SlideShare a Scribd company logo
Reply to post 1 & 2 with 150 words each
Post 1
It isn't so much what role the private sector plays in the
determination of risks related to the challenges at the local
level. It becomes more of what isn't the private sector doing and
why aren't they contributing resources to Homeland Security.
The private sector continually dedicates resources, funding, and
personnel in support of Homeland Security and the operations
associated with the partnership. "Within homeland security,
there are five partnership archetypes that encompass the types
of relationships we share with the private sector" (Department
of Homeland Security, 2014, p. 61). These partnership
archetypes allow Homeland Security and private sector
organizations to utilize such models when challenges, roles, and
responsibilities are defined. When challenges, roles, and
responsibilities are not defined the problem increases, therefore
the flexibility of the models can occur to achieve the desire
outcome. The archetypes contribute to the private sector in the
determination of risks related to the six challenges associated
with Homeland Security. This is because the models can be
applied to any situation or involvement between the two at the
local level. When a model isn't achievable, the method or
intertwining or conjoint models helps achieve in determination.
A specific example of how a privately owned or operated
companies and business add or reduce risk in one of the six
strategic challenge areas is the Air Cargo Advance Screening
(ACAS) Program. This program correlates to the terrorism
strategic challenge because it requires the partnership between
the federal industry and the airline industry. This requires
airline industries to submit documentation of air cargo in
advance regarding shipments arriving to the U.S. from foreign
locations. Granted this was originally a voluntary process that
airlines already participated in, however, in June 2018 it
become a requirement. "This is a necessary measure as the
Department of Homeland Security (DHS) continues to raise the
baseline on aviation security worldwide" (Department of
Homeland Security, 2018, p. 1). It is a practical application in
mitigating future terrorism because it requires airlines to submit
the documentation of air cargo at the earliest possibility before
the cargo is loaded on the plane that it's being transported to the
U.S. This program aids in the reduction and helps reduce
terrorism because terrorism will employ any means necessary to
send and receive the necessary tools and equipment to commit
terrorist acts against U.S.
Post 2
As I continue to read and learn about the Quadrennial homeland
security review, the more I realize how important and
informative of a document it is regarding threats to the US.
Hopefully, the 2018 version is released soon so we can see how
threats change and evolve. As it relates to threats and hazards to
the US and critical infrastructure, the private sector and public
collaborate often in order to ensure threat information is
properly disseminated for the best and current security practices
(DHS, 2014). The federal government maintains a steadfast
relationship with the private sector to ensure stakeholders are
properly managed and the best practices regarding security of
the nation is adhered to (DHS, 2014). One key concern
impacting the private sector is budgeting which can affect local
investment for security of smaller communities not able to
obtain outside funding (DHS, 2014). As the cyber environment
continues to be at the forefront of threats facing the US, it is
imperative DHS continues to partner with law enforcement
partners and the private sector to determine how terrorist or
extremist use the internet (DHS, 2014). Furthermore, after
determining the online threat, local communities can be taught
how to better protect themselves while online. This technique
can be built up as the community becomes more aware of the
threats.
An obvious but significant direct support from the private sector
to the natural hazard strategic challenge is by contributing to
disaster relief financing (Chandra, et al, 2016). This can be
accomplished through a variety of ways, either short or long
term through partnerships or supplemented by federal funds
(Chandra, et al, 2016). Regardless, these public and private
arrangements are vital in the successful recovery of a smaller
community. A specific example I can recently remember is
when multiple privately-owned power companies from the east
coast sent personnel to NC and SC after hurricane Florence last
year when hundreds of thousands of people did not have power.
Through these efforts the power was able to be properly
restored ultimately reducing the risk for electrical fires or “hot”
lines scattered throughout the community.
Thank you for the time and have a good week.

More Related Content

Similar to Reply to post 1 & 2 with 150 words eachPost 1It isnt so m

National Response Framework And National Incident...
National Response Framework And National Incident...National Response Framework And National Incident...
National Response Framework And National Incident...
Deb Birch
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
hartrobert670
 
Homeland Security Bill
Homeland Security BillHomeland Security Bill
Homeland Security Bill
Lissette Hartman
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
felicidaddinwoodie
 
20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetterDoug DePeppe, Esq.
 
