Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Description Note: There are 2 parts to this assignment. Part 1 Based on the article titled “The Vulnerability of Dams: A Rising Threat to Life & Property” by W. Sharkey Bowers and your independent

Description

Note: There are 2 parts to this assignment.

Part 1

Based on the article titled “The Vulnerability of Dams: A Rising Threat to Life & Property” by W. Sharkey Bowers and your independent research, choose at least 1 method of vulnerability analysis and conduct a risk assessment (RA) using a model of your choice or from the example provided in this Phase’s materials. There are many models to choose from, and sector-specific plans may assist you in locating 1 for your sector.

After selecting and properly referencing the source of your RA methodology, complete the following:

  • Describe how it works.
  • Complete the analysis of your asset.
  • Report the findings.
  • Be sure to identify, list, and describe threats, vulnerabilities, consequences, and risks.
  • After identifying the greatest risks, offer some realistic mitigation measures.
    • These should be well-researched and sophisticated, and costs associated with these should also be presented. For example, for deterring a terrorist attack on the Hoover Dam, stating “use a security guard” is not specific enough, is not necessarily a realistic and true deterrent, and includes no information about this as an expense.

Your report should be 3–5 pages, not including a title or reference page, may include tables, graphs, lists, or whatever format you believe clearly delivers the results of this RA.

Part 2

Not all critical infrastructures (CIs) can be equally protected. Limited resources in terms of dollars, manpower, time, political will, and so forth mean that assets are in competition for support. Economics and political agendas, plus cultural, psychological, legal, and other factors might also influence the allocation of scarce resources.

Add the choices to this environment of competing interests, and select an allocation model that you would recommend to the governmental or corporate leader who you would hypothetically advise regarding your asset or network. You may also assemble parts and pieces from different strategies depending on any variety of elements you must consider.

Example 1

There is a bridge in your network that you consider critical, but there are 2 alternate routes in your system by which travelers could bypass a problematic bridge. The original bridge may not be critical or may warrant a lower allocation of maintenance funds, because maintenance could be done more regularly and cheaply with traffic rerouted. In such a case, your allocation model might assign increasing dollars over 5 years to achieve a certain maintenance standard. Unless you are an engineer, you might not know this kind of detail or comprehend such schemes. For this reason and others, you should be researching mitigation measures and solutions from subject-matter sources.

Example 2

In the attacks of 9/11, Flight 77 crashed into the western face of the Pentagon, killing 184 people on the aircraft and in the building. Many more might have been casualties that day if protective window treatments made of Mylar materials had not been installed in the then-recent renovations of that western area. Broken, flying glass is a cause for many injuries and incapacitation in other explosions. In this case, a relatively simple and somewhat less expensive solution probably saved lives. If given limited funds to protect the Pentagon, one might choose to install only blast-resistant windows. For more on this, see the Pentagon’s Renovation Manager’s News Briefing from September 15, 2001.

The allocation model you choose and write about for this Week’s individual project may be 1 of the strategies Ted Lewis discusses, a combination of these models, or a strategy of your own design with or without elements from the other models. Be sure to include the following:

  • Be prepared to describe fully how your allocation model works.
  • Describe how it would apply for your assigned network or asset.
  • You must detail what it will mean in terms of concrete outcomes, or what resources will be applied to your asset or network.
  • Determine what impact it might have for other critical infrastructure priorities in your community or company.
  • Because you are an advisor to a leader, also discuss various ways the community or company might pay or offset these protection or resilience-enhancing measures.

You should be able to discuss and explain the rationale for any budget or resource allowances you use. This will require additional, comprehensive research. For example, if you discuss increased training for special responders, find out from your real-world community members or company what such training costs. Remember to think comprehensively, using the 360-degree view. If you are training 1 person for a week, what travel costs must be included? Is another person working the trainee’s shifts, and if so, are these hours overtime? What does that cost? How does the agency plan for training costs?

Even hypothetical scenarios should have real-world facts and figures to draw upon. Provide and properly cite sources for budgets, measures, ideas, recommendations, and so forth that are drawn from external sources. Your report should be 2–3 pages, not including a title or reference page, and may include tables, graphs, lists, or whatever format you believe clearly delivers the basis for your allocation strategy.

For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.

