Discuss two criticisms of the nipp model

Assignment Help Other Subject
Reference no: EM131383311

Assignment 1: NIPP

Write a two to four (2-4) page paper in which you

Analyze the National Infrastructure Protection Plan and Risk Management Framework, located at

https://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf,

and conclude how it has been designed to protect the nation's critical infrastructure.

1. Determine the purpose of the feedback loop design and argue how it strengthens or weakens the model. Justify your response.

2. Decide if taking a "risk management" approach is suitable for protecting the nation's critical infrastructure. Support your response.

3. Choose the one (1) step that is the most important or has the greatest impact on the other steps of the Risk Management Framework and describe why.

4. Discuss two (2) criticisms of the NIPP model and suggest ways of dealing with those criticisms.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the national infrastructure plan in the context of strategic targets.

Use technology and information resources to research issues in homeland security.

Write clearly and concisely about topics related to Homeland Security Organization and Administration using proper writing mechanics and technical style conventions.

315 Assignment

Assignment 2: Briefing Report

Review the briefing report titled "Federal Protective Service: Actions needed to resolve delays and inadequate oversight issues with PS's risk assessment and management program" located at

https://www.gao.gov/new.items/d11705r.pdf.

Most of the changes that have taken place within the Federal Protective Service (FPS) have been reactive as a result of specific events such as the Oklahoma City bombing and terrorist events of September 11, 2001. This insinuates that there ould be other potential threats that are being ignored because they have yet to be exploited.

Write a three to four (3-4) page paper in which you:

1. Evaluate the security measures taken by the FPS and determine if the measures are comprehensive enough, given any potential threats not mentioned in the report.

2. Compare the security measures provided by the FPS to those of a commercial building with which you are familiar.

3. Describe the weaknesses that still exist within the protocols defined by the FPS.

4. Describe the security measures that you see at your nearest federal building as well as the security measures that you believe may not be obvious to other observers.

5. Use at least two (2) quality resources in this assignment including the suggested FPS Website. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Summarize the methods and practices related to perimeter security.

Use technology and information resources to research issues in security assessment and solutions.

Write clearly and concisely about topics related to security assessment and solutions using proper writing mechanics and technical style conventions.

Reference no: EM131383311

Questions Cloud

Software programmer at a large financial institution : A software programmer at a large financial institution realized that she had accidentally overdrawn her checking account. She was able to make a small adjustment in the bank's accounting system, allowing her to not be charged the overdraft fee.
Research workers compensation rules : Research workers' compensation rules, regulations, and procedures associated with Oklahoma. In your post, comment on which state (or applicable residential area) you are researching.
Find also the corresponding three term approximation : Obtain a three term approximation to the oscillation frequency when the oscillation has unit amplitude. Find also the corresponding three-term approximation.
Should people outside the cave have made a greater effort : does this have a parallel with today's uneducated population? Should people outside the cave have made a greater effort to go inside the cave to enlighten their fellow humans? If so, how?
Discuss two criticisms of the nipp model : Determine the purpose of the feedback loop design and argue how it strengthens or weakens the model. Justify your response.Decide if taking a "risk management" approach is suitable for protecting the nation's critical infrastructure. Support your re..
What was the zollverein : Who was William Cockerill? Throughout the seventeenth century, what was the relationship between Hungary and the Habsburg Empire? What was the Zollverein? What was the Middle Passage during the transatlantic slave trade
Explain what kant meant by categorical imperative : Explain what Kant meant by "categorical imperative." Explain why you do or do not agree with this idea. Describe the relationship between Kant's idea of the categorical imperative and his search for morality.
Deduce the acceleration of the ball : Assuming the ball to be in planar motion, find the energy conservation equation for the ball. Deduce the acceleration of the ball.
Find the energy conservation equation for the yo yo : Explain why the string does no work on the yo-yo. Find the energy conservation equation for the yo-yo and deduce its acceleration.

Reviews

Write a Review

Other Subject Questions & Answers

  According to the function p -25x2 300x what number of

a chain store manager has been told by the main office that daily profit p is related to the number of clerks working

  What are the implications associated with abuse and neglect

What are the implications associated with abuse and neglect.

  All planning activities must include a clear main idea at

for this modules 1-2 page assignmentuse a suggested activity to complete a planning activity word document for your

  Create at least five possible visuals that you might utilize

You are required to locate or create at least five possible visuals that you might utilize for your Project (e.g., photographs, drawings, video clips, screenshots) and add them to your existing project draft.

  Human creativity from the era covered by the learning plan

1.Your presentation includes one example of human creativity from the era covered by the learning plan. 2.Your presentation includes one slide that represents the example chosen (an image) 3.Your presentation includes one slide that includes relevant..

  Compare and contrast deontology and utilitarianism

The Consequentialism Debate: Compare and contrast deontology and utilitarianism. Briefly discuss the differences between Bentham and Mill's versions of utilitarianism. Discuss the political and ethical implications of utilitarianism

  Explain the difference between a meteoroid meteor and a

in your own words discuss why meteors so often appear in showers at the same time each year. in other words why do we

  Why do you believe that laws are needed in our society

Explains why you believe that laws are needed in our society. Be sure to address not only the need for laws in general and/or the need for criminal law, but also to consider, specifically, the need for civil/tort law

  Sociological perspective differ from common sense

How does the sociological perspective differ from “common sense.” Include a concrete example in your response.

  Explain how religions view at least three varying social

the us culture has a broad spectrum of religious affiliations and religiosity. as a result of interacting with people

  Discuss methods a researcher might use to assure

The article above also briefly discusses the importance, or rather the influence, that an author's motivation for writing a particular piece may have on how the author chooses to portray the statistical data. Discuss methods a researcher might us..

  Conduct a literature search to locate research articles

NRS-433V :Identify six peer research articles which will be utilized through the next as reference sources. Create a reference list in which the six articles are listed. Beneath each reference include the article's abstract. The completed assignme..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd