310 W3

****ANSWER POST 250 WORDS MIN****

 

Discussion Questions: 1) In your own words, construct an overview of the critical information sector you choose for this discussion. 

2) Examine at least three of the following:

  • Unique aspects as they relate to national security
  • Risks/threats/hazards/vulnerabilities related to national security
  • Potential countermeasures/mitigations related to the continuity of operations
  • Minimizing disruption and improving first responder safety
  • Cross-sector dependencies/interdependencies 

3) Give your opinion on how either a physical attack, a cyber event, or a natural disaster could impact critical infrastructure.

****REPLY TO EACH POST 100 WORDS MIN EACH****

 

1.This has truly been a busing week, and it is not over yet. I look forward to your comments and feedback.

The critical infrastructure sectors are composed of 16 sectors. The water and wastewater sector play a vital role in the success of sectors such as the Chemical Sector, which uses water to produce materials such as microchips, broadband devices, and solar panels; the Commercial Facilities Sector uses water in cooling plates; Communications relies on electricity which relies on hydropower, which is produced by water, Dams Sector and levees are used to manage water, the Energy Sector uses water for cooling plant systems, Food and Agriculture Sector use water in product productions and farming, Information Technology Sector uses water in a variety of way.

These 16 sectors are called out in Presidential Policy Directive 21 (PPD-21) as being vital to the United States and its citizens, and they should be provided support to ensure their operations, security, and resiliency to minimize any long-term disruption that could cause harm to human life, supply chain, economic secure or national security. This is the role and effort that the SRMAs put forth.

The water and wastewater sector have several interdependences that rely on its services, such as electricity, healthcare, IT services, and transportation, and dependencies, such as the chemical sector that provides chemicals to water treatment facilities that are used to manage the quality of the water or used to treat the wastewater. If any or all were interrupted by natural weather events such as hurricanes or manmade incidents such as nation-state-directed cyber-attacks for an extended period, it could have debilitating effects within the sectors, consequences in other sectors, and psychological impacts on the population.

The mitigation and other measures to minimize the effects of natural and manmade incidents is an effort that has been taken on by the SRMAs, the Government Coordinating Council (GCC), private sector owners and operators, and the Sector Coordinating Counsel, as well as a few other advisory committees and efforts. The goal is to increase the amount of information sharing and, at the same time, allow for the American system of free enterprise to flourish.  

The Emergency Services Sector (ESS) is one of the few sectors that deals with incidents firsthand and on a daily basis. All incidents originate at the local level, making it critical to keep first responders informed, well-equipped, and prepared to deal with any incidents they may encounter. This sector receives support from DHS Science and Technology (S&T) and DHS Information and Analysis (I&A). The ability to learn from emerging threats within the United States or over-the-horizon threats seen first overseas is critical to ensuring the safety of first responders.

The continued effort and expertise the private sector owners and operators bring to the table to help the government better understand their needs before and during an incident. They are vital to incident notification, response, and swift recovery from any incident that might have to be faced.

 

2.Unique aspects related to national security can vary due to evolving threats and geopolitical dynamics. There are several common unique aspects that are relevant to national security considerations like cultural diversity, location, cyber security, economic interdependence, border security, nuclear weapons, treaties, asymmetric threats. Technological improvements and intelligence. National security considerations are shaped by its unique combination of these and other factors. Effective national security strategies require a comprehensive understanding of these aspects and the ability to adapt to changing circumstances and emerging threats.

Risks, threats, hazards, and vulnerabilities related to national security encompass a wide range of potential challenges that can impact a country’s stability and well-being. Risks in the context of national security refer to potential events or developments that could have adverse effects on a country’s security. These risks can be both internal and external and may include economic risks, political risks, environmental risks, and more.

Threats are specific entities or conditions that pose a direct danger to a country’s national security. They can be state or non-state actors and can take various forms, such as military threats, cyber threats, terrorism, or espionage. Threats often involve hostile intent or actions. Examples of threats include rival nations, terrorist organizations, and cyber criminals.

Hazards typically refer to natural or environmental events that can cause significant harm to a country’s population, infrastructure, or resources. While not always malicious, hazards can have profound national security implications. Examples of hazards include natural disasters like earthquakes, hurricanes, pandemics, and environmental pollution.

