Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-1013/12
<1> For Each Asset. Do <2> through <6> for each asset identified on the DCS
worksheet.  When done, return to igure D-2
F
.
<2> For Each Tactic. Do <3> through <6> for each applicable tactic with a design
basis threat entry on the DCS worksheet (see AppendiB for all worksheets).
x
When done, proceed to <7>.
<3> Select Level of Protection. Use Table D-31 and the asset's value rating listed
on the DCS worksheet to select an appropriate level of protection.  Proceed to
<4>.
<4> Enter Level of Protection on Worksheet. Enter the level of protection for the
applicable tactic on the DCS worksheet in the column labeled "LOP" associated
with the applicable tactic.  Proceed to <5>.
<5> Is Level of Protection Too High or Too Low?If the user determines that the
level of protection selected for a tactic is too high or too low, proceed to
<6>.  If the user accepts the level of protection selected, proceed to <2> for
the next tactic.
<6> Modify Level of Protection. Modify the level of protection for the applicable
tactic on the DCS worksheet.  Lowering the level of protection may result in
the asset being protected less than its value warrants with a higher risk of
asset compromise.  Conversely, raising the level of protection may result in
greater protection than the asset value warrants.  Proceed to <2> for the next
tactic.
<7> Collateral Damage Assessment. Estimate the potential for damage to the asset as
a result of a bomb attack against a neighboring asset.  Assess collateral
damage using Figure D-21
.  Proceed to <1> for the next asset.
Figure D-20
Description:
Level of Protection Procedure
Table D-31
Levels of Protection Selection
Tactic
Asset Value
L
M
H
VH
Moving Vehicle Bomb
L
H
H
H
Stationary Vehicle Bomb
L
H
H
H
Exterior
L
H
H
H
Ballistics
H
H
H
H
Forced Entry
L
M
H
VH
D-4.3
Collateral Damage Assessment Procedure.  Typically,
facilities are not located in isolation, but clustered together,
to facilitate efficient operations.  If an asset of interest is
in a facility that is clustered with one or more other buildings,
then a collateral damage assessment is required.  A collateral
damage assessment uses the design basis threat for neighboring
assets (assets that are housed within 1,500 feet (450 m) of the
asset of interest) to determine a threat severity level for
collateral damage.
Figure D-21 presents a process chart and
Figure D-22 provides a description for the collateral damage
assessment procedure.
218








Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business