Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
Unit 5 – Individual Project
View Assignment Details for Unit 5 –
Assignment Overview
Type: Individual Project
Unit: Completing a Network Analysis and preparing it for an HS Manager’s use based on the Defense Industrial Base sector
Deliverable Length: 2-3 pages in APA 6th edition format
View objectives for this assignment
Assignment Descriiption
Assignment Objectives
Analyze a sector using network theory.
Apply the techniques of project management to addressing challenges in critical infrastructures.
Break down the critical components that are highly important to the sector.
Categorize the key sectors of critical infrastructure.
Compare and contrast various risk assessment procedures.
Critique the role that the private sector plays in homeland security.
Derive the best use of resources to reduce vulnerabilities and/or minimize financial impact.
Formulate a strategy for protecting the sector by various means: target hardening, regulatory policies, or restructuring of the sector.
Model the most important components as a fault-tree to extract the critical vulnerabilities of the sector.
Outline the assets associated with each of the key sectors as well as how the sectors function and their regulatory structure.
Recognize the most salient vulnerabilities associated with each sector.
Key Assignment:
For your Key Assignment:
Cover the sector, network, and assets that you selected earlier and referenced throughout the term. You have selected the Defense Industrial Base Sector: Based on the Defense Industrial Base sector address the following:
Discuss the placement of the selected sector in context nationally, regionally, or as otherwise applies. This context should also include discussion of related or overlapping critical infrastructure (CI) sectors that are also relevant to your selected network. Consider any issues or factors pertaining to networks, integration with, or dependence upon other sectors, sector-centric challenges, and so forth. What you choose to include is indicative of your thorough and intelligent approach to covering this requirement.
Include your research and presentation of legal, regulatory, policy-related, and political considerations regarding your selected network, that if not precisely real-world are realistic and reasonable as influences on CI prioritization and resource allocation. This portion will expressly employ applied research methodologies.
Utilize the full application of a vulnerability analysis tool, methodology, or fault tree to analyze your selected network and to identify critical nodes, capabilities, and assets.
Include a complete risk assessment (RA) of at least 1 critical node, identified through your conduct of a vulnerability analysis. This RA model may use an existing tool, be designed by you, or reflect a hybrid of models. The RA will consider threats, vulnerabilities, costs, and risks and identify the most significant among these.
Provide comprehensive recommendations for mitigation, prevention activities, and devices to strengthen protection and resiliency of the network and its assets.
Apply an existing, self-designed, or hybrid model of a resource allocation model to make recommendations on how resources should be applied toward the protection and resiliency of nodes and assets.
Your Key Assignment must include the addition of the following:
Give recommendations for future public- and private-sector initiatives in effecting protected and resilient CI, drawing on lessons gathered from completing this network analysis and extending these lessons to a larger CI context.
Identify and explain potential solutions to mitigate the risks and vulnerabilities you assessed for your asset.
Draw conclusions about the remaining challenges for your network or asset.
Refine your entire product so that it would be suitable for a homeland security (HLS) manager’s use.
References
Be sure to adhere to the following standards:
Include 8 or more academic, technical, or governmental references that may or may not include course materials.
Using more references reflects more research into the topic and better mastery of employing multiple sources.
You may not use wikis or any other shortcut-type sources.
Mechanics and Requirements
For your Key Assignment, be sure to meet the following requirements:
2-3 pages,
Double-space your work in 11- or 12-point font of any style with 1-inch margins all around.
Your citations must appear in proper APA style.
Continue to practice high-quality, scholarly writing
Include the following elements of style in your Key Assignment:
You may deliver the required components in whatever order or format you see fit. You can employ a case study model, a traditional research project, add quantitative or qualitative elements, produce a unique construct to accommodate your topic, and so forth.
This is not a thought piece for you to simply share personal perspectives and philosophies. Do not include your personal opinions. The tone must be scholarly, and if there is a perspective to advance, use evidence, not opinion, to do so. If analysis is required for your product, support your arguments by referring to the facts or evidence you provided in your product, formal documents, or expert perspectives you included. You can still assess these, but be scholarly and assertive in your tone. Do not use “I” statements anywhere in the paper.
The majority of the paper should consist of original work. Use plenty of sources, but weave them into the fabric of the paper’s presentation, analysis, and content. Do not use huge portions of someone else’s material. Also, do not use huge portions of someone else’s material verbatim and without proper annotation, as this constitutes plagiarism.
You should be familiar with the university’s plagiarism policy. A student does not need to intend to cheat to have cheated. Contact your instructor if you are worried about your use of material. When in doubt, cite any outside material, and when using it verbatim, properly annotate the same.
Subtopic headers are recommended because they are useful to both the writer and reader.
Write primarily in narrative style, not in bullets. Do not use enumerated or bulleted lists unless they are used and noted as someone else’s original words. This is scholarly writing, not a military or business style memorandum.
Speak in an affirmative voice, and then support what you state. Rather than saying “I think the FBI made several mistakes when liaising with the CIA prior to 9/11,” you might try 1 of the following examples:
“The FBI made several mistakes when liaising with the CIA prior to 9/11. Evidence such as__________ suggests…”
“Per John Smith, former Lead Agent for the New York Joint Terrorism Task Force, the FBI made several mistakes when liaising with the CIA prior to 9/11 (Smith, 2004). He points to evidence…”
“Arguably, the FBI made several mistakes when liaising with the CIA prior to 9/11. There are two sides of this assertion, however, that should each be explored in depth.”
Please submit your assignment and ensure that you rate below 10 percent on turnitin originality verification check.
Reference
Lewis, T. G. (n.d.). Network analysis. [Video]. Center for Homeland Defense and Security. https://www.chds.us/ed/items/448
Kristine Poptanich. (2008) Strategic Risk Analysis, Approaches and Methods. [Video]. Center for Homeland Defense and Security. https://www.chds.us/ed/items/446For assistance with your assignment, please use your text, Web resources, and all course materials.
Lewis, T. (2005). Network analysis. Retrieved from the Naval Postgraduate School’s Center for Homeland Defense and Security Web site: https://www.chds.us/coursefiles/cip/lectures/riskanalysis/cip_riskanalysis_network analysis/player.html
Lewis, T. (2005). Critical infrastructure strategy and strategic principles. Retrieved from the Naval Postgraduate School’s Center for Homeland Defense and Security Web site: http://www.chds.us/?media/resources&collection=63&type=LECTURE.