Vulnerabilities are weaknesses that can be exploited by threats to undermine national security. These vulnerabilities can be found in a country’s infrastructure, institutions, or policies. Identifying and addressing vulnerabilities is crucial to reducing the impact of potential threats and hazards. Examples of vulnerabilities include outdated critical infrastructure, inadequate cyber security measures, and ineffective border controls.

Minimizing disruption and improving first responded safety are critical aspects of national security, especially during emergencies, disasters, and crisis situations. Some ways to achieve this objective are preparedness and training, technology and equipment, talking to the community, infrastructure resilience and information sharing, risk assessment and mitigation, resource allocation, and public alerts.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper

310 W2

 ****ANSWER POST 250 WORDS MON EACH****

Discussion Questions: 1) Explain at least one key federal plan, strategy, or guidance released to date and how they have contributed to the current structure of critical infrastructure security and resilience. 

2) Define risk and explain the value of risk management to the homeland security enterprise.

3) Summarize at least one natural hazard, technological/accidental hazard, or adversarial/human-caused threat and provide a recent example.

4) Discuss at least one of the twelve technological/accidental hazards and provide a recent example.

5) Elaborate on at least one of the adversarial/human-caused threat examples and provide a recent example.

****REPLY TO EACH POST 100 WORDS MIN*** 

 

  1. One key federal plan that has contributed to the current structure of critical infrastructure security and resilience is the National Infrastructure Protection Plan (NIPP). The NIPP provides a comprehensive framework and guidance for managing risks and protecting critical infrastructure in the United States. It outlines the roles and responsibilities of various stakeholders, including government entities, private businesses, and other organizations. The NIPP promotes a collaborative approach, encouraging cooperation and information sharing among different sectors to enhance the resilience of critical infrastructure. It has helped improve the coordination and implementation of security measures across sectors, and has increased the overall preparedness and response capabilities to various threats and hazards.  Risk can be defined as the potential for harm, loss, or damage resulting from a specific event or activity. In the context of the homeland security enterprise, risk management is a systematic approach to identifying, assessing, and mitigating risks. It involves the process of understanding the nature of risks, evaluating their likelihood and potential consequences, and implementing measures to minimize their impact or likelihood of occurrence. The value of risk management lies in its ability to prioritize and allocate resources effectively, enabling informed decision-making and the development of targeted strategies to enhance resilience. By understanding and managing risks, the homeland security enterprise can proactively prevent or minimize the impact of various threats, ensuring the protection of lives, critical infrastructure, and national security. A recent example for this question is the fire that occurred in 2020 in California. These fires were fueled by a combination of drought conditions, high temperatures, and strong winds. They resulted in the loss of lives, widespread destruction of homes and infrastructure, and significant environmental damage. The wildfires posed a serious threat to human safety, natural resources, and critical infrastructure, such as power lines and communication networks. One of the twelve technological/accidental hazards is a transportation accident. An example of a recent transportation accident is the collapse of the Morandi Bridge in Genoa, Italy, in August 2018. The collapse of this major highway bridge resulted in the tragic loss of 43 lives and caused significant disruption to transportation networks. This accident highlighted the importance of regular inspections, maintenance, and proactive safety measures to prevent catastrophic failures in critical infrastructure. An example of an adversarial/human-caused threat is cyberterrorism. Recent examples of cyberattacks include the Colonial Pipeline ransomware attack in May 2021, which disrupted the fuel supply on the East Coast of the United States, and the SolarWinds supply chain attack discovered in December 2020, affecting numerous government and private organizations. These cyber incidents demonstrated the potential for malicious actors to exploit vulnerabilities in critical infrastructure systems, leading to significant economic, societal, and national security consequences. Protecting against cyber threats requires robust cybersecurity measures, information sharing, and a proactive and adaptive approach to detect, prevent, and respond to such attacks.

https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/national-infrastructure-protection-plan-and-resources#:~:text=The%20National%20Infrastructure%20Protection%20Plan,achieve%20security%20and%20resilience%20outcomes.

https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years

https://calmatters.org/environment/2021/07/california-fires-2020/

 

2. The current state of critical infrastructure security and resilience owes much to the federal government’s National Infrastructure Protection Plan (NIPP). It is an all-encompassing strategy introduced in 2006 and revised in 2009 and 2013. The National Assets Protection Plan (NIPP) is a coordination and risk reduction strategy throughout the nation’s critical assets. It provides principles for collaboration between federal, state, local, and private sector institutions and assists in identifying and prioritizing essential infrastructure (Baggett & Simpkins, 2018). The plan contains risk management, information sharing, and incident management processes to protect vital infrastructure from cyber and physical attacks. The NIPP has been crucial in making the United States’ critical infrastructure solid and secure, and it is regularly updated to account for new risks.

