Model validation substantiates a computerized model such that the model provides satisfactory accuracy consistent with the intended application of the model.

Model verification ensures that a computerized model and its implemenation represent a mathematical model.

General "The vulnerability concept is used to characterize a system’s lack of robustness or resilience with respect to various threats, both within and outside the boundaries of the system. It describe[s] the properties of an industrial system that may weaken its ability to survive and perform its mission in the presence of threats. The properties of an industrial system; its premises, facilities, and production equipment, including its human resources, human organization and all its software, hardware, and net-ware, that may weaken or limit its ability to endure threats and survive accidental events that originate both within and outside the system boundaries." (Einarsson and Rausand 1998: 535-36) [Einarsson, S., & Rausand, M. (1998). An approach to vulnerability analysis of complex industrial systems. Risk analysis, 18(5), 535-546.]

Critical-Infrastructure "A modeling approach that specifies the three main aspects involved in effective physical protection of a system: (i) attacks; (ii) assets; and (iii) protection technologies and devices." (Marrone et al. 2013; 218) [Marrone, S., Nardone, R., Tedesco, A., D'Amore, P., Vittorini, V., Setola, R., & Mazzocca, N. (2013). Vulnerability modeling and analysis for critical infrastructure protection applications. International Journal of Critical Infrastructure Protection, 6(3-4), 217-227.]