ABSTRACT

This chapter describes the relevance of threat-to and threat-from analysis to effective risk management. The resultant threat-vector and dependency-flow theories will be illuminated with examples, and include a discussion on possible threat metrics associated with critical infrastructure (CI) interdependency. These examples are intended to illustrate how to apply the material from the earlier chapters into risk assessment activities around CI sectors.