 In homeland security, protecting civilians and vital infrastructure is of utmost importance. Natural disasters, acts of terrorism, cyberattacks, and other dangers to national security are examples of events and actions that pose risks. Effective risk management solutions are essential if we are to accomplish this mission. Identifying and mitigating risks can reduce the likelihood of suffering an adverse outcome. In this way, we can keep the people safe and keep their faith in our government and institutions strong. Comprehensive risk management requires cooperation between public and commercial organizations and the general population (Sadiq et al., 2019). Furthermore, the risk mitigation techniques’ effectiveness must be continuously monitored and evaluated. In conclusion, the safety and assurance of our nation depend on our proactive approach to detecting and managing threats. Doing so will help avert catastrophes and keep people safe.

Radiation is a significant technological risk that harms people and the environment. It is produced naturally and artificially in nuclear power plants and medical devices. The Fukushima accident vividly illustrates the terrible results of being exposed to radiation. The 2011 earthquake and tsunami damaged the nuclear power facility, which allowed radioactive materials to escape into the environment (Kamae, 2016). Long-term effects on public health and the environment necessitated the relocation of many individuals in the aftermath. The detrimental consequences of radiation exposure can be prevented or reduced using proper safeguards. Radiation-emitting medical equipment must be used correctly, and radioactive waste must be disposed of correctly. Nuclear power plants must undergo routine safety assessments. Taking these precautions will make the environment safer for everyone.

 It is crucial to keep in mind potential risks as we continue to navigate the ever-changing landscape of technology. Cyber attacks, which can involve everything from the theft of sensitive information to the entire takeover of computer systems, are among today’s greatest threats. The latest SolarWinds attack is a sobering reminder that no network is impenetrable (Leithauser, 2020). This attack affected a wide range of government organizations and significant corporations, highlighting the need for preventative measures against cyber attacks. Strong passwords and regular software updates are two of the best ways for individuals and businesses to protect themselves from cybercriminals. Keeping an eye out for potential cyber assaults and adopting precautions will help us avoid being caught off guard.

The proliferation of cybercrime is highly worrying and dangerous for our culture. As more and more of our daily activities become reliant on digital tools, so do the opportunities for cybercriminals to steal our data. There are many examples of this danger in the actual world, sadly. The Colonial Pipeline was shut down in May 2021 after a ransomware assault caused gas shortages and price increases along the East Coast (Hansbrough & Stephenson, 2021). Cybercrime can have severe consequences for our daily lives and essential infrastructure, as seen in this instance.

References

Baggett, R. K., & Simpkins, B. K. (2018). Homeland Security and Critical Infrastructure Protection. Bloomsbury Publishing USA.

Hansbrough, B., & Stephenson, E. F. (2021). Did Georgia’s Post-Pipeline-Hack Gasoline-Tax Suspension Lower Prices? Atlantic Economic Journal, 49(3), 321–323. https://doi.org/10.1007/s11293-021-09724-3

Kamae, K. (2016). Earthquakes, Tsunamis and Nuclear Risks Prediction and Assessment Beyond the Fukushima Accident (K. Kamae, Ed.; 1st ed. 2016.). Springer Nature. https://doi.org/10.1007/978-4-431-55822-4

Leithauser, T. (2020). CISA Issues New Warning About SolarWinds Breach. Cybersecurity Policy Report, 1–1.

Sadiq, A.-A., Tyler, J., & Noonan, D. S. (2019). A review of community flood risk management studies in the United States. International Journal of Disaster Risk Reduction, 41, 101327–. https://doi.org/10.1016/j.ijdrr.2019.101327

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper

300 w2

 

**ANSWER POST 250 WORDS MIN***

Discussion Questions: This week we learned about the importance of a strong research question. Please cite your research question followed by some background information on your topic. Provide at least one reference that was used to develop your research question. 

