Figure 6-1 Long Description
This figure presents a schematic describing the details of the security assessment process. It illustrates the processes and ultimately leads to the calculation of benefits as defined by "Net Consequences Avoided. "
The process begins with Box 1: containing "Deployment Team Initial Risk/Threat Assessment – Established Attack Profiles and Key Vulnerabilities. "
Box 1 flows to Box 2: "Design and Conduct of FOT ", containing:
- Technologies
- Operational Scenarios
- Technology Exercises
- Security Staged Events
Box 1 also flows to Box 3: "Delphi Panel "
Within Box 3 are 4 sub-boxes:
- Box 3A: Establishing Vulnerability Scores: Weighting and Ranking Vulnerabilities by: Load Types: Bulk Fuel; LTL-High Hazard; Bulk Chemicals; and, Truckload Explosives. Attack Profiles: Theft; Diversion; and, Interception.
- Box 3B: Establish Vulnerability Factors: Weighting and Ranking Contributing Factors to Vulnerabilities: Chain of Custody; Access; and Response Time.
- Box 3C: Predictions of Future Attack Events by Load Type and Attack Profile.
- Box 3D: Establish Reductions in Vulnerability Factors through FOT Technologies.
Within Box 3, Box 3B and Box 3D flow to Box 3A. Box 3A also flows to Box 3B demonstrating the iterative nature of the Delphi process.
Box 2 flows to Box 4: containing:
Evaluation of FOT
- Technical Performance and Use
- User Acceptance
- Deployment Issues
Box 4 flows to Box 3D.
Box 5 is: Deployment Team Consequence Assessment – Established Consequences by Load Type and Attack Profiles.
Box 5 along with Box 3C flow to Box 6: Establish "Before " Technology Consequence Potential.
Box 5 along with Box 3D flow to Box 7: Establish "After " Technology Consequence Potential.
Box 6 and Box 7 both flow to the final box, Box 8: Net Consequences Avoided = Benefits.