Set 2.8: Conducting Your Vulnerability Assessment

Understanding Vulnerability & Risk


Set 2.8

Conducting Your Vulnerability Assessment


In this set we explore “top-down” and “bottom-up” information generation, and describe how you can combine this type of information generation with the approaches used in the Series 2 activities to produce a vulnerability assessment. download

Objectives

  • Review what your vulnerability assessment should include.
  • Take away a sample vulnerability assessment outline.