Vulnerability Assessment.. . . . .
Key Terms.. . . .
Step 1: Receive Mission; Understand Higher Headquarters
Guidance and Strategic Direction
Step 2: Understand the Operational Environment
Step 3: Frame and Define the Problem Identify the Problem or Problem Set, Then View It as an Adversary System
Step 3.b: Determine the Adversary COG
Step 3.c: Identify the Adversary COG’s Critical
Requirements, Then Critical Vulnerabilities
Step 4: Develop the Operational Approach
Step 4.a: Identify Own COG and Those of Other Key Stakeholders (Friends and Allies, Neutrals, Others),
Critical Requirements, and Critical Vulnerabilities
Step 4.b: Assess and Prioritize Vulnerabilities for Attack or Protection
Step 4.c: Determine Initial Decisive Points
Step 4.d: Determine Lines of Operation and Effort
Step 4.e: Decide on and Document the Operational ApproachStep 4.f: Issue Guidance and Direction
Step 5: Assess Performance and Effectiveness..