English1 Vulnerability evaluation is the approach used to define, quantify and prioritize device vulnerabilities (or ranking). Vulnerability assessment Networks performing risk evaluations include but are not limited to information technology, energy supply and water management networks, transport and communications systems. Comprehensive method of risk recognition, risk management and risk evaluation. A risk evaluation consists of a detailed review of the workplace for events, conditions and procedures that may be potentially harmful to people. When detected, you assess and determine the probability and the severity of the risk. You will then be able to determine which steps to effectively remove or monitor the harm are appropriate if you make this decision (Van Zyl, 2006). The NIPP offers a structured strategy to develop a priorities, objectives, and criteria for protecting domestic critical infrastructure and key resources (CIs / KR), in order to allow the most efficient use of federal resources to reduce risk, decrease risks, and mitigate attacks and other consequences. It identifies overarching concepts for all the CI / KR industries defined in HSPD 7, and it discusses the physical, cyber and human aspects needed for the successful implementation of comprehensive programmes.
English2 www.dhs.gov
English3 References Van Zyl, K. (2006). Reducing Disaster Risk through Vulnerability Assessment: An Agricultural Perspective.Jàmbá: Journal Of Disaster Risk Studies,1(1). Image References (2020). Retrieved 13 April 2020, fromhttps://www.dhs.gov/xlibrary/assets/NIPP_RiskMgmt.pdf