Logo


1. Transportation Security
2. Bridge and Tunnel Assessments

3. Highway Assessments

Step 2 - Identify critical assets.

  • Characterize threat
  • Threat characterization for the purposes of vulnerability assessment is different from what might be used on a day-to-day basis as part of an operational security plan

    "Although threat information is deemed beneficial to the [assessment], it should not be given undue weight. There remains insufficient empirical data on domestic terrorist activity to suggest a pattern of particular targeting of a specific region or city. Henceforth, it must be recognized that the identification of a particular threat is not an absolute predictor that a terrorist incident will occur.”

    The Bush Administration established the “Homeland Security Advisory System” to improve coordination and communication among all levels of government and the American public in the fight against terrorism. This system provides a national framework for communicating the nature and degree of terrorist threats between government officials and the citizens they represent. At this time, the system uses a variety of factors to assess the threat, such as:

    • Is the threat credible?
    • Is the threat corroborated?
    • Is the threat specific and/or imminent?
    • How grave is the threat?

     

  • Identify exposure levels, by assigning vulnerability factors to the critical assets
    • Visibility and Attendance - Awareness of the existence of the asset and the number of people typically present
    • Access to the Asset - The availability of an asset to ingress and egress by a potential threat element
    • Site Specific Hazards - The presence of materials that have biological, nuclear, incendiary, chemical, or explosive properties in quantities that would expend initial response capabilities if compromised

  • Score asset vulnerability

The following formula is used to calculate the vulnerability factor (y) for each critical asset. In the formula, the sub-elements are multiplied by each other for visibility and attendance (A * B), for access to the asset (C * D), and for site specific hazards (E * F). The three resulting numbers are then added.

Vulnerability Factor (y) = ( A * B ) + ( C * D ) + ( E * F )

For any critical asset, the lowest attainable vulnerability factor score is 3 and the highest attainable score is 75.

The vulnerability factor (y) will be used to calculate the vulnerability coordinate (Y) in the next step, as follows:

Vulnerability Coordinate: (Y) = (y/75)* 100

To receive your Draft Vulnerability Assessment , please submit your payment of $99.00


Business Name:
Contact Information:
Email Address:
Location to be Assessed:
  

Other members of our business group:
Cloud-Security.us | US-scada.com

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED