Main Content
Disaster Planning and Vulnerability Assessment
The U.S. Department of Energy (2002) provided a standard three-step model for conducting vulnerability assessments. The model includes steps for pre-assessment, assessment, and post-assessment. (See Figure 2.) While the model was designed to support vulnerability assessments for electric power infrastructure, it is easily transferable to other infrastructure systems, including those that support health care delivery systems, and should serve as your point of reference throughout this course.
Pre-Assessment
"The pre-assessment phase involves defining the scope of the assessment, establishing appropriate information protection procedures, and identifying and ranking critical assets. Each of these activities is critical in ensuring the success of the assessment" (U.S. Department of Energy, 2002).
Assessment
The assessment methodology consists of ten sub-steps as detailed below:
- Network architecture
- Threat environment
- Penetration testing
- Physical security
- Physical asset analysis
- Operations security
- Policies and procedures
- Impact analysis
- Infrastructure interdependencies
- Risk characterization
Post-Assessment
"The post-assessment phase involves prioritizing assessment recommendations, developing an action plan, capturing lessons learned and best practices, and conducting training. The risk characterization element results provide the basis for the post-assessment by providing prioritized lists of recommendations that are ranked by key criteria" (U.S. Department of Energy, 2002).