Search results

Jump to navigation Jump to search
  • {{#ask: [[Category:Main]][[defined by::Tanzania]] | format=category | limit=1000 }}
    280 bytes (41 words) - 19:00, 3 March 2017
  • ...isions, derailments, level-crossing accidents, accidents to persons caused by rolling stock in motion, fires and other. <ref> Directive 2004/49/EC Railwa ...nuclear incidents and other environmental and industrial accidents, caused by human activity or acts. <ref>[http://www.ifrc.org/docs/idrl/867EN.pdf Disas
    10 KB (1,276 words) - 17:13, 19 December 2020
  • ...tructions stored therein. This includes all associated inputs and outputs, by means of wires or wirelessly, in a system or network. <ref>[https://cms.un ...switching, interchange, transmission, or reception of data or information by the executive agency. <ref>[http://www.dnd.gov.ph/miss/PDF/downloadables/C
    20 KB (2,704 words) - 01:29, 8 March 2023
  • ==== [[Tanzania]] ==== ...m_docman%26task%3Ddoc_download%26gid%3D62%26Itemid%3D91 United Republic of Tanzania National Operational Guidelines for Disaster Management 2003]</ref>}}<br/><
    22 KB (2,752 words) - 11:24, 1 April 2024
  • The EU EURAM project defined Risk mitigation as: {{definition|Action of reducing a risk by implementing security controls, taking assurance measures, avoiding the ris
    23 KB (3,049 words) - 13:48, 15 August 2022
  • {{definition|Emergency (''power grid'') means, as declared by the ISO, either: (i) any abnormal system condition which requires immediate ...altuuksien käyttö.<br/><br/>Emergency is a condition of the society, meant by the ''Preparedness Act'', which has so many or so serious incidents or [[th
    21 KB (3,053 words) - 11:22, 1 April 2024
  • ...users for approved purposes the confidentiality requirement is determined by reference to the likely consequences of unauthorised disclosure of official ...ntiality: The ability to protect sensitive information from being accessed by unauthorized people. <ref>[https://www.cyber.gc.ca/en/glossary Glossary - C
    26 KB (3,452 words) - 00:43, 15 November 2023
  • ...: the assurance that information has been created, amended or deleted only by the intended authorised means – integrity relates to information and comm {{definition|Integrity: Information systems and information can be changed by authorized persons or systems only. <ref>[http://nic.af/Content/files/Natio
    26 KB (3,514 words) - 22:56, 25 May 2023
  • ...on|Availability is the property of being accessible and usable upon demand by an authorized entity. <ref>[https://www-ns.iaea.org/downloads/security/nuc {{definition|The property of being accessible and useable upon demand by an authorized entity. <ref>ITU Security in Telecommunications and Informati
    26 KB (3,485 words) - 22:52, 25 May 2023
  • {{quote-ciprnet|Hazard is defined as the source of potential harm.}}<br/> ...n combination. In technical settings, hazards are described quantitatively by the likely frequency of occurrence of different intensities for different a
    28 KB (3,824 words) - 13:53, 15 August 2022
  • {{definition|The knowledge and [[Capacity|capacities]] developed by governments, professional [[response]] and [[Recovery|recovery]] organisati ...training and field [[[[exercise]]|[[exercise]]s]]. These must be supported by formal institutional, legal and budgetary capacities. The related term “r
    36 KB (4,683 words) - 00:42, 16 March 2023
  • ...the prevention of an [[accident]] or keeping the [[damage|damages]] caused by an accident as small as possible. -''unofficial translation''- <ref name=TS ...investing in preventive measures is justified in areas frequently affected by disasters. <ref>[http://www.nemo.gov.lc/DRRProfile.pdf Disaster Risk Reduc
    36 KB (4,907 words) - 00:43, 16 March 2023
  • {{definition|A plan prepared by an authority defining what kind of rescue unit is needed to stabilise an [[ {{definition|Response is defined as the actions taken immediately before, during and/or directly after an [[
    35 KB (4,753 words) - 11:25, 1 April 2024
  • ...ing in [[disruption]], [[damage]] and casualties, which cannot be relieved by the unaided capacity of locally, mobilised resources. <ref>[http://www.euro {{definition|A term describing an event that can be defined spatially and geographically, but that demands observation to produce evide
    58 KB (7,885 words) - 23:59, 15 March 2023
  • ...licious [[ICT]]-related incident caused by means of an attempt perpetrated by any threat actor to destroy, expose, alter, disable, steal or gain unauthor {{definition|Attacks against information systems carried out by using malicious software, including botnets. <ref>[https://ec.europa.eu/eus
    62 KB (7,731 words) - 11:20, 1 April 2024
  • ...iality of stored, transmitted or processed data or of the services offered by, or accessible via, network and information systems. <ref name=2555ojEN>ht ...f stored, transmitted or processed data or of the related services offered by, or accessible via, network and information systems. <ref name="NIS Directi
    71 KB (9,541 words) - 11:23, 1 April 2024
  • ...lity or flaw of an asset, system, process or control that can be exploited by a cyber threat. <ref name="NIS Directive2">[https://eur-lex.europa.eu/eli/d ...ion, or operation that renders it susceptible to disruption or destruction by a [[threat]] and includes [[dependency|dependencies]] on other types of [[i
    67 KB (9,377 words) - 23:17, 10 January 2023
  • ...]], and the likelihood that a specific [[vulnerability]] will be exploited by a particular [[threat]]. <ref>[http://eur-lex.europa.eu/LexUriServ/site/en/ {{definition|The probability of adverse effects caused by a hazardous phenomenon or substance in an organism, a population, or an eco
    70 KB (9,704 words) - 01:02, 15 November 2023