Vulnerability analysis

From Methods
Jump to navigation Jump to search


Activities

  • Activity 1: Clarifying and itemising the problem or Task
  • Activity 4: Assessing and selecting the solution concept

Necessary tools

Possible for support are:

Description

With the help of a vulnerability analysis, vulnerabilities are identified. It can be used as part of optimizing a product or when comparing products or processes.

Procedure

  1. Define the problem area of ÔÇïÔÇïthe vulnerability analysis
  2. Assemble a team of experts to solve the problem
  3. Determine and weight the requirements for the scope to be examined
  4. Determine the extent to which requirements are met and identify weak points
  5. Derive recommendations for actions

Sources

  • Kumke 2018
  • Lindemann 2009, p. 305
  • VDI 2221 (1993)