SlideShare a Scribd company logo
1 of 2
HLSC 720-DISCUSSION 2-REPLY 1
The thread must be a minimum of 250 words. MINIMUM OF TWO SOURCES BESIDES THE
TEXTBOOK. Must cite at least 2 sources in addition to the Bible.TEXTBOOK: Bennett, B. T.
(2018). Understanding, assessing, and responding to terrorism: Protecting critical
infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN:
9781119237785.**FRANK**Critical infrastructure analysis, evaluation, and emergency
response ultimately depend upon its established risk assessment, weighing the value of
attack versus potential target vulnerability (Bennett, 2018). Bennett (2018) defines risk as,
a quantified measure of the possibility that a critical asset will suffer some degree or harm
or loss (Bennett, p. 203, 2018). Risk in its simplest form is a combination of three elements,
when discussing critical infrastructure, a threat toward the asset, any potential asset
vulnerabilities, and the resulting consequences of an attack (Bennett, 2018). Liu & Song
(2020) expanded upon this intentionally simplistic risk definition by including cyber
networks, big data, and telecommunications, encompassing risk assessment into the virtual
arena. Risk, increasingly, has moved beyond physical planning for actual critical
infrastructure response and into server management or cyber security (Liu & Song, 2020).
Quantitative/Qualitative Determining a true number to categorize risk based on
mathematical calculations which weigh a combination of risk-related elements briefly
describes quantitative risk analysis (Bennett, 2018). An essential aspect of quantitative risk
analysis is the establishment of an actual numerical value, allowing for a comparative scale
between multiple critical infrastructures across America (Lyu et al., 2019). For example, if
all libraries with open access were garnering a 3 on the risk scale, a library with partial
open access and metal detectors would be anointed a 2 on the risk scale, assuming the top is
a higher risk (Lyu et al., 2019). If a potential threat was intended upon using explosive
devices in each library, and each library had 50 employees, then the mitigated difference
between potential losses, determined from security differences, from the first to the second
library would establish its quantitative risk rating (Bennett, 2018). Critical Infrastructure
and its individualization denotate specific elements which increase or decrease their overall
risk assessment number, thereby, creating a quantitative risk assessment (Lyu et al.,
2019). Qualitative risk analysis, on the other hand, utilizes a matrix developed from
an event-descriptive scalable table exploring the ratio of hazard likelihood versus
consequences (Bennett, 2018). Although expansive, innately more complex and time-
consuming qualitative risk analysis is implemented more frequently in America,
particularly because it identifies changeable weak points (Bennett, 2018). For example,
Zimek & Hromada (2020) reviewed several consumer malls and shopping centers across
the world utilizing a lens of qualitative risk analysis. The research indicated that reducing
varying access points across the facilities could prevent terrorists easy access, limiting the
ease by which the attack could be carried out (Zimek & Hromada, 2020). Eventually, Zimek
& Hromada (2020) determining multiple entrances, exits, and hallways should be locked or
sealed to the general public, utilizing qualitative risk to improve upon weaknesses.
Comprehensive Risk/Worst Case Scenario Ascertaining the prominent factors in risk
requires a renewal of priorities, it appears the classic doomsayers or worst-case scenario
planners can, at times, prompt more action, however, operating within this theoretical full-
scale disaster mode often results in unrealistic expectations upon businesses or public
entities (Bennett, 2018). For example, if every military base, law enforcement agency, or
private hard target critical infrastructure attempted to incorporate anti-missile technology,
preventing nuclear attacks, the resulting cost and time expended would be inconceivable
(Gao & Deng, 2019). Therefore, researchers like (Gao & Deng) argue for a more achievable
risk assessment methodology, utilizing a comprehensive risk matrix to guide America, and
other world superpowers, toward affordable, achievable, and plausible risk-based
responses and changes. Levels of Analysis Layers of analysis must exist within a
comprehensive risk assessment, identifying the value of an asset through evaluation
becomes paramount to this process (Bennett, 2018). For example, a large urban police
station and a small town hall have completely different levels of value, and corresponding
risk assessment metrics (Bennett, 2018). The assets portfolio or services provided needs to
be weighed amongst its relative value, the urban police station keeps hundreds of
thousands of people safe, while the town hall is responsible for executive and clerical
decisions regarding tens of thousands of people (Gao & Deng, 2019). When viewing the
differences between the two targets in this light it becomes easy to determine a
comparative system-level assessment, hopefully, placing funds, personnel, and resources in
the proper track (Bennett, 2018). The allocation of resources versus risk
management, assessment, and analysis empowers many of Gods passages and messages,
For God gave us a spirit not of fear but of power and love and self-control (English Standard
Version, 2001/2016 2 Timothy 1:7). References Bennett, B. (2018). Understanding,
Assessing and Responding to Terrorism. John Wiley & Sons, Inc. Hoboken, NJ. English
Standard Version. (2016). Bible hub. Retrieved from https://biblehub.com (Original work
published 2001). Gao, S., & Deng, Y. (2019). An Evidential Evaluation of Nuclear Safeguards.
International Journal of Distributed Sensor Networks.
https://doi.org/10.1177/1550147719894550 Liu, W., & Song, Z. (2020). Review of
Studies on the Resilience of Urban Critical Infrastructure Networks. Reliability Engineering
& System Safety. 193. https://doi.org/10.1016/j.ress.2019.106617 Lyu, X., Ding, Y., & Yang,
S. (2019). Safety and Security Risk Assessment in Cyber-Physical Systems. IET Cyber-
Physical Systems: Theory & Applications. 4(3). https://doi.org/10.1049/iet-
cps.2018.5068 Zimek, O., & Hromada, M. (2020). Risk Analysis of Selected Soft Targets.
SGEM. 2(1). https://doi.org/10.5593/sgem2020/2.1/s07.037

