SlideShare a Scribd company logo
1 of 2
HLSC 720-DISCUSSION 2-REPLY 1
The thread must be a minimum of 250 words. MINIMUM OF TWO SOURCES BESIDES THE
TEXTBOOK. Must cite at least 2 sources in addition to the Bible.TEXTBOOK: Bennett, B. T.
(2018). Understanding, assessing, and responding to terrorism: Protecting critical
infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN:
9781119237785.**FRANK**Critical infrastructure analysis, evaluation, and emergency
response ultimately depend upon its established risk assessment, weighing the value of
attack versus potential target vulnerability (Bennett, 2018). Bennett (2018) defines risk as,
a quantified measure of the possibility that a critical asset will suffer some degree or harm
or loss (Bennett, p. 203, 2018). Risk in its simplest form is a combination of three elements,
when discussing critical infrastructure, a threat toward the asset, any potential asset
vulnerabilities, and the resulting consequences of an attack (Bennett, 2018). Liu & Song
(2020) expanded upon this intentionally simplistic risk definition by including cyber
networks, big data, and telecommunications, encompassing risk assessment into the virtual
arena. Risk, increasingly, has moved beyond physical planning for actual critical
infrastructure response and into server management or cyber security (Liu & Song, 2020).
Quantitative/Qualitative Determining a true number to categorize risk based on
mathematical calculations which weigh a combination of risk-related elements briefly
describes quantitative risk analysis (Bennett, 2018). An essential aspect of quantitative risk
analysis is the establishment of an actual numerical value, allowing for a comparative scale
between multiple critical infrastructures across America (Lyu et al., 2019). For example, if
all libraries with open access were garnering a 3 on the risk scale, a library with partial
open access and metal detectors would be anointed a 2 on the risk scale, assuming the top is
a higher risk (Lyu et al., 2019). If a potential threat was intended upon using explosive
devices in each library, and each library had 50 employees, then the mitigated difference
between potential losses, determined from security differences, from the first to the second
library would establish its quantitative risk rating (Bennett, 2018). Critical Infrastructure
and its individualization denotate specific elements which increase or decrease their overall
risk assessment number, thereby, creating a quantitative risk assessment (Lyu et al.,
2019). Qualitative risk analysis, on the other hand, utilizes a matrix developed from
an event-descriptive scalable table exploring the ratio of hazard likelihood versus
consequences (Bennett, 2018). Although expansive, innately more complex and time-
consuming qualitative risk analysis is implemented more frequently in America,
particularly because it identifies changeable weak points (Bennett, 2018). For example,
Zimek & Hromada (2020) reviewed several consumer malls and shopping centers across
the world utilizing a lens of qualitative risk analysis. The research indicated that reducing
varying access points across the facilities could prevent terrorists easy access, limiting the
ease by which the attack could be carried out (Zimek & Hromada, 2020). Eventually, Zimek
& Hromada (2020) determining multiple entrances, exits, and hallways should be locked or
sealed to the general public, utilizing qualitative risk to improve upon weaknesses.
Comprehensive Risk/Worst Case Scenario Ascertaining the prominent factors in risk
requires a renewal of priorities, it appears the classic doomsayers or worst-case scenario
planners can, at times, prompt more action, however, operating within this theoretical full-
scale disaster mode often results in unrealistic expectations upon businesses or public
entities (Bennett, 2018). For example, if every military base, law enforcement agency, or
private hard target critical infrastructure attempted to incorporate anti-missile technology,
preventing nuclear attacks, the resulting cost and time expended would be inconceivable
(Gao & Deng, 2019). Therefore, researchers like (Gao & Deng) argue for a more achievable
risk assessment methodology, utilizing a comprehensive risk matrix to guide America, and
other world superpowers, toward affordable, achievable, and plausible risk-based
responses and changes. Levels of Analysis Layers of analysis must exist within a
comprehensive risk assessment, identifying the value of an asset through evaluation
becomes paramount to this process (Bennett, 2018). For example, a large urban police
station and a small town hall have completely different levels of value, and corresponding
risk assessment metrics (Bennett, 2018). The assets portfolio or services provided needs to
be weighed amongst its relative value, the urban police station keeps hundreds of
thousands of people safe, while the town hall is responsible for executive and clerical
decisions regarding tens of thousands of people (Gao & Deng, 2019). When viewing the
differences between the two targets in this light it becomes easy to determine a
comparative system-level assessment, hopefully, placing funds, personnel, and resources in
the proper track (Bennett, 2018). The allocation of resources versus risk
management, assessment, and analysis empowers many of Gods passages and messages,
For God gave us a spirit not of fear but of power and love and self-control (English Standard
Version, 2001/2016 2 Timothy 1:7). References Bennett, B. (2018). Understanding,
Assessing and Responding to Terrorism. John Wiley & Sons, Inc. Hoboken, NJ. English
Standard Version. (2016). Bible hub. Retrieved from https://biblehub.com (Original work
published 2001). Gao, S., & Deng, Y. (2019). An Evidential Evaluation of Nuclear Safeguards.
International Journal of Distributed Sensor Networks.
https://doi.org/10.1177/1550147719894550 Liu, W., & Song, Z. (2020). Review of
Studies on the Resilience of Urban Critical Infrastructure Networks. Reliability Engineering
& System Safety. 193. https://doi.org/10.1016/j.ress.2019.106617 Lyu, X., Ding, Y., & Yang,
S. (2019). Safety and Security Risk Assessment in Cyber-Physical Systems. IET Cyber-
Physical Systems: Theory & Applications. 4(3). https://doi.org/10.1049/iet-
cps.2018.5068 Zimek, O., & Hromada, M. (2020). Risk Analysis of Selected Soft Targets.
SGEM. 2(1). https://doi.org/10.5593/sgem2020/2.1/s07.037

