Survey And Reflection

Survey And Reflection

Reflect on the connection between knowledge or concepts from these courses and how those have been, or could be, applied in the work place (200-250 words per course reflection.

Physical Security – (200-250 words)

Security Architecture and Design – (200-250 words)

I work as a software developer.

The post Survey And Reflection appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Risk Assessment Report

Risk Assessment Report

Risk Assessment Report Instructions

INFA 610

Background

This is an individual research project. The objective of the research project is to develop an Information Asset Risk Assessment Report for an organization of your choosing, and worth 25% of your total course grade. The report will be due by the end of the 11th week. The analysis should be conducted using only publicly available information (that is, information obtainable on the Internet, company reports, news reports, journal articles, etc.). The risk analysis should consider legitimate, known threats that pertain to the subject organization. Based on the information gathered, presumed vulnerabilities of the company or organization’s computing and networking infrastructure will be identified. Then, based on the identified threats and vulnerabilities, you will describe the risk profile for the subject organization and suggest recommendations to mitigate the risks.

Your report should be 12 pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the report in your Assignment Folder prior to the submission deadline.

Project Proposal

Prior to writing your report, you must submit a short (a page and half) Project Proposal, indicating the name and relevant aspect(s) of the organization you intend to use as a subject for your report. The proposal must be accompanied by an annotated bibliography submitted via the assignment folder. Your instructor will provide feedback as to the suitability of your subject and bibliography. Additional details are provided below.

You will submit a project proposal of your Risk Assessment Report by the end of Session 4. The project proposal will account for 10% of your research paper grade (2.5% of your total course grade).

The project proposal should be a page and half (double spaced) description of the organization that you propose to analyze, with a summary of the scope (e.g., entire organization, key business area, major system, etc.) for the risk assessment you are expected to conduct. The proposal should identify the subject organization with a brief explanation of why you chose the subject for this assignment. The proposal should also describe the research methods to be used and anticipated sources of research information sources. Your instructor will use the proposal to provide feedback on the suitability of the proposed subject organization and the scope you propose, as well as the suitability of the proposed research methods and information sources. If you do not provide a proposal, you will be preparing their Risk Assessment Reports “at risk;” i.e., they will run the risk of delivering a report that is not suitable for this course.

An important step in developing your Risk Assessment Report will be the construction of an Annotated Bibliography. Having developed and described a subject organization and scope of analysis in the proposal, the next step is to identify and assess the value of potential research material. You should identify five (5) to six (6) significant articles relevant to your subject organization and to identifying and assessing risks in a context similar to the scope of your report. For a report of this nature you may expect to find useful sources in both business-focused (e.g., Business Source Premier, Business and Company Resource Center, ABI/Inform) and technically-focused databases (e.g., ACM Digital Library, IEEE, Gartner.com). The annotated bibliography will consist of 100-250 words per article, that describe the main ideas of the article, a discussion of the usefulness of such an article in understanding various aspects of you report, and other comments you might have after reading the article. For each article, there should be a complete reference in APA format. Your Annotated Bibliography will then form the basis of the sources for your report. (You may also supplement the references used in your report with additional reference material.)

Some excellent guidance on how to prepare an annotated bibliography can be found at http://guides.library.cornell.edu/annotatedbibliography.

Risk Assessment Report Proposal and Annotated Bibliography should be submitted by the end of Session 4.

The grading criteria for the proposal are as follows:

  1. Organization Selected & Justification (Right Scope and Relevance): 60%
  2. Research methods proposed (Bibliography): 40%

Risk Assessment Report

The Risk Assessment Report should be a polished, graduate-level paper. Be sure to carefully cite (using correct APA-Style in-line citations) all sources of information in the report. UMUC policies regarding plagiarism will apply to the Risk Assessment Report as well as all other deliverables in this course. You must submit the report to Turnitn.com to improve the originality score before submitting the report in the Assignment Folder. The lower the originality score the better it is. You should aim for an originality score of 10%..

Please submit questions regarding the research paper to the INFA610 “Q&A” Conference.

