Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Networkattacker

istheprocessofidentifying,quantifying,andprioritizing(orranking)thevulnerabilitiesinasystem.
Examplesofsystemsforwhichvulnerabilityassessmentsareperformedinclude,butarenotlimitedto,
informationtechnologysystems,energysupplysystems,watersupplysystems,transportationsystems,
andcommunicationsystems.Suchassessmentsmaybeconductedonbehalfofarangeofdifferent
organizations,fromsmallbusinessesuptolargeregionalinfrastructures.Vulnerabilityfromthe
perspectiveofdisastermanagementmeansassessingthethreatsfrompotentialhazardstothe
populationandtoinfrastructure.Itmaybeconductedinthepolitical,social,economicor
environmentalfields.
Vulnerabilityassessmenthasmanythingsincommonwithriskassessment.Assessmentsaretypically
performedaccordingtothefollowingsteps:
1.

Catalogingassetsandcapabilities(resources)inasystem.

2.

Assigningquantifiablevalue(oratleastrankorder)andimportancetothoseresources

3.

Identifyingthevulnerabilitiesorpotentialthreatstoeachresource

4.

Mitigatingoreliminatingthemostseriousvulnerabilitiesforthemostvaluableresources

"Classicalriskanalysisisprincipallyconcernedwithinvestigatingtheriskssurroundingaplant(or
someotherobject),itsdesignandoperations.Suchanalysistendtofocusoncausesandthedirect
consequencesforthestudiedobject.Vulnerabilityanalysis,ontheotherhand,focusbothon
consequencesfortheobjectitselfandonprimaryandsecondaryconsequencesforthesurrounding
environment.Italsoconcernsitselfwiththepossibilitiesofreducingsuchconsequencesandof
improvingthecapacitytomanagefutureincidents."(LvkvistAndersen,etal.,2004)Ingeneral,a
vulnerabilityanalysisservesto"categorizekeyassetsanddrivetheriskmanagementprocess."(United
StatesDepartmentofEnergy,2002)1
IntheUnitedStates,guidesprovidingvaluableconsiderationsandtemplatesforcompletinga
vulnerabilityassessmentareavailablefromnumerousagenciesincludingtheDepartmentofEnergy,
theEnvironmentalProtectionAgency,andtheUnitedStatesDepartmentofTransportation,justto
nameafew.
SeveralacademicresearchpapersincludingTurneretal.(2003),[1]FordandSmith(2004),[2]Adger
(2006),[3]Fraser(2007)[4]andPattetal.(2010)[5]amongstothers,haveprovidedadetailreviewofthe
diverseepistemologiesandmethodologiesinvulnerabilityresearch.Turneretal.(2003) [1]forexample
proposedaframeworkthatillustratesthecomplexityandinteractionsinvolvedinvulnerability
analysis,drawsattentiontothearrayoffactorsandlinkagesthatpotentiallyaffectsthevulnerabilityof
acoupleofhumanenvironmentsystems.Theframeworkmakesuseofnestedflowchartstoshowhow
socialandenvironmentalforcesinteracttocreatesituationsvulnerabletosuddenchanges.Fordand
Smith(2004),proposeananalyticalframework,basedonresearchwithCanadianarcticcommunities.
Theysuggestthat,thefirststageistoassesscurrentvulnerabilitybydocumentingexposuresand
currentadaptivestrategies.Thisshouldbefollowedbyasecondstagethatestimatesdirectional
changesinthosecurrentriskfactorsandcharacterizesthecommunitysfutureadaptivecapacity.Ford
andSmiths(2004)frameworkutilizeshistoricinformationincludinghowcommunitieshave
experiencedandaddressedclimatichazards,withinformationonwhatconditionsarelikelytochange,
andwhatconstraintsandopportunitiesthereareforfutureadaptation.

You might also like