Description Note: There are 2 parts to this assignment. Part 1 Based on the article titled “The Vulnerability of Dams: A Rising Threat to Life & Property”

Description

Note: There are 2 parts to this assignment.

Part 1

Based on the article titled “The Vulnerability of Dams: A Rising Threat to Life & Property” by W. Sharkey Bowers and your independent research, choose at least 1 method of vulnerability analysis and conduct a risk assessment (RA) using a model of your choice or from the example provided in this Phase’s materials. There are many models to choose from, and sector-specific plans may assist you in locating 1 for your sector.

After selecting and properly referencing the source of your RA methodology, complete the following:

  • Describe how it works.
  • Complete the analysis of your asset.
  • Report the findings.
  • Be sure to identify, list, and describe threats, vulnerabilities, consequences, and risks.
  • After identifying the greatest risks, offer some realistic mitigation measures.
    • These should be well-researched and sophisticated, and costs associated with these should also be presented. For example, for deterring a terrorist attack on the Hoover Dam, stating “use a security guard” is not specific enough, is not necessarily a realistic and true deterrent, and includes no information about this as an expense.

Your report should be 3–5 pages, not including a title or reference page, may include tables, graphs, lists, or whatever format you believe clearly delivers the results of this RA.

Part 2

Not all critical infrastructures (CIs) can be equally protected. Limited resources in terms of dollars, manpower, time, political will, and so forth mean that assets are in competition for support. Economics and political agendas, plus cultural, psychological, legal, and other factors might also influence the allocation of scarce resources.

Add the choices to this environment of competing interests, and select an allocation model that you would recommend to the governmental or corporate leader who you would hypothetically advise regarding your asset or network. You may also assemble parts and pieces from different strategies depending on any variety of elements you must consider.

Example 1

There is a bridge in your network that you consider critical, but there are 2 alternate routes in your system by which travelers could bypass a problematic bridge. The original bridge may not be critical or may warrant a lower allocation of maintenance funds, because maintenance could be done more regularly and cheaply with traffic rerouted. In such a case, your allocation model might assign increasing dollars over 5 years to achieve a certain maintenance standard. Unless you are an engineer, you might not know this kind of detail or comprehend such schemes. For this reason and others, you should be researching mitigation measures and solutions from subject-matter sources.

Example 2

In the attacks of 9/11, Flight 77 crashed into the western face of the Pentagon, killing 184 people on the aircraft and in the building. Many more might have been casualties that day if protective window treatments made of Mylar materials had not been installed in the then-recent renovations of that western area. Broken, flying glass is a cause for many injuries and incapacitation in other explosions. In this case, a relatively simple and somewhat less expensive solution probably saved lives. If given limited funds to protect the Pentagon, one might choose to install only blast-resistant windows. For more on this, see the Pentagon’s Renovation Manager’s News Briefing from September 15, 2001.

The allocation model you choose and write about for this Week’s individual project may be 1 of the strategies Ted Lewis discusses, a combination of these models, or a strategy of your own design with or without elements from the other models. Be sure to include the following:

  • Be prepared to describe fully how your allocation model works.
  • Describe how it would apply for your assigned network or asset.
  • You must detail what it will mean in terms of concrete outcomes, or what resources will be applied to your asset or network.
  • Determine what impact it might have for other critical infrastructure priorities in your community or company.
  • Because you are an advisor to a leader, also discuss various ways the community or company might pay or offset these protection or resilience-enhancing measures.

You should be able to discuss and explain the rationale for any budget or resource allowances you use. This will require additional, comprehensive research. For example, if you discuss increased training for special responders, find out from your real-world community members or company what such training costs. Remember to think comprehensively, using the 360-degree view. If you are training 1 person for a week, what travel costs must be included? Is another person working the trainee’s shifts, and if so, are these hours overtime? What does that cost? How does the agency plan for training costs?

Even hypothetical scenarios should have real-world facts and figures to draw upon. Provide and properly cite sources for budgets, measures, ideas, recommendations, and so forth that are drawn from external sources. Your report should be 2–3 pages, not including a title or reference page, and may include tables, graphs, lists, or whatever format you believe clearly delivers the basis for your allocation strategy.

For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.

References

Evey, L. (2001, September 15). September 11, 2011: Attack on America – DoD News Briefing on Pentagon Renovation 11:00 a.m. EDT; September 15, 2001 [Interview transcript]. Yale Law School, The Avalon Project. 

Sharkey Bowers, W. (2021). The Vulnerability of Dams: A Rising Threat to Life & Property. . 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Review the National Institute of Corrections’ work on risk, need, and responsivity.  Address the following in a research paper of 5-7:  -Compare, contrast,

Review the National Institute of Corrections’ work on risk, need, and responsivity.  Address the following in a research paper of 5-7:  -Compare, contrast, and distinguish between the various recidivism strategies using the risk, need, and responsivity principle as the basis for assessing treatment needs.  -Evaluate whether all offenders, no matter

See attachments. Review the Angel Case Study . Assume the

See attachments. Review the Angel Case Study . Assume the management team at your facility has asked for your help in preparing a treatment plan for the client in the case study. Prepare a 1,100 word proposed treatment plan summary, including your ideas for a treatment plan. Refer to the

Carbon Dioxide Calculator Table of Contents: (1.) The Carbon Cycle and Mankind

Carbon Dioxide Calculator Table of Contents: (1.) The Carbon Cycle and Mankind (2.) Activity: Calculating Your Emissions of Carbon Dioxide The Carbon Cycle and Mankind We have seen that plants sequester large sums of carbon in themselves.  They are able to do this since, on average, photosynthesis produces more sugar

How might the educational efforts of organizations like the Redlands Christian Migrant Association (RCMA) in teaching migrant families about labor hazards

How might the educational efforts of organizations like the Redlands Christian Migrant Association (RCMA) in teaching migrant families about labor hazards and prevention methods contribute to broader community health improvements, and what additional strategies could be employed to further enhance the immediate and long-term health outcomes of these populations?