SlideShare a Scribd company logo
1 of 2
Download to read offline
10:26 PM (CDT)
Unit 3 ­ Individual Project 
Assignment Details
Assignment Description
Click on the following links for the Phase 3 Reading Assignment:
Sim Technologies for Evac Planning and Disaster Response
In this assignment, you are required to create and present an essay that addresses a real­world scenario regarding the anticipation of a devastating crisis emergency (student
selected), and you must make an assessment of the necessary technology (software or hard technology) to mitigate, resolve, and restore normalcy. The scenario may be of
a terrorist attack, a natural phenomenon (hurricane, tornado, earthquake, flooding, etc.), a school shooting or act of workplace violence, an infrastructure failure, a natural gas
line explosion and resulting fire, a forest fire threatening homes and lives, and so forth.
Assignment Guidelines
Address the following in an essay of 750–1,000 words:
In detail, describe your selected scenario.
As stated above, your scenario can include terrorist attacks, natural disasters, violent domestic acts, school shootings, infrastructure failures, natural
gas explosions, forest fires, and so on.
Regarding your scenario, what are 1–2 types of technology that you would use during each of the different phases of emergency management? Consider
technology that is used to improve operational efficiencies, such as communications, industrial technology, and data storage.
The 4 phases that need to be addressed are as follows:
Mitigation
Preparation
Response
Recovery
For each technology that you have selected, address the following:
Is this technology applicable to any of the other emergency management phases? Why or why not?
Based on past use, how effective is the technology? Explain.
How much does the technology cost? Explain.
Consider equipment, training, maintenance, and implementation costs.
Considering future advancements, is the technology practical for long­term applications? Explain.
Compile your responses into the final essay, and submit the file to your instructor.
Be sure to reference all sources using APA style.
Please submit your assignment.
For assistance with your assignment, please use your text, Web resources, and all course materials.
Reading Assignment
You can find links to the following articles in the Phase 3 Assignment Descriptions:
Sim Technologies for Evac Planning and Disaster Response
Assignment Objectives
Evaluate the use of Homeland Security and Emergency Management technologies for All­Hazards event planning and response.
Other Information
There is no additional information to display at this time.
Legend
Extra Credit View Assignment Rubric
Assignment Overview
Type: Individual Project
Unit:  Planning, Response, and Technology
Due Date:  Wed, 6/6/18
Grading Type: Numeric
Points Possible:  135
Points Earned:  0
Deliverable Length:  750–1,000 words
Go To:
Assignment Details
Scenario
Learning Materials
Reading Assignment
My Work:
Online Deliverables: Submissions
Privacy Policy Terms of Use About Our Ads Contact Us
© 2018 Colorado Technical University. 
  All Rights Reserved. Authorized Users Only.

More Related Content

Similar to Db3

Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
todd521
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
lorainedeserre
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
felicidaddinwoodie
 
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
juliekannai
 
Managing Vulnerability SEC400 Managing.docx
Managing Vulnerability     SEC400 Managing.docxManaging Vulnerability     SEC400 Managing.docx
Managing Vulnerability SEC400 Managing.docx
infantsuk
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planning
mmohamme1124
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
SusanaFurman449
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
Joe
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
Adhar kashyap
 
The number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docxThe number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docx
armitageclaire49
 

Similar to Db3 (19)

Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1
 
CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2
 
Fso size up03
Fso   size up03Fso   size up03
Fso size up03
 
Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1
 
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
 
Briefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland SecurityBriefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland Security
 
Managing Vulnerability SEC400 Managing.docx
Managing Vulnerability     SEC400 Managing.docxManaging Vulnerability     SEC400 Managing.docx
Managing Vulnerability SEC400 Managing.docx
 
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planning
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
The number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docxThe number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docx
 
CMGT 230 Education Redefined / snaptutorial.com
CMGT 230 Education Redefined / snaptutorial.comCMGT 230 Education Redefined / snaptutorial.com
CMGT 230 Education Redefined / snaptutorial.com
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Db3