Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Description Note: There are 2 parts to this assignment. Part 1 Based on the article titled “The Vulnerability of Dams: A Rising Threat to Life & Property” by W. Sharkey Bowers and your independent

Description

Note: There are 2 parts to this assignment.

Part 1

Based on the article titled “The Vulnerability of Dams: A Rising Threat to Life & Property” by W. Sharkey Bowers and your independent research, choose at least 1 method of vulnerability analysis and conduct a risk assessment (RA) using a model of your choice or from the example provided in this Phase’s materials. There are many models to choose from, and sector-specific plans may assist you in locating 1 for your sector.

After selecting and properly referencing the source of your RA methodology, complete the following:

  • Describe how it works.
  • Complete the analysis of your asset.
  • Report the findings.
  • Be sure to identify, list, and describe threats, vulnerabilities, consequences, and risks.
  • After identifying the greatest risks, offer some realistic mitigation measures.
    • These should be well-researched and sophisticated, and costs associated with these should also be presented. For example, for deterring a terrorist attack on the Hoover Dam, stating “use a security guard” is not specific enough, is not necessarily a realistic and true deterrent, and includes no information about this as an expense.

Your report should be 3–5 pages, not including a title or reference page, may include tables, graphs, lists, or whatever format you believe clearly delivers the results of this RA.

Part 2

Not all critical infrastructures (CIs) can be equally protected. Limited resources in terms of dollars, manpower, time, political will, and so forth mean that assets are in competition for support. Economics and political agendas, plus cultural, psychological, legal, and other factors might also influence the allocation of scarce resources.

Add the choices to this environment of competing interests, and select an allocation model that you would recommend to the governmental or corporate leader who you would hypothetically advise regarding your asset or network. You may also assemble parts and pieces from different strategies depending on any variety of elements you must consider.

Example 1

There is a bridge in your network that you consider critical, but there are 2 alternate routes in your system by which travelers could bypass a problematic bridge. The original bridge may not be critical or may warrant a lower allocation of maintenance funds, because maintenance could be done more regularly and cheaply with traffic rerouted. In such a case, your allocation model might assign increasing dollars over 5 years to achieve a certain maintenance standard. Unless you are an engineer, you might not know this kind of detail or comprehend such schemes. For this reason and others, you should be researching mitigation measures and solutions from subject-matter sources.

Example 2

In the attacks of 9/11, Flight 77 crashed into the western face of the Pentagon, killing 184 people on the aircraft and in the building. Many more might have been casualties that day if protective window treatments made of Mylar materials had not been installed in the then-recent renovations of that western area. Broken, flying glass is a cause for many injuries and incapacitation in other explosions. In this case, a relatively simple and somewhat less expensive solution probably saved lives. If given limited funds to protect the Pentagon, one might choose to install only blast-resistant windows. For more on this, see the Pentagon’s Renovation Manager’s News Briefing from September 15, 2001.

The allocation model you choose and write about for this Week’s individual project may be 1 of the strategies Ted Lewis discusses, a combination of these models, or a strategy of your own design with or without elements from the other models. Be sure to include the following:

  • Be prepared to describe fully how your allocation model works.
  • Describe how it would apply for your assigned network or asset.
  • You must detail what it will mean in terms of concrete outcomes, or what resources will be applied to your asset or network.
  • Determine what impact it might have for other critical infrastructure priorities in your community or company.
  • Because you are an advisor to a leader, also discuss various ways the community or company might pay or offset these protection or resilience-enhancing measures.

You should be able to discuss and explain the rationale for any budget or resource allowances you use. This will require additional, comprehensive research. For example, if you discuss increased training for special responders, find out from your real-world community members or company what such training costs. Remember to think comprehensively, using the 360-degree view. If you are training 1 person for a week, what travel costs must be included? Is another person working the trainee’s shifts, and if so, are these hours overtime? What does that cost? How does the agency plan for training costs?

Even hypothetical scenarios should have real-world facts and figures to draw upon. Provide and properly cite sources for budgets, measures, ideas, recommendations, and so forth that are drawn from external sources. Your report should be 2–3 pages, not including a title or reference page, and may include tables, graphs, lists, or whatever format you believe clearly delivers the basis for your allocation strategy.

For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.

