Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Description Note: There are 2 parts to this assignment. Part 1 You are encouraged to use the library as a resource for this assignment. This week, you will choose the critical infrastructure (CI)

Description

Note: There are 2 parts to this assignment.

Part 1

You are encouraged to use the library as a resource for this assignment.

This week, you will choose the critical infrastructure (CI) sector that you will focus on for the remainder of the term. Each sector can only be selected by 1 student unless student enrollment in this course is high, in which case, only 1 student may choose a subsector.

For example, you could select the transportation sector with subsectors of freight rail, roads, bridges, waterways, and so forth. The instructor will employ a first-come-first-served method of allocation.

When choosing your sector, keep in mind that later in the term, you will evaluate a network of assets (or nodes) within this realm, as well as conduct a risk assessment on at least 1 critical asset within that network.

You should choose a sector that is salient for you personally, and for which the network and asset you will examine are readily researchable or can be physically explored. The purpose of the vulnerability analysis and risk assessment you will undertake later in the course are to understand the principles of these functions, rather than master the processes of conducting these evaluations. Therefore, you should neither choose an obscure sector and assets to study, nor focus on over-exposed entities.

For this week’s assignment, assume the role of CI advisor to the senior leader or manager of a community, agency, or company of your choice. You have a vested interest in providing this leader with specific information about your sector, but you also seek to educate him or her on critical infrastructure protection.

Write a White Paper intended to both inform and influence decision makers in public and private entities on a given topic. Be sure to include the following:

  • Provide clear, strong, and concise arguments about why the community, agency, or company should focus their research time over the next few months upon the CI sector you selected.
  • Explain in your own words what CI sectors are, and why they are specially designated as such in the Department of Homeland Security (DHS).
  • Discuss briefly the other CI sectors that are interdependent with yours.
  • Consider and discuss 1 or 2 key potential networks and 1 or more critical assets within this sector to be explored later.

This White Paper should be no more than 3 pages long, 1.5 or double-spaced, 11- or 12-point font, well-organized, clearly delivered, mechanically sound, and comprehensive in content.

If you mention sources or deliver content that is in any way derived from material or ideas that are not original thought, include proper citations.

Cover information about your sector that will be the most important to this particular manager. Do not spend precious space on filler information such as the history of a sector, or overly broad views on international or national dependence upon the sector.

Keep the following in mind for when you will submit your Key Assignment:

If you feel that you need assistance with your writing skills, please contact your instructor early in the term, and you will be connected with appropriate sources for further assistance.

Part 2

Create a presentation depicting a network drawn from within your chosen sector that you will examine and analyze for vulnerabilities and risks over the coming weeks. Your network must include more than 2 nodes, and it may contain physical or virtual links.

  • Your network depiction does not need to be represented to scale, but it should reasonably illustrate the relationship between nodes and assets to each other, and it should give the viewer a sense of which nodes are critical.
  • You may use a properly referenced graphic that exists elsewhere, but you should manually identify and magnify the key aspects of its nodes, links, and other notable features, in an original depiction.
  • Be certain to also label your nodes, and describe each one in detail during the presentation.
  • Remember that this network is a microcosm of the sector you selected. Be certain to characterize how and why this network is critical and worth examining.
  • You may use any media or aids to deliver the graphic depiction of your network, such as PowerPoint, geographic maps, satellite imagery, photos, video, or any combination of such tools.
  • Your instructor may ask you to share your network graphic, discuss it with your peers, or formally present it to the instructor or class.
  • You must provide whatever narrative is necessary for your product to be stand-alone. For example, your PowerPoint may employ comments on the note pages.

Your presentation should be of sufficient length to cover both the breadth and important nuances of your selected network, and its included nodes or assets. In editing and packaging your work, however, you should remember that a manager or client’s time is usually constrained, so it is important to be concise and comprehensive if you seek to be effective.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Topic: The Reliability of Eyewitness Testimony The Term Paper Assignment will consist of at least 10 double-spaced pages (excluding title page, references, figures, illustrations, or other extraneou

Topic: The Reliability of Eyewitness Testimony The Term Paper Assignment will consist of at least 10 double-spaced pages (excluding title page, references, figures, illustrations, or other extraneous elements outside the main body of the paper). Students will format their paper using 12-point Times New Roman font and one-inch margins. Students

Discussion Post No chat gpt or Ai! Drawing upon Robert Merton’s theory of Social Structure and Anomie, devise a hypothetical scenario that illustrates the interplay between societal norms, cultural

Discussion Post No chat gpt or Ai! Drawing upon Robert Merton’s theory of Social Structure and Anomie, devise a hypothetical scenario that illustrates the interplay between societal norms, cultural goals, the strain experienced by individuals, and the various modes of adaptation (conformity, innovation, ritualism, retreatism, or rebellion) that individuals might

This assignment assesses the following Course Outcome: FS208-2: Distinguish the aspects of criminal and civil laws that emergency services agencies are likely to encounter. Criminal and Civil Law Emer

This assignment assesses the following Course Outcome: FS208-2: Distinguish the aspects of criminal and civil laws that emergency services agencies are likely to encounter. Criminal and Civil Law Emergency services personnel encounter violations of criminal and civil law on a daily basis. It is critical that responders be able to identify

John E. McGrath finds that “the notion of privacy is functionally quite weak as a counter to the growth of national surveillance,” because “seemingly legitimate ‘public’ uses of surveillance can justi

John E. McGrath finds that “the notion of privacy is functionally quite weak as a counter to the growth of national surveillance,” because “seemingly legitimate ‘public’ uses of surveillance can justify most of its intrusions.” The Wall Street Journal article reports on how the FBI searched American’s data in 2021.  Some groups

Global Trends in Illicit Wildlife Trade The primary purpose of the project is to thoroughly investigate and define the dynamics of the global ‘Illicit Wildlife Trade’ (IWT) to enhance theAustralian

Global Trends in Illicit Wildlife Trade The primary purpose of the project is to thoroughly investigate and define the dynamics of the global ‘Illicit Wildlife Trade’ (IWT) to enhance theAustralian Border Force’s (ABF) ability to effectively counteract these illegal operations. Introduction-300 words Any lessons learnt or recommendations arising from research

Concept mapping is brainstorming with a purpose. You start with an overarching concept that you break down into its smaller parts, using arrows and linking words to show how ideas are connected. In th

Concept mapping is brainstorming with a purpose. You start with an overarching concept that you break down into its smaller parts, using arrows and linking words to show how ideas are connected. In this assignment you will create a concept map around a state corrections policy of your choice.  Steps

In the previous assignment, you developed a position paper for the research topic that you have identified and explored. You have recommendations for change, revocation, modification, and addition to

In the previous assignment, you developed a position paper for the research topic that you have identified and explored. You have recommendations for change, revocation, modification, and addition to the research topic. Your research topic has come from an issue, problem, or policy of law enforcement, corrections, or the court

In the mini lecture, we discussed the policy implications of trait theories. Primarily, we looked at the implications for treatment, rehabilitation, and prevention. Let’s expand this discussion to the

In the mini lecture, we discussed the policy implications of trait theories. Primarily, we looked at the implications for treatment, rehabilitation, and prevention. Let’s expand this discussion to the criminal justice system. Specifically, the adjudication stage. Please address the following: Should individuals with Antisocial Personality Disorder be held responsible for

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in P

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in P

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in P Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in P

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete  Choose a topic(Topic Dealing with Police Subcultures) covered in this module you would like to know more about. Do a little research and find a reading, podcast, or video