31.07.2015 Views

Final Report - Vulnerability Committee

Final Report - Vulnerability Committee

Final Report - Vulnerability Committee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Summary of PIEVC ProtocolAt each step data sufficiency isassessedFeedback loops allow you torevisit earlier stepsThe amount of detail definedby the owner will affect thetechnical analysis and thestudy costSummary of PIEVC ProtocolStep 1: Project Definition– Describe the infrastructure– Define the boundaryconditions for thevulnerability assessmentStatus=Complete6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!