More Related Content

Similar to Critical infrastructure risk analysis

discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxbkbk37
 
Wildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoyWildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoyOECD Environment
 
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx
1 A Cost-Benefit Analysis of the New Orleans Flood P.docxjoyjonna282
 
IE Magazine Article
IE Magazine ArticleIE Magazine Article
IE Magazine ArticleLaura Devine
 
Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services neirew J
 
Laypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofLaypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofijccsa
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdfclientmentailai
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxShiraPrater50
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxadkinspaige22
 
Disaster resilient societies
Disaster resilient societiesDisaster resilient societies
Disaster resilient societiesMaricica Botescu
 
Published create .........lllllDRlage..pdf
Published  create .........lllllDRlage..pdfPublished  create .........lllllDRlage..pdf
Published create .........lllllDRlage..pdfLataJimma
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform MovementJennifer Reither
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
 
Discussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docxDiscussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docxelinoraudley582231
 
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...ijsptm
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016Cameron Brown
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mfelipaser7p
 
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREASRISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAScivej
 
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas  Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas civej
 

Similar to Critical infrastructure risk analysis (20)

discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docx
 
Wildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoyWildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoy
 
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
 
IE Magazine Article
IE Magazine ArticleIE Magazine Article
IE Magazine Article
 
CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2
 
Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services
 
Laypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofLaypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception of
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdf
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
Disaster resilient societies
Disaster resilient societiesDisaster resilient societies
Disaster resilient societies
 
Published create .........lllllDRlage..pdf
Published  create .........lllllDRlage..pdfPublished  create .........lllllDRlage..pdf
Published create .........lllllDRlage..pdf
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
Discussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docxDiscussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docx
 
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
 
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREASRISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
 
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas  Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
 

More from bkbk37

Range of.docx
Range of.docxRange of.docx
Range of.docxbkbk37
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docxbkbk37
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxbkbk37
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxbkbk37
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxbkbk37
 
Race and.docx
Race and.docxRace and.docx
Race and.docxbkbk37
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docxbkbk37
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docxbkbk37
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docxbkbk37
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxbkbk37
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docxbkbk37
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docxbkbk37
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxbkbk37
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxbkbk37
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxbkbk37
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxbkbk37
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxbkbk37
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxbkbk37
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxbkbk37
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docxbkbk37
 

More from bkbk37 (20)

Range of.docx
Range of.docxRange of.docx
Range of.docx
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docx
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docx
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docx
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Critical infrastructure risk analysis

