Professional Documents
Culture Documents
4.1
4.2
4.3
4.4
4.5
1.
Risk Assessment
2.
Threat Assessment
4.6
Risk
Lives
Estimated
likelihood
Estimated
impact
Property
Societal disruption
Image
Money
1.
Risk Assessment
2.
Threat Assessment
4.7
1.
Risk Assessment
2.
Threat Assessment
4.8
1.
Risk Assessment
2.
Threat Assessment
4.9
1.
Risk Assessment
2.
Threat Assessment
4.10
1.
Risk Assessment
2.
Threat Assessment
4.11
1.
Risk Assessment
2.
Threat Assessment
4.12
1.
Risk Assessment
2.
Threat Assessment
4.13
1.
Risk Assessment
2.
Threat Assessment
4.14
1.
Risk Assessment
2.
Threat Assessment
4.15
4.16
4.17
4.18
4.19
4.20
4.21
4.22
4.23
4.24
Preventive
Measures
Detective
Measures
Corrective
Measures
4.25
4.26
Overall
steps to
produce a
SSA
4.27
4.28
4.29
4.30
4.31
4.32
4.33
4.34
Potential
Threat
Scenarios
4.35
Step 1:
Scenario
Selection
4.36
4.37
4.38
Step 4:
Determine if
the scenario
requires a
mitigation
strategy
4.39
4.40
4.41
4.42
V. Security assessment
documentation
After completion of the SSA a report must
be prepared, consisting of a summary of
how the assessment was cinducted, a
description of each vernerability found
during the assessment, and a description
of counter measures thet could be used to
address each vulnerability.
This report must be protected from
unautherized access or disclosure.
HZS ISPS 2006-20
07
4.43