Reference no: EM131199269
Proposed application of risk management process
The Homeland Security Risk Management Process is explained point-by-point and in detail on pp. 15-26 of this reading assignment.
Note: This part will actually become the fifth subsection of the KA project.
Title: Proposed Application of Risk Management Process to [insert your critical infrastructure or key resource (CIKR) site]
Summarize the 7 steps outlined in this document and draft brief policy requirements or statements that would implement the steps with specifics connected to their critical infrastructure or key resource (CIKR) site. Use these to craft a policy proposal of 1.5-2 pages to the manager of your CIKR site explaining how the Homeland Security Risk Management Process (IRM cycle) should be applied to the CIKR.
Include useful bibliographic references.
Part Two:
Note: This part will actually become the sixth subsection of the KA project.
Title:Preparedness Planning Policy
The owner and operator of your critical infrastructure or key resource (CIKR) site wants to put a policy or set of policy papers in place concerning preparedness at your site.
Draft a proposal explaining what should go into a preparedness and infrastructure protection program for the threat that was previously identified at your CIKR site.
• For each concept, come up with 1 or more examples of how it might be put into action.
• Include how state, local, and other businesses might be leveraged to enhance your program.
• Include useful bibliographic references.
• Note: You are not required to write the program itself with details and requirements. You are only required to explain the concepts that fall under the heading of Preparedness.
• and 1/2 to 1 page onIdentify and detail the potential involvement of non-DHS federal agencies, including the Department of Defense, law enforcement, and the intelligence community.
What are the disadvantages of benchmarking
: In order to improve processes quality, management keeps records and evaluates processes based on these records. This type of recordkeeping is considered benchmarking. Benchmarking allows an organization to analyze variances for different types of pro..
|
Map and draw the new supply network
: Map and draw the new supply network as a result of the changes made in the case and calculate the annual cost associated with running the upgraded system
|
Leadership truly acknowledge critical role of the employees
: Humility. Does your leadership truly acknowledge the critical role of the employees who help the organization achieve its set goals? Is such acknowledgment manifested through rewards and profit sharing or is it superficial?
|
What society should truly expect from the future
: When technology should be paramount, and when should it be sidelined? What society should truly expect from the future? Consideration of strategic, operational, and tactical uses of technology.
|
Draft proposal explaining what should go into a preparedness
: Draft a proposal explaining what should go into a preparedness and infrastructure protection program for the threat that was previously identified at your CIKR site.
|
Calculate present value of cash inflow
: If project's cost of capital (discount rate) is 12.5%, what is the project's NPV? Should the project be accepted? Why or why not? Calculate present value (PV) of cash inflow (CF)
|
Organismic background factors in influencing
: erform an S-O-R black box analysis on yourself. Observe what you are doing(especially in terms of the products and services you are using or purchasing). Identify the role of the stimuli and organismic background factors in influencing these behavior..
|
Furniture company makes tables and chairs
: A furniture company makes tables and chairs. A table requires 40 board feet of wood and a chair requires 30 board feet of wood. Wood costs $1 per board foot and 40,000 board feet of wood are available. It takes 2 hours of skilled labor to make an unf..
|
Meaningful use may have helped healthcare interoperability
: Explain how meaningful use may have helped the increase in implementation of healthcare information technology. Explain how meaningful use may have helped healthcare interoperability.
|