Conduct a risk assessment by identifying the threat

Assignment Help Management Information Sys
Reference no: EM131582592 , Length: 5

The textbook defines critical infrastructure as "the assets' systems and networks, whether physical or virtual, so vital that their incapacitation or destruction would have a debilitating effect on security, national economic security, public health or safety."

For this week's writing assignment, please create a report that answers the following questions:

Provide a brief description of 3-5 CIKR that exist within your community.

Select one CIKR and identify the private and public partnership structure.

What Sector-Specific Agency would be responsible for providing institutional knowledge / and specialized expertise for your CIKR?

Conduct a risk assessment by identifying the threat (natural and manmade), vulnerabilities and consequence to your CIKR.

What activities would you implement to help manage your risk?

How would you evaluate the effectiveness of your activities?

How would information be shared throughout the process?

Paper Submission Requirements:

Your response should be 3-5 pages in length (double spaced).

Paper must include a "reference page" not included in the 3-5-page minimum.

Use APA format.

Resources for Assessment:

Textbook Reading: Introduction to Homeland Security, Chapter 8

National Infrastructure Protection Plan 2013 (NIPP)

Homeland Security Presidential Directive (HSPD) - 7

Reference no: EM131582592

Questions Cloud

Set up the integral for the volume of the solid : Set up the integral for the volume V of the solid obtained by rotating the region bounded by the given curve about the specified axis.
Complete the report showing via gelato revenue : Required: Complete the report showing Via Gelato revenue and spending variances for June
Strategic planning and the business mission and objectives : Describe using your own words how it is being used in measuring the success of IS implementation - strategic planning and the business mission and objectives.
Calculate the sample average retail price : A T-shirt company is interested in knowing the average retail price charged for one product sold in stores across the country.
Conduct a risk assessment by identifying the threat : Conduct a risk assessment by identifying the threat (natural and manmade), vulnerabilities and consequence to your CIKR.
Discuss the reasons for using external style sheets : Design and develop an external style definition that can be applied to all the web pages.Discuss the reasons for using external style sheets.
Prepare the journal entry to record company taxes : In 2010 the company reported $10 million in pretax income. Requirements: Prepare the journal entry to record Company A's income taxes
Propose a new business intelligence application : Develop a presentation to propose a new business intelligence (BI) application for either your organization or an organization .
Prepare the journal entry to record amortization expense : Prepare the journal entry to record amortization expense for the first year. If required, round your answers to nearest whole value

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd