b. Value-for each threat, list whether it is critical, high, medium, or low. The threat rating is a subjective judgment based on existence, capability, history, intention, and targeting. Threat Value Critical-Known aggressors or hazards, highly capable of 10 causing loss or damage exist. One or more vulnerabilities are present. The threat source is known to having intent and means. High - Known aggressors or hazards, capable of causing loss or 7.9 damage to the school exist. One or more vulnerabilities are present and the aggressors are known or reasonably Suspected having intent and means. Medium - Known aggressors or hazards that may be capable of causing loss or damage exist. One or more vulnerabilities may be present; however, the aggressors are not believed to have intent. Low - Few or no aggressors or hazards exist. Their capability of 1-3 causing damage is doubtful. 5-6 c. Threat valuation - Determine the numeric value of identified assets - Ute personal judgment - Keep mission of the entity in mind 3. Vulnerabilities a. List and identify vulnerabilities, examples: Human . Operational - insufficient security procedures Informational vulnerabilities Facility - weak physical location and geographical Equipment VULNERABILITY Value - C.H.ML Numeric Value 1-10 b. Value-for each threat, list whether it is critical, high, medium, or low. The threat rating is a subjective judgment based on existence, capability, history, intention, and targeting. Threat Value Critical-Known aggressors or hazards, highly capable of 10 causing loss or damage exist. One or more vulnerabilities are present. The threat source is known to having intent and means. High - Known aggressors or hazards, capable of causing loss or 7.9 damage to the school exist. One or more vulnerabilities are present and the aggressors are known or reasonably Suspected having intent and means. Medium - Known aggressors or hazards that may be capable of causing loss or damage exist. One or more vulnerabilities may be present; however, the aggressors are not believed to have intent. Low - Few or no aggressors or hazards exist. Their capability of 1-3 causing damage is doubtful. 5-6 c. Threat valuation - Determine the numeric value of identified assets - Ute personal judgment - Keep mission of the entity in mind 3. Vulnerabilities a. List and identify vulnerabilities, examples: Human . Operational - insufficient security procedures Informational vulnerabilities Facility - weak physical location and geographical Equipment VULNERABILITY Value - C.H.ML Numeric Value 1-10