Sign In
Not register? Register Now!
Pages:
5 pages/β‰ˆ1375 words
Sources:
8 Sources
Style:
APA
Subject:
Social Sciences
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 24.3
Topic:

HLS 6040: Threat / Vulnerability / Risk Assessment - and Site Selection

Essay Instructions:

Final Assignment/Project
• Select a location to conduct a Threat/Vulnerability/Risk Assessment, select either your place of business, or if you’re a full time student, select a location on campus, your topic is due by the end of (Week 2 Attached)
• Turn in your project outline, to include selected location, top 5 critical infrastructure/key resource items, Threat, Vulnerability, and Risk Assessment placeholders, and finally mitigation techniques and recommendation. Outline is due by the end of (Week 4 Attached)
• Conduct a Vulnerability Assessment, using either the “Sample Vulnerability Assessment Template (word doc)” from Week 3, or the “Conducting a Vulnerability Assessment” PowerPoint presentation from the Week 4 lecture material. Please include a Threat Assessment, Vulnerability Assessment and Risk Assessment as well as the MSHARP or CARVER assessment tool in your final project (paper or presentation). Final project is due by the end of (Week8 Attached)

Essay Sample Content Preview:

Critical Infrastructure: Vulnerability Analysis and Protection
HLS 6040 FINAL PROJECT
Name
Institution: Northeastern University
Date
Threat/Vulnerability/Risk Assessment- and site selection
The chosen location is the university library, as one of the locations where there are many people at once. The library infrastructure is designed to cater to many students, and this makes the location a target. Additionally, there is a need to safeguard the assets, particularly the information and computer, the intrusion of the computer network may comprise other resources of the university one of the threats that is likely to affect people using the library services is associated with mass casualties, especially when there are shootings nearby. The emergency mitigation plans take into consideration. Hence, the threats, vulnerabilities and risks that can be assessed in Snell library while prioritizing the risks.
Critical infrastructure/ key resource items,
The critical infrastructure and key resources are crucial to the proper functioning of the library system. Increasingly, public and university libraries in the US have large digital resources. Protecting the key resources improves the safety and security of students and university visitors. Assets in the school are both physical and virtual, but risk, threat and vulnerability assessment have focused on the critical infrastructure identified in America to ensure proper functioning of the society including information technology and emergency services (Abouzakhar, 2013). However, studies and interest in the impact of threats to key resources in schools has received less attention, while institutions of higher learning have people moving in and out, and the high number of people could present a challenge to emergency management personnel in case of a disaster, accident or attack.
The key resources for the library include the power supply, water supply, Information technology infrastructure, the library building and the campus building. The resources are crucial, vital, necessary and useful to students, highlighting that the likely debilitating impact on proper functioning of the library system, if the key resources were to be compromised. Identifying the threat scenarios is necessary to mitigate the risks and prevent catastrophes because of poor planning and management. In any case, the countermeasures are based on the risk assessment, where the costs and benefits of taking action are considered to protect the assets (Moteff, 2005). Protection efforts are a policy that affects the ability of the institution to protect the key resources and critical infrastructure.
To mitigate further attacks, it is necessary to first look at preparedness to manage any eventualities, while considering the resources available (Moteff, 2011). At the moment, the university police and security personnel are responsible for risk management. However, the IT infrastructure is one that affects the functioning of the library, and there is a need to identify then most effective IT risk management strategies if the library is to safeguard the library network effectively. The threats, hazards and vulnerabilities are ranked depending on their likelihood of occurring and impact on the local ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!