SlideShare a Scribd company logo
1 of 3
(Mt) – Cumberland University Emerging Threats Discussion
Chapter 6 discusses the concept of correlation. Assume that An agency has focused its
system development and critical infrastructure data collection efforts on separate
engineering management systems for different types of assets and is working on the
integration of these systems. In this case, the agency focused on the data collection for two
types of assets: water treatment and natural gas delivery management facilities. Please
identify what type of critical infrastructure data collection is needed for pavement and
storm water management facilities. To complete this assignment, you must do the
following:A) Create a new thread. As indicated above, identify what type of critical
infrastructure data collection is needed for pavement and storm water management
facilities. B) Select AT LEAST 3 other students’ threads and post substantive comments on
those threads. Your comments should extend the conversation started with the
thread. Repliesstudent Threats Jyostna1.Most of the government infrastructure system is
experiencing cyber-attack since most of the hackers are targeting their confidentiality.
Therefore, they should deploy useful practices to secure and protect their files from the
hacker’s threats under effective analysis. The information that will be discussed in this
paper will relate to the stormwater and pavement data collection process. Therefore, the
team involved should ensure they have a good plan in identifying and mitigating cyber-
attack (Amroso, 2013). The following are some of the measures that are considered:Strom
water management Internal Database: The management has concluded that the information
that has been gathered from the database is one of the easiest approaches of the sample
data. However, the management had some of the simple approaches to managing the data
even though it was complex.Data Collection: The management uses different approaches
such as geometry, aerial picture monitoring, and other better ways of gaining the sample
data.Historical disasters/Strom data: Moreover, some of the data samples were gained from
different historical events that acted as the data sources. The information was used to make
an effective prediction based on disaster occurrences management (Orlins,2015).Sensors
and Road Monitoring: The use of the maps were very effective to sense some of the flow of
the information while detecting the threats affecting data collections.Latitudes and
Longitudes Movement: This is one of the approaches that can be deployed to help the
business to detect and mitigate the disaster occurrences by the use of the geospatial and GIS
systems in gathering effective information that can be deployed to predict the
information.Therefore, the National Infrastructure system should be protected and secured
effectively as mentioned by Amoroso (2015).Transit: It is the responsibility of the
management to make the effective approach of securing the government confidential
information to secure their network under the encryption approach.Data Sources: The
management should consider the source of the data and secure the data effectively.Data
Reduction Emphasis: The data should be maximized securely.Storage Consideration: The
management should ensure the data storage is effectively considered.2. Teja
srivastavaCritical infrastructure data collection is needed for pavement and stormwater
management facilities. The collection of data is very important when it comes to critical
infrastructure development. It’s regarded as being an important step whose effectiveness
will determine the results of the final outcome. Therefore to facilitate the effectiveness of
the two types of assets, the following information will have to be factoredCondition of the
assets- these two assets are similar yet different according to the set performance criteria.
However, the information collected has to be quantitative and detailed or generic and
qualitative according to the established standards and practices. For instance, this can
include information about the pavement conditions, nature of the gas supply, etc. (Pontius,
1993). This information will help to ascertain the present state of the assets and to ascertain
the nature of work /input required to make them operational once morePhysical attributes-
this includes the description of the above two assets such as the length, size, material type,
etc. This will help to ascertain whether the physical attributes coincide with the population
or the present location it is situated. For instance, the material used to build these two types
of assets can be revisited to establish whether the assets are durable enough to withhold
extreme situations.Location- this can be done using geographic coordinates or linear
referencing to clearly map where the natural gas and water treatment facilitates extend.
Location as a factor is used to ascertain the suitability and effectiveness of the asset to that
specific location. In addition, its use in determining the time taken during times such as
disaster recovery and maintenance efforts3. Mohan VamsiFor a proper connection, it is
noteworthy that the components and characteristics of two affiliations are relative. The
more tantamount properties, the least requesting it is to relate, and as the components of
qualities shift, the harder it is to compare. In like manner having similar properties
perceives perils more effectively than the different characteristics as the models are
affirmed against the imprint database. So having various attributes may leave behind the
model that the imprint database has and over the long haul, the structure would be in
danger, causing a shut down from time to time. Relationship between’s asphalt the
executives and tempest water the executive’s offices should be possible from multiple
points of view yet profile-based, signature-based, area-based, and time-sensitive would be
doable for corresponding information for associations at the national level. Any of these
referenced connections enables information gathering to process as well as distinguishes
the anomalous exercises, abnormalities or recognizes noxious dangers and code in the
framework. Low Impact Development (LID) implies a way to deal with stormwater the
board that copies a site’s unique hydrology as the scene is created. Utilizing a low effect
improvement approach, stormwater is overseen on location, and the rate and volume of
predevelopment stormwater coming to accepting waters are unaltered. The count of
predevelopment hydrology depends on local soil.Low effect advancement standards
supplement, and in some cases supplant conventional stormwater the board frameworks,
which indeed stressed moving stormwater off-site with controls, funnels, trench, and lakes.

More Related Content

Similar to Cumberland University Emerging Threats Discussion.docx

Data Mining and Offshore Maintenance Management
Data Mining and Offshore Maintenance ManagementData Mining and Offshore Maintenance Management
Data Mining and Offshore Maintenance Management
Billy Buckenham
 
2004-07-28 Fast Aerosol Sensing Tools for Natural Event Tracking FASTNET
2004-07-28 Fast Aerosol Sensing Tools for Natural Event Tracking FASTNET2004-07-28 Fast Aerosol Sensing Tools for Natural Event Tracking FASTNET
2004-07-28 Fast Aerosol Sensing Tools for Natural Event Tracking FASTNET
Rudolf Husar
 
Paper id 25201431
Paper id 25201431Paper id 25201431
Paper id 25201431
IJRAT
 
Performance evaluation of a discovery and scheduling protocol for multihop ad...
Performance evaluation of a discovery and scheduling protocol for multihop ad...Performance evaluation of a discovery and scheduling protocol for multihop ad...
Performance evaluation of a discovery and scheduling protocol for multihop ad...
Minor33
 
Debbie Wilson: Deliver More Efficient, Joined-Up Services through Improved Ma...
Debbie Wilson: Deliver More Efficient, Joined-Up Services through Improved Ma...Debbie Wilson: Deliver More Efficient, Joined-Up Services through Improved Ma...
Debbie Wilson: Deliver More Efficient, Joined-Up Services through Improved Ma...
AGI Geocommunity
 
Learning in non stationary environments
Learning in non stationary environmentsLearning in non stationary environments
Learning in non stationary environments
Springer
 

Similar to Cumberland University Emerging Threats Discussion.docx (20)

APPLICATION OF MATRIX PROFILE TECHNIQUES TO DETECT INSIGHTFUL DISCORDS IN CLI...
APPLICATION OF MATRIX PROFILE TECHNIQUES TO DETECT INSIGHTFUL DISCORDS IN CLI...APPLICATION OF MATRIX PROFILE TECHNIQUES TO DETECT INSIGHTFUL DISCORDS IN CLI...
APPLICATION OF MATRIX PROFILE TECHNIQUES TO DETECT INSIGHTFUL DISCORDS IN CLI...
 
Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...
Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...
Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
 
Data Mining and Offshore Maintenance Management
Data Mining and Offshore Maintenance ManagementData Mining and Offshore Maintenance Management
Data Mining and Offshore Maintenance Management
 
Stream Processing Environmental Applications in Jordan Valley
Stream Processing Environmental Applications in Jordan ValleyStream Processing Environmental Applications in Jordan Valley
Stream Processing Environmental Applications in Jordan Valley
 
Management High-level overview of the OMG Data Distribution Service (DDS)
Management High-level overview of the OMG Data Distribution Service (DDS)Management High-level overview of the OMG Data Distribution Service (DDS)
Management High-level overview of the OMG Data Distribution Service (DDS)
 
IEEE Service computing 2016 Title and Abstract
IEEE Service computing 2016 Title and AbstractIEEE Service computing 2016 Title and Abstract
IEEE Service computing 2016 Title and Abstract
 
2004-07-28 Fast Aerosol Sensing Tools for Natural Event Tracking FASTNET
2004-07-28 Fast Aerosol Sensing Tools for Natural Event Tracking FASTNET2004-07-28 Fast Aerosol Sensing Tools for Natural Event Tracking FASTNET
2004-07-28 Fast Aerosol Sensing Tools for Natural Event Tracking FASTNET
 
Paper id 25201431
Paper id 25201431Paper id 25201431
Paper id 25201431
 
RAINFALL PREDICTION USING DATA MINING TECHNIQUES - A SURVEY
RAINFALL PREDICTION USING DATA MINING TECHNIQUES - A SURVEYRAINFALL PREDICTION USING DATA MINING TECHNIQUES - A SURVEY
RAINFALL PREDICTION USING DATA MINING TECHNIQUES - A SURVEY
 
Performance evaluation of a discovery and scheduling protocol for multihop ad...
Performance evaluation of a discovery and scheduling protocol for multihop ad...Performance evaluation of a discovery and scheduling protocol for multihop ad...
Performance evaluation of a discovery and scheduling protocol for multihop ad...
 
Back to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV securityBack to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV security
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
 
Debbie Wilson: Deliver More Efficient, Joined-Up Services through Improved Ma...
Debbie Wilson: Deliver More Efficient, Joined-Up Services through Improved Ma...Debbie Wilson: Deliver More Efficient, Joined-Up Services through Improved Ma...
Debbie Wilson: Deliver More Efficient, Joined-Up Services through Improved Ma...
 
Steinberg
SteinbergSteinberg
Steinberg
 
P47
P47P47
P47
 
Data repository for sensor network a data mining approach
Data repository for sensor network  a data mining approachData repository for sensor network  a data mining approach
Data repository for sensor network a data mining approach
 
Short-Term Weather Forecasting Using Spatial Feature Attention Based LSTM Mod...
Short-Term Weather Forecasting Using Spatial Feature Attention Based LSTM Mod...Short-Term Weather Forecasting Using Spatial Feature Attention Based LSTM Mod...
Short-Term Weather Forecasting Using Spatial Feature Attention Based LSTM Mod...
 
Learning in non stationary environments
Learning in non stationary environmentsLearning in non stationary environments
Learning in non stationary environments
 
IRJET- AC Duct Monitoring and Cleaning Vehicle for Train Coaches
IRJET- AC Duct Monitoring and Cleaning Vehicle for Train CoachesIRJET- AC Duct Monitoring and Cleaning Vehicle for Train Coaches
IRJET- AC Duct Monitoring and Cleaning Vehicle for Train Coaches
 

More from write22

Utilizing research software can be daunting for a What.docx
Utilizing research software can be daunting for a What.docxUtilizing research software can be daunting for a What.docx
Utilizing research software can be daunting for a What.docx
write22
 
To Prepare Reflect on your own community and consider the.docx
To Prepare Reflect on your own community and consider the.docxTo Prepare Reflect on your own community and consider the.docx
To Prepare Reflect on your own community and consider the.docx
write22
 
Watch this video about Joseph concept of Creative.docx
Watch this video about Joseph concept of Creative.docxWatch this video about Joseph concept of Creative.docx
Watch this video about Joseph concept of Creative.docx
write22
 
write a 700 word psychoanalytic criticism research about the.docx
write a 700 word psychoanalytic criticism research about the.docxwrite a 700 word psychoanalytic criticism research about the.docx
write a 700 word psychoanalytic criticism research about the.docx
write22
 