References

Evey, L. (2001, September 15). September 11, 2011: Attack on America – DoD News Briefing on Pentagon Renovation 11:00 a.m. EDT; September 15, 2001 [Interview transcript]. Yale Law School, The Avalon Project. https://avalon.law.yale.edu/sept11/dod_brief09.asp

Sharkey Bowers, W. (2021). The Vulnerability of Dams: A Rising Threat to Life & Property. . 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Research Question: What is the effectiveness of current airport personnel training for active shooter situations in enhancing readiness, and how can existing programs be improved? A formal creative

Research Question: What is the effectiveness of current airport personnel training for active shooter situations in enhancing readiness, and how can existing programs be improved? A formal creative project proposal is required and shall be prepared in accordance with the standards of the academic discipline. The formal proposal must provide

We have learned about organizational structures, management, and leadership. Write an essay in which you expand on the following topics: Begin with an introduction that describes management, organi

We have learned about organizational structures, management, and leadership. Write an essay in which you expand on the following topics: Begin with an introduction that describes management, organization, and leadership in relation to criminal justice organizations. What are the main differences between management and leadership? How do managers and leaders

write a narrative essay (minimum 1200 words) in which you address and discuss the questions and statements listed below. Use at least three scholarly sources and remember to demonstrate a thorough und

write a narrative essay (minimum 1200 words) in which you address and discuss the questions and statements listed below. Use at least three scholarly sources and remember to demonstrate a thorough understanding of the READ and ATTEND sections in your essay. Cite your sources in APA format. What is the

I need these answered in 1200 words. with 3 sources in apa format, Describe why voluntariness is important in the confession/interrogation context. What factors affect voluntariness? Explain Miranda

I need these answered in 1200 words. with 3 sources in apa format,  Describe why voluntariness is important in the confession/interrogation context. What factors affect voluntariness? Explain Miranda v. Arizona and how it affects interrogations and confessions. Include what ‘triggers’ the need for Miranda warnings as well as what is

Make syre your follow directions and show work Write and test hypotheses t tests for dependent samples by hand and in excelMake conclusions about your research based on hypothesis testFor any math pro

Make syre your follow directions and show work Write and test hypotheses t tests for dependent samples by hand and in excel Make conclusions about your research based on hypothesis test For any math problem, your final answer must be enclosed in a box, bolded, or highlighted. Use the demonstration

Download this Excel spreadsheet to identify the small number of offenders responsible for the bulk of the crime problem: click here. Use the format from the 80/20 tutorial to create your Excel table.

Download this Excel spreadsheet to identify the small number of offenders responsible for the bulk of the crime problem:  click here. Use the format from the 80/20 tutorial to create your Excel table. Put the table in a Word document, and make it look like a professional bulletin. (Remember, the numbers

Use the Impact Assessment dataset (click here or see below). We’re going to do some data drills involving hypothetical situations where a crime analyst would be asked to analyze temporal trends in dat

Use the Impact Assessment dataset (click here or see below). We’re going to do some data drills involving hypothetical situations where a crime analyst would be asked to analyze temporal trends in data to see if the evidence is consistent with an argument that a crime reduction intervention was successful. You

see below) to view an Excel data matrix representing an initial crime pattern. This file contains 12 cases that resulted from an initial pattern identification. However, not all of these cases are par

see below) to view an Excel data matrix representing an initial crime pattern. This file contains 12 cases that resulted from an initial pattern identification. However, not all of these cases are part of the final pattern. So, your assignment is to use the three-step process for pattern finalization presented

The purpose of this assignment is for you to construct a repeat incident location report. Open the calls-for-service dataset: click here or see below. Use this dataset to construct a repeat incident

The purpose of this assignment is for you to construct a repeat incident location report.Open the calls-for-service dataset: click here or see below.  Use this dataset to construct a repeat incident report of a particular type of activity (e.g., alarm calls, disturbances, drug calls, or domestic calls) for either Zone 1 or

this is 3 different people opinion on criminal justice hypothesis that has practical value and is of direct relevance to crime control. Respond back to all 3 answers with your opinion on their answers

this is 3 different people opinion on criminal justice hypothesis that has practical value and is of direct relevance to crime control. Respond back to all 3 answers with your opinion on their answers and feedback    1. Assessing License Plate Reader Technology’s Effect on Vehicle-Related CrimeVehicle-related crimes—including car thefts

Open the Police Report Data Entry Tutorial (below this dropbox). Follow along with the steps, and then complete the Excel spreadsheet for all 10 of the police reports on our textbook website. Here ar

Open the Police Report Data Entry Tutorial (below this dropbox). Follow along with the steps, and then complete the Excel spreadsheet for all 10 of the police reports on our textbook website.  Here are the variables you need: Incident report number Beat Offense Street Number, Street Name Occurred From Date

Summarize the constitutional basis for criminal procedure.Explain the exclusionary rule and the exceptions to it. Likewise, summarize the fruit of the poisonous tree doctrine and the exceptions to it.

Summarize the constitutional basis for criminal procedure. Explain the exclusionary rule and the exceptions to it. Likewise, summarize the fruit of the poisonous tree doctrine and the exceptions to it. Explain the defense of qualified immunity. What is reasonable suspicion and when is it used? Define probable cause and identify