More Related Content

Similar to HLSC 1.docx

discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxbkbk37
 
Wildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoyWildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoyOECD Environment
 
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx
1 A Cost-Benefit Analysis of the New Orleans Flood P.docxjoyjonna282
 
IE Magazine Article
IE Magazine ArticleIE Magazine Article
IE Magazine ArticleLaura Devine
 
Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services neirew J
 
Laypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofLaypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofijccsa
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdfclientmentailai
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxShiraPrater50
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxadkinspaige22
 
Disaster resilient societies
Disaster resilient societiesDisaster resilient societies
Disaster resilient societiesMaricica Botescu
 
Published create .........lllllDRlage..pdf
Published  create .........lllllDRlage..pdfPublished  create .........lllllDRlage..pdf
Published create .........lllllDRlage..pdfLataJimma
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform MovementJennifer Reither
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
 
Discussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docxDiscussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docxelinoraudley582231
 
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...ijsptm
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016Cameron Brown
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mfelipaser7p
 
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREASRISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAScivej
 
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas  Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas civej
 

Similar to HLSC 1.docx (20)

discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docx
 
Wildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoyWildfire-Workshop-Presentation-Shawn-McCoy
Wildfire-Workshop-Presentation-Shawn-McCoy
 
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx 1  A Cost-Benefit Analysis of the New Orleans Flood P.docx
1 A Cost-Benefit Analysis of the New Orleans Flood P.docx
 
IE Magazine Article
IE Magazine ArticleIE Magazine Article
IE Magazine Article
 
CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2
 
Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services
 
Laypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofLaypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception of
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdf
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
Disaster resilient societies
Disaster resilient societiesDisaster resilient societies
Disaster resilient societies
 
Published create .........lllllDRlage..pdf
Published  create .........lllllDRlage..pdfPublished  create .........lllllDRlage..pdf
Published create .........lllllDRlage..pdf
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
Discussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docxDiscussion Question  Looking over the next five years, in your op.docx
Discussion Question  Looking over the next five years, in your op.docx
 
