Quantcast Section D-3. Design Basis Threat

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-1013/12
SECTION D-3:
DESIGN BASIS THREAT
D-3.1
Introduction.  Material in this section is taken from
Army TM 5-583-1.  Analysts familiar with this document may prefer
to use it to develop security glazing design criteria.
The threat to an asset forms the basis for the design
of its protective system.  Threat must be defined in terms that
are meaningful to the designer, i.e., the design parameters of
the aggressor tactics and their associated tools, weapons, and
explosives.  To define the threat, the analyst determines the
aggressors likely to threaten the asset and the likelihood that
they will attempt to compromise it.  From this information, the
analyst can determine which tactics the aggressors will likely
employ and the threat severity levels associated with those
tactics.  The threat severity levels describe the specific tools,
weapons, and explosives associated with each tactic.
D-3.2
Design Basis Threat Procedure.  Figure D-9 presents the
procedures required to complete the design basis threat.  The
procedures shown and described in Figure D-9 cover identifying
likely aggressors, assessing likelihood of aggression,
identifying applicable tactics and severity levels, and
consolidating tactics into design basis threat.
D-3.2.1
Required Information.  The following information is
required for the design basis threat procedure:
a) List of assets.  This information is available from
Figure D-5 and recorded on the Glazing System Design
Criteria Summary worksheet.
b) Worksheets (see Appendix B):
1)  None
189





 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.
6230 Stone Rd, Unit Q Port Richey, FL 34668

Phone For Parts Inquiries: (727) 493-0744
Google +