لخّصلي

خدمة تلخيص النصوص العربية أونلاين،قم بتلخيص نصوصك بضغطة واحدة من خلال هذه الخدمة

نتيجة التلخيص (50%)

Figure 3-2: NIPP Risk Management Framework: Set Security Goals
?????From a sector perspective, security goals or their related sup
porting objectives:
o Define the protective (and, if appropriate, the response or
recovery) posture that security partners seek to attain;
o Express this posture in terms of objective metrics and
the time required to attain it through specific supporting
objectives;
o Consider distinct assets, systems, networks, operational
processes, business environments, and risk management
approaches; and
o Vary according to the specific business characteristics and
security landscape of the affected sector, jurisdiction, or
locality.It is developed by DHS in collaboration with other secu
rity partners, updated on an ongoing basis, and used to
support strategic decisionmaking, planning, and resource
allocation;
o Enabling DHS, SSAs, and other security partners to deter
mine the best courses of action to reduce potential conse
quences, threats, or vulnerabilities. Some available options
include encouraging voluntary implementation of focused
risk management strategies (e.g., through public-private
partnerships), pursuing economic incentive-related policies
and programs, and undertaking regulatory action if appro
priate; and
o Using prioritized information to identify, or create,
specific protective programs for CI/KR of the highest
criticality based on risk.The inventory includes basic information on the relation
ships, dependencies, and interdependencies between various
assets, systems, networks, and functions; on service provid
ers, such as schools and businesses, that may be of relevance??????????????????????????????????????????????????????????????????


النص الأصلي

Figure 3-2: NIPP Risk Management Framework: Set Security Goals
�����
�����
��������
�����������������������������������������������������
Feedback
loop
Set
Security
Goals
Prioritize
Implement
Protective
Programs
Measure
Effectiveness
Identify Assets,
Systems,
Networks, and
Functions
Assess
Risks
(Consequences,
Vulnerabilities,
and Threats)
• Supporting the development of the national risk profile
presented in the National CI/KR Protection Annual Report
described in chapter 7. This is a high-level summary of
the aggregate risk and the protective status of all sectors.
It is developed by DHS in collaboration with other secu
rity partners, updated on an ongoing basis, and used to
support strategic decisionmaking, planning, and resource
allocation;
• Enabling DHS, SSAs, and other security partners to deter
mine the best courses of action to reduce potential conse
quences, threats, or vulnerabilities. Some available options
include encouraging voluntary implementation of focused
risk management strategies (e.g., through public-private
partnerships), pursuing economic incentive-related policies
and programs, and undertaking regulatory action if appro
priate; and
• Using prioritized information to identify, or create,
specific protective programs for CI/KR of the highest
criticality based on risk. Depending on the protective
program, resource allocation may occur at the Federal,
State, Territorial, local, or tribal level, or may be solely the
responsibility of CI/KR owners and operators. International
outreach and collaboration also may be required in many
circumstances.
From a sector perspective, security goals or their related sup
porting objectives:
• Define the protective (and, if appropriate, the response or
recovery) posture that security partners seek to attain;
• Express this posture in terms of objective metrics and
the time required to attain it through specific supporting
objectives;
• Consider distinct assets, systems, networks, operational
processes, business environments, and risk management
approaches; and
• Vary according to the specific business characteristics and
security landscape of the affected sector, jurisdiction, or
locality.
Taken collectively, these goals guide all levels of government
and the private sector in tailoring protective programs and
activities to address CI/KR protection needs.
3.2 Identify Assets, Systems, Networks,

and Functions
To meet its responsibilities under the Homeland Security
Act and HSPD-7, DHS maintains a comprehensive national
inventory of the information needed to identify those assets,
systems, networks, and functions that make up the Nation’s
CI/KR. This information may be different for each sector
because it is collected on an asset, system, network, or func
tion basis, as determined by the fundamental characteristics
of each sector.
3.2.1 National Infrastructure Inventory
The inventory addresses the physical, cyber, and human
elements of each asset, system, network, or function under
consideration. The compilation process relies on the substan
tial body of previous assessments that have been completed
for natural disasters, industrial accidents, and other incidents.
The inventory includes basic information on the relation
ships, dependencies, and interdependencies between various
assets, systems, networks, and functions; on service provid
ers, such as schools and businesses, that may be of relevance


تلخيص النصوص العربية والإنجليزية أونلاين

تلخيص النصوص آلياً

تلخيص النصوص العربية والإنجليزية اليا باستخدام الخوارزميات الإحصائية وترتيب وأهمية الجمل في النص

تحميل التلخيص

يمكنك تحميل ناتج التلخيص بأكثر من صيغة متوفرة مثل PDF أو ملفات Word أو حتي نصوص عادية

رابط دائم

يمكنك مشاركة رابط التلخيص بسهولة حيث يحتفظ الموقع بالتلخيص لإمكانية الإطلاع عليه في أي وقت ومن أي جهاز ماعدا الملخصات الخاصة

مميزات أخري

نعمل علي العديد من الإضافات والمميزات لتسهيل عملية التلخيص وتحسينها


آخر التلخيصات

Showing kindnes...

Showing kindness is a crucial human trait. When someone is facing hardship or difficulty, extending ...

بيان المهمة " ت...

بيان المهمة " توفير تعليم وتدريب عالي الجودة يحركه السوق ودعم ريادة الأعمال والبحث التطبيقي التعاوني...

مفهوم القيم في ...

مفهوم القيم في الفلسفة: يوجد اختلاف في النظر إلى القيم حسب المذاهب الفلسفية، وباعتبار المواضيع التي ...

الفصل 5: فورت ك...

الفصل 5: فورت كارون في الصباح بعد لقاءنا بالملك، عدت إلى فندقنا لاصطحاب روكسي، بينما بقيت زانوبا في...

ثانياً الأندلس ...

ثانياً الأندلس : المراد بلفظ الأندلس اسبانيا الاسلامية بصفة عامة اطلق هذا اللفظ في بادىء الأمر على ش...

We then identif...

We then identify the enabling technologies for the introduced 6G services and outline a comprehensiv...

‏1. Exporting: ...

‏1. Exporting: - In this initial stage, the firm starts selling its products or services in foreign ...

إن الاعتدال وال...

إن الاعتدال والوسطية في المنهج الإسلامي من المسلمات المهمة للتعايش وبناء السلام، وعلى هذا المنوال نج...

وينبغـي أن يالح...

وينبغـي أن يالحـظ أن العبـرة فـي وصـف المـادة بأنهـا سـامة أم ال، ليسـت بطبيعـة هـذه المـادة فـي ذات...

* Links surroun...

* Links surrounding window themes and frames the doors. * The connections between walls and foundat...

يشير الكتاب الى...

يشير الكتاب الى مسار المرض باعتباره محددا اساسيا في رحلة العلاج للمرضى منطلقا من تعريف أنسيلم ستراوس...

Laser Doppler V...

Laser Doppler Velocimetry: Principle: This technique measures the velocity of blood flow in retinal...