RISK ASSESSMENT PART II!
***PLEASE LOOK AT THE ATTACHMENTS*** YOU WILL BE ADDING TO THIS ASSIGNMENT TO PART I and II
THE ATTACHMENTS ARE THE INSTRUCTIONS AND RISK ASSESSMENT PARTS I AND II. YOU WILL ADD PART III TO THE ATTACHED.
For this assignment, you will add a new section to your Risk Assessment: Part 1 –
Vulnerability Analysis Critical Infrastructure Assignment and label it “Part 3.” Do not get
rid of Parts 1 and 2. Add to your existing table of contents and reference page at the end of the
paper.
In Part 3, you will:
1. Provide a single unit/station assessment. Clearly identify the unit of assessment.
2. The below tables will be needed along with the needed verbiage.
RISK ASSESSMENT OF NASHVILLE BNA AIRPORT 3
Risk assessment of Nashville BNA Airport
Parts I & II
Table of Contents
1.1Critical infrastructure, vulnerability analysis, and risk assessment 3
1.1.1 Defining and measuring risk 3
1.1.3 Role of government in risk assessment 4
1.1.4 Asset-level vs. portfolio-level analysis 4
1.2 FEMA's community perspective on mitigation 4
1.2.1 Tools, techniques, processes, and best practices for identifying critical infrastructure 5
1.3.1 The critical infrastructure identification process 6
1.3.3 National preparedness and homeland security directives 7
1.6 PPD 21 and the Stafford Act 8
1.6.1 Protective security and effective security countermeasures 9
1.6.2 Pure risk assessment model and security vulnerability analysis 9
3.1 Structural and non-structural mitigation strategies 13
3.1.1 Assessment and recommendations 14
Arvdsson , B., Johanson , J., & Guldaker , N. (2021). Critical infrastructure, geographical information science and risk governance: A systematic cross-field review. Reliability Engineering and Safety 15
Felice , F., Baffo, I., & Petrillo, I. (2021). Critical Infrastructures Overview: Past, Present and Future. Sutainability , (14), 4. https://www.mdpi.com/2071-1050/14/4/2233 15
Critical Infrastructure
The Department of Homeland Security lists sixteen critical substructure sectors whose assets, structures, and systems (physical or virtual) are so vital to the US that their disruption or obliteration would have a devastating impact on national security, financial security, public health, and care, or any grouping thereof (Krausmann, et al. 2019). Our essential substructures provide vital services. Significant resources are government, private, or individual property that may be evaluated economically. Vulnerability research quantifies vulnerabilities based on asset and threat evaluations and evaluates current security measures.
Risk is the probability that a vital asset may be damaged or lost due to a defined threat targeting and exploiting a specific susceptibility of a critical substructure, key source, or essential support. Risk assessments analyze a vital asset's security system using specified scenarios. Serious asset value, threats, vulnerabilities, and the chance of exploitation determine risk.
Threats foretell bad things. Successful threats can damage essential assets. Threats have intent. A hazard is an action or circumstance that exposes a danger. Terrorists or cyber-attacks are threats. Natural hazards include floods and hurricanes. All risks are human-made, and while most stakes are genuine, humans may cause them by ignorance or not following laws and procedures.
Risk evaluations need unique government involvement. DHS says doctrine and guidelines are the first and most crucial stage in risk management integration. Risk management and risk assessments do not avoid evil occurrences but help agencies, corporations, and individuals focus on the most harmful actions and how to prevent or reduce them. FEMA, DHS, and community-developed risk assessments should be tailored to each resource and scenario. Individuals, companies, and agencies must follow the instructions and create mitigation strategies. The government assesses risk for assets that harm the US or essential assets within its jurisdiction.
Asset-level security gives baseline risk facts. Asset-level protection analyzes one asset at a time. Asset-level guard involves scenario documentation, importance, critical evaluation, security susceptibility assessment, hazard likelihood valuation, benefit/cost investigation, and risk-informed conclusions (Guo, et al., 2019). Portfolio risk assessment compares various assets to asset-level protection. Portfolio risk assessment involves investments, an industry, and an authority or city. Loss is the main distinction between asset and collection risk investigation. The portfolio-level investigation evaluates direct asset sufferers and indirect losses from physical geography, cyber, or internal and outside rational interdependencies, whereas asset-level analysis estimates asset losses solely.
FEMA lists five important infrastructure planning activities. First, they advocate a standard critical infrastructure identification process that includes assets and structures, dependencies, interdependencies, and significant nodes within the authority (FEMA). Second, acquire duplicates of current security and resilience, hazard extenuation, emergency processes, emergency response, and continuity of operations plans. Third, staff must examine, coordinate, and update current methods to maintain critical infrastructure security and resilience and build a customized strategy and program for the area of responsibility (FEMA). Fourth, each system must define security, jurisdiction, and information-sharing roles. Finally, gaps, whether functions and duties cover all operational instructions, jurisdictional borders and coordination efforts, and particular geographical challenges. All risks, independent of source, repercussions of asset breaches, optimal preventive measures based on asset vulnerabilities, priority strategy, and program implementation instructions must be defined.
Identifying critical infrastructure and choosing tools, strategies, procedures, and best practices to minimize risks and recover after an event is possible. First, identify critical infrastructure, resources, and assets. Second, these assets and resources must be rated by importance. Third, assess threats (Rehak et al., 2019). General and site-specific threat assessments exist. Available threat assessments predict the possibility of enemies attacking a crucial asset. Each resource and support undergoes site-specific threat assessment. Fourth, a vulnerability assessment must identify weaknesses that an adversary or environmental hazard can exploit. Fifth, risk assessments must identify high-risk assets. Finally, security countermeasures must be created to address vulnerabilities and dangers.
The CARVER matrix is a common asset vulnerability analysis tool. CARVER provides
We are a professional custom writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework.
Yes. We have posted over our previous orders to display our experience. Since we have done this question before, we can also do it for you. To make sure we do it perfectly, please fill our Order Form. Filling the order form correctly will assist our team in referencing, specifications and future communication.
1. Click on the “Place order tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
2. Fill in your paper’s requirements in the "PAPER INFORMATION" section and click “PRICE CALCULATION” at the bottom to calculate your order price.
3. Fill in your paper’s academic level, deadline and the required number of pages from the drop-down menus.
4. Click “FINAL STEP” to enter your registration details and get an account with us for record keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
5. From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.
Need help with this assignment?
Order it here claim 25% discount
Discount Code: SAVE25