Quantcast Identification of Likely Aggressors Procedure

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search

<1> For Each Asset. Loop through <2>,
<3>, and <4>, likelihood of aggression,
applicable tactics and severity levels,
and tactics consolidation procedures
for each asset. After all assets have
been processed, return to Figure 1.
<2> Identification of Likely Aggressors.
<1> For Each
Identify likely aggressors using
identification of likely aggressors
procedure presented in Figure D-10.
Proceed to <3>
<3> Likelihood of Aggression. Determine
likelihood of aggression against asset
Identification of
using likelihood of aggression
procedure presented in Figure D-12.
Proceed to <4>.
<4> Applicable Tactics and Severity
Levels. Select tactics and severity
<3> Likelihood
levels for asset using applicable tactics
of Aggression
and severity levels procedure
presented in Figure D-14. Proceed to
<5> Tactics Consolidation. Determine
<4> Applicable
worst severity level of each tactic using
Tactics and
tactics consolidation procedure
Severity Levels
presented in Figure D-18.
<5> Tactics
Figure D-9
Process Chart and Description:  Design Basis Threat Procedure
Identification of Likely Aggressors Procedure.  Figure
D-10 presents the process chart and procedure description for the
identification of likely aggressors procedure.  It shows and
describes structures for identifying likely aggressors for
primary and secondary assets.
Required Information.  The following information is
required for the identification of likely aggressors procedure:
a) Worksheets (see Appendix B):
1)  Asset Value/Aggressor Likelihood (AVAL) for
both primary and secondary assets.


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.
6230 Stone Rd, Unit Q Port Richey, FL 34668

Phone For Parts Inquiries: (727) 493-0744
Google +