SlideShare a Scribd company logo
10:26 PM (CDT)
Unit 3 ­ Individual Project 
Assignment Details
Assignment Description
Click on the following links for the Phase 3 Reading Assignment:
Sim Technologies for Evac Planning and Disaster Response
In this assignment, you are required to create and present an essay that addresses a real­world scenario regarding the anticipation of a devastating crisis emergency (student
selected), and you must make an assessment of the necessary technology (software or hard technology) to mitigate, resolve, and restore normalcy. The scenario may be of
a terrorist attack, a natural phenomenon (hurricane, tornado, earthquake, flooding, etc.), a school shooting or act of workplace violence, an infrastructure failure, a natural gas
line explosion and resulting fire, a forest fire threatening homes and lives, and so forth.
Assignment Guidelines
Address the following in an essay of 750–1,000 words:
In detail, describe your selected scenario.
As stated above, your scenario can include terrorist attacks, natural disasters, violent domestic acts, school shootings, infrastructure failures, natural
gas explosions, forest fires, and so on.
Regarding your scenario, what are 1–2 types of technology that you would use during each of the different phases of emergency management? Consider
technology that is used to improve operational efficiencies, such as communications, industrial technology, and data storage.
The 4 phases that need to be addressed are as follows:
Mitigation
Preparation
Response
Recovery
For each technology that you have selected, address the following:
Is this technology applicable to any of the other emergency management phases? Why or why not?
Based on past use, how effective is the technology? Explain.
How much does the technology cost? Explain.
Consider equipment, training, maintenance, and implementation costs.
Considering future advancements, is the technology practical for long­term applications? Explain.
Compile your responses into the final essay, and submit the file to your instructor.
Be sure to reference all sources using APA style.
Please submit your assignment.
For assistance with your assignment, please use your text, Web resources, and all course materials.
Reading Assignment
You can find links to the following articles in the Phase 3 Assignment Descriptions:
Sim Technologies for Evac Planning and Disaster Response
Assignment Objectives
Evaluate the use of Homeland Security and Emergency Management technologies for All­Hazards event planning and response.
Other Information
There is no additional information to display at this time.
Legend
Extra Credit View Assignment Rubric
Assignment Overview
Type: Individual Project
Unit:  Planning, Response, and Technology
Due Date:  Wed, 6/6/18
Grading Type: Numeric
Points Possible:  135
Points Earned:  0
Deliverable Length:  750–1,000 words
Go To:
Assignment Details
Scenario
Learning Materials
Reading Assignment
My Work:
Online Deliverables: Submissions
Privacy Policy Terms of Use About Our Ads Contact Us
© 2018 Colorado Technical University. 
  All Rights Reserved. Authorized Users Only.

More Related Content

Similar to Db3

Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1
nikig6806
 
Fso size up03
Fso   size up03Fso   size up03
Fso size up03
Kevin C
 
Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1
uopassignment
 
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
todd521
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
lorainedeserre
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
felicidaddinwoodie
 
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
juliekannai
 
Briefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland SecurityBriefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland Security
Mark Ehlen
 
Managing Vulnerability SEC400 Managing.docx
Managing Vulnerability     SEC400 Managing.docxManaging Vulnerability     SEC400 Managing.docx
Managing Vulnerability SEC400 Managing.docx
infantsuk
 
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
Gregoire Burel
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
MITRE ATT&CK
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planningmmohamme1124
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
SusanaFurman449
 
Chapter 13
Chapter 13Chapter 13
Chapter 13Joe
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security Adhar kashyap
 
The number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docxThe number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docx
armitageclaire49
 
CMGT 230 Education Redefined / snaptutorial.com
CMGT 230 Education Redefined / snaptutorial.comCMGT 230 Education Redefined / snaptutorial.com
CMGT 230 Education Redefined / snaptutorial.com
McdonaldRyan208
 

Similar to Db3 (19)

Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1
 
CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2
 
Fso size up03
Fso   size up03Fso   size up03
Fso size up03
 
Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1Stayer cis 359 week 3 case study 1
Stayer cis 359 week 3 case study 1
 
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
 
Briefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland SecurityBriefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland Security
 
Managing Vulnerability SEC400 Managing.docx
Managing Vulnerability     SEC400 Managing.docxManaging Vulnerability     SEC400 Managing.docx
Managing Vulnerability SEC400 Managing.docx
 
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planning
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
The number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docxThe number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docx
 
CMGT 230 Education Redefined / snaptutorial.com
CMGT 230 Education Redefined / snaptutorial.comCMGT 230 Education Redefined / snaptutorial.com
CMGT 230 Education Redefined / snaptutorial.com
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Db3