****REPLY TO EACH POST 100 WORDS MIN EACH****

In your two responses, please provide a critique of your classmates’ question. Your critique should be substantive in nature and designed to improve your classmates’ question.  

1. Research Question:

Should the right to the second amendment remain non-infringed in every state in the United States?

Background:

Not only was this a difficult question to choose, but it is also a complicated one. According to the department of justice, an increase in punishment does little to deter a criminal from commiting crime. What does deter them, is the certainty of being caught. In this concept, the more likely the potential criminal will be caught and or injured/die during the process, the less likely they are to commit the crime in the first place(Department of Justice, 2016) . Not only does the amendment protect our nations citizens against each other, but also to protect ourselves from a tyrannical government. A good example would be the Nazi’s(Willit, 2022) . The first thing Hitler did once he took control was remove the countries entire weapon supply from the people. One the other hand, a regulation giving people the ability to end a person(s) life could prove to be devastating if not well regulated with protections such as thorough background checks.

Department of Justice. (2016). Five things about deterrence. National Institute of Justice.

Willit, A. (2022, August 17). The benefits of 2nd Amendment Rights on American society. True North. https://truenorthideas.org/the-benefits-of-2nd-amendment-rights-on-american-society/

2. My research question is can putting more security in schools like airports limit school shootings?

The background information on my research question was created with the notion that shootings at airports rarely happen to my understanding. I see it as airports have a massive amount of security, but schools do not. If schools were as secure as an airport, they could have the potential to keep schools safe in this country. In my search for information, I used the school Trefry Library System and searched for ‘airport shootings’, ‘school shootings’, and ‘airport security’. Then used Google to search for the same information. I did not find as recent airport shootings as I did school shootings. I also believe regardless of how many laws are passed about guns, even when people that own and respect guns and use them properly there will still be guns that end up in the wrong hands.

The reference that was used to develop my research question is the Transportation Security Administration website. It has listed all the security measures that airports have across the United States. This was a great source since it comes straight from a government source and is up to date.

Security screening. Security Screening | Transportation Security Administration. (n.d.). https://www.tsa.gov/travel/security-screening

Further information that was found is that not all public schools across the country are safe for the students that attend the schools. This was not surprising since school shootings are still happening.

Schaeffer, K. (2022, July 27). U.S. school security procedures have become more widespread in recent years but are still unevenly adopted. Pew Research Center. https://www.pewresearch.org/short-reads/2022/07/27/u-s-school-security-procedures-have-become-more-widespread-in-recent-years-but-are-still-unevenly-adopted/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper

310 W1

 ****ANSWER QUESTION 250 WORDS MIN****

Discussion Questions: 1) Discuss, in your own words, why critical infrastructure protection, security, and resilience are vital to the U.S. public confidence when considering the Nation’s safety, prosperity, and well-being.

2) Explain the consequences, as well as the impacts, of aging critical infrastructure failures. Be sure to summarize their ramifications for our nation’s citizens.

3) Identify and explain at least two key legislations, acts, and Presidential actions since 9/11, be sure to include one that occurred in the past five years. Do not write about the USA PATRIOT Act or the USA FREEDOM Act.

****REPLY TO EACH POST 100 WORDS MIN EACH****

1. Critical infrastructure protection is a key part in maintaining the publics confidence in the U.S. National Security apparatus for two key reasons.  The first is the simple fact that one of the key things U.S. citizens pay taxes for is the protection of the homeland, one of the primary missions of the Department of Defense (DOD), more specifically U.S. Northern Command who maintains that primary mission.  While protecting the homeland also includes deterring, and if necessary, defeating foreign threats it also encompasses protecting vital critical infrastructure from threats both domestic and abroad.  The second key reason that maintaining the public’s confidence in this effort is important is because that same critical infrastructure that needs to be protected and resilient enables each citizen to carry on with their day to day lives.  Whether it is running water, electricity, or interstates, all of these are critical infrastructure that if destroyed or degraded would have far reaching impacts on citizens across the country. 

