U.S. Department of Transportation - Federal Motor Carrier Safety Administration FMCSA Home | DOT Home | Feedback

Back to Section 6

Figure 6-1 Long Description

This figure presents a schematic describing the details of the security assessment process. It illustrates the processes and ultimately leads to the calculation of benefits as defined by "Net Consequences Avoided. "

The process begins with Box 1: containing "Deployment Team Initial Risk/Threat Assessment – Established Attack Profiles and Key Vulnerabilities. "

Box 1 flows to Box 2: "Design and Conduct of FOT ", containing:

Box 1 also flows to Box 3: "Delphi Panel "

Within Box 3 are 4 sub-boxes:

Within Box 3, Box 3B and Box 3D flow to Box 3A. Box 3A also flows to Box 3B demonstrating the iterative nature of the Delphi process.

Box 2 flows to Box 4: containing:

Evaluation of FOT

Box 4 flows to Box 3D.

Box 5 is: Deployment Team Consequence Assessment – Established Consequences by Load Type and Attack Profiles.

Box 5 along with Box 3C flow to Box 6: Establish "Before " Technology Consequence Potential.

Box 5 along with Box 3D flow to Box 7: Establish "After " Technology Consequence Potential.

Box 6 and Box 7 both flow to the final box, Box 8: Net Consequences Avoided = Benefits.


DOT

DOT Home | Federal Motor Carrier Safety Administration Home | Feedback
United States Department of Transportation - Federal Motor Carrier Safety Administration