<1> For Each Asset. Loop through <2>,
<3>, and <4>, likelihood of aggression,
applicable tactics and severity levels,
and tactics consolidation procedures
for each asset. After all assets have
been processed, return to Figure 1.
<2> Identification of Likely Aggressors.
<1> For Each
Identify likely aggressors using
identification of likely aggressors
procedure presented in Figure D-10.
Proceed to <3>
<3> Likelihood of Aggression. Determine
likelihood of aggression against asset
using likelihood of aggression
procedure presented in Figure D-12.
Proceed to <4>.
<4> Applicable Tactics and Severity
Levels. Select tactics and severity
levels for asset using applicable tactics
and severity levels procedure
presented in Figure D-14. Proceed to
<5> Tactics Consolidation. Determine
worst severity level of each tactic using
tactics consolidation procedure
presented in Figure D-18.
Process Chart and Description: Design Basis Threat Procedure
Identification of Likely Aggressors Procedure. Figure
D-10 presents the process chart and procedure description for the
identification of likely aggressors procedure. It shows and
describes structures for identifying likely aggressors for
primary and secondary assets.
Required Information. The following information is
required for the identification of likely aggressors procedure:
a) Worksheets (see Appendix B):
1) Asset Value/Aggressor Likelihood (AVAL) for
both primary and secondary assets.