The five steps of the vulnerability approach





Our vulnerability assessment approach is composed of 5 steps. Steps 1 to 3 enable us to calculate the threat likelihood. Steps 4 to 5 are dedicated to the severity of the hazard.