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
 
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREASRISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
RISK-SENSITIVE MITIGATION PLANNING IN SEISMICALLY VULNERABLE URBAN AREAS
 
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas  Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
Risk-Sensitive Mitigation Planning in Seismically Vulnerable Urban Areas
 

More from write4

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxwrite4
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docxwrite4
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxwrite4
 
Role In Influencing Society.docx
Role In Influencing Society.docxRole In Influencing Society.docx
Role In Influencing Society.docxwrite4
 
Role of Private Security.docx
Role of Private Security.docxRole of Private Security.docx
Role of Private Security.docxwrite4
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxwrite4
 
Robbins Network Services.docx
Robbins Network Services.docxRobbins Network Services.docx
Robbins Network Services.docxwrite4
 
Robinson Crusoe review.docx
Robinson Crusoe review.docxRobinson Crusoe review.docx
Robinson Crusoe review.docxwrite4
 
Rocking Horse.docx
Rocking Horse.docxRocking Horse.docx
Rocking Horse.docxwrite4
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxwrite4
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docxwrite4
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxwrite4
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxwrite4
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxwrite4
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxwrite4
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxwrite4
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxwrite4
 
Saudi Arabia.docx
Saudi Arabia.docxSaudi Arabia.docx
Saudi Arabia.docxwrite4
 
Right to Privacy.docx
Right to Privacy.docxRight to Privacy.docx
Right to Privacy.docxwrite4
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxwrite4
 

More from write4 (20)

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docx
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docx
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docx
 
Role In Influencing Society.docx
Role In Influencing Society.docxRole In Influencing Society.docx
Role In Influencing Society.docx
 
Role of Private Security.docx
Role of Private Security.docxRole of Private Security.docx
Role of Private Security.docx
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docx
 
Robbins Network Services.docx
Robbins Network Services.docxRobbins Network Services.docx
Robbins Network Services.docx
 
Robinson Crusoe review.docx
Robinson Crusoe review.docxRobinson Crusoe review.docx
Robinson Crusoe review.docx
 
Rocking Horse.docx
Rocking Horse.docxRocking Horse.docx
Rocking Horse.docx
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docx
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docx
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docx
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docx
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docx
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docx
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docx
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docx
 
Saudi Arabia.docx
Saudi Arabia.docxSaudi Arabia.docx
Saudi Arabia.docx
 
Right to Privacy.docx
Right to Privacy.docxRight to Privacy.docx
Right to Privacy.docx
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docx
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

HLSC 1.docx

  • 1. HLSC 720-DISCUSSION 2-REPLY 1 The thread must be a minimum of 250 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.**FRANK**Critical infrastructure analysis, evaluation, and emergency response ultimately depend upon its established risk assessment, weighing the value of attack versus potential target vulnerability (Bennett, 2018). Bennett (2018) defines risk as, a quantified measure of the possibility that a critical asset will suffer some degree or harm or loss (Bennett, p. 203, 2018). Risk in its simplest form is a combination of three elements, when discussing critical infrastructure, a threat toward the asset, any potential asset vulnerabilities, and the resulting consequences of an attack (Bennett, 2018). Liu & Song (2020) expanded upon this intentionally simplistic risk definition by including cyber networks, big data, and telecommunications, encompassing risk assessment into the virtual arena. Risk, increasingly, has moved beyond physical planning for actual critical infrastructure response and into server management or cyber security (Liu & Song, 2020). Quantitative/Qualitative Determining a true number to categorize risk based on mathematical calculations which weigh a combination of risk-related elements briefly describes quantitative risk analysis (Bennett, 2018). An essential aspect of quantitative risk analysis is the establishment of an actual numerical value, allowing for a comparative scale between multiple critical infrastructures across America (Lyu et al., 2019). For example, if all libraries with open access were garnering a 3 on the risk scale, a library with partial open access and metal detectors would be anointed a 2 on the risk scale, assuming the top is a higher risk (Lyu et al., 2019). If a potential threat was intended upon using explosive devices in each library, and each library had 50 employees, then the mitigated difference between potential losses, determined from security differences, from the first to the second library would establish its quantitative risk rating (Bennett, 2018). Critical Infrastructure and its individualization denotate specific elements which increase or decrease their overall risk assessment number, thereby, creating a quantitative risk assessment (Lyu et al., 2019). Qualitative risk analysis, on the other hand, utilizes a matrix developed from an event-descriptive scalable table exploring the ratio of hazard likelihood versus consequences (Bennett, 2018). Although expansive, innately more complex and time- consuming qualitative risk analysis is implemented more frequently in America, particularly because it identifies changeable weak points (Bennett, 2018). For example,
  • 2. Zimek & Hromada (2020) reviewed several consumer malls and shopping centers across the world utilizing a lens of qualitative risk analysis. The research indicated that reducing varying access points across the facilities could prevent terrorists easy access, limiting the ease by which the attack could be carried out (Zimek & Hromada, 2020). Eventually, Zimek & Hromada (2020) determining multiple entrances, exits, and hallways should be locked or sealed to the general public, utilizing qualitative risk to improve upon weaknesses. Comprehensive Risk/Worst Case Scenario Ascertaining the prominent factors in risk requires a renewal of priorities, it appears the classic doomsayers or worst-case scenario planners can, at times, prompt more action, however, operating within this theoretical full- scale disaster mode often results in unrealistic expectations upon businesses or public entities (Bennett, 2018). For example, if every military base, law enforcement agency, or private hard target critical infrastructure attempted to incorporate anti-missile technology, preventing nuclear attacks, the resulting cost and time expended would be inconceivable (Gao & Deng, 2019). Therefore, researchers like (Gao & Deng) argue for a more achievable risk assessment methodology, utilizing a comprehensive risk matrix to guide America, and other world superpowers, toward affordable, achievable, and plausible risk-based responses and changes. Levels of Analysis Layers of analysis must exist within a comprehensive risk assessment, identifying the value of an asset through evaluation becomes paramount to this process (Bennett, 2018). For example, a large urban police station and a small town hall have completely different levels of value, and corresponding risk assessment metrics (Bennett, 2018). The assets portfolio or services provided needs to be weighed amongst its relative value, the urban police station keeps hundreds of thousands of people safe, while the town hall is responsible for executive and clerical decisions regarding tens of thousands of people (Gao & Deng, 2019). When viewing the differences between the two targets in this light it becomes easy to determine a comparative system-level assessment, hopefully, placing funds, personnel, and resources in the proper track (Bennett, 2018). The allocation of resources versus risk management, assessment, and analysis empowers many of Gods passages and messages, For God gave us a spirit not of fear but of power and love and self-control (English Standard Version, 2001/2016 2 Timothy 1:7). References Bennett, B. (2018). Understanding, Assessing and Responding to Terrorism. John Wiley & Sons, Inc. Hoboken, NJ. English Standard Version. (2016). Bible hub. Retrieved from https://biblehub.com (Original work published 2001). Gao, S., & Deng, Y. (2019). An Evidential Evaluation of Nuclear Safeguards. International Journal of Distributed Sensor Networks. https://doi.org/10.1177/1550147719894550 Liu, W., & Song, Z. (2020). Review of Studies on the Resilience of Urban Critical Infrastructure Networks. Reliability Engineering & System Safety. 193. https://doi.org/10.1016/j.ress.2019.106617 Lyu, X., Ding, Y., & Yang, S. (2019). Safety and Security Risk Assessment in Cyber-Physical Systems. IET Cyber- Physical Systems: Theory & Applications. 4(3). https://doi.org/10.1049/iet- cps.2018.5068 Zimek, O., & Hromada, M. (2020). Risk Analysis of Selected Soft Targets. SGEM. 2(1). https://doi.org/10.5593/sgem2020/2.1/s07.037