Federal Emergency Management Agency

FEMA 452, A How-To Guide to Mitigate Potential Terrorist Attacks Against Buildings (2005)

Main Content
Cover photo for the document: FEMA 452, A How-To Guide to Mitigate Potential Terrorist Attacks Against Buildings (2005)
This how-to guide* outlines methods for identifying the critical assets and functions within buildings, determining the threats to those assets, and assessing the vulnerabilities associated with those threats. The methods presented provide a means to assess risks and to make decisions about how to mitigate them. The scope of the methods includes reducing physical damage to structural and non-structural components of buildings and related infrastructure, and reducing resultant casualties during conventional bomb attacks, as well as attacks involving chemical, biological, and radiological (CBR) agents. NOTE: This publication is available free to Local and State government staff. All other interested parties can obtain this publication via online download only. The Risk Assessment Database can be downloaded from www.fema.gov/plan/prevent/rms/rmsp452.shtm. *The guide is currently being updated.
SizePublication Date
Icon for file of type application/pdfFEMA 452, A How-To Guide to Mitigate Potential Terrorist Attacks Against Buildings (Complete)
9.41MJanuary 1, 2005
Icon for file of type text/plainFEMA 452, A How-To Guide to Mitigate Potential Terrorist Attacks Against Buildings (Complete)
335.49KJanuary 1, 2005
Icon for file of type application/pdfFEMA 452, Cover and Table of Contents
2.29MJanuary 1, 2005
Icon for file of type text/plainFEMA 452, Cover and Table of Contents
14.97KJanuary 1, 2005
Icon for file of type application/pdfStep 1 - Threat Identification and Rating
1.83MJanuary 1, 2005
Icon for file of type text/plainStep 1 - Threat Identification and Rating
56.24KJanuary 1, 2005
Icon for file of type application/pdfStep 2 - Asset Value Assessment
3.39MJanuary 1, 2005
Icon for file of type text/plainStep 2 - Asset Value Assessment
34.30KJanuary 1, 2005
Icon for file of type application/pdfStep 3 - Vulnerability Assessment
1.53MJanuary 1, 2005
Icon for file of type text/plainStep 3 - Vulnerability Assessment
34.95KJanuary 1, 2005
Icon for file of type application/pdfStep 4 - Risk Assessment
1.70MJanuary 1, 2005
Icon for file of type text/plainStep 4 - Risk Assessment
22.24KJanuary 1, 2005
Icon for file of type application/pdfStep 5 - Consider Mitigation Options
1.55MJanuary 1, 2005
Icon for file of type text/plainStep 5 - Consider Mitigation Options
37.35KJanuary 1, 2005
Icon for file of type application/pdfAppendix A - Building Vulnerability Assessment Checklist
1.57MJanuary 1, 2005
Icon for file of type text/plainAppendix A - Building Vulnerability Assessment Checklist
113.80KJanuary 1, 2005
Icon for file of type application/pdfAppendix B - Risk Assessment Database (v5.0) User Guide
4.98MJanuary 1, 2005
Icon for file of type text/plainAppendix B - Risk Assessment Database (v5.0) User Guide
129.93KJanuary 1, 2005
Icon for file of type application/pdfAppendix C - Acronyms and Abbreviations
1.28MJanuary 1, 2005
Icon for file of type text/plainAppendix C - Acronyms and Abbreviations
2.17KJanuary 1, 2005
Back to Top