skip navigation

Justinfo Subscribe to Stay Informed

Add your conference to our Justice Events calendar


NCJRS Abstract


Subscribe to Stay Informed
Want to be in the know? JUSTINFO is a biweekly e-newsletter containing information about new publications, events, training, funding opportunities, and Web-based resources available from the NCJRS Federal sponsors. Sign up to get JUSTINFO in your inbox.

The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
NCJ Number: NCJ 206046     Find in a Library
Title: Vulnerability Assessment Methodologies Report: Phase I, Final Report
  Document URL: PDF 
Corporate Author: US Dept of Homeland Security
United States of America
Date Published: 07/2003
Page Count: 58
  Annotation: Providing a comparative baseline, this Federal report provides an analysis of various commercial and government vulnerability assessment methodologies which can be used by State and local governments to assess the risk associated within their areas of responsibility.
Abstract: The U.S. Department of Homeland Security, Office of Domestic Preparedness identified the need to examine and classify various types of vulnerability assessment methodologies, software, and tools as they would pertain to different types of assets. This Phase I study focused on the methodologies used to determine vulnerabilities and risks, which in turn, identify countermeasures that could be effective at reducing the risk by reducing the vulnerability. In identifying physical asset vulnerability assessment providers using a proven methodology, this study’s goals were to develop criteria for analysis of various methodologies, clearly map capabilities and identify any capability overlaps, describe advantages and disadvantages of using particular methodologies, automated tools, software and emerging technologies to assess different types of assets, and to provide evidence that methodologies, automated tools, software and emerging technologies can perform as advertised. Forty-four private methodologies were considered in this study. Sufficient information was found to make some level of assessment for 24 public (Federal, State, and local government) methodologies. Study findings drawn from this analysis include: (1) the most robust methodologies do not solely focus on one sector of the economy; (2) the quality of the assessor in all cases is very important; (3) while all methodologies determined some measure of risk, few methodologies actually calculated a numerical value for that measure of risk; and (4) the training required to accurately use one of these methodologies varied greatly in time and cost. Additional phases of this project were recommended to better determine the effectiveness of the various methodologies. Appendices A-D
Main Term(s): Dangerousness
Index Term(s): Research methods ; Criminal methods ; National security ; Threat assessment ; Domestic terrorism
Sale Source: US Dept of Homeland Security
Washington, DC 20528
United States of America
Type: Report (Study/Research)
Country: United States of America
Language: English
Note: Downloaded on July 7, 2004.
  To cite this abstract, use the following link:

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.