+1(978)310-4246 credencewriters@gmail.com
  

Description

NSTRUCTIONS:

A substantive comment should be approximately 350 words or more.

Cite (2 or MORE) sources within your comment to support your statements.

Include at least a couple of references, properly formatted, not just a link.

Discussion: Drones and Vulnerability Analysis

Vulnerability is becoming a focal problem, especially with the increase use of drones and the real probability of drone hijacking by hackers.

In the field of construction, vulnerability is defined as a measure of the susceptibility of an element or combination of elements to fail once they are exposed to potentially damaging natural phenomena. It is obvious that this definition is deficient given the potential threats to in this country’s infrastructure from terrorist activities.

Traditionally, vulnerability analysis met five basic objectives. These objectives are as follows: 1) identification and quantification of hazards that can affect system, whether they are natural or derive from human activity; 2) estimation of the susceptibility to damage of components that are considered essential to providing water in case and disaster; 3) definition of measures to be included in the mitigation plan. These measures aimed to decrease the physical vulnerability of the systems components; 4) Identification of measures and procedures for developing and emergency plan; and, 5) evaluation of the effectiveness of the mitigation and emergency plans, and implementation of training activities.

In your opinion, which of the above basic objectives need revision because of increased threat brought about by cyber threats and social media prevalence (people posting pictures and snippets that could divulge information, like layouts, schedules, or problems).

What additional objective would you propose? If there is consensus on a few objectives, what are the issues that would arise if these are accepted?

Please post your response to this question and critique the response of at least one other student before the end of this Module.

_______________________________________________________________________________________________

Module 2 – Background

THE MILITARY PARTNERSHIPS

Required Reading

Dolan, A. M. and Thompson, R. M. (2013).

Integration of drones into domestic airspace: Selected legal issues.

Congressional Research Service. Retrieved from

https://fas.org/sgp/crs/natsec/R42940.pdf

Read pp. 3-11.

FEMA IS-75:

Military Resources in Emergency Management

(2011). FEMA. Retrieved from

https://training.fema.gov/emiweb/is/is75/student%2…

Read “Integration of Military Resources in Accordance with NIMS and NRF” pp. SM III-8 to SM III-21

The Posse Comitatus Act—fact sheet

(2019, September 23), Section 1385 of Title 18, United States Code (USC). U.S. Northern Command. Retrieved from

https://www.northcom.mil/Newsroom/Fact-Sheets/Arti…

2018 National Preparedness Report (2018). FEMA.gov.

https://www.fema.gov/media-library-data/1541781185…

/

Required Websites

American Red Cross: Terrorism Preparedness:

http://www.redcross.org/get-help/prepare-for-emerg…

NORAD and U.S. Northern Command Posture Statement:

http://www.northcom.mil/Portals/28/Documents/2014%…

United States Northern Command.

http://www.northcom.mil/

Discussion: Drones and Vulnerability Analysis
Vulnerability is becoming a focal problem, especially with the
increase use of drones and the real probability of drone
hijacking by hackers.
In the field of construction, vulnerability is defined as a measure
of the susceptibility of an element or combination of elements to
fail once they are exposed to potentially damaging natural
phenomena. It is obvious that this definition is deficient given
the potential threats to in this country’s infrastructure from
terrorist activities.
Traditionally, vulnerability analysis met five basic objectives.
These objectives are as follows: 1) identification and
quantification of hazards that can affect system, whether they
are natural or derive from human activity; 2) estimation of the
susceptibility to damage of components that are considered
essential to providing water in case and disaster; 3) definition of
measures to be included in the mitigation plan. These measures
aimed to decrease the physical vulnerability of the systems
components; 4) Identification of measures and procedures for
developing and emergency plan; and, 5) evaluation of the
effectiveness of the mitigation and emergency plans, and
implementation of training activities.
1. In your opinion, which of the above basic objectives need
revision because of increased threat brought about by cyber
threats and social media prevalence (people posting pictures
and snippets that could divulge information, like layouts,
schedules, or problems).
2. What additional objective would you propose? If there is
consensus on a few objectives, what are the issues that would
arise if these are accepted?
Please post your response to this question and critique the
response of at least one other student before the end of this
Module.
Module 2 – Background
THE MILITARY PARTNERSHIPS
Required Reading
Dolan, A. M. and Thompson, R. M. (2013). Integration of drones into
domestic airspace: Selected legal issues. Congressional Research Service.
Retrieved from https://fas.org/sgp/crs/natsec/R42940.pdf
Read pp. 3-11.
FEMA IS-75: Military Resources in Emergency Management (2011).
FEMA. Retrieved
from https://training.fema.gov/emiweb/is/is75/student%20manual/stu
dent%20manual.pdf
Read “Integration of Military Resources in Accordance with NIMS and
NRF” pp. SM III-8 to SM III-21
The Posse Comitatus Act—fact sheet (2019, September 23), Section 1385
of Title 18, United States Code (USC). U.S. Northern Command. Retrieved
from https://www.northcom.mil/Newsroom/Fact-Sheets/ArticleView/Article/563993/the-posse-comitatus-act/
2018 National Preparedness Report (2018).
FEMA.gov. https://www.fema.gov/media-librarydata/15417811858232ae55a276f604e04b68e2748adc95c68/2018NPRRprt20181108v50
8.pdf/
Required Websites
American Red Cross: Terrorism
Preparedness: http://www.redcross.org/get-help/prepare-foremergencies/types-of-emergencies/terrorism
NORAD and U.S. Northern Command Posture Statement:
http://www.northcom.mil/Portals/28/Documents/2014%20NC%20Po
sture%20Statement_Final_HASC.pdf
United States Northern Command. http://www.northcom.mil/

Purchase answer to see full
attachment

  
error: Content is protected !!