Discuss what one needs to do to prepare a risk assessment

Assignment Help Business Law and Ethics
Reference no: EM131042052

Per the text, by 1962, the Irish Republican Army (IRA) had all but ceased operating. In 1969, a Catholic civil rights movement had engulfed Northern Ireland when Catholics demanded the same rights as Protestants. The Northern Ireland government reacted to the movement with aggressive and repressive actions. When the situation escalated with violence, the British Army was sent in.

1. Choose a specific action taken by the British Army during this time period that you believe contributed to the resurgence of the IRA. Provide a rationale for your response.

2. Hypothesize what might have happened differently had the British Army not taken this action.

3. Per the text, with the collapse of the Soviet Union, several breakaway states emerged in the region. Explain the potential threats that these breakaway states poses to the U.S. Analyze these potential threats, and suggest the key measures that the U.S. can take in order to mitigate the threats in question.

4. Analyze the strategic mistakes that the terrorists made when attacking the Moscow Theater in 2002. Assess the level of influence that the terrorists' mistakes from the Moscow attack exerted on the terrorists who perpetrated the attack on the Beslan school in 2004. Use examples from each attack to support your response.

5. Security Breach. Select any one of the following for your original post:
One key element of security assessment and policy is preparing plans for fire evacuation, bomb threats, sheltering-in-place, and working with operations related to continuity of operations. Lay out what one needs to consider for any one of the above. I hope that the class will spread this out so all are discussed. If someone else already started a thread on your choice add to that discussion, don't create a new thread. Don't copy a plan from the Internet, I want see your analysis of what you would create, and why.

a. Discuss a major security breech, lay it out, draw lessons, and offer suggestion on what should/could have been done.

b. Describe one issue not mentioned in the textbook when using contracted security at an organization. Then, describe one issue not mentioned in the textbook when using proprietary security at an organization. Draw a conclusion.

c. Discuss what one needs to do to prepare a risk assessment, what are the key elements, and how do you go about thinking about prioritizing the mitigation?

d. Describe the preventive measures needed to secure your selected threat from occurring and the monetary cost associated with those measures.

e. Any current event related to security assessment or policy.

f. Any topic from the text that you wish to expand or expound on.

Reference no: EM131042052

Questions Cloud

Any current event related to security assessment or policy : Describe the preventive measures needed to secure your selected threat from occurring and the monetary cost associated with those measures.
Step the chi square for the given data : Suppose an airline claims that its flights are consistently on time with an average delay of at most 15 minutes. It claims that the average delay is so consistent that the variance is no more than 150 minutes.
Two possible constructors for frames : Here are two possible constructors for frames: (define (make-frame origin edge1 edge2) (list origin edge1 edge2)) (define (make-frame origin edge1 edge2) (cons origin (cons edge1 edge2))) For each constructor supply the appropriate selectors to pr..
Informed consent from all human participants : Researchers must obtain Informed Consent from all human participants in a research study. Informed Consent requires that participants are informed of the following (check all that apply):
Discuss what one needs to do to prepare a risk assessment : Choose a specific action taken by the British Army during this time period that you believe contributed to the resurgence of the IRA. Provide a rationale for your response.
Determine the organizations competitive position : Assess the structure of the organization and the influence this has on its performance. Determine the organization's competitive position and the possibilities this provides.
Considerable variability in the data : 1. Our hypothesis test is testing to see if there is a difference in the population mean between two groups. The data for each group has considerable variability. Given that there is considerable variability in the data for the two groups ________..
Terms of your selectors and constructor : A two-dimensional vector v running from the origin to a point can be represented as a pair consisting of an x-coordinate and a y-coordinate. Implement a data abstraction for vectors by giving a constructor make-vect and corresponding selectors xco..
How can an organization be effective : How can an organization be effective if its leadership is not very good? The answer should fouce on the reason part. The answer should be two pages.

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  What is eyewitness identification how do eyewitness

what is eyewitness identification? how do eyewitness identification procedures affect the systematic procedures of the

  Write a 1000-word paper in which you analyze future

write a 1000-word paper in which you analyze future correctional issues associated with increasing and changing

  You are still expected to support your opinion with

please note that you are required to support your views by citing your sources in all assignments. even if the

  Explain how the columbine shootings relate to gun policy

Explain how the Columbine shootings relate to gun policy

  Explain three examples each of highrisk and lowrisk decision

Explain the concept of fundamental attribution error. If you were to encountering a coworker who rarely smiles or returns your greeting when you pass her in the hall, how might this perceptual bias influence you opinion of that person..

  Discuss the cyber crime and identify theft and the factors

In a 1-2 page well constructed essay, discuss the cyber crime and identify theft and the factors that can lead to this criminal behavior? What theory best depicts this

  Discuss the elements of burning related to arson

Discuss the willful and malicious intent related to arson. Discuss the elements of burning related to arson. Discuss the issues surrounding the definition of a dwelling. Discuss burning with the intent to defraud an insurer

  What is the role of consumer law protection in business

Summarize the following acts: sections 1 and 2 of the Sherman Act; the Clayton Act and the relationship to mergers; and the Robinson-Patman Act on price discrimination. What is the role of consumer law protection in business

  In a hostile work environment sexual harassment claim the

1 which of the following statutes regulates internal union affairs and establishes certain rights of union members? the

  Review the website of any large law enforcement egancy and

review the website of any large law enforcement egancy and write about the recruitment process required for sworn law

  Strengths and limitations of this sampling technique

In 2-3 paragraphs discuss the sampling technique you plan to utilize in your research design? What are the strengths and limitations of this sampling technique

  Fiduciary duties that java jet officers owe to java jet

What are the fiduciary duties that Java Jet's officers owe to Java Jet? Were any of those duties violated? Describe the differences between international and comparative law to your client

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd