Chat with us, powered by LiveChat Outline on transportation sector and aviation subsector | acewriters
+1(978)310-4246 credencewriters@gmail.com
  

1ST ATTACHMENT IS THE IP4 ASSIGNMENT NEEDED TO COMPLETE THIS OUTLINE, AND 2ND ATTACHMENT IS A SAMPLE OF THE FULL AND DETAIL OUTLINE NEEDED FOR THIS ASSIGNMENT.Post an outline of your Unit 4 IP Key Assignment draft for peer review. Review and provide feedback to a minimum of 1 peer. In crafting your outline, return to the discussions and assignments from the earlier phases of this course. There is no specific order for your final product (Key Assignment), but you should demonstrate good organization skills and comprehensive inclusion of the main elements. You may also look at the illustrations or M.U.S.E. items to be reminded of components to include. For the outline you will share here, be as specific and detailed as possible. For example, do not simply state “Risk Assessment.” Instead (as an example), state:Risk Assessment of the Hoover Dam as the most critical node in the Lower Colorado Dams Network.This asset is chosen as most critical because…Threats considered include erosion, user demand, earthquake, terrorist attack…Consequences considered include, loss of all reserved water in dam, impact on agriculture, damage or destruction to lower dams…The most likely “Threats” include…Remember, this is an example of being comprehensive and specific; your node, priorities, conditions, and so forth may necessitate other elements in your outline.
ip4_assignment.docx

essay_outline__3_.docx

Unformatted Attachment Preview

Note: There are 2 parts to this assignment.
Part 1
Based on the John Harrald (et al) article titled “Review of Risk-Based Prioritization/Decision Making Methodologies
for Dams,” and your independent research, choose at least 1 method of vulnerability analysis and conduct a risk
assessment (RA) using a model of your choice or from the example provided in this Phase’s materials. There are
many models to choose from, and sector-specific plans may assist you in locating 1 for your sector.
After selecting and properly referencing the source of your RA methodology, complete the following:





Describe how it works.
Complete the analysis of your asset.
Report the findings.
Be sure to identify, list, and describe threats, vulnerabilities, consequences, and risks.
After identifying the greatest risks, offer some realistic mitigation measures.
o These should be well-researched and sophisticated, and costs associated with these should also
be presented. For example, for deterring a terrorist attack on the Hoover Dam, stating “use a
security guard” is not specific enough, is not necessarily a realistic and true deterrent, and
includes no information about this as an expense.
Your report should be 3–5 pages, not including a title or reference page, may include tables, graphs, lists, or
whatever format you believe clearly delivers the results of this RA.
Part 2
Not all critical infrastructures (CIs) can be equally protected. Limited resources in terms of dollars, manpower,
time, political will, and so forth mean that assets are in competition for support. Economics and political agendas,
plus cultural, psychological, legal, and other factors might also influence the allocation of scarce resources.
Add the choices to this environment of competing interests, and select an allocation model that you would
recommend to the governmental or corporate leader who you would hypothetically advise regarding your asset or
network. You may also assemble parts and pieces from different strategies depending on any variety of elements
you must consider.
Example 1
There is a bridge in your network that you consider critical, but there are 2 alternate routes in your system by
which travelers could bypass a problematic bridge. The original bridge may not be critical or may warrant a lower
allocation of maintenance funds, because maintenance could be done more regularly and cheaply with traffic
rerouted. In such a case, your allocation model might assign increasing dollars over 5 years to achieve a certain
maintenance standard. Unless you are an engineer, you might not know this kind of detail or comprehend such
schemes. For this reason and others, you should be researching mitigation measures and solutions from subjectmatter sources.
Example 2
In the attacks of 9/11, Flight 77 crashed into the western face of the Pentagon, killing 184 people on the aircraft
and in the building. Many more might have been casualties that day if protective window treatments made of
Mylar materials had not been installed in the then-recent renovations of that western area. Broken, flying glass is a
cause for many injuries and incapacitation in other explosions. In this case, a relatively simple and somewhat less
expensive solution probably saved lives. If given limited funds to protect the Pentagon, one might choose to install
only blast-resistant windows. For more on this, see the Pentagon’s Renovation Manager’s news briefing on
September 15, 2001, available here.
The allocation model you choose and write about for this Week’s individual project may be 1 of the strategies Ted
Lewis discusses, a combination of these models, or a strategy of your own design with or without elements from
the other models. Be sure to include the following:





Be prepared to describe fully how your allocation model works.
Describe how it would apply for your assigned network or asset.
You must detail what it will mean in terms of concrete outcomes, or what resources will be applied to
your asset or network.
Determine what impact it might have for other critical infrastructure priorities in your community or
company.
Because you are an advisor to a leader, also discuss various ways the community or company might pay or
offset these protection or resilience-enhancing measures.
You should be able to discuss and explain the rationale for any budget or resource allowances you use. This will
require additional, comprehensive research. For example, if you discuss increased training for special responders,
find out from your real-world community members or company what such training costs. Remember to think
comprehensively, using the 360-degree view. If you are training 1 person for a week, what travel costs must be
included? Is another person working the trainee’s shifts, and if so, are these hours overtime? What does that cost?
How does the agency plan for training costs?
Even hypothetical scenarios should have real-world facts and figures to draw upon. Provide and properly cite
sources for budgets, measures, ideas, recommendations, and so forth that are drawn from external sources. Your
report should be 2–3 pages, not including a title or reference page, and may include tables, graphs, lists, or
whatever format you believe clearly delivers the basis for your allocation strategy.
Please submit your assignment.
Reference
Evey, L. (2001). DOD News Briefing on Pentagon Renovation [Interview transcript]. Retrieved from U.S. Department
of Defense Web site: http://www.defense.gov/transcripts/transcript.aspx?transcriptid=1636
Harrald, J. R., Renda-Tanali, I., Shaw, G. L., Rubin, C. B., Yeletaysi, S. (2004). Review of risk based
prioritization/decision making methodologies for dams. Washington, DC: The George Washington
University Institute for Crisis, Disaster, and Risk Management.
ESSAY OUTLINE
*This is a general outline. To add more paragraphs, follow the format of the Paragraph Topic
Sentence
I.
II.
III.
IV.
Introduction:
A. Introduction: how are you going to grab your audience’s attention
B. General information about the topic
C. Reason for the audience to read your paper/what you are trying to prove
D. Thesis statement
Paragraph Topic Sentence
A. Support/evidence
i. Detail or example
ii. Detail or example
B. Support/evidence
i. Detail or example
ii. Detail or example
C. Support/evidence
i. Detail or example
ii. Detail or example
D. Transition into your next paragraph
Paragraph Topic Sentence
A. Support/evidence
i. Detail or example
ii. Detail or example
B. Support/evidence
i. Detail or example
ii. Detail or example
C. Support/evidence
i. Detail or example
ii. Detail or example
D. Transition into your next paragraph
Paragraph Topic Sentence
A. Support/evidence
i. Detail or example
ii. Detail or example
B. Support/evidence
i. Detail or example
ii. Detail or example
C. Support/evidence
i. Detail or example
V.
ii. Detail or example
D. Transition into your next paragraph
Conclusion
A. Restate your thesis statement
B. Summarize your main points
C. Relate it to the general concept/topic
D. Wrap up of essay

Purchase answer to see full
attachment

error: Content is protected !!