The Risk Assessment Report should be submitted by the end of Session 11

Risk Assessment Report Overview

The objective of this assignment is to develop a Risk Assessment Report for a company, government agency, or other organization (the “subject organization”). The analysis will be conducted using only publicly available information (e.g., information obtainable on the Internet, company reports, news reports, journal articles, etc.) and based on judicious, believable extrapolation of that information. Your risk analysis should consider subject organization information assets (computing and networking infrastructure), their vulnerabilities and legitimate, known threats that can exploit those vulnerabilities. Your assignment is then to derive the risk profile for the subject organization. Your report should also contain recommendations to mitigate the risks.

There is a wealth of business-oriented and technical information that can be used to infer likely vulnerabilities and assets for an organization. It is recommended that students select their organizations based at least in part on ease of information gathering, from a public record perspective.

Steps to be followed:

  1. Pick a Subject Organization : Follow these guidelines:

a. No insider or proprietary information. All the information you collect must be readily available for anyone to access. You will describe in your proposal how you intend to collect your information.

b. You should pick a company or organization that has sufficient publicly available information to support a reasonable risk analysis, particularly including threat and vulnerability identification.

  1. Develop Subject Organization Information : Examples of relevant information includes:

a. Company/Organization name and location

b. Company/Organization management or basic organization structure

c. Company/Organization industry and purpose (i.e., the nature of its business)

d. Company/Organization profile (financial information, standing in its industry, reputation)

e. Identification of relevant aspects of the company/organization’s computing and network infrastructure, Note: Do not try to access more information through Social Engineering, or through attempted cyber attacks or intrusion attempts.

  1. Analyze Risks

a. For the purposes of this assignment, you will follow the standard risk assessment methodology used within the U.S. federal government, as described in NIST Special Publication 800-30 (United States. National Institute of Standards and Technology (2002). Risk Management Guide for Information Technology Systems (Special Publication 800-30). Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf)

b. In conducting your analysis, focus on identifying threats and vulnerabilities faced by your subject organization.

c. Based on the threats and vulnerabilities you identify, next determine both the relative likelihood and severity of impact that would occur should each of the threats materialize. This should produce a listing of risks, at least roughly ordered by their significance to the organization.

d. For the risks you have identified, suggest ways that the subject organization might respond to mitigate the risk.

  1. Prepare Risk Assessment Report

a. Reports should be 12 pages (exclusive of cover, title page, table of contents, endnotes and bibliography), double-spaced, and should follow a structure generally corresponding to the risk assessment process described in NIST Special Publication 800-30.

b. The report should be prepared using the APA Style. All sources of information should be indicated via in-line citations and a list of references.

c. Reports should be submitted via the Assignment Folder.

Grading Criteria

As previously stated, the Proposal and Annotated Bibliography will constitute 10% of your Risk Assessment Report grade (2.5% of your final grade). You will demonstrate in the final report your risk assessment subject matter competency and communication and knowledge competencies. The Risk Assessment Report, accounting for 22.5% of the final grade, will be assessed as follows:

· Clear statement of scope to be analyzed and appropriate coverage of that scope: 10%

· Technical Content (depth and accuracy of information and analysis): 30%

· Recommendations for risk mitigation or other conclusions supported by research and analysis: 10%

· Communications competency: 25% (assessed using a graduate school wide rubric)

· Knowledge competency: 25% (assessed using a graduate school wide rubric)

1

The post Risk Assessment Report appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Prepare Risk Assessment Report

Prepare Risk Assessment Report

Risk Assessment Report Instructions

INFA 610

Background

This is an individual research project. The objective of the research project is to develop an Information Asset Risk Assessment Report for an organization of your choosing, and worth 25% of your total course grade. The report will be due by the end of the 11th week. The analysis should be conducted using only publicly available information (that is, information obtainable on the Internet, company reports, news reports, journal articles, etc.). The risk analysis should consider legitimate, known threats that pertain to the subject organization. Based on the information gathered, presumed vulnerabilities of the company or organization’s computing and networking infrastructure will be identified. Then, based on the identified threats and vulnerabilities, you will describe the risk profile for the subject organization and suggest recommendations to mitigate the risks.

Your report should be 12 pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the report in your Assignment Folder prior to the submission deadline.

