Vulnerability Threat Assessment And Infrastructure
JUS-320 Topic 8 Vulnerability Threat Assessment- Critical Infrastructure Checklist and Analysis (CAN BE COMPLETED ON DOCUMENT IN FILES)
Part I: Complete the Vulnerability Assessment of Critical Infrastructure Assets on a public location with which you are familiar. The word count for all of Part I should be 500-600 words.
1. Describe assets in the public location environment.
2. Describe the threats to assets in the public location environment (natural, man-made or accidental)
3. Rank your assets based on value. List only your top five assets.
4. What types of (threatening) activities could occur, based on each of the five assets? Cite sources of examples of similar assets being threatened in similar settings.
5. Identify current protection measures in place for assets.
Part II: Create a threat assessment report that summarizes your findings. The word count for all of Part II should be 1,000-1,250 words. Include the following:
1. Write an historical background on the public space you assessed.
2. Explain which assets would require the most protection.
3. Explain weak and strong protection measures, and detail improvements that need to be made to eliminate the weak measures.
4. Provide an assessment of the recommended protection measures and why they are the best approach to strengthen the security of the environment.
Vulnerability Assessment of Critical Infrastructure Assets (17 points)
Complete Part I of the Vulnerability Assessment of Critical Infrastructure Assets on a public location with relevant and insightful evidence to support claims. Responses are well delineated and demonstrate a commanding understanding of the topic.
Threat Assessment Report (8.5 points)
Essay provides a comprehensive historical background on the public space with relevant and insightful evidence to support claims. Essay is well delineated and demonstrates a commanding understanding of the topic.
Assets Requiring Most Protection (8.5 points)
The explanation of which assets would require the most protection is provided with quality details; analysis is comprehensive and insightful; description demonstrates an exceptional approach.
Protection Measures (8.5 points)
The explanation of weak and strong protection measures is provided with quality details; analysis is comprehensive and insightful; explanation detailing improvements that need to be made to eliminate the weak measures demonstrates an exceptional approach.
Assessment (8.5 points)
The assessment of the recommended protection measures is provided with quality details; analysis is comprehensive and insightful; and explanation of why they are the best approach to strengthen the security of the environment demonstrates an exceptional approach.
Research (8.5 points)
At least three relevant, scholarly sources are cited and are flawlessly integrated into the essay to support the claims made therein.
Sources are completely and correctly documented, as appropriate to assignment and style, and format is free of error.
Argument Logic and Construction (8.5 points)
Clear and convincing argument presents a persuasive claim in a distinctive and compelling manner. All sources are authoritative.
Mechanics of Writing (8.5 points)
Mechanics of Writing (includes spelling, punctuation, grammar, language use)
Documentation of Sources (4.25 points)
Documentation of Sources (citations, footnotes, references, bibliography, etc., as appropriate to assignment and style)
Paper Format (4.25 points)
APA 7 Format.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more