Security and Risk Analysis
Key Facts
Abbreviation
SRA
Pronunciation
/sɪˈkjʊrəti ənd rɪsk æˈnælɪsɪs/
Category
Miscellaneous
Related Field
Unclassified
Examples in Context
- Trusting Modeling will help to describe network security demand and risk analysis, is useful to determine network security strategy. Trusting Modeling will be an important phase of Network Security Architecture Design.
- At the first half part, the article discussed the two main steps at the earlier preparatory stage, the demand of the security and the risk analysis.
- At present, Information security risk management theory is one of the hotspots researched by information security experts, and information security risk analysis method is one of the theory's chief content to research.
- Then Particular statement for design target, design principle and design basis to the system security design, and analysis the main threats and risks to the information system, give a risk analysis of security needs to them, which would set out the relevant security policy.
- Therefore, the scientific essence of ecological security requires using various measures to improve vulnerability continuously and reduce risk according to the tools of vulnerability analysis and risk assessment.
Other meanings of SRA
Saratoga Rowing Association
Community
Scanning Radar Altimeter
Academic
Short Range Aids
Gov
Search and Retrieval of Abnormals
Computing
Stylus Rake Angle
Computing