minor security controls that eventually lead to major incidents. As such, the security risk management cycle has to, in some form, incorporate the decaying of risk reduction strategies (Figure 3). In essence, the security risk management cycle (Figure 3) may have the component of security decay in-built, through the Monitor and Review process; however, there are discrete benefits in understanding security decay as a discrete function. ...
Context 3
... such, the security risk management cycle has to, in some form, incorporate the decaying of risk reduction strategies (Figure 3). In essence, the security risk management cycle (Figure 3) may have the component of security decay in-built, through the Monitor and Review process; however, there are discrete benefits in understanding security decay as a discrete function. Whilst the concept of security decay has been considered by Underwood (1984) and McClure (1997), there is a dearth of knowledge relating to the gradual degradation of security controls. ...
Context 4
... the first part, the participants were asked to provide some demographic information, such as age, gender and occupation. In the second part, the nine risk perception characteristics (Table 1) were developed into questions and the participants asked to indicate their risk perceptions, based on the seven-point semantic differential scale (Figure 3). Five criminal activities, namely murder, kidnapping, armed robbery, rioting and burglary, together with terrorist attack against an educational institution were listed. ...
Context 5
... were asked to indicate their level of risk perception by marking the scale position. Figure 3 Survey questionnaire using the risk characteristics ...
Context 6
... 8 typical samples of cartridge Fig. 3 Values of c1, c2 and ...
Context 7
... we must select a background and ensure that its colour invariant values do not overlap the cartridge's values. Firstly, we have measured eight familiar types of cartridge. . In order to find the range of c 1 c 2 c 3 of cartridge, we select 8 typical images of cartridge [ Fig. 2] to compute their values of c 1 c 2 c 3 . The results show in Fig. 3, where, X-axis is the value of c 1 , c 2 or c 3 ×100, Y-axis is the number of pixels with the same invariant value, and the size of sample images is 300×300. The Fig. 3 shows the values of c 1 , c 2 or c 3 . The RGB values produced by the same object may change because of differences in input devices, illumination etc. Therefore, we ...
Context 8
... cartridge. . In order to find the range of c 1 c 2 c 3 of cartridge, we select 8 typical images of cartridge [ Fig. 2] to compute their values of c 1 c 2 c 3 . The results show in Fig. 3, where, X-axis is the value of c 1 , c 2 or c 3 ×100, Y-axis is the number of pixels with the same invariant value, and the size of sample images is 300×300. The Fig. 3 shows the values of c 1 , c 2 or c 3 . The RGB values produced by the same object may change because of differences in input devices, illumination etc. Therefore, we select the middle value of available RGB as the background, which is R=54, G=12, B=170, their corresponding values of colour invariant properties is c 1 = 0.31, c 2 =0.07, ...