The consequences of aging critical infrastructure have the same impacts on individual citizens as is described above.  While there are threats to critical infrastructure that originate from malicious actors, the maintenance of critical infrastructure can be just as serious of a problem.  The impact of a decaying roadway, water pipes, or hydroelectric dam is just as serious as that of a terrorist attack on any of these entities.  The only difference is that the cause of this is entirely on the United States itself, and blame can not be placed on some external entity.

In the wake of 9/11, there was a series of laws and executive actions put into place to better protect the homeland and address some shortfalls in national security at the time.  One of these was Executive Order 13231, put into place on 16 October 2001. Titled, “Critical Infrastructure Protection in the Information Age” this executive order directed the federal government to take appropriate action to identify and address vulnerabilities in information systems that would impact critical infrastructure.  This ranged from the digital control switches for power grids, to the air traffic control systems that had become reliant on computers and the internet.  Since 2001, the reliance on information systems has increased significantly, which also caused a sharp uptick in cyber vulnerabilities to these systems.  This led to the “Cybersecurity and Infrastructure Security Agency Act of 2018” (Public Law Number: 115-278) which amended the homeland security act of 2002 and established the aforementioned agency.  This law took elements of the DHS and formally established it as an independent agency whose sole focus is to lead all cybersecurity and critical infrastructure security programs.

 

2. A critical infrastructure can be described as a virtual or physical asset or system vital to the US that if suffered disability or destruction would have a devastating effect on security, national economic security, national public health or safety, or any mixture of those elements (NIST, n.d.). This list includes but is not limited to the transportation system, water and wastewater management, energy sources, and national cyber-security. These lifeline functions are vital to every US citizen’s everyday life. We count on the reliability of these systems to function and complete our own personal and business objectives. Protecting, maintaining, and providing uninterrupted service of these systems is vital to public confidence. An example of this can be found in 2017 when the Election Infrastructure became a subsector of the Government Facilities sector supporting a “free and fair” democracy – a foundation of the American way of life (Harrell & Sales, 2019). The partnerships built between the government and the private and public sectors are what maintain public confidence in the US critical infrastructure (Harrell & Sales, 2019).

An aging infrastructure does not only affect one sector of the framework of the American backbone. Each sector feeds off one another. For example, if the transportation sector is disrupted, the price of goods (the agriculture sector) may increase or even experience a slight influence. In turn, this can cause a strain on the US economic structure. In addition, an aging infrastructure has several consequences for US citizens. Not only does it impede our everyday activities, but it can possibly deteriorate, succumb to failure, and affect the health and well-being of us all. A decline in communication between friends and family can cause a decline in mental health of individuals. Without the public’s confidence in the infrastructure, the possibility of civil unrest and economic turmoil may increase. This economic turmoil may lead to higher consumer prices, water usage restrictions, and/or power outages across the nation. With all this uncertainty, the call for leadership and government change increases due to the public’s uncertainty and frustration (Little, 2012; p.7).

On November 5, 2021, congress entered legislation (US Code Chapter 53, Title 49) for the funding of programs for the Federal Transit Administration (FTA). Known as the Infrastructure Investment and Jobs Act, this program authorizes close to $108 billion for service transportation programs and other FTA programs. The focus of the legislation entails safety oversight programs, modernization of current infrastructure, addressing “greener” methods of transportation, and increasing the accessibility of transit service for more Americans (FTA, 2023).

In 2018, then President Donald Trump signed into legislation America’s Water Infrastructure Act. This act supports America’s competitive by increasing storage, protection from flood waters, deepening ports of interest, and maintaining the stability of inland waterways. The legislation further calls for an increase in local and stakeholder input while decreasing the “red tape” that has been experienced before (EPW, n.d

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper

Management informational system

Guidelines for submitting the assignment:

1. Submit the assignment as a word document attachment.

2. These are individual submissions.

3. Please DO NOT COLLABORATE on these assignments.

4. Please make sure to put your name in the word document.

5. Type the question followed by your answer.

6. Use 12 point font size (any font type) double-space to type your answer.

7. Check for grammatical and spelling errors before submitting your assignment.

8. The text within parenthesis in italics indicates the minimum length of the answer for each

question. For eg. (minimum 1 page) indicates that you should have atleast one page for

the answer. For questions that does not specify minimum length you can use your

discretion pertaining to the length of the answer.