Project Proposal

Prior to writing your report, you must submit a short (a page and half) Project Proposal, indicating the name and relevant aspect(s) of the organization you intend to use as a subject for your report. The proposal must be accompanied by an annotated bibliography submitted via the assignment folder. Your instructor will provide feedback as to the suitability of your subject and bibliography. Additional details are provided below.

You will submit a project proposal of your Risk Assessment Report by the end of Session 4. The project proposal will account for 10% of your research paper grade (2.5% of your total course grade).

The project proposal should be a page and half (double spaced) description of the organization that you propose to analyze, with a summary of the scope (e.g., entire organization, key business area, major system, etc.) for the risk assessment you are expected to conduct. The proposal should identify the subject organization with a brief explanation of why you chose the subject for this assignment. The proposal should also describe the research methods to be used and anticipated sources of research information sources. Your instructor will use the proposal to provide feedback on the suitability of the proposed subject organization and the scope you propose, as well as the suitability of the proposed research methods and information sources. If you do not provide a proposal, you will be preparing their Risk Assessment Reports “at risk;” i.e., they will run the risk of delivering a report that is not suitable for this course.

An important step in developing your Risk Assessment Report will be the construction of an Annotated Bibliography. Having developed and described a subject organization and scope of analysis in the proposal, the next step is to identify and assess the value of potential research material. You should identify five (5) to six (6) significant articles relevant to your subject organization and to identifying and assessing risks in a context similar to the scope of your report. For a report of this nature you may expect to find useful sources in both business-focused (e.g., Business Source Premier, Business and Company Resource Center, ABI/Inform) and technically-focused databases (e.g., ACM Digital Library, IEEE, Gartner.com). The annotated bibliography will consist of 100-250 words per article, that describe the main ideas of the article, a discussion of the usefulness of such an article in understanding various aspects of you report, and other comments you might have after reading the article. For each article, there should be a complete reference in APA format. Your Annotated Bibliography will then form the basis of the sources for your report. (You may also supplement the references used in your report with additional reference material.)

Some excellent guidance on how to prepare an annotated bibliography can be found at http://guides.library.cornell.edu/annotatedbibliography.

Risk Assessment Report Proposal and Annotated Bibliography should be submitted by the end of Session 4.

The grading criteria for the proposal are as follows:

  1. Organization Selected & Justification (Right Scope and Relevance): 60%
  2. Research methods proposed (Bibliography): 40%

Risk Assessment Report

The Risk Assessment Report should be a polished, graduate-level paper. Be sure to carefully cite (using correct APA-Style in-line citations) all sources of information in the report. UMUC policies regarding plagiarism will apply to the Risk Assessment Report as well as all other deliverables in this course. You must submit the report to Turnitn.com to improve the originality score before submitting the report in the Assignment Folder. The lower the originality score the better it is. You should aim for an originality score of 10%..

Please submit questions regarding the research paper to the INFA610 “Q&A” Conference.

The Risk Assessment Report should be submitted by the end of Session 11

Risk Assessment Report Overview

The objective of this assignment is to develop a Risk Assessment Report for a company, government agency, or other organization (the “subject organization”). The analysis will be conducted using only publicly available information (e.g., information obtainable on the Internet, company reports, news reports, journal articles, etc.) and based on judicious, believable extrapolation of that information. Your risk analysis should consider subject organization information assets (computing and networking infrastructure), their vulnerabilities and legitimate, known threats that can exploit those vulnerabilities. Your assignment is then to derive the risk profile for the subject organization. Your report should also contain recommendations to mitigate the risks.

There is a wealth of business-oriented and technical information that can be used to infer likely vulnerabilities and assets for an organization. It is recommended that students select their organizations based at least in part on ease of information gathering, from a public record perspective.

Steps to be followed:

  1. Pick a Subject Organization : Follow these guidelines:

a. No insider or proprietary information. All the information you collect must be readily available for anyone to access. You will describe in your proposal how you intend to collect your information.

b. You should pick a company or organization that has sufficient publicly available information to support a reasonable risk analysis, particularly including threat and vulnerability identification.