  • 1. HLSC 720-DISCUSSION 2-REPLY 1 The thread must be a minimum of 250 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.**FRANK**Critical infrastructure analysis, evaluation, and emergency response ultimately depend upon its established risk assessment, weighing the value of attack versus potential target vulnerability (Bennett, 2018). Bennett (2018) defines risk as, a quantified measure of the possibility that a critical asset will suffer some degree or harm or loss (Bennett, p. 203, 2018). Risk in its simplest form is a combination of three elements, when discussing critical infrastructure, a threat toward the asset, any potential asset vulnerabilities, and the resulting consequences of an attack (Bennett, 2018). Liu & Song (2020) expanded upon this intentionally simplistic risk definition by including cyber networks, big data, and telecommunications, encompassing risk assessment into the virtual arena. Risk, increasingly, has moved beyond physical planning for actual critical infrastructure response and into server management or cyber security (Liu & Song, 2020). Quantitative/Qualitative Determining a true number to categorize risk based on mathematical calculations which weigh a combination of risk-related elements briefly describes quantitative risk analysis (Bennett, 2018). An essential aspect of quantitative risk analysis is the establishment of an actual numerical value, allowing for a comparative scale between multiple critical infrastructures across America (Lyu et al., 2019). For example, if all libraries with open access were garnering a 3 on the risk scale, a library with partial open access and metal detectors would be anointed a 2 on the risk scale, assuming the top is a higher risk (Lyu et al., 2019). If a potential threat was intended upon using explosive devices in each library, and each library had 50 employees, then the mitigated difference between potential losses, determined from security differences, from the first to the second library would establish its quantitative risk rating (Bennett, 2018). Critical Infrastructure and its individualization denotate specific elements which increase or decrease their overall risk assessment number, thereby, creating a quantitative risk assessment (Lyu et al., 2019). Qualitative risk analysis, on the other hand, utilizes a matrix developed from an event-descriptive scalable table exploring the ratio of hazard likelihood versus consequences (Bennett, 2018). Although expansive, innately more complex and time- consuming qualitative risk analysis is implemented more frequently in America, particularly because it identifies changeable weak points (Bennett, 2018). For example,
  • 2. Zimek & Hromada (2020) reviewed several consumer malls and shopping centers across the world utilizing a lens of qualitative risk analysis. The research indicated that reducing varying access points across the facilities could prevent terrorists easy access, limiting the ease by which the attack could be carried out (Zimek & Hromada, 2020). Eventually, Zimek & Hromada (2020) determining multiple entrances, exits, and hallways should be locked or sealed to the general public, utilizing qualitative risk to improve upon weaknesses. Comprehensive Risk/Worst Case Scenario Ascertaining the prominent factors in risk requires a renewal of priorities, it appears the classic doomsayers or worst-case scenario planners can, at times, prompt more action, however, operating within this theoretical full- scale disaster mode often results in unrealistic expectations upon businesses or public entities (Bennett, 2018). For example, if every military base, law enforcement agency, or private hard target critical infrastructure attempted to incorporate anti-missile technology, preventing nuclear attacks, the resulting cost and time expended would be inconceivable (Gao & Deng, 2019). Therefore, researchers like (Gao & Deng) argue for a more achievable risk assessment methodology, utilizing a comprehensive risk matrix to guide America, and other world superpowers, toward affordable, achievable, and plausible risk-based responses and changes. Levels of Analysis Layers of analysis must exist within a comprehensive risk assessment, identifying the value of an asset through evaluation becomes paramount to this process (Bennett, 2018). For example, a large urban police station and a small town hall have completely different levels of value, and corresponding risk assessment metrics (Bennett, 2018). The assets portfolio or services provided needs to be weighed amongst its relative value, the urban police station keeps hundreds of thousands of people safe, while the town hall is responsible for executive and clerical decisions regarding tens of thousands of people (Gao & Deng, 2019). When viewing the differences between the two targets in this light it becomes easy to determine a comparative system-level assessment, hopefully, placing funds, personnel, and resources in the proper track (Bennett, 2018). The allocation of resources versus risk management, assessment, and analysis empowers many of Gods passages and messages, For God gave us a spirit not of fear but of power and love and self-control (English Standard Version, 2001/2016 2 Timothy 1:7). References Bennett, B. (2018). Understanding, Assessing and Responding to Terrorism. John Wiley & Sons, Inc. Hoboken, NJ. English Standard Version. (2016). Bible hub. Retrieved from https://biblehub.com (Original work published 2001). Gao, S., & Deng, Y. (2019). An Evidential Evaluation of Nuclear Safeguards. International Journal of Distributed Sensor Networks. https://doi.org/10.1177/1550147719894550 Liu, W., & Song, Z. (2020). Review of Studies on the Resilience of Urban Critical Infrastructure Networks. Reliability Engineering & System Safety. 193. https://doi.org/10.1016/j.ress.2019.106617 Lyu, X., Ding, Y., & Yang, S. (2019). Safety and Security Risk Assessment in Cyber-Physical Systems. IET Cyber- Physical Systems: Theory & Applications. 4(3). https://doi.org/10.1049/iet- cps.2018.5068 Zimek, O., & Hromada, M. (2020). Risk Analysis of Selected Soft Targets. SGEM. 2(1). https://doi.org/10.5593/sgem2020/2.1/s07.037