9. The text in bold within parenthesis at the end of question indicates the maximum points

for that question. For eg. (10 points) indicates you can get a maximum of 10 points for

the question.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper

CIO

You have recently accepted a new position at a large hospital that specializes in critical care of cancer patients. Your supervisor, the CIO, has requested you create and present to upper-level management (C-Suite: CEO, CFO, CSO, etc.) a presentation on the various bad actors your organization may face in the near future. The CIO impresses upon you the need for additional funding to secure key systems in the network but cautions you against creating a state of panic as none of those attending have a deep understanding of cybersecurity.

Create a 10- to 12-slide digital presentation for upper-level management that explains the possible threats. Address the following:

  • Research and identify the various threat actors of the digital world, including advanced persistent threats (APTs), cyberterrorism, script kiddies, cybercriminals, hacktivists, industrial espionage relating to intellectual property, and insider threats.
  • Prioritize which threat actors would pose the greatest threat.
  • Utilizing the article “The Role of the Adversary Model in Applied Security Research,” located in the topic Resources, include an adversary model to compare and contrast threats and adversaries related to each threat actor.
  • Define insider threats and the problems associated, assumptions, goals, capabilities, favored techniques, and aversion to risk.
  • Identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.
  • Must include a title slide, reference slide, and presenter’s notes.

Additionally, include graphics that are relevant to the content, visually appealing, and use space appropriately. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper

Networking

 

Big tech companies like Google, Facebook, and OneWeb are on a mission to make the Internet accessible to the world’s population. Their goal is to develop different technologies that can beam high-speed Internet connectivity to places that have never been able to take advantage of the internet before. Using the information provided in the required articles conduct additional online research to find at least two more credible sources that discuss these topics. (Access the MISM Credible Resource Guide for assistance with finding additional appropriate credible professional resources.)

Evaluate the effects broadband internet access has on business opportunities. Review the U.N. report as well as the most current list of Least Developed CountriesLinks to an external site. as published by the United Nations. Choose an underrepresented country from the list. Evaluate the potential advantages that broadband internet access might have on businesses operating in your chosen country. Compare the current potential of businesses operating within your chosen country to those operating in areas where broadband internet access is common. Provide at least two examples of advantages that internet connectivity would create for businesses within your chosen country. Explain how these advantages and opportunities would impact the personal and professional lives of your chosen country’s population.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper

discussion and reply to student

  

  

Please respond to the following:

  • Debate  whether the cost of utilizing ATOM for large projects is justified when  an organization has limited resources to dedicate to risk management  efforts. Provide a description that you would present to your managers  to persuade them to see matters your way.

Be sure to respond to at least one of your classmates’ posts.

Respond to student below

  

Yolanda Kennedy         

 4:10pm Sep 10 at 4:10pm          

The  answer cost of whether or not utilization of ATOM for large projects is  justified when an organization has limited resources to dedicate to risk  management efforts is difficult to provide a clear answer.  From a  business perspective, the cost of ATOM for large projects is justified  because larger projects correlate with a more intricate ATOM methodology  (ATOM-risk.com, 2023).  Therefore, whenever there is greater complexity  with a business process or function, it is expected that costs will be  higher .

            From the perspective of the smaller business or the  business with fewer available resources, the cost of utilizing ATOM for a  large project is likely not justified.  The reason for this is that the  cost for larger projects, as mentioned above, is higher.  A smaller  company or a company with  fewer resources likely cannot afford it  (ATOM-risk.com, 2023).  From this perspective, the cost would not be  justified.

            A description that I would present to your managers to  persuade them to see matters your way is the following: for larger  projects, the ATOM methodology is associated with higher costs because  of the increased size of the project.  Because of this, the ATOM cost  for larger projects also increases (ATOM-risk.com, 2023) .  However,  with that being said, the data or findings generated through the ATOM  with respect to risk management can help companies to save an incredible  amount of money in avoiding or better mitigating risks.  Therefore, the  cost savings create a significant and positive return on the investment  that the company spends on the ATOM methodology being used, which makes  the investment more than beneficial for the company it in the long run.

