Milestone Two: Draft of Vulnerability Identification and Vulnerability Assessment Sections
Thomas L. Norman, one of the world’s leading security design consultants, provided the following definition of vulnerability:
A vulnerability is any condition that could be exploited by a threat actor to carry out an intrusion or escape or to easily destroy property or process. Different threat actors have different goals and thus look for different kinds of vulnerabilities. An economic criminal is looking for different types of vulnerabilities than a violent criminal. A terrorist is looking for different kinds of vulnerabilities than a subversive (Norman, 2016, p. 155).
In this milestone assignment, you will develop a draft of the vulnerability identification and vulnerability assessment sections of your final project.
To complete this milestone assignment, use the Milestone Two Guide document, which provides directions for each prompt.
Prompt
Specifically, the following critical elements must be addressed:
Vulnerability Identification: In this section, you will determine the areas of vulnerability of the key asset that may be exploited by terrorists.
Develop a comprehensive profile of the key asset, utilizing the four main categories of people, property, proprietary information, and reputation.
Explain why you believe this key asset deserves protection based on the profile of the location.
Describe the common vulnerabilities of the critical infrastructure sector that the key asset is a part of, and support with evidence. Be sure to include physical, cyber, and personnel vulnerabilities.
Using your analysis of the key asset and its critical infrastructure sector, determine the known and/or probable vulnerabilities of the key asset. Defend your response.
Vulnerability Assessment: In this section, you will assess the overall vulnerability of your key asset.
Explain how the motivations, capabilities, and tactics of the terrorist groups previously identified could impact their decision to target the key asset.
Determine which of the asset’s known and/or probable vulnerabilities are the most likely to be exploited by terrorists. Explain your reasoning.
Using what you determined above, rate the current vulnerability level of the key asset, and justify your reasoning. Use the scale from the vulnerability worksheet to assist in determining your rating.
Milestone Rubrics: Note that the grading rubric for this milestone submission is not identical to that of the final project, as this is a draft and not your final submission. The Final Project Rubric will include an additional “Exceeds Expectations” category that provides guidance as to how you can go above and beyond “Meets Expectations” in your final submission.
What to Submit
Your paper should be 4 to 5 pages (in addition to the references page) and should follow APA formatting: 12-point Times New Roman font, double spacing, and one-inch margins. Remember to include a references page and cite any research you use in your paper.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