References

Evey, L. (2001, September 15). September 11, 2011: Attack on America – DoD News Briefing on Pentagon Renovation 11:00 a.m. EDT; September 15, 2001 [Interview transcript]. Yale Law School, The Avalon Project. https://avalon.law.yale.edu/sept11/dod_brief09.asp

Sharkey Bowers, W. (2021). The Vulnerability of Dams: A Rising Threat to Life & Property. . 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Topic: The Reliability of Eyewitness Testimony The Term Paper Assignment will consist of at least 10 double-spaced pages (excluding title page, references, figures, illustrations, or other extraneou

Topic: The Reliability of Eyewitness Testimony The Term Paper Assignment will consist of at least 10 double-spaced pages (excluding title page, references, figures, illustrations, or other extraneous elements outside the main body of the paper). Students will format their paper using 12-point Times New Roman font and one-inch margins. Students

Discussion Post No chat gpt or Ai! Drawing upon Robert Merton’s theory of Social Structure and Anomie, devise a hypothetical scenario that illustrates the interplay between societal norms, cultural

Discussion Post No chat gpt or Ai! Drawing upon Robert Merton’s theory of Social Structure and Anomie, devise a hypothetical scenario that illustrates the interplay between societal norms, cultural goals, the strain experienced by individuals, and the various modes of adaptation (conformity, innovation, ritualism, retreatism, or rebellion) that individuals might

This assignment assesses the following Course Outcome: FS208-2: Distinguish the aspects of criminal and civil laws that emergency services agencies are likely to encounter. Criminal and Civil Law Emer

This assignment assesses the following Course Outcome: FS208-2: Distinguish the aspects of criminal and civil laws that emergency services agencies are likely to encounter. Criminal and Civil Law Emergency services personnel encounter violations of criminal and civil law on a daily basis. It is critical that responders be able to identify

John E. McGrath finds that “the notion of privacy is functionally quite weak as a counter to the growth of national surveillance,” because “seemingly legitimate ‘public’ uses of surveillance can justi

John E. McGrath finds that “the notion of privacy is functionally quite weak as a counter to the growth of national surveillance,” because “seemingly legitimate ‘public’ uses of surveillance can justify most of its intrusions.” The Wall Street Journal article reports on how the FBI searched American’s data in 2021.  Some groups

Global Trends in Illicit Wildlife Trade The primary purpose of the project is to thoroughly investigate and define the dynamics of the global ‘Illicit Wildlife Trade’ (IWT) to enhance theAustralian

Global Trends in Illicit Wildlife Trade The primary purpose of the project is to thoroughly investigate and define the dynamics of the global ‘Illicit Wildlife Trade’ (IWT) to enhance theAustralian Border Force’s (ABF) ability to effectively counteract these illegal operations. Introduction-300 words Any lessons learnt or recommendations arising from research

Concept mapping is brainstorming with a purpose. You start with an overarching concept that you break down into its smaller parts, using arrows and linking words to show how ideas are connected. In th

Concept mapping is brainstorming with a purpose. You start with an overarching concept that you break down into its smaller parts, using arrows and linking words to show how ideas are connected. In this assignment you will create a concept map around a state corrections policy of your choice.  Steps

In the previous assignment, you developed a position paper for the research topic that you have identified and explored. You have recommendations for change, revocation, modification, and addition to

In the previous assignment, you developed a position paper for the research topic that you have identified and explored. You have recommendations for change, revocation, modification, and addition to the research topic. Your research topic has come from an issue, problem, or policy of law enforcement, corrections, or the court

In the mini lecture, we discussed the policy implications of trait theories. Primarily, we looked at the implications for treatment, rehabilitation, and prevention. Let’s expand this discussion to the

In the mini lecture, we discussed the policy implications of trait theories. Primarily, we looked at the implications for treatment, rehabilitation, and prevention. Let’s expand this discussion to the criminal justice system. Specifically, the adjudication stage. Please address the following: Should individuals with Antisocial Personality Disorder be held responsible for

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in P

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in P

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in P Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in P

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete Choose a topic(Topic Dealing with Police Subcultures) covered in

Part 1 2.4 Dig Deeper Discussion – Availability Ends Sep 29, 2024 11:59 PMCORRECTIONS Section 004 Fall Semester 2024Steps To Complete  Choose a topic(Topic Dealing with Police Subcultures) covered in this module you would like to know more about. Do a little research and find a reading, podcast, or video