Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the complianz-gdpr domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php on line 6114 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6114) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1893 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6114) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1893 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6114) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1893 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6114) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1893 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6114) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1893 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6114) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1893 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6114) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1893 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6114) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1893 {"id":1444,"date":"2020-09-14T10:33:02","date_gmt":"2020-09-14T08:33:02","guid":{"rendered":"https:\/\/legind.com\/?page_id=1444"},"modified":"2020-10-30T01:54:49","modified_gmt":"2020-10-30T00:54:49","slug":"vulnerability-analyser","status":"publish","type":"page","link":"https:\/\/legind.com\/en\/vulnerability-analyser\/","title":{"rendered":"Vulnerability Analyser"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.6.1″ _module_preset=”default”][et_pb_row _builder_version=”4.6.1″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.6.1″ _module_preset=”default”][et_pb_text _builder_version=”4.6.3″ _module_preset=”default” text_font_size=”20px”]<\/p>\n

Products<\/a> > Legind VA <\/strong>(Vulnerability Analyser)<\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.6.1″ _module_preset=”default” header_font=”|600|||||||” header_font_size=”50px” header_2_font_size=”30px” header_font_size_tablet=”” header_font_size_phone=”37px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”22px” header_2_font_size_last_edited=”on|phone”]<\/p>\n

Analyse vulnerabilities in infrastructures<\/h1>\n

Identifying the most likely points of attack and the optimal prevention<\/h2>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_5,3_5,1_5″ _builder_version=”4.6.1″ _module_preset=”default”][et_pb_column type=”1_5″ _builder_version=”4.6.1″ _module_preset=”default”][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.6.1″ _module_preset=”default”][et_pb_image src=”https:\/\/legind.com\/wp-content\/uploads\/2020\/09\/Vulnerability-Analyzer-legind-technologies.jpg” title_text=”Vulnerability-Analyzer-legind-technologies” _builder_version=”4.6.1″ _module_preset=”default”][\/et_pb_image][et_pb_text _builder_version=”4.6.5″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″]<\/p>\n

A terrorist that will attack an infrastructure (e.g., an airport) is likely to consider\u2014besides the desired target and effect\u2014the risk and the costs. In analysing the vulnerabilities, we must further consider the current security measures, the sequence of steps needed for a successful attack, the possibly attitudes of the attacker (e.g., risk taking behaviour), as well as all the uncertainties involved. For preventing attacks, we must consider available options, their effect, and their cost.<\/p>\n

Legind VA (Vulnerability Analyser) is tool that allows the analyser to take all these issues into account and identify the most vulnerable points and the most cost-efficient countermeasures.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.6.1″ _module_preset=”default”][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Products > Legind VA (Vulnerability Analyser)Analyse vulnerabilities in infrastructures Identifying the most likely points of attack and the optimal preventionA terrorist that will attack an infrastructure (e.g., an airport) is likely to consider\u2014besides the desired target and effect\u2014the risk and the costs. In analysing the vulnerabilities, we must further consider the current security measures, the […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_oct_exclude_from_cache":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1444","page","type-page","status-publish","hentry"],"yoast_head":"\nVulnerability Analyser - Legind Technologies<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Analyser - Legind Technologies\" \/>\n<meta property=\"og:description\" content=\"Products > Legind VA (Vulnerability Analyser)Analyse vulnerabilities in infrastructures Identifying the most likely points of attack and the optimal preventionA terrorist that will attack an infrastructure (e.g., an airport) is likely to consider\u2014besides the desired target and effect\u2014the risk and the costs. In analysing the vulnerabilities, we must further consider the current security measures, the […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legind.com\/en\/vulnerability-analyser\/\" \/>\n<meta property=\"og:site_name\" content=\"Legind Technologies\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-30T00:54:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legind.com\/en\/vulnerability-analyser\/\",\"url\":\"https:\/\/legind.com\/en\/vulnerability-analyser\/\",\"name\":\"Vulnerability Analyser - Legind Technologies\",\"isPartOf\":{\"@id\":\"https:\/\/legind.com\/en\/#website\"},\"datePublished\":\"2020-09-14T08:33:02+00:00\",\"dateModified\":\"2020-10-30T00:54:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/legind.com\/en\/vulnerability-analyser\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legind.com\/en\/vulnerability-analyser\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legind.com\/en\/vulnerability-analyser\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legind.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Analyser\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legind.com\/en\/#website\",\"url\":\"https:\/\/legind.com\/en\/\",\"name\":\"Legind Technologies\",\"description\":\"Analytic tools for law enforcement\",\"publisher\":{\"@id\":\"https:\/\/legind.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legind.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legind.com\/en\/#organization\",\"name\":\"Legind Technologies A\/S\",\"url\":\"https:\/\/legind.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/legind.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legind.com\/wp-content\/uploads\/2018\/01\/cropped-LogoCircledotCOM.png\",\"contentUrl\":\"https:\/\/legind.com\/wp-content\/uploads\/2018\/01\/cropped-LogoCircledotCOM.png\",\"width\":200,\"height\":55,\"caption\":\"Legind Technologies A\/S\"},\"image\":{\"@id\":\"https:\/\/legind.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Analyser - Legind Technologies","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Vulnerability Analyser - Legind Technologies","og_description":"Products > Legind VA (Vulnerability Analyser)Analyse vulnerabilities in infrastructures Identifying the most likely points of attack and the optimal preventionA terrorist that will attack an infrastructure (e.g., an airport) is likely to consider\u2014besides the desired target and effect\u2014the risk and the costs. In analysing the vulnerabilities, we must further consider the current security measures, the […]","og_url":"https:\/\/legind.com\/en\/vulnerability-analyser\/","og_site_name":"Legind Technologies","article_modified_time":"2020-10-30T00:54:49+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/legind.com\/en\/vulnerability-analyser\/","url":"https:\/\/legind.com\/en\/vulnerability-analyser\/","name":"Vulnerability Analyser - Legind Technologies","isPartOf":{"@id":"https:\/\/legind.com\/en\/#website"},"datePublished":"2020-09-14T08:33:02+00:00","dateModified":"2020-10-30T00:54:49+00:00","breadcrumb":{"@id":"https:\/\/legind.com\/en\/vulnerability-analyser\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legind.com\/en\/vulnerability-analyser\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/legind.com\/en\/vulnerability-analyser\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legind.com\/en\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Analyser"}]},{"@type":"WebSite","@id":"https:\/\/legind.com\/en\/#website","url":"https:\/\/legind.com\/en\/","name":"Legind Technologies","description":"Analytic tools for law enforcement","publisher":{"@id":"https:\/\/legind.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legind.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/legind.com\/en\/#organization","name":"Legind Technologies A\/S","url":"https:\/\/legind.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/legind.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/legind.com\/wp-content\/uploads\/2018\/01\/cropped-LogoCircledotCOM.png","contentUrl":"https:\/\/legind.com\/wp-content\/uploads\/2018\/01\/cropped-LogoCircledotCOM.png","width":200,"height":55,"caption":"Legind Technologies A\/S"},"image":{"@id":"https:\/\/legind.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/pages\/1444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/comments?post=1444"}],"version-history":[{"count":5,"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/pages\/1444\/revisions"}],"predecessor-version":[{"id":3357,"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/pages\/1444\/revisions\/3357"}],"wp:attachment":[{"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/media?parent=1444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}