SLIDE 9 5 zyxwvutsrqponmlkjihgfedcbaZYXWVUTSRQPONMLKJIHGFEDCBA
Application One: Vulnerability/Lethality Information Requirements zyxwvutsrqponmlkjihgfedcbaZYXWVUTSRQPONMLKJIHGFEDCBA Nelson (1 998) identified three categories of data required for vulnerability assessment (p. 13). First, information is needed to identify the likely scenarios in which the weapon system is likely to be exercised. Second, data are needed about the expected damage that might occur as a result
- f threadtarget interaction. Third, the impact of damage on the platform’s capabilities must be
- known. This information is not only required, but must also be available and reliable. Data
voids exist where required information is unavailable or unreliable. The data voids define the information that must be gathered in the vulnerability assessment plan. zyxwvutsrqponmlkjihgfedcbaZYXWVUTSRQPONMLKJIHGFEDCBA
(p. 7)
vulnerability/lethality analyses: (1) likely combat scenarios, (2) scenario characteristics, (3) mission success criteria, (4) assessment of specific capabilities, (5) levels of specific capabilities, zyxwvutsrqponmlkjihgfedcbaZYXWVUTSRQPONMLKJIHGFEDCBA (6) subsystems to provide capabilities, (7) critical components, (8) likely damage to the system, and (9) expected vulnerability. using a three-phase approach. In Phase 1
,
the first seven information types were identified. This information described how the system would be used, the capabilities required, and the critical components that would provide those capabilities. In Phase 2, the likely sources of damage and the critical components that would be affected by that likely damage were determined (information types 8 and 7). During Phase 3, the critical components that were identified during Phase 1 were assessed according to their status as determined during Phase 2. The expected vulnerability (information type 9) was determined during Phase 3 from this assessment. Nelson (1998) identified nine types of required information for conducting She adapted the VulnerabilityAethality analysis methodology Application Two: Simulation Credibility Nelson’s (1998) application of the methodology suggested certain parallels that could be drawn between the assessment of weapon system vulnerability and the assessment of simulation
- credibility. Clearly, a simulation is not a weapon system, and this article does not suggest that
this is the case. However, the absence of credibility is a significant vulnerability for models and simulations, and indirect comparisons of these processes can be made. Comparison of Definitions As stated earlier in this paper, vulnerability is a loss or reduction of capability to perform a mission as a result of having been subjected to a hostile environment (Deitz, 1996, p. 8). A simulation under development can lose capability as a result of environmental influences that are hostile to its development. For example, poor simulation design may preclude mission
- accomplishment. Alternatively, inaccurate simulation of a warfighting capability could result in
program cancellation. Just as vulnerability assessments are used to determine potential risks in weapon system design, VV&A is used to reduce developmental risks associated with modeling and simulation. Applying the VulnerabilityLethality Axioms to Simulation Credibility Three axioms of the VulnerabilityAethality analysis methodology were described earlier. These postulates can be applied to simulation credibility in a similar fashion. The first axiom stated that mappings from one level to the next are noninvertible (Klopcic et al., 1992, p. 12). Nonintrovertibility refers to the inability to trace the exact origins of a particular
- utcome. For example, in VulnerabilityAethality terms, it is impossible to determine the exact set
- f damage vectors that caused a particular capability to survive. To apply this axiom to the
simulation credibility problem, a distinction must be made between deterministic and stochastic
- simulations. Klopcic et al. noted that deterministic models are insufficient to adequately portray
the multiple factors that determine combat damage. Instead, stochastic models are used to