SlideShare a Scribd company logo
HLSC 720-DISCUSSION 2-REPLY 1
The thread must be a minimum of 250 words. MINIMUM OF TWO SOURCES BESIDES THE
TEXTBOOK. Must cite at least 2 sources in addition to the Bible.TEXTBOOK: Bennett, B. T.
(2018). Understanding, assessing, and responding to terrorism: Protecting critical
infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN:
9781119237785.**FRANK**Critical infrastructure analysis, evaluation, and emergency
response ultimately depend upon its established risk assessment, weighing the value of
attack versus potential target vulnerability (Bennett, 2018). Bennett (2018) defines risk as,
a quantified measure of the possibility that a critical asset will suffer some degree or harm
or loss (Bennett, p. 203, 2018). Risk in its simplest form is a combination of three elements,
when discussing critical infrastructure, a threat toward the asset, any potential asset
vulnerabilities, and the resulting consequences of an attack (Bennett, 2018). Liu & Song
(2020) expanded upon this intentionally simplistic risk definition by including cyber
networks, big data, and telecommunications, encompassing risk assessment into the virtual
arena. Risk, increasingly, has moved beyond physical planning for actual critical
infrastructure response and into server management or cyber security (Liu & Song, 2020).
Quantitative/Qualitative Determining a true number to categorize risk based on
mathematical calculations which weigh a combination of risk-related elements briefly
describes quantitative risk analysis (Bennett, 2018). An essential aspect of quantitative risk
analysis is the establishment of an actual numerical value, allowing for a comparative scale
between multiple critical infrastructures across America (Lyu et al., 2019). For example, if
all libraries with open access were garnering a 3 on the risk scale, a library with partial
open access and metal detectors would be anointed a 2 on the risk scale, assuming the top is
a higher risk (Lyu et al., 2019). If a potential threat was intended upon using explosive
devices in each library, and each library had 50 employees, then the mitigated difference
between potential losses, determined from security differences, from the first to the second
library would establish its quantitative risk rating (Bennett, 2018). Critical Infrastructure
and its individualization denotate specific elements which increase or decrease their overall
risk assessment number, thereby, creating a quantitative risk assessment (Lyu et al.,
2019). Qualitative risk analysis, on the other hand, utilizes a matrix developed from
an event-descriptive scalable table exploring the ratio of hazard likelihood versus
consequences (Bennett, 2018). Although expansive, innately more complex and time-
consuming qualitative risk analysis is implemented more frequently in America,
particularly because it identifies changeable weak points (Bennett, 2018). For example,
Zimek & Hromada (2020) reviewed several consumer malls and shopping centers across
the world utilizing a lens of qualitative risk analysis. The research indicated that reducing
varying access points across the facilities could prevent terrorists easy access, limiting the
ease by which the attack could be carried out (Zimek & Hromada, 2020). Eventually, Zimek
& Hromada (2020) determining multiple entrances, exits, and hallways should be locked or
sealed to the general public, utilizing qualitative risk to improve upon weaknesses.
Comprehensive Risk/Worst Case Scenario Ascertaining the prominent factors in risk
requires a renewal of priorities, it appears the classic doomsayers or worst-case scenario
planners can, at times, prompt more action, however, operating within this theoretical full-
scale disaster mode often results in unrealistic expectations upon businesses or public
entities (Bennett, 2018). For example, if every military base, law enforcement agency, or
private hard target critical infrastructure attempted to incorporate anti-missile technology,
preventing nuclear attacks, the resulting cost and time expended would be inconceivable
(Gao & Deng, 2019). Therefore, researchers like (Gao & Deng) argue for a more achievable
risk assessment methodology, utilizing a comprehensive risk matrix to guide America, and
other world superpowers, toward affordable, achievable, and plausible risk-based
responses and changes. Levels of Analysis Layers of analysis must exist within a
comprehensive risk assessment, identifying the value of an asset through evaluation
becomes paramount to this process (Bennett, 2018). For example, a large urban police
station and a small town hall have completely different levels of value, and corresponding
risk assessment metrics (Bennett, 2018). The assets portfolio or services provided needs to
be weighed amongst its relative value, the urban police station keeps hundreds of
thousands of people safe, while the town hall is responsible for executive and clerical
decisions regarding tens of thousands of people (Gao & Deng, 2019). When viewing the
differences between the two targets in this light it becomes easy to determine a
comparative system-level assessment, hopefully, placing funds, personnel, and resources in
the proper track (Bennett, 2018). The allocation of resources versus risk
management, assessment, and analysis empowers many of Gods passages and messages,
For God gave us a spirit not of fear but of power and love and self-control (English Standard
Version, 2001/2016 2 Timothy 1:7). References Bennett, B. (2018). Understanding,
Assessing and Responding to Terrorism. John Wiley & Sons, Inc. Hoboken, NJ. English
Standard Version. (2016). Bible hub. Retrieved from https://biblehub.com (Original work
published 2001). Gao, S., & Deng, Y. (2019). An Evidential Evaluation of Nuclear Safeguards.
International Journal of Distributed Sensor Networks.
https://doi.org/10.1177/1550147719894550 Liu, W., & Song, Z. (2020). Review of
Studies on the Resilience of Urban Critical Infrastructure Networks. Reliability Engineering
& System Safety. 193. https://doi.org/10.1016/j.ress.2019.106617 Lyu, X., Ding, Y., & Yang,
S. (2019). Safety and Security Risk Assessment in Cyber-Physical Systems. IET Cyber-
Physical Systems: Theory & Applications. 4(3). https://doi.org/10.1049/iet-
cps.2018.5068 Zimek, O., & Hromada, M. (2020). Risk Analysis of Selected Soft Targets.
SGEM. 2(1). https://doi.org/10.5593/sgem2020/2.1/s07.037