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docxLarry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
smile790243
 
250 words agree or disagree In the last several decades, peo.docx
250 words agree or disagree In the last several decades, peo.docx250 words agree or disagree In the last several decades, peo.docx
250 words agree or disagree In the last several decades, peo.docx
vickeryr87
 
HM510Week2 AssignmentAs the assistant director of emergency
HM510Week2 AssignmentAs the assistant director of emergency HM510Week2 AssignmentAs the assistant director of emergency
HM510Week2 AssignmentAs the assistant director of emergency
SusanaFurman449
 
Order 325914012
Order 325914012Order 325914012
Order 325914012
Denis Simiyu
 
Concepts On Information Sharing And Interoperability Contestabile Final 03 0...
Concepts On Information Sharing And Interoperability Contestabile  Final 03 0...Concepts On Information Sharing And Interoperability Contestabile  Final 03 0...
Concepts On Information Sharing And Interoperability Contestabile Final 03 0...
jcontestabile
 
Fema And The Federal Emergency Management Agency
Fema And The Federal Emergency Management AgencyFema And The Federal Emergency Management Agency
Fema And The Federal Emergency Management Agency
Denise Enriquez
 
Discussion Question  For this week’s assigned reading, you were t.docx
Discussion Question  For this week’s assigned reading, you were t.docxDiscussion Question  For this week’s assigned reading, you were t.docx
Discussion Question  For this week’s assigned reading, you were t.docx
elinoraudley582231
 
Is 2014 the year for Cyber Militias ?
Is 2014 the year for Cyber Militias ?Is 2014 the year for Cyber Militias ?
Is 2014 the year for Cyber Militias ?
David Sweigert
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Course Objective - Assess the importance of Port Management .docx
Course Objective - Assess the importance of Port Management .docxCourse Objective - Assess the importance of Port Management .docx
Course Objective - Assess the importance of Port Management .docx
vanesaburnand
 

Similar to Reply to post 1 & 2 with 150 words eachPost 1It isnt so m (17)

National Response Framework And National Incident...
National Response Framework And National Incident...National Response Framework And National Incident...
National Response Framework And National Incident...
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Homeland Security Bill
Homeland Security BillHomeland Security Bill
Homeland Security Bill
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 
20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter
 
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docxLarry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
 
250 words agree or disagree In the last several decades, peo.docx
250 words agree or disagree In the last several decades, peo.docx250 words agree or disagree In the last several decades, peo.docx
250 words agree or disagree In the last several decades, peo.docx
 
HM510Week2 AssignmentAs the assistant director of emergency
HM510Week2 AssignmentAs the assistant director of emergency HM510Week2 AssignmentAs the assistant director of emergency
HM510Week2 AssignmentAs the assistant director of emergency
 
Order 325914012
Order 325914012Order 325914012
Order 325914012
 
Concepts On Information Sharing And Interoperability Contestabile Final 03 0...
Concepts On Information Sharing And Interoperability Contestabile  Final 03 0...Concepts On Information Sharing And Interoperability Contestabile  Final 03 0...
Concepts On Information Sharing And Interoperability Contestabile Final 03 0...
 
Prichard_WritingSample1
Prichard_WritingSample1Prichard_WritingSample1
Prichard_WritingSample1
 
Fema And The Federal Emergency Management Agency
Fema And The Federal Emergency Management AgencyFema And The Federal Emergency Management Agency
Fema And The Federal Emergency Management Agency
 
Discussion Question  For this week’s assigned reading, you were t.docx
Discussion Question  For this week’s assigned reading, you were t.docxDiscussion Question  For this week’s assigned reading, you were t.docx
Discussion Question  For this week’s assigned reading, you were t.docx
 
Is 2014 the year for Cyber Militias ?
Is 2014 the year for Cyber Militias ?Is 2014 the year for Cyber Militias ?
Is 2014 the year for Cyber Militias ?
 
Prichard_WritingSample2
Prichard_WritingSample2Prichard_WritingSample2
Prichard_WritingSample2
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Course Objective - Assess the importance of Port Management .docx
Course Objective - Assess the importance of Port Management .docxCourse Objective - Assess the importance of Port Management .docx
Course Objective - Assess the importance of Port Management .docx
 

More from felipaser7p

Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docxDiscussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
felipaser7p
 
Discussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docxDiscussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docx
felipaser7p
 
Discussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docxDiscussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docx
felipaser7p
 
Discussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docxDiscussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docx
felipaser7p
 
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docxDiscussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
felipaser7p
 
Discussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docxDiscussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docx
felipaser7p
 
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docxDiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
felipaser7p
 
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docxDiscussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
felipaser7p
 
Discussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docxDiscussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docx
felipaser7p
 
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docxDiscussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
felipaser7p
 
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docxDiscussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
felipaser7p
 
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docxDiscussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
felipaser7p
 
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docxDiscussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
felipaser7p
 
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docxDiscussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
felipaser7p
 
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docxDiscussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
felipaser7p
 
Discussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docxDiscussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docx
felipaser7p
 
discussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docxdiscussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docx
felipaser7p
 
Discussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docxDiscussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docx
felipaser7p
 
Discussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docxDiscussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docx
felipaser7p
 
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docxDiscussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
felipaser7p
 

More from felipaser7p (20)

Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docxDiscussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
 
Discussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docxDiscussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docx
 
Discussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docxDiscussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docx
 
Discussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docxDiscussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docx
 
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docxDiscussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
 
Discussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docxDiscussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docx
 
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docxDiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
 
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docxDiscussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
 
Discussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docxDiscussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docx
 
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docxDiscussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
 
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docxDiscussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
 
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docxDiscussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
 
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docxDiscussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
 
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docxDiscussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
 
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docxDiscussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
 
Discussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docxDiscussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docx
 
discussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docxdiscussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docx
 
Discussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docxDiscussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docx
 
Discussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docxDiscussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docx
 
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docxDiscussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Reply to post 1 & 2 with 150 words eachPost 1It isnt so m

  • 1. Reply to post 1 & 2 with 150 words each Post 1 It isn't so much what role the private sector plays in the determination of risks related to the challenges at the local level. It becomes more of what isn't the private sector doing and why aren't they contributing resources to Homeland Security. The private sector continually dedicates resources, funding, and personnel in support of Homeland Security and the operations associated with the partnership. "Within homeland security, there are five partnership archetypes that encompass the types of relationships we share with the private sector" (Department of Homeland Security, 2014, p. 61). These partnership archetypes allow Homeland Security and private sector organizations to utilize such models when challenges, roles, and responsibilities are defined. When challenges, roles, and responsibilities are not defined the problem increases, therefore the flexibility of the models can occur to achieve the desire outcome. The archetypes contribute to the private sector in the determination of risks related to the six challenges associated with Homeland Security. This is because the models can be applied to any situation or involvement between the two at the local level. When a model isn't achievable, the method or intertwining or conjoint models helps achieve in determination. A specific example of how a privately owned or operated companies and business add or reduce risk in one of the six strategic challenge areas is the Air Cargo Advance Screening (ACAS) Program. This program correlates to the terrorism strategic challenge because it requires the partnership between the federal industry and the airline industry. This requires airline industries to submit documentation of air cargo in advance regarding shipments arriving to the U.S. from foreign
  • 2. locations. Granted this was originally a voluntary process that airlines already participated in, however, in June 2018 it become a requirement. "This is a necessary measure as the Department of Homeland Security (DHS) continues to raise the baseline on aviation security worldwide" (Department of Homeland Security, 2018, p. 1). It is a practical application in mitigating future terrorism because it requires airlines to submit the documentation of air cargo at the earliest possibility before the cargo is loaded on the plane that it's being transported to the U.S. This program aids in the reduction and helps reduce terrorism because terrorism will employ any means necessary to send and receive the necessary tools and equipment to commit terrorist acts against U.S. Post 2 As I continue to read and learn about the Quadrennial homeland security review, the more I realize how important and informative of a document it is regarding threats to the US. Hopefully, the 2018 version is released soon so we can see how threats change and evolve. As it relates to threats and hazards to the US and critical infrastructure, the private sector and public collaborate often in order to ensure threat information is properly disseminated for the best and current security practices (DHS, 2014). The federal government maintains a steadfast relationship with the private sector to ensure stakeholders are properly managed and the best practices regarding security of the nation is adhered to (DHS, 2014). One key concern impacting the private sector is budgeting which can affect local investment for security of smaller communities not able to obtain outside funding (DHS, 2014). As the cyber environment continues to be at the forefront of threats facing the US, it is imperative DHS continues to partner with law enforcement partners and the private sector to determine how terrorist or
  • 3. extremist use the internet (DHS, 2014). Furthermore, after determining the online threat, local communities can be taught how to better protect themselves while online. This technique can be built up as the community becomes more aware of the threats. An obvious but significant direct support from the private sector to the natural hazard strategic challenge is by contributing to disaster relief financing (Chandra, et al, 2016). This can be accomplished through a variety of ways, either short or long term through partnerships or supplemented by federal funds (Chandra, et al, 2016). Regardless, these public and private arrangements are vital in the successful recovery of a smaller community. A specific example I can recently remember is when multiple privately-owned power companies from the east coast sent personnel to NC and SC after hurricane Florence last year when hundreds of thousands of people did not have power. Through these efforts the power was able to be properly restored ultimately reducing the risk for electrical fires or “hot” lines scattered throughout the community. Thank you for the time and have a good week.