Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Homeland security

Review the list of critical infrastructures attached under the Week 1 folder.

If you were doing a risk assessment, which one(s) would you designate as the most important, or the highest priority? What criteria or basis would you use to determine that? If you changed the criteria, how would that affect your prioritization of the infrastructures? 

2). Factoring likelihood into risk assessments presents a variety of complications, as the lecture points out in several places. One skill that risk managers need is to be able to convince others that low frequency or low probability events can still cause catastrophic, high-impact consequences, and that options for dealing with such events may call for implementing additional safeguards, or to avoid the risk entirely.

Find a news story about a high-impact, low-frequency disaster or catastrophe (other than the 9/11 attacks or Hurricane Katrina), and describe the costs of that event, and what mitigation strategies should have been used to reduce or avoid the negative consequences. 

Show more
Recommended answer
Recommended answer
  • @
  • 2 orders completed
ANSWER

Tutor has posted answer for $10.00. See answer's preview

$10.00

*** ******* ** *** ********** ** ******** ******** ** stop **** ** terrorist within *** ****** ****** not **** the United ****** ** ********** ** ********* ******* *** ****** *** damage to *** ****** ****** ** ***** would ** * ********* attack Since **** department ********* in 2003 the Department ** ******** ******** *** * ********* in place to support *** mission *** *** **** * ****** ** the ** ************ ********* ** **** of 2005 *** DHS *** reorganized *** called *** Second Stage ****** ** ********* *** ****** Secretary ** DHS ******* Chertoff ***** * ************ ****** ** ************ *** Analysis ********* *** **** *** ********* ********* *** *********** ******** the Chief ********* ******* *** that department ** **** ****** I&A **** ******** **** ************ ** *********** ***** and ******** within the ********** ** ******* * ****** operational ******** provide * ******* ********** ******* *** *** the IC ** * whole; *** to *** ** a ******* ****** ** information *** ***** ***** *** ******* ****** partners *** ******** ******** *** ** **** assigned the original *** ************ *************** *********** ** *********** ******** *** ************** ***************** ************** ** ******* ******* *** integrate *** *********** *** intelligence *********** ** ***** to— ****** ******** and ****** the ****** and ***** ** ********* threats to the homeland; *** ****** *** ******** ******* ** ********* ******* the ****** ******* *** *** understand **** threats ** ***** ** ****** and ********* vulnerabilities of *** *********** Congress **** **** information ******* * *** ******** ** *** *** DHS ************ organization requiring ** ***** *********** as appropriate information ******** ** *** Department ****** the ********** ** other ******** ** the ******* ********** **** responsibilities related to ******** ******** *** ** ******** ** ***** and local ********** *** ******* sector ******** **** such **************** ******* ** ****** ** the deterrence ********** ********** of or ******** to ********* ******* ******* *** ****** States ******* ******** * critical ************** ** ******* as any facility ****** ** function ***** ******** the foundation for ******** ******** ********** economic vitality reputation *** way ** **** ** ***** ******** infrastructure ** ** ********** ********* *** *** survival of *** ****** *** ** ******* *** ******* ** ** ******** *** ****** whether physical ** virtual so ***** to *** ****** States **** the incapacity ** *********** of **** systems *** ****** ***** have * ************ ****** on ******** ******** ******** ******** ******** ****** ****** ** ****** ** *** combination ** ***** ******** FEMA ******* ******** infrastructure as ********** physical ****** *** ************* (cyber) ******* **** **** ** intact *** operational 24x7x365 ** order ** ****** ************* continuity ** operations *** ******* ******* ** ** other ***** *** ********* ****** ********* and ******* ****** to ***** or mitigate *** ************ ******* ** disasters" ******** ************** Protection (CIP) ******** ** *** ********* ********** ** ******* indispensable ****** physical assets *** ******* *********** ************** ** ***** ******** ***** are ****** ** a ********** *** ******** decision ****** ******* ***** ******* leaders ** ********* ******* what needs ********** where *** *** ** ** ********* in *** **** sense **** mitigation in ********* ********** ** proactive and goes ****** ****** ******** ********* ******** *** ***** ***** ** *** ******* of: *********** *** ******** infrastructures *********** the ******* against those *************** ********* *** *************** ** ********** *************** ********* the ***** of *********** ** loss ** * ******** infrastructure *** ******** *************** ***** **** ** unacceptable (“The ********* 2014) ****** the ********** of ******* a streamlined ******* and ******* ********* and ****** ** the cyber ***** ** **** *** skills ********* ********* ************ *** ******** ** effectively ******* as **** ** to ******* some deterrent ** ****** ********* ***** **** for ************* *** *** **** **** with ************* ************ Comprehensive ************* *********** ** ******************** **** ********* ************* ** ******** ************** owners *** ********* ** federal ******************* programs ** a *** that ************ *********** ********** *** ******** ********* *** ******* ************ ***** to **************** *** ******* public-private ******** ** responsibilities for ********** ******* ************* *** ***** ** ** * *** ***** for *** ************** and ****** for *** ****** in *** **** ******* ***** **** ****** ******* for *** integrity ** ******** ************** **** ********* was ******* ** the 1990s *** ** which ******** * ***** of ********* **** and ******** valuable ********* **** ******* *** health ****** *** economic ******** ** our ****** ****** the ****** ** ********* *********** ** ********** *** meant *** introduction ** *** threat ******* ** ******* **** **** *** ******** ** ******** ******* to ********* ******** Because improving *** ************* ** ** *********** such a large **** of **** ****** *********** across ********** *** ******* ****** ******** unity ** ****** ** ********* ** ******* ********* ***** ****** **** “when ** comes ** ************* ******* agencies **** *********** missions *** ******* coordinate *** *********** nearly ** well as **** ****** – with **** ***** ** **** the ******* sector *** Bash and ****** 2013)” *** *************** that ****** ******* ** ************* who ******* *** ****** ******** ************** is not ****** * system **** ***** ****** **** ** ******* ******* *** ****** *************** A system ** this ***** ** able ** ****** you of ***** ********** ** ************* ** order ** ********** **** **** * survey ** all ********** should ** undertaken *** ****** ****** ******** General Administrative Information Management Awareness *** ******* ******** ************** ** Hazards/Potential rises; *** ******** **************** *** ******** ******** to ** ****** from **** **** ** survey *** ** terms ** identifying areas ** need ** ********* establishing a **** of ********* crisis situations *********** what *********** **** ************ ** *********** with and *********** current efforts Once *** ****** ******* has been ********* *** *********** ** **** ** ********* and **** ********** **** can ** ************ ** ********* actual ********* *** ** ********** a ******** ***** ** **** element ** *** business The survey ******* is *** ******* **** ****** reducing ************* **** *** **** ******** *** ********* The management ***** ** critical ** **** ******* You **** ensure **** all ****** ** ********** ****** part ** *** ******* ******* ***** Make * ****** ******* ******** responsible to *** ********** *** *** ***** ** ********* The formal ********** ** * ****** manager to the ******** ** ******* ****************** ********* or **** ***** *********** ***** *** ********** *** initial portion of this **** *** ***** ******** **** *** reports on ****** ********** ************ ****** **** *** ** accomplished ** preparing an agenda for senior ***** and ***** of ******** meetings **** ******** * discussion ** crisis ********** ************ ** * ********* **** You **** ** **** it **** **** *** ******* though **** you **** make *** discussion substantive ******* more **** *** **** and tiring ********** on ********** ********* *** *********** compliance through *** ****** ** *** ************ ******* company policy *** ********** **** *** be accomplished through ****** ******** ** ****** ** *** highest ****** of the ******* *** ********** Cyberspace as * ******** ***** *** *** ********** **** June by *** ****** Lieberman (I-Conn) *** ******* ** ******** ** *** ****** Committee ** Homeland ******** *** Governmental ******* ** ***** *** *** ********* ** * ******** Center *** Cybersecurity *** ************** (NCCC) within *** ** ********** ** ******** ******** ***** **** would be *********** *** ********** both federal ******** ******** *** critical ************** owned ** the private ****** ******* ***** ******* Although *** White House already has ***** wartime ****** ****** aspects ** the ******** act ********* ********** ** *** **** *** ******** ** its ********* to **** the ******* ********** *** ********* to ****** **** ** meant by ********* infrastructure" ********* to *** **** *** ********** can ***** ******** ** protect any ******** ****** ***** destruction ** ********** ** ******** ********* ***** ***** ******** or ******** ************ ******** This ***** ******* ******* *** the system **** *** ******** ****** of ********** ******* ** ******** infrastructure would ** ******** ** soon ** **** designation ** **** An owner ***** ****** this *********** *** as *** **** ** ********* ******* *** government ***** **** *** ***** ******** to ********** ***** is not ******* to ******** ****** ************ 2011)A majority ** *** ******* critical *************** *** ********* ***** or ******** ***** means **** *** ******* sector *** initially *********** *** ********* ********** ******* ******* ** ***** ********** ********* ******** ***** **** *** ****** ******* more **** *** private ****** *** ****** **** *** ********** **** **** ** to ****** *** ****** **** *** ******* critical *************** *** assets *** ********* (Homeland Security **** * 11) Likewise the ******* government will be ***** to ******* support *** *** *********** ** ***** *** private sector *** ****** ***** *** its specific ***************** ********* Security 2003 * ****** chemical sector ** one of the **** ********** critical *************** to ******* disaster *** ********* attacks **** ***** said *** *** ** ******* **** *** *** ** enhance security at chemical facilities (Homeland ******** ***** ** ******** special attention ** ***** **** ** ***** ********** which house "large ********** ** hazardous ********** ********* ******** **** p *** Studies conducted ** *** *** *** ******* ****** are ********* ******** to ******** *** "understand ******** vulnerabilities ****** *** ****************** ************** *** ***** ********** ****** ********* Security **** * ******* though *** ******* ****** **** occasionally **** ********** **** the *** ***** *** ***** **** *** ******* ********** must **** ** *** ******* ****** ** lend * **** in ********* ******** *** ******** An ******* of the ******* ********** ******* on *** ******* ****** *** ********** *** the ******* ***** of 2001 * ***** ********** ** construction *********** was ********** ** ******* *** ********* *** *********** ** the ********* **** ****** in Washington DC and *** ******* **** office ******** ** *** JerseyOne **** **** ********** **** ***** * few ** *** ******* ******** *************** "cross ************* ******** ********* ******** **** * *** ********* *** ******* ********** *** ********* **** *** *********** ********* ** ******* security *** *** *************** **************** (Homeland Security **** * *** *** ****** ****** *********** **** Canada is ** * ***** ***** ** ******** ******** ************** ******* *** ***** made ** ******* protection for ************* ************** infrastructures ** ******* of this *********** is *** Alaskan Canadian hightway ** ***** to ********* ***** *** ******** ** ****** ** **** ****** ***** Canadian *********** ** ******* that ******* of ******** ************** involves *** only *** *** *** *** ****** and ******* ******* ** well *** *** would *** ** **** ** ***** *** their *************** ******* *** ********** ** ***** *** ***** ******** the ******* ****** *** **** versaThe ** government *** **** ***** ******* in ********** ********** *** strategies to ****** ** ******** infrastructures ***** **** **** **** **** ********* to ********* ****** *** natural ********* *** of *** ** ************ goals is to ********* * ****** *********** **** spans across *** ****** ** ********** ** addition ** *** ******* sector *** *** American people ********* Security ***** The ********* Critical ************** *********** ******* ** **** one ** many ***** ***** by *** ** government ** ****** ******** ************** **** ******* provides ********** ** "security-related" ******** ************** *********** (Homeland ******** 2009 * 5)By ******** **** **** ******** ************** ****** ** is ****** ** understand *** *** ** ********** *** been successful ** hardening **** ******** ************** The *********** *** **** ****** ** *** ** the most ********** ******** *************** that ***** **** ******* ** ****** **** ****** are an ******* ********* (Mark ****** ***** ***** Carafano 2005) *** ** ********** has ******* *** measures ** providing **** ********** through *** hiring ** **** health inspectors *** ****** "more ********* ************* ******* ***** ******** **** p **** Contamination of our ******** ***** ****** is ***** * topic ** ******** ******* *** ***** **** ** the ************* Protection ****** as **** ** *** ********** ** Homeland ******** ** ******* * ************* *** ****** ********** ******* ***** Carafano ***** ***** assessments **** ******* *** **** ***** security at **** threat ********** ** **** **** "enhance monitoring *** ******* ** information" ******* ***** ******** **** * ******** ******* to *** critical infrastructure of ****** health *** ** government has *********** ******** ** harden ********** ************ ******* ***** ******** 2005) **** ** extremely ********* ******* of the ***** of a ********** ****** ***** have **** **** ************ in ********* ******** ** ********** stockpiles ** ******* ********* ******* ***** ******** **** * **** In order to improve the ******** ******** ** medical structures *** ** ********** *** ******** *********** to the private ******* (Sauter & ******** **** * ****** response ** hardening *** ******** ************** ** ********* ******** *** ** government *** *********** ******** ** ****** ************** *** ********* ************* ********* (Sauter ***** ******** 2005 * **** The ** ********** has instituted * ******* ******** emergency ************ ******** ******* ***** teaches ****** ******** *** ********* ********** protection ******** *** ******** protocols" (Sauter ***** ******** **** * **** ***** *** defense industrial base ******** infrastructure ****** ** ***** by * ******** of *** private sector *** US ********** has *********** new ******** ** include "critical ************** protection ************ ** ******** ********** ******* ***** Carafano **** * 296) ******** ******** ** ***** ************ ** the "defense ******* ********** production *** ************ processes" ******* ***** ******** **** p 296)The ****************** ******** infrastructure has been ******** ** *** ** government *** in ****** * ******* *** **** ******** ** ******** ***** *** **** ********** areas *** ** *** ************* architecture *** then address *** ******** issue ******* ***** ******** ***** ********** there **** **** been ******* **** in *** ****** ******** ************** sector to ******** *********** ** *** energy ********** (Sauter ***** ******** **** * 298) ******** equipment is being repaired and replaced and ***** **** **** **** ************ in "restoration *** ******** of services" ******* ***** ******** 2005 * *************** improvements have **** made ** ****** *** ************** ******** infrastructure sector; for ******* ******** initiatives **** been *********** to ******* commercial ********* with ********** ***** ******** ***** ********* ******* ***** ******** **** * 299) ***** have also **** *** ************ ** screening technology ***** **** ******** potential ******* to ************** as **** as ****** the ****** ******* sector ** identifying *********** mail" ******* & Carafano 2005 ** *************** *** **** ******* ***** **** ** ****** ******** ************** ***** *** ***** several weaknesses ** *** US ************ ******** ***** face ** *** only ***** thing that is **** ****** **** ********* ******** ************** ** *** ********** ** potential **** of ********** in ***** ******** infrastructures It ** ***** **** ****** to ****** *** ******** infrastructures is too ******** ** a **** *** ** *** **** effective *** ** ********** ***** to ***** ** ***** ***** ** *** ****** ****** ***** *** critical infrastructures are most ********** *** *** York **** *** ******* ********** ** ******* ******* ********** **** ***** ** **** ** *** protection of our ******** ***** ways *********** security systems **** ** be ******** ** ****** *** locks on *** *********** *** St ******** ******** ****** *** ***** David *********** ** ********* an *********** security ****** ** will ****** **** monitoring ** ******* *** ***** ***** in ***** ** approaching ****** **** ***** Mussington) To ******* ******* ***** of ******** ****** ******** ***** ** deployed to ********* dangerous shipments ******* *** locks" **** ***** *********** **** people ***** realize **** * large ******** of *** nation's ***** *** *********** ******* inland ********* ***** is *** ** ** ********* **** **** ********* ** **** to *** ************** *************************** * (2011) **** is *** **** *** to Protect ** ******** ************** **** a Cyber Attack? ********* from http://wwwscientificamericancomLa Bash * *** Landis * ***** August) ***** Policy *** ************** ********** to *** ********** of Critical Infrastructure from ***** Threats Retrieved **** ************************************************ * ***** ****** The ********** of Homeland Security ************ *********** ***** ******** Overview *** Oversight ********** *** Congress ********* **** http://fasorg/sgp/crs/homesec/R40602pdfSikich * ****** ******** *************************** ********* from ********************************* ****** *** Security ** ******** ************** ***** ******** ********* **** ***********************************************

or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question