More Related Content

Similar to HLSC 1.docx

discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docx
bkbk37
 
Wildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoyWildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoy
OECD Environment
 
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
joyjonna282
 
IE Magazine Article
IE Magazine ArticleIE Magazine Article
IE Magazine ArticleLaura Devine
 
Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services
neirew J
 
Laypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofLaypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception of
ijccsa
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdf
clientmentailai
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
ShiraPrater50
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
adkinspaige22
 
Disaster resilient societies
Disaster resilient societiesDisaster resilient societies
Disaster resilient societiesMaricica Botescu
 
Published create .........lllllDRlage..pdf
Published  create .........lllllDRlage..pdfPublished  create .........lllllDRlage..pdf
Published create .........lllllDRlage..pdf
LataJimma
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
Jennifer Reither
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
festockton
 
Discussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docxDiscussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docx
elinoraudley582231
 
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
ijsptm
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016Cameron Brown
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
felipaser7p
 
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas  Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
civej
 
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREASRISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
civej
 

Similar to HLSC 1.docx (20)

discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docx
 
Wildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoyWildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoy
 
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
 
IE Magazine Article
IE Magazine ArticleIE Magazine Article
IE Magazine Article
 
CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2
 
Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services
 
Laypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofLaypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception of
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdf
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
Disaster resilient societies
Disaster resilient societiesDisaster resilient societies
Disaster resilient societies
 
Published create .........lllllDRlage..pdf
Published  create .........lllllDRlage..pdfPublished  create .........lllllDRlage..pdf
Published create .........lllllDRlage..pdf
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
Discussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docxDiscussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docx
 
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
 
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas  Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
 
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREASRISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
 

More from bkbk37

Range of.docx
Range of.docxRange of.docx
Range of.docx
bkbk37
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
bkbk37
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
bkbk37
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
bkbk37
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
bkbk37
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
bkbk37
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
bkbk37
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docx
bkbk37
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docx
bkbk37
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
bkbk37
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
bkbk37
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
bkbk37
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
bkbk37
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
bkbk37
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
bkbk37
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
bkbk37
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
bkbk37
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
bkbk37
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docx
bkbk37
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
bkbk37
 

More from bkbk37 (20)

Range of.docx
Range of.docxRange of.docx
Range of.docx
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docx
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docx
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docx
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

HLSC 1.docx

  • 1. HLSC 720-DISCUSSION 2-REPLY 1 The thread must be a minimum of 250 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.**FRANK**Critical infrastructure analysis, evaluation, and emergency response ultimately depend upon its established risk assessment, weighing the value of attack versus potential target vulnerability (Bennett, 2018). Bennett (2018) defines risk as, a quantified measure of the possibility that a critical asset will suffer some degree or harm or loss (Bennett, p. 203, 2018). Risk in its simplest form is a combination of three elements, when discussing critical infrastructure, a threat toward the asset, any potential asset vulnerabilities, and the resulting consequences of an attack (Bennett, 2018). Liu & Song (2020) expanded upon this intentionally simplistic risk definition by including cyber networks, big data, and telecommunications, encompassing risk assessment into the virtual arena. Risk, increasingly, has moved beyond physical planning for actual critical infrastructure response and into server management or cyber security (Liu & Song, 2020). Quantitative/Qualitative Determining a true number to categorize risk based on mathematical calculations which weigh a combination of risk-related elements briefly describes quantitative risk analysis (Bennett, 2018). An essential aspect of quantitative risk analysis is the establishment of an actual numerical value, allowing for a comparative scale between multiple critical infrastructures across America (Lyu et al., 2019). For example, if all libraries with open access were garnering a 3 on the risk scale, a library with partial open access and metal detectors would be anointed a 2 on the risk scale, assuming the top is a higher risk (Lyu et al., 2019). If a potential threat was intended upon using explosive devices in each library, and each library had 50 employees, then the mitigated difference between potential losses, determined from security differences, from the first to the second library would establish its quantitative risk rating (Bennett, 2018). Critical Infrastructure and its individualization denotate specific elements which increase or decrease their overall risk assessment number, thereby, creating a quantitative risk assessment (Lyu et al., 2019). Qualitative risk analysis, on the other hand, utilizes a matrix developed from an event-descriptive scalable table exploring the ratio of hazard likelihood versus consequences (Bennett, 2018). Although expansive, innately more complex and time- consuming qualitative risk analysis is implemented more frequently in America, particularly because it identifies changeable weak points (Bennett, 2018). For example,
  • 2. Zimek & Hromada (2020) reviewed several consumer malls and shopping centers across the world utilizing a lens of qualitative risk analysis. The research indicated that reducing varying access points across the facilities could prevent terrorists easy access, limiting the ease by which the attack could be carried out (Zimek & Hromada, 2020). Eventually, Zimek & Hromada (2020) determining multiple entrances, exits, and hallways should be locked or sealed to the general public, utilizing qualitative risk to improve upon weaknesses. Comprehensive Risk/Worst Case Scenario Ascertaining the prominent factors in risk requires a renewal of priorities, it appears the classic doomsayers or worst-case scenario planners can, at times, prompt more action, however, operating within this theoretical full- scale disaster mode often results in unrealistic expectations upon businesses or public entities (Bennett, 2018). For example, if every military base, law enforcement agency, or private hard target critical infrastructure attempted to incorporate anti-missile technology, preventing nuclear attacks, the resulting cost and time expended would be inconceivable (Gao & Deng, 2019). Therefore, researchers like (Gao & Deng) argue for a more achievable risk assessment methodology, utilizing a comprehensive risk matrix to guide America, and other world superpowers, toward affordable, achievable, and plausible risk-based responses and changes. Levels of Analysis Layers of analysis must exist within a comprehensive risk assessment, identifying the value of an asset through evaluation becomes paramount to this process (Bennett, 2018). For example, a large urban police station and a small town hall have completely different levels of value, and corresponding risk assessment metrics (Bennett, 2018). The assets portfolio or services provided needs to be weighed amongst its relative value, the urban police station keeps hundreds of thousands of people safe, while the town hall is responsible for executive and clerical decisions regarding tens of thousands of people (Gao & Deng, 2019). When viewing the differences between the two targets in this light it becomes easy to determine a comparative system-level assessment, hopefully, placing funds, personnel, and resources in the proper track (Bennett, 2018). The allocation of resources versus risk management, assessment, and analysis empowers many of Gods passages and messages, For God gave us a spirit not of fear but of power and love and self-control (English Standard Version, 2001/2016 2 Timothy 1:7). References Bennett, B. (2018). Understanding, Assessing and Responding to Terrorism. John Wiley & Sons, Inc. Hoboken, NJ. English Standard Version. (2016). Bible hub. Retrieved from https://biblehub.com (Original work published 2001). Gao, S., & Deng, Y. (2019). An Evidential Evaluation of Nuclear Safeguards. International Journal of Distributed Sensor Networks. https://doi.org/10.1177/1550147719894550 Liu, W., & Song, Z. (2020). Review of Studies on the Resilience of Urban Critical Infrastructure Networks. Reliability Engineering & System Safety. 193. https://doi.org/10.1016/j.ress.2019.106617 Lyu, X., Ding, Y., & Yang, S. (2019). Safety and Security Risk Assessment in Cyber-Physical Systems. IET Cyber- Physical Systems: Theory & Applications. 4(3). https://doi.org/10.1049/iet- cps.2018.5068 Zimek, O., & Hromada, M. (2020). Risk Analysis of Selected Soft Targets. SGEM. 2(1). https://doi.org/10.5593/sgem2020/2.1/s07.037