  1. Develop Subject Organization Information : Examples of relevant information includes:

a. Company/Organization name and location

b. Company/Organization management or basic organization structure

c. Company/Organization industry and purpose (i.e., the nature of its business)

d. Company/Organization profile (financial information, standing in its industry, reputation)

e. Identification of relevant aspects of the company/organization’s computing and network infrastructure, Note: Do not try to access more information through Social Engineering, or through attempted cyber attacks or intrusion attempts.

  1. Analyze Risks

a. For the purposes of this assignment, you will follow the standard risk assessment methodology used within the U.S. federal government, as described in NIST Special Publication 800-30 (United States. National Institute of Standards and Technology (2002). Risk Management Guide for Information Technology Systems (Special Publication 800-30). Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf)

b. In conducting your analysis, focus on identifying threats and vulnerabilities faced by your subject organization.

c. Based on the threats and vulnerabilities you identify, next determine both the relative likelihood and severity of impact that would occur should each of the threats materialize. This should produce a listing of risks, at least roughly ordered by their significance to the organization.

d. For the risks you have identified, suggest ways that the subject organization might respond to mitigate the risk.

  1. Prepare Risk Assessment Report

a. Reports should be 12 pages (exclusive of cover, title page, table of contents, endnotes and bibliography), double-spaced, and should follow a structure generally corresponding to the risk assessment process described in NIST Special Publication 800-30.

b. The report should be prepared using the APA Style. All sources of information should be indicated via in-line citations and a list of references.

c. Reports should be submitted via the Assignment Folder.

Grading Criteria

As previously stated, the Proposal and Annotated Bibliography will constitute 10% of your Risk Assessment Report grade (2.5% of your final grade). You will demonstrate in the final report your risk assessment subject matter competency and communication and knowledge competencies. The Risk Assessment Report, accounting for 22.5% of the final grade, will be assessed as follows:

· Clear statement of scope to be analyzed and appropriate coverage of that scope: 10%

· Technical Content (depth and accuracy of information and analysis): 30%

· Recommendations for risk mitigation or other conclusions supported by research and analysis: 10%

· Communications competency: 25% (assessed using a graduate school wide rubric)

· Knowledge competency: 25% (assessed using a graduate school wide rubric)

The post Prepare Risk Assessment Report appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Professional Email Message

Professional Email Message

Choose one of the professional scenarios provided in Blackboard under the Student Center tab, or click here to view them in a new window.

Write a Professional Email Message (in the form of Figure 5.1 on page 84 of BCOM9) from the perspective of a character in the scenario. The email should discuss the communication issue provided in the scenario and should be addressed to another character from the scenario.

The message should take the form of an email; however, you will submit your assignment to the online course shell.

The professional email message must adhere to the following requirements:

  1. Content:

Address the communication issue from the scenario.

Request a face-to-face meeting to discuss the issue (at a specific time).

Concentrate on the facts of the situation and avoid using overly emotional language.

Assume your recipient is learning about the situation for the first time through your communication.

  1. Format:

Use a descriptive subject line or heading.

Include an appropriate and professional greeting / salutation.

Use email form including: To:, From:, Subject:, and Signature.

  1. Clarity / Mechanics:

Focus on clarity, writing mechanics, and professional language/style requirements.

Run spell/grammar check before submitting.

  1. Your assignment must:

This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

  1. Submitting your assignment:

Submit your assignment through the online course shell only.

  1. The specific course learning outcomes associated with this assignment are:

Plan, create, and evaluate professional documents.

Deliver professional information to various audiences using appropriate tone, style, and format.

Analyze professional communication examples to assist in revision.

Below is a list of scenario :

ENG315 Professional Scenarios

  1. Saban is a top performing industrial equipment salesperson for D2D. After three years of working with his best client, he receives a text message from Pat (his direct manager) assigning him to a completely different account.

Pat has received complaints that Saban gets all of the good clients and is not a “team player.”

Saban responds to the message and asks for a meeting with Pat to discuss this change. Pat responds with another text message that reads: “Decision final. Everyone needs to get a chance to work with the best accounts so it is fair. Come by the office and pick up your new files.”

Moments later, Saban sends a text message to Karen, his regional manager and Pat’s boss. It simply reads, “We need to talk.”

  1. Amber, Savannah, and Stephen work for Knowledge, Inc. (a consulting company). While on a conference call with Tim Rice Photography (an established client), the group discusses potential problems with a marketing campaign. Tim Rice, lead photographer and owner of Tim Rice Photography, is insistent the marketing is working and changes are not needed.

