Vulnerability Assessment.. . . . . 
Key Terms.. . . .

  1. Outline of the Five Steps to Applying the VAMPG
    Determine the Adversary Center of Gravity

  2. Identify the Adversary COG’s Critical Requirements,
    Then Its Critical Vulnerabilities

  3. Identify Own COG and Those of Other Key Stakeholders
    (Friends and Allies, Neutrals, Others), Critical
    Requirements, and Critical Vulnerabilities

  4. Assess and Prioritize Vulnerabilities for Attack or
    Protection 

  5. Mission, Symbolism, History, Accessibility,
    Criticality, Accessibility, Recuperability, Vulnerability,
    Effect, and Recognizability
    VAM in the Context of Military Planning

Step 1: Receive Mission; Understand Higher Headquarters
Guidance and Strategic Direction
Step 2: Understand the Operational Environment
Step 3: Frame and Define the Problem Identify the Problem or Problem Set, Then View It as an Adversary System
Step 3.b: Determine the Adversary COG
Step 3.c: Identify the Adversary COG’s Critical
Requirements, Then Critical Vulnerabilities
Step 4: Develop the Operational Approach
Step 4.a: Identify Own COG and Those of Other Key Stakeholders (Friends and Allies, Neutrals, Others),
              Critical Requirements, and Critical Vulnerabilities
Step 4.b: Assess and Prioritize Vulnerabilities for Attack or Protection
Step 4.c: Determine Initial Decisive Points

Step 4.d: Determine Lines of Operation and Effort
Step 4.e: Decide on and Document the Operational ApproachStep 4.f: Issue Guidance and Direction
Step 5: Assess Performance and Effectiveness..

20 Dec 2015