Reference

ATOM-risk.com. (2023). THe ATOM methodology. ATOM Risk. Retreived from https://atom-risk.com/atom-methodology/#1600443752039-c5ac53ca-1b1d

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper

Law Research assignment

AIRPORT ASSESSMENT: INITIAL ASSIGNMENT INSTRUCTIONS OVERVIEW Comprise a comprehensive analysis of all potential threats and vulnerabilities at the Richmond International Airport. This assessment should be conducted without consideration to, or analysis of, existing measures. This is your personal assessment based on your knowledge gained from the information in this course and outside sources (i.e., scholarly, governmental, academic). Prepare a report reflecting the findings from the analysis. At a minimum, the assignment should include:  An introduction that provides a brief outlining the purpose of the report.  identification of stakeholders that are responsible for ensuring security, prevention, and risk management, discussion of the interdependencies, relationships, and legal requirements of the stakeholders.  a description of the threat assessment that outlines all identified threats and hazards and the potential impact on affected resources (organized by natural, accidental, and international or malicious).  A description of the vulnerability assessment that outlines all identified vulnerabilities using potential impact categories (catastrophic, critical, limited, minor, and negligible); develop appropriate definitions for each of the categories. Similarly, definitions should be developed for the likelihood of occurrence (highly likely, likely, possible, unlikely, remote/rate). Do NOT assign weights or probabilities to each category. This will be done in the next assignment.  A summary of your findings. Do NOT make recommendations. This will be done in the next assignment. INSTRUCTIONS  Length of assignment: 900-1400 words o Include in the assignment the following; however, note that these are excluded from the length of the assignment:  Title Page, References, Two Tables  Format of assignment: APA  Number of citations: 4  Acceptable sources (e.g., scholarly articles published within the last five years) Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper

crime trend

 

  1. Instructions
    For Part 1 of this assignment you are expected to fill out the City Demographic and Crime Trend Analysis [DOCX] chart provided. Use the Sample City Demographic and Crime Trend Analysis Chart [DOCX] as an example. Note: This sample only provides data for one U.S. city. Remember that you are responsible for completing the chart for one U.S. city and one non-U.S. city.  
    Fill out the chart by compiling the following demographic and crime trend data for one selected U.S. city and one selected non-U.S. city: 

    1. Geographic location.
    2. Total population.
    3. Population by age.
    4. Population by race.
    5. Population by gender.
    6. Population by socioeconomic status.
    7. Number of sworn police officers.
    8. Three types of violent crime for the past five years:
      • Total occurrences.
      • Rate per 100,000 people.
    9. Three types of property crime for the past five years:
      • Total occurrences.
      • Rate per 100,000 people. 
    10. In Part 2 of this assignment you are expected to write a three- to four-page report in which you:
    11. Compare/contrast the demographic and crime trend data you’ve collected for your two selected cities.
    12. Draw three to four conclusions, based on your analysis of each of your selected cities, to share with the cities’ mayors, police chiefs, and city councils. 
    13. Use three sources to support your writing.
      • Choose sources that are credible, relevant, and appropriate.
      • Cite each source listed on your source page at least one time within your assignment.
      • Access the library or review library guides for help with research, writing, and citation. 
    14. Note: Good places to start your research include: 
    •  The FBI’s Uniform Crime Reporting.
    • The European Commission’s Eurostat.
    • The Bureau of Justice Statistics’ National Crime Victimization Survey
    • The Strayer University Library.
    • Reminder: Be sure to submit your completed City Demographic and Crime Trend Analysis Chart and your written report to the assignment submission area in Blackboard.
      Formatting
      This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:
    • The preferred method is for both parts of your assignment to be typed using Times New Roman font (size 12), with one-inch margins on all sides.
      • Use single spaced for the City Demographic and Crime Trend Analysis Chart.
      • Use double spaced for your 3–4-page written report.  
    • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date.
    • Include a separate source list page. Citations and references must follow SWS format. 
    • Learning Outcomes
      The specific course learning outcome associated with this assignment is:
    • Analyze the correlation between crime patterns and demographics, such as gender, age, ethnicity, and socioeconomic status.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
  3. Institution Release Statement

  ASSIGNMENT SUBMISSION

  1. Text SubmissionWrite Submission
  2. Attach Files
  3. SafeAssign accepts files in .doc, .docx, .docm, .ppt, .pptx, .odt, .txt, .rtf, .pdf, and .html file formats only. Files of any other format will not be checked through SafeAssign.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper