Provide a detailed overview of your overall assessment area. Provide ample (exhaustive) GIS data and mapping data of your overall assessment area. Use CARVER along with the various tables
RISK ASSESSMENT PART II
***PLEASE LOOK AT THE ATTACHMENT*** YOU WILL BE ADDING TO THIS ASSIGNMENT TO PART I
INSTRUCTIONS
Provide a detailed overview of your overall assessment area.
Provide ample (exhaustive) GIS data and mapping data of your overall assessment area.
Use CARVER along with the various tables and formulas found in your text to complete
the needed tables.
Identify the top 10 specific critical infrastructures in the area to guard and protect and
explain your reasoning.
Identify the top 3 specific critical infrastructures in the area to guard and protect and
explain your reasoning.
Complete Tables 1–2.
Paper must contain three or more full pages of content not including the cover and
reference pages.
Seven or more excellent sources must be cited.
APA formatting guidelines must be used
RISK ASSESSMENT: PART 2 – DATA PROFILE, GEOGRAPHIC INFORMATION SYSTEM, AND MAPPING ASSIGNMENT INSTRUCTIONS OVERVIEW For this assignment, you will add a new section to your Risk Assessment: Part 1 – Vulnerability Analysis Critical Infrastructure Assignment and label it “Part 2.” Do not get rid of Part 1. Add to your existing table of contents and reference page at the end of the paper. In Part 2 you will: 1. Provide a detailed overview of your overall assessment area. Provide an in-depth data profile (identifying the population and demographic data for the area) of your overall assessment area. 2. Provide ample (exhaustive) GIS data and mapping data of your overall assessment area. a. Each table, figure, or chart needs to be properly labeled as per current APA. b. These numbers will change when new sections are added. c. Use visuals such as maps, satellite images, diagrams, etc. 3. Use CARVER along with the various tables and formulas found in your textbook to complete the needed tables. The same will be used in Part 3. (See textbook) 4. Identify the top 10 specific critical infrastructures in the area to guard and protect and explain your reasoning. Use the below table but also provide data that supports each area being on this list.
5. Identify the top 3 specific critical infrastructures in the area to guard and protect and explain your reasoning. Create another Table just like above with only the top 3 listed. This will be Table 2. (Analyze the area for factors that contribute to critical infrastructure identification.) *Your CI list will have more than 3 locations—the top 3 will need what is called for above— They cannot be areas; they need to be locations. The locations cannot be a group of all schools in the county or all banks.
INSTRUCTIONS Provide a detailed overview of your overall assessment area. Provide ample (exhaustive) GIS data and mapping data of your overall assessment area. Use CARVER along with the various tables and formulas found in your text to complete the needed tables. Identify the top 10 specific critical infrastructures in the area to guard and protect and explain your reasoning. Identify the top 3 specific critical infrastructures in the area to guard and protect and explain your reasoning. Complete Tables 1–2. Paper must contain three or more full pages of content not including the cover and reference pages. Seven or more excellent sources must be cited. APA formatting guidelines must be used
image1.png
,
RISK ASSESSMENT OF NASHVILLE BNA AIRPORT 12
Risk assessment of Nashville BNA Airport
Parts I
Table of Contents
1.1“Critical infrastructure, vulnerability analysis, and risk assessment” 3
1.1.1Defining and measuring risk 3
1.1.3Role of government in risk assessment 4
1.1.4 “Asset-level vs. portfolio-level analysis” 4
1.2 FEMA's community perspective on mitigation 4
1.2.1 Tools, techniques, processes, and best practices for identifying critical infrastructure 5
1.3.1 The critical infrastructure identification process 6
1.3.3“National preparedness and homeland security directives” 6
1.6 “PPD 21 and the Stafford Act” 8
1.6.1 “Protective security and effective security countermeasures” 8
1.6.2 “Pure risk assessment model and security vulnerability analysis” 8
2.1 Overview of Nashville BNA Airport 9
3.1 Structural and non-structural mitigation strategies 10
3.1.1 Assessment and recommendations 11
Critical Infrastructure
1.1Critical infrastructure, vulnerability analysis, and risk assessment
The Department of Homeland Security lists sixteen critical substructure sectors whose assets, structures, and systems (physical or virtual) are so vital to the US that their disruption or obliteration would have a devastating impact on national security, financial security, public health, and care, or any grouping thereof (Krausmann, et al. 2019). Our essential substructures provide vital services. Essential resources are government, private, or individual property that may be evaluated economically. Vulnerability research quantifies vulnerabilities based on asset and threat evaluations and evaluates current security measures.
1.1.1 Defining and measuring risk
Risk is the probability that a vital asset may be damaged or lost due to a defined threat targeting and exploiting a specific susceptibility of a critical substructure, key source, or key support. Risk assessments analyze a vital asset's security system using specified scenarios. Serious asset value, threats, vulnerabilities, and the chance of exploitation determine risk.
1.1.2 Threats and Hazards
Threats foretell bad things. Successful threats can damage essential assets. Threats have intent. A hazard is an action or circumstance that exposes a hazard. Terrorists or cyber-attacks are threats. Natural hazards include floods and hurricanes. All risks are human-made, and while most hazards are natural, humans may cause them by ignorance or not following laws and procedures.
1.1.3 Role of government in risk assessment
Risk evaluations need unique government involvement. DHS says doctrine and guidelines are the first and most crucial stage in risk management integration. Risk management and risk assessments do not avoid evil occurrences but help agencies, corporations, and individuals focus on the most harmful actions and how to prevent or reduce them. FEMA, DHS, and community-developed risk assessments should be tailored to each resource and scenario. Individuals, companies, and agencies must follow the instructions and create mitigation strategies. The government assesses risk for assets that harm the US or essential assets within its jurisdiction.
1.1.4 Asset-level vs. portfolio-level analysis
Asset-level security gives baseline risk facts. Asset-level protection analyzes one asset at a time. Asset-level guard involves scenario documentation, importance, critical evaluation, security susceptibility assessment, hazard likelihood valuation, benefit/cost investigation, and risk-informed conclusions (Guo, et al. 2019). Portfolio risk assessment compares various assets to asset-level protection. Portfolio risk assessment involves investments, an industry, and an authority or city. Loss is the main distinction between asset and collection risk investigation. The portfolio-level investigation evaluates direct asset sufferers and indirect losses from physical geography, cyber, or internal and outside rational interdependencies, whereas asset-level analysis estimates asset losses solely.
1.2 FEMA's community perspective on mitigation
FEMA lists five important infrastructure planning activities. First, they advocate a standard critical infrastructure identification process that includes assets and structures, dependencies, interdependencies, and significant nodes within the authority (FEMA). Second, acquire duplicates of current security and resilience, hazard extenuation, emergency processes, emergency response, and continuity of operations plans. Third, staff must examine, coordinate, and update current methods to maintain critical infrastructure security and resilience and build a customized strategy and program for the area of responsibility (FEMA). Fourth, each system must define security, jurisdiction, and information-sharing roles. Finally, gaps, whether roles and duties cover all operational instructions, jurisdictional borders and coordination efforts, and particular geographical challenges. All risks, independent of source, repercussions of asset breaches, optimal preventive measures based on asset vulnerabilities, priority strategy, and program implementation instructions must be defined.
1.2.1 Tools, techniques, processes, and best practices for identifying critical infrastructure
Identifying critical infrastructure and choosing tools, strategies, procedures, and best practices to minimize risks and recover after an event is possible. First, identify critical infrastructure, resources, and assets. Second, these assets and resources must be rated by importance. Third, assess threats (Rehak, et al. 2019). General and site-specific threat assessments exist. General threat a
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.