Amber reaches over to put Tim on “Mute” but accidently pushes a different button. She immediately says to Savannah and Stephen that the marketing campaign is not working and that “…Tim should stick to taking pretty pictures.”

Tim responds, “You know I can hear you, right?”

  1. James shows up to work approximately five minutes late this morning, walks silently (but quickly) down the hallway and begins to punch in at the time clock located by the front desk.

Sarah, the front desk manager, says, “Good morning, James,” but James ignores her, punches in, and heads into the shop to his workplace. Sarah rolls her eyes, picks up the phone, and dials the on-duty manager to alert her that James just arrived and should be reaching his desk any moment.

  1. Paul works for the website division of SuperMega retail company. He receives an email late Friday afternoon that explains a new computer will launch at the end of next June and it will be in high demand with limited stock. Also contained in the three-page-message is that customers will be able to preorder the item 30 days before launch according to the production company. Paul is asked to create a landing page for consumers who are interested in learning more about the product.

By mistake, Paul sets up a preorder page for the product that afternoon (well in advance of the company authorized period) and late Friday evening consumers begin to preorder the product. Sharon, Vice President of Product Sales at SuperMega, learns of the error Saturday morning and calls Paul to arrange a meeting first thing Monday morning. Sharon explains to Paul on the phone that the company intends on canceling all of the preorders and Paul responds that the company should honor the preorders because it was not a consumer error. After a heated exchange, Paul hangs up on Sharon when she insists that the preorders will be canceled because of Paul’s error.

The post Professional Email Message appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

· Discuss the role of outcome in assessment of quality performance.

· Discuss the role of outcome in assessment of quality performance.

Unit 8: 425 Discussion

Initial Discussion responses should be at least 150 words.

· Discuss the role of outcome in assessment of quality performance.

· Define quality in health care and discuss its domains and dimensions.

· Discuss the components of a comprehensive performance measurement framework.

One source must come from the book.

The post · Discuss the role of outcome in assessment of quality performance. appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Conduct a literature search on person-centered care and / or the concept of personhood as it relates to working with individuals with dementia.

Conduct a literature search on person-centered care and / or the concept of personhood as it relates to working with individuals with dementia.

Select one aspect that interests you. Create an annotated bibliography using three (3) peer-reviewed sources. Summarize the findings of each article reviewed and reflect upon its application to caregivers and individuals with dementia. Create a bibliography page using the APA citation format to cite your references.

The instructions are attached.

The post Conduct a literature search on person-centered care and / or the concept of personhood as it relates to working with individuals with dementia. appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Annotated Bibliography (DUE 04/16/2019)

Annotated Bibliography (DUE 04/16/2019)

Report Issue
Conduct a literature search on person-centered care and / or the concept of personhood as it relates to working with individuals with dementia. Select one aspect that interests you. Create an annotated bibliography using three (3) peer-reviewed sources. Summarize the findings of each article reviewed and reflect upon its application to caregivers and individuals with dementia. Create a bibliography page using the APA citation format to cite your references.

The instructions are attached.

The post Annotated Bibliography (DUE 04/16/2019) appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Explain the pressures associated with ethical decision making at Farrows Bank.

Explain the pressures associated with ethical decision making at Farrows Bank.

For this assignment, read the case study, The 1920 Farrow’s Bank failure: a case of managerial hubris. This case is located in the ABI/Inform Complete Database found in the Online Library (see reference below).

Hollow, M. (2014). The 1920 farrow’s bank failure: A case of managerial hubris? Journal of Management History, 20(2), 164-178.

Thomas Farrow had been evaluated as having been inflicted by managerial hubris at the time of the bank’s collapse in 1920. With this in mind, address the following questions, with thorough explanations and well-supported rationale.

How did corporate culture, leadership, power and motivation affect Thomas’ level of managerial hubris?

Relate managerial hubris to ethical decision making and the overall impact on the business environment.

Explain the pressures associated with ethical decision making at Farrows Bank.

Evaluate whether the level of managerial hubris would have been decreased if Farrow Bank had a truly ethical business culture. Could this have affected the final outcome of Farrow Bank? Explain your position.

