Geoscience Reference
In-Depth Information
that represents the set of measures (e.g., “high” for economic loss, “medium” for
duration of loss, and “low” for number of customers impacted may be rated as
“medium” overall).
An even more thorough approach, advocated by some, is to carefully consider
the ranges that may be obtained for each of the measures and assign “weights,”
which are used to construct a function that yields an overall measure of the desir-
ability of each countermeasure (or portfolio of countermeasures). This function
is sometimes called a “utility function.” In this approach, the measure of risk is a
“utility value” and high values are preferred over low values. Therefore, the port-
folio of countermeasures that yields the largest expected utility is, by definition, the
most desirable (best).
Required Expertise
To carry out a vulnerability assessment, a team of experts typically needs to visit
the facility to ascertain the vulnerabilities of the critical assets and the antici-
pated results that would be caused by their physical destruction or impairment.
Depending on the objectives and scope of the assessment, VA teams may include
the following types of experts (these are representative of experts used by DHS dur-
ing site assistance visits to review and/or conduct vulnerability assessments):
Physical security experts who focus on the physical security of the facility,
including access controls, barriers, locks and keys, badges and passes, intru-
sion detection devices and associated alarm reporting and display, CCTV
assessment and surveillance, communications equipment, lighting, postings,
security systems wiring, and protective force personnel.
Explosive ordnance disposal (EOD) experts who examine and evaluate the
vulnerability of critical assets to attacks that involve explosive devices of all
kinds, including vulnerabilities to vehicle-delivered explosives and small
charges.
Special operations forces or assault planning experts who focus on terror-
ist strategies for the most likely method of attack, including physical secu-
rity vulnerabilities (e.g., fencing or CCTV gaps) and outside surveillance/
positioning vulnerabilities (e.g., areas of cover for clandestine operations and
positions for using long-range weapons).
Infrastructure systems experts who calculate the anticipated results of the loss
of the asset as it pertains to the facility and the loss of the facility as it pertains
to its specific infrastructure.
Interdependencies experts who evaluate the dependence of the facility on out-
side infrastructures, such as electric power, water (potable and processed) and
wastewater, natural gas, steam, petroleum products, telecommunications,
transportation (e.g., roads, railroads, and marine links), and banking and
finance.
Search WWH ::




Custom Search