You have had the opportunity to review thermoregulation as is.docx
You have had the opportunity to review thermoregulation as is.docxYou have had the opportunity to review thermoregulation as is.docx
You have had the opportunity to review thermoregulation as is.docx
write22
 
Write 300 words in MLA Nietzsche claims God.docx
Write 300 words in MLA Nietzsche claims God.docxWrite 300 words in MLA Nietzsche claims God.docx
Write 300 words in MLA Nietzsche claims God.docx
write22
 
Write 300 words in MLA choose one topic.docx
Write 300 words in MLA choose one topic.docxWrite 300 words in MLA choose one topic.docx
Write 300 words in MLA choose one topic.docx
write22
 
Week 9 Assignment 2 Case Total Quality.docx
Week 9 Assignment 2 Case Total Quality.docxWeek 9 Assignment 2 Case Total Quality.docx
Week 9 Assignment 2 Case Total Quality.docx
write22
 
What were American and British strategies for winning the.docx
What were American and British strategies for winning the.docxWhat were American and British strategies for winning the.docx
What were American and British strategies for winning the.docx
write22
 
What is the process involving movement of mantle rock that.docx
What is the process involving movement of mantle rock that.docxWhat is the process involving movement of mantle rock that.docx
What is the process involving movement of mantle rock that.docx
write22
 
Unit Learning Outcomes ULO Explain job and.docx
Unit Learning Outcomes ULO Explain job and.docxUnit Learning Outcomes ULO Explain job and.docx
Unit Learning Outcomes ULO Explain job and.docx
write22
 
Timeline of events what was happening that was important.docx
Timeline of events what was happening that was important.docxTimeline of events what was happening that was important.docx
Timeline of events what was happening that was important.docx
write22
 
To what degree did the emergence of a large union.docx
To what degree did the emergence of a large union.docxTo what degree did the emergence of a large union.docx
To what degree did the emergence of a large union.docx
write22
 
This you will begin to synthesize the information you.docx
This you will begin to synthesize the information you.docxThis you will begin to synthesize the information you.docx
This you will begin to synthesize the information you.docx
write22
 
This is for Understanding the behavior of infection.docx
This is for Understanding the behavior of infection.docxThis is for Understanding the behavior of infection.docx
This is for Understanding the behavior of infection.docx
write22
 
The use of devices within information technology has increased exponentially....
The use of devices within information technology has increased exponentially....The use of devices within information technology has increased exponentially....
The use of devices within information technology has increased exponentially....
write22
 
Steven Smith was employed by the Avon School District as.docx
Steven Smith was employed by the Avon School District as.docxSteven Smith was employed by the Avon School District as.docx
Steven Smith was employed by the Avon School District as.docx
write22
 
Students will assume the situation of an individual with.docx
Students will assume the situation of an individual with.docxStudents will assume the situation of an individual with.docx
Students will assume the situation of an individual with.docx
write22
 
The company that all students will use for their final.docx
The company that all students will use for their final.docxThe company that all students will use for their final.docx
The company that all students will use for their final.docx
write22
 
the following critical elements must be Lens.docx
the following critical elements must be Lens.docxthe following critical elements must be Lens.docx
the following critical elements must be Lens.docx
write22
 

More from write22 (20)

Utilizing research software can be daunting for a What.docx
Utilizing research software can be daunting for a What.docxUtilizing research software can be daunting for a What.docx
Utilizing research software can be daunting for a What.docx
 
To Prepare Reflect on your own community and consider the.docx
To Prepare Reflect on your own community and consider the.docxTo Prepare Reflect on your own community and consider the.docx
To Prepare Reflect on your own community and consider the.docx
 
Watch this video about Joseph concept of Creative.docx
Watch this video about Joseph concept of Creative.docxWatch this video about Joseph concept of Creative.docx
Watch this video about Joseph concept of Creative.docx
 
write a 700 word psychoanalytic criticism research about the.docx
write a 700 word psychoanalytic criticism research about the.docxwrite a 700 word psychoanalytic criticism research about the.docx
write a 700 word psychoanalytic criticism research about the.docx
 
You have had the opportunity to review thermoregulation as is.docx
You have had the opportunity to review thermoregulation as is.docxYou have had the opportunity to review thermoregulation as is.docx
You have had the opportunity to review thermoregulation as is.docx
 
Write 300 words in MLA Nietzsche claims God.docx
Write 300 words in MLA Nietzsche claims God.docxWrite 300 words in MLA Nietzsche claims God.docx
Write 300 words in MLA Nietzsche claims God.docx
 
Write 300 words in MLA choose one topic.docx
Write 300 words in MLA choose one topic.docxWrite 300 words in MLA choose one topic.docx
Write 300 words in MLA choose one topic.docx
 
Week 9 Assignment 2 Case Total Quality.docx
Week 9 Assignment 2 Case Total Quality.docxWeek 9 Assignment 2 Case Total Quality.docx
Week 9 Assignment 2 Case Total Quality.docx
 
What were American and British strategies for winning the.docx
What were American and British strategies for winning the.docxWhat were American and British strategies for winning the.docx
What were American and British strategies for winning the.docx
 
What is the process involving movement of mantle rock that.docx
What is the process involving movement of mantle rock that.docxWhat is the process involving movement of mantle rock that.docx
What is the process involving movement of mantle rock that.docx
 
Unit Learning Outcomes ULO Explain job and.docx
Unit Learning Outcomes ULO Explain job and.docxUnit Learning Outcomes ULO Explain job and.docx
Unit Learning Outcomes ULO Explain job and.docx
 
Timeline of events what was happening that was important.docx
Timeline of events what was happening that was important.docxTimeline of events what was happening that was important.docx
Timeline of events what was happening that was important.docx
 
To what degree did the emergence of a large union.docx
To what degree did the emergence of a large union.docxTo what degree did the emergence of a large union.docx
To what degree did the emergence of a large union.docx
 
This you will begin to synthesize the information you.docx
This you will begin to synthesize the information you.docxThis you will begin to synthesize the information you.docx
This you will begin to synthesize the information you.docx
 
This is for Understanding the behavior of infection.docx
This is for Understanding the behavior of infection.docxThis is for Understanding the behavior of infection.docx
This is for Understanding the behavior of infection.docx
 
The use of devices within information technology has increased exponentially....
The use of devices within information technology has increased exponentially....The use of devices within information technology has increased exponentially....
The use of devices within information technology has increased exponentially....
 
Steven Smith was employed by the Avon School District as.docx
Steven Smith was employed by the Avon School District as.docxSteven Smith was employed by the Avon School District as.docx
Steven Smith was employed by the Avon School District as.docx
 
Students will assume the situation of an individual with.docx
Students will assume the situation of an individual with.docxStudents will assume the situation of an individual with.docx
Students will assume the situation of an individual with.docx
 
The company that all students will use for their final.docx
The company that all students will use for their final.docxThe company that all students will use for their final.docx
The company that all students will use for their final.docx
 
the following critical elements must be Lens.docx
the following critical elements must be Lens.docxthe following critical elements must be Lens.docx
the following critical elements must be Lens.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Cumberland University Emerging Threats Discussion.docx

  • 1. (Mt) – Cumberland University Emerging Threats Discussion Chapter 6 discusses the concept of correlation. Assume that An agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems for different types of assets and is working on the integration of these systems. In this case, the agency focused on the data collection for two types of assets: water treatment and natural gas delivery management facilities. Please identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. To complete this assignment, you must do the following:A) Create a new thread. As indicated above, identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. Repliesstudent Threats Jyostna1.Most of the government infrastructure system is experiencing cyber-attack since most of the hackers are targeting their confidentiality. Therefore, they should deploy useful practices to secure and protect their files from the hacker’s threats under effective analysis. The information that will be discussed in this paper will relate to the stormwater and pavement data collection process. Therefore, the team involved should ensure they have a good plan in identifying and mitigating cyber- attack (Amroso, 2013). The following are some of the measures that are considered:Strom water management Internal Database: The management has concluded that the information that has been gathered from the database is one of the easiest approaches of the sample data. However, the management had some of the simple approaches to managing the data even though it was complex.Data Collection: The management uses different approaches such as geometry, aerial picture monitoring, and other better ways of gaining the sample data.Historical disasters/Strom data: Moreover, some of the data samples were gained from different historical events that acted as the data sources. The information was used to make an effective prediction based on disaster occurrences management (Orlins,2015).Sensors and Road Monitoring: The use of the maps were very effective to sense some of the flow of the information while detecting the threats affecting data collections.Latitudes and Longitudes Movement: This is one of the approaches that can be deployed to help the business to detect and mitigate the disaster occurrences by the use of the geospatial and GIS systems in gathering effective information that can be deployed to predict the information.Therefore, the National Infrastructure system should be protected and secured effectively as mentioned by Amoroso (2015).Transit: It is the responsibility of the
  • 2. management to make the effective approach of securing the government confidential information to secure their network under the encryption approach.Data Sources: The management should consider the source of the data and secure the data effectively.Data Reduction Emphasis: The data should be maximized securely.Storage Consideration: The management should ensure the data storage is effectively considered.2. Teja srivastavaCritical infrastructure data collection is needed for pavement and stormwater management facilities. The collection of data is very important when it comes to critical infrastructure development. It’s regarded as being an important step whose effectiveness will determine the results of the final outcome. Therefore to facilitate the effectiveness of the two types of assets, the following information will have to be factoredCondition of the assets- these two assets are similar yet different according to the set performance criteria. However, the information collected has to be quantitative and detailed or generic and qualitative according to the established standards and practices. For instance, this can include information about the pavement conditions, nature of the gas supply, etc. (Pontius, 1993). This information will help to ascertain the present state of the assets and to ascertain the nature of work /input required to make them operational once morePhysical attributes- this includes the description of the above two assets such as the length, size, material type, etc. This will help to ascertain whether the physical attributes coincide with the population or the present location it is situated. For instance, the material used to build these two types of assets can be revisited to establish whether the assets are durable enough to withhold extreme situations.Location- this can be done using geographic coordinates or linear referencing to clearly map where the natural gas and water treatment facilitates extend. Location as a factor is used to ascertain the suitability and effectiveness of the asset to that specific location. In addition, its use in determining the time taken during times such as disaster recovery and maintenance efforts3. Mohan VamsiFor a proper connection, it is noteworthy that the components and characteristics of two affiliations are relative. The more tantamount properties, the least requesting it is to relate, and as the components of qualities shift, the harder it is to compare. In like manner having similar properties perceives perils more effectively than the different characteristics as the models are affirmed against the imprint database. So having various attributes may leave behind the model that the imprint database has and over the long haul, the structure would be in danger, causing a shut down from time to time. Relationship between’s asphalt the executives and tempest water the executive’s offices should be possible from multiple points of view yet profile-based, signature-based, area-based, and time-sensitive would be doable for corresponding information for associations at the national level. Any of these referenced connections enables information gathering to process as well as distinguishes the anomalous exercises, abnormalities or recognizes noxious dangers and code in the framework. Low Impact Development (LID) implies a way to deal with stormwater the board that copies a site’s unique hydrology as the scene is created. Utilizing a low effect improvement approach, stormwater is overseen on location, and the rate and volume of predevelopment stormwater coming to accepting waters are unaltered. The count of predevelopment hydrology depends on local soil.Low effect advancement standards
  • 3. supplement, and in some cases supplant conventional stormwater the board frameworks, which indeed stressed moving stormwater off-site with controls, funnels, trench, and lakes.