Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
0Activity

Table Of Contents

1 INTRODUCTION
2 VULNERABILITY ASSESSMENT PROCESS
3 PRE-ASSESSMENT
4 VULNERABILITY ASSESSMENT METHODOLOGY
5 POST-ASSESSMENT
APPENDIX A: CRITICAL ASSETS METHODOLOGY
Table A.1 Criticality/Consequence Dimensions and Attributes
Table A.2 Critical Asset Listing
APPENDIX B: REQUEST FOR INFORMATION
APPENDIX C: VULNERABILITY SURVEY METHODOLOGY
Table C.4.3 Physical Security Access Control/Badges
Table C.4.4 Physical Security Locks/Keys
Table C.4.6 Physical Security Communications Equipment
Table C.4.7 Protective Force/Local Law Enforcement Agency
Table C.7.1 List of Interview Candidates for Policies and Procedures Element
Table C.8.2 Estimated Value of a Utility Energy 24-ohur Outage
0 of .
Results for:
No results containing your search query
P. 1
DoE VAM[1]

DoE VAM[1]

Ratings: (0)|Views: 4|Likes:
Published by Steve Swift

More info:

Published by: Steve Swift on May 30, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/28/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 55 are not shown in this preview.
You're Reading a Free Preview
Pages 59 to 72 are not shown in this preview.
You're Reading a Free Preview
Pages 76 to 99 are not shown in this preview.
You're Reading a Free Preview
Pages 103 to 124 are not shown in this preview.
You're Reading a Free Preview
Pages 128 to 155 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->