Quantcast Section D-2. Assets

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search

Introduction.  Material in this section is taken from
Army TM 5-583-1.  Analysts familiar with this document may prefer
to use it to develop security glazing design criteria.
The design criteria developed in this section relate
primarily to assets associated with facilities as opposed to
facilities themselves.  Protecting individual assets is generally
more cost effective than protecting an entire facility.
Buildings should only be considered assets if they are the likely
target of aggression as in vandalism.  Determining the assets to
be protected is the first step in establishing any protective
Asset Types.  Assets may be primary or secondary.
Primary assets have a direct value to their owner or user and are
likely to be the ultimate target of an aggressor.  To function
properly, a primary asset may depend on other facilities,
equipment, or personnel.  These other facilities, equipment, or
personnel may be considered secondary assets.  Damaging the
secondary asset may result in the compromise of the primary
asset.  An example of the relationship between a primary and a
secondary asset is a mainframe computer system and its power
source.  The computer system depends on uninterrupted electrical
power supply for its continued operation.  The computer system is
the primary asset and the power supply is the secondary asset
which supports it.
Asset Categories.  Assets are divided into 14 different
categories in this handbook.  These categories include the
military assets which are commonly targeted by aggressors and
which are most frequently of significant value to their users.
These categories also include assets which are required to be
protected by regulations.  The categories are presented in Table
Assets Procedure.  Figure D-3 presents the process
chart for the assets procedure.  It shows structures for
identifying assets and assessing primary and secondary asset
values.  Figure D-4 provides the description for the assets
procedure.  It explains each structure presented in Figure D-3.


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.