Abstract:Essential component of organizing stage of the counteraction for the en-croachment against the business organization is to identify vulnerabilities of the social organization. The purpose of this stage is to identify all existing and potential weaknesses and disadvantages of the security system of the organization, creating a circumstance for adversely effects on the sources of threat.
“…Climate and geography features define as potential threats the dangers of earthquakes, floods, landslides, forest fires, heavy snowfalls, blizzards, icings, extreme temperatures and drought, hail, strong winds and tornadoes [1,4,5].…”
Management of crises caused by natural disasters is one of the main functions of the state. The ability of our country to respond adequately to constantly accompanying natural disasters is one of the main approaches to ensure security. Essential for the management of natural disasters are properly identified and defined risk factors and threats. Increasing the different by their nature emergencies throughout the country puts more strongly the questions about the effectiveness of forecasting and planning at national, institutional, regional and object level.
“…Climate and geography features define as potential threats the dangers of earthquakes, floods, landslides, forest fires, heavy snowfalls, blizzards, icings, extreme temperatures and drought, hail, strong winds and tornadoes [1,4,5].…”
Management of crises caused by natural disasters is one of the main functions of the state. The ability of our country to respond adequately to constantly accompanying natural disasters is one of the main approaches to ensure security. Essential for the management of natural disasters are properly identified and defined risk factors and threats. Increasing the different by their nature emergencies throughout the country puts more strongly the questions about the effectiveness of forecasting and planning at national, institutional, regional and object level.
“…Any secured military computer network that store and process secured information or provide access to secured services requires incensement of security measures. [5], [8], [14].…”
The purpose of the study is to describe and present the process of accessing information resources in a secure military computer network as generalized net model. A simulation of the model was carried out using specialized software for working with generalized nets - GN IDE, and the most important results are visualized in the report.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.