Geoscience Reference
In-Depth Information
activity is differentiated from general cargo operations by its focus on small- and
medium-size packages and by service from millions of senders to nearly 150 million
destinations. The sector is highly concentrated, with a handful of providers holding
roughly 94% of the market share.
Transportation Systems
The nation's transportation system quickly, safely, and securely moves people and
goods through the country and overseas. The Transportation Systems Sector con-
sists of six key subsectors, or modes: Aviation, Highway, Maritime Transportation,
Mass Transit, Pipeline Systems, and Rail.
Water
HSPD-7 designates the Environmental Protection Agency (EPA) as the federal lead
for the Water Sector's critical infrastructure protection activities. All activities are
carried out in consultation with the DHS and the EPA's Water Sector partners.
Methodological Approaches to
Vulnerability Assessment
There are different threat approaches as part of vulnerability assessment method-
ologies. These threat approaches can be summarized by two main approaches: asset
based and scenario based. Asset based examines the impact on individual assets
(e.g., loading dock, main lobby) if attacked, whereas the scenario-based approach
considers multiple potential specific sequences of events (e.g., damage or destroy
building).
Vulnerability assessment methodologies are categorized as using one (or more)
of the following approaches: checklist, simple rating, risk matrix, or risk equation.
In some cases, a methodology may be a hybrid that incorporates elements of mul-
tiple approaches, or a range of approach options may be available to the assessor. A
description of each approach category is provided next.
Checklist
Checklist-based vulnerability assessments are the simplest methodological
approach. They consist of a list of questions or criteria against which the assessor
compares the characteristics of the facility or asset being evaluated. The checklists
may be grouped according to the various assessment elements (e.g., physical, cyber,
OPSEC, and interdependencies). The questions may be answered yes or no or may
require a qualitative response. Generally, if the answer to a question is no or if
the criterion is not met, a recommended action will be requested or required. An
Search WWH ::




Custom Search