Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-1013/12
<1> Create Tactic and Threat Severity Level Worksheet for Asset. se a separate TTSL
U
for each asset (see AppendixB for all worksheets).  Enter the information
necessary to identify the asset into the space labeled "asset" on the form.
Such information should include the name of the asset and the letter
corresponding to the applicable asset category for primary assets.  For
secondary assets, add an indication of their being secondary assets and add the
primary asset that they support.  Proceed to <2>.
<2> Transfer Aggressors to Worksheet. Transfer aggressors that apply to the asset
from the AVAL worksheet.  Enter an "X" in the box adjacent to each applicable
aggressor type on the TTSL worksheet.  Do not include aggressors whose
likelihood rating is very low.  Proceed to <3>.
<3> Indicate Applicable Tactics. Indicate which tactics apply to the asset as
determined using Figure D-16 by entering an "X" in the box adjacent to each
applicable tactic on the TTSL worksheet.  If, in the judgment of the analyst,
the tactic indicated inFigure D-16 does not apply for the particular asset
being analyzed, do not enter an "X" for that tactic.  Proceed to <4>.
<4> For Each Applicable Aggressor. For the asset under consideration, do <5> through
<8> for each aggressor identified on the TTSL worksheet.  When done, return to
Figure D-9
.
<5> For Each Applicable Tactic. For the applicable aggressor under consideration, do
<6> through <8> for each tactic identified on the TTSL worksheet.  When done,
return to <4> for the next applicable aggressor.
<6> Check for Severity Level Entry. Using Figure D-17
,  read across from the
applicable aggressors and down from the applicable tactics.  Under an applicable
tactic, read down from the applicable likelihood rating (low, medium, high or
very high).  At the intersection of each aggressor and tactic/likelihood pair,
there is either an entry of possible threat severity level or no entry at all.
Proceed to <7>.
<7> Is there a Severity Level Entry? If there is a threat severity level entry,
proceed to <8>.  Otherwise, return to <5> for the next applicable tactic.
<8> Determine Appropriate Threat Severity Level. ransfer the threat severity level
T
found on Figure D-17 to the TTSL worksheet.  Enter the threat severity level at
the at the intersection of the aggressor and tactic pair.  Return to gure D-9
Fi
.
Figure D-15
Description:
Applicable Tactics and Severity Levels Identification Procedure
211








Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business