Your response should be a minimum of three double- spaced pages. References should include your required reading, case study reference plus a minimum of one additional credible reference. All sources used must be referenced; paraphrased and quoted material must have accompanying citations, and cited per APA guidelines.

The post Explain the pressures associated with ethical decision making at Farrows Bank. appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Primary Task Response: Within the Discussion Board area,

Primary Task Response: Within the Discussion Board area,

write 400 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Note: There are 2 parts to this assignment.

Part 1

Research the lower Colorado River Watch Network. This network is the basis for the discussion this week. Discuss the following:

Identify and fully describe at least 1 threat to the network or assets in the illustration.

Clearly explain how the threat might impact the node or asset, network, and sector.

Offer possible mitigation measures to prevent the threat from reducing or eliminating the capability of the node, asset, network, or sector.

You should also identify and discuss at least 1 other sector that impacts, or is impacted by the sectors involved in the illustration.

Before providing your answer, you must check the answers provided by your fellow students. Do not provide the same elements that another student has already selected. This should compel you to offer your input early in the week and to check back often to comment on the contributions of others. There is more than 1 primary sector involved here. If other students select the sector you would have chosen, and all other relevant sectors seem to have been taken, then you may choose the same sector as another student, but you must discuss different, unique ways in which the sector in the illustration impacts, or is impacted by that sector.

Part 2

Your instructor will assign you a role as a member of a community’s public or private sector entity. Use real-world, or realistic hypothetical actors and actions to draw upon in answering this week’s discussion questions.

Scenario

You are a member of a western community of about 400,000 citizens, called Westland. Though your city is midsized, it is surrounded by rural, lightly populated towns, making the city the dominant voice in county emergency management planning and operations. The city is also the largest one in the entire southern part of your state.

Westland is dominated by a few major industries to include several military bases and a nuclear power plant located 10 miles outside of city limits in Tiny Town. You have been asked to participate in planning and exercise development for the county’s emergency operations plan (EOP) for responding to an incident involving the nuclear reactor. There are a number of communities across the country who have published an EOP for nuclear plant incidents, and the Department of Homeland Security (DHS) provides guidance as well. However, Westland’s leaders want to solicit input from as many local and relevant stakeholders and prospective partners as possible. They realize that buy-in during the preparatory stages is key to an effective and integrated response involving all vital partners when and if a crisis occurs. Your organization is invited to play a role in establishing this EOP, and you are an enthused participant in the process. In at least 1 crisis scenario associated with nuclear plant incidents, a severe reactor accident results in significant radiation leakage. This is the worst-case scenario that emergency planners wish to plan for, believing other, lesser incidents will still benefit from such a plan.

To answer the questions that follow, do whatever research is appropriate to understand the entity you represent and to best estimate the realistic needs and preferences you will advocate.

The following assets are being considered as potential critical infrastructure (CI), with each eligible for some application of resources to be used for hardening of physical structures, reinforcement of expertise and capabilities, increased manpower and training, or other forms of fortification. Westland has $3.5 million dollars to direct toward CI protection and resiliency.

The following are assets to be prioritized:

The primary interstate through Westland

The primary railway through Westland

The area’s largest hospital and attendant capabilities

Area schools

Area nursing homes

Fire Department hazmat capabilities

Emergency warning system

U.S. Army Combat Readiness Training Area

Westland’s primary broadcasting resource

Answer the following questions in the Discussion Board area:

Fully describe the role you are playing this week. Discuss what you believe your overarching agenda will be, and how it will influence your prioritization of assets for community resource allocation. Remember that resources may include funds, manpower, recognition, time, and other intangible applications.

What contributions can you provide to the pool of resources in your assigned role?

Rank all 10 assets in order of priority. Allocate portions of the $3.5 million dollars to assets as you see fit. Explain why you selected these amounts and how the money might support critical infrastructure protection (CIP) and resiliency measures.

Make a strong and clear argument on why you chose the top 3 assets you selected. Be willing to revisit your choices and negotiate your priorities to help the group come to consensus, but be true to your perceived values as well.

The post Primary Task Response: Within the Discussion Board area, appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"