Compare and contrast various risk assessment procedures.

Unit 4 – Discussion Board
View Assignment Details for Unit 4 –
Assignment Overview
Type: Discussion Board
Unit: Understanding and conducting a Risk Assessment (RA)
Deliverable Length: 400-600 words
Assignment Descriiption
Assignment Objectives
Compare and contrast various risk assessment procedures.
Derive the best use of resources to reduce vulnerabilities and/or minimize financial impact.
Primary Task : Write 400–600 with an illustration words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
Note: There are 2 parts to this assignment.
Part 1
create a 1 page resource allocation strategy with a graph utilizing the reference material
REVIEW OF RISK BASED PRIORITIZATION/DECISION MAKING
METHODOLOGIES FOR DAMS
John R. Harrald, Ph.D.
Irmak Renda-Tanali, D.Sc.
Greg L. Shaw, M.S.
Claire B. Rubin, M.A.
Sarp Yeletaysi, B.S.
The George Washington University
Institute for Crisis, Disaster, and Risk Management
1776 G St. NW Suite 110
Washington, DC 20052
April 29, 2004
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.367.1996&rep=rep1&type=pdf
focusing on the summary of methodologies 2.1.-2.8. My Paperhelp writing expert has full discretion to choose whichever strategy they wish. as an example:
2. SUMMARY OF METHODOLOGIES
Quite a few methodologies exist both in the U.S. and in the world that consider risk as part of assessing
dam safety. We refer to risk as probability of occurrence of an unfavorable event multiplied by the
consequences should such event occurs.
Risk = probability x consequence
Or in a more elaborate expression we define risk as follows:
Risk = threat3 x vulnerability x {direct (short-term) consequences + indirect (broad) consequences}
We have identified several tools pertaining to:
1) dam safety risk assessment (RBPS);
2) dam safety priority indexing (TPR, CI);
3) dam safety risk assessment and priority indexing (PRA, CI); and
4) dam security risk (and vulnerability) assessment. (RAM-D, EPRI tool)
Not all of the methods incorporate uncertainty in their approach, however they are included here since
they all have been either developed in cooperation with dam agencies or recognized worldwide or in the
U.S. and are currently being used. Two of those methods look at dam security issues, in that they differ
from the rest of the methods. The next section summarizes each methodology. We will begin with dam
security risk assessment tools. Table 1 will provide a snapshot overview of the dam safety risk
assessment and investment prioritization methodologies described here in a table format.
For the purposes of completeness, we have also provided an overview of general widely recognized risk
analysis methods in Appendix D. Some of the dam safety risk assessment methodologies that we are
about to discuss, draw upon these risk analysis methods.
to craft a response to the questions below. Prepare a miniature brief of 1 page in APA 6th edition guidelines that describes your assigned resource allocation strategy, and develop an illustration to aid in your explanation.
Refer to the Lower Colorado Dams Network as the network to which you will allocate your resources using the model you chose. You have $30 million to allocate to the Lower Colorado Dams Network.
Using the allocation model assigned present the strategy for how these dollars would be apportioned. Be true to the allocation strategy’s concept, and answer the following questions:
What specific monies will you assign to which assets, links, network components, or sector elements? Explain how your allocation model guided your decisions.
What strengths does your allocation model have to allocating resources to this network? Be comprehensive and specific in your answer.
What shortcomings or detriments does your allocation model reveal for allocating resources to this network? Be comprehensive and specific in your answer.
Provide 2–3 modifications to this model that would enhance it for allocating resources to this network. If you believe this model is ideal and no modifications are necessary, explain why you believe this.
Respond to Another Student: Review at least 1 other student’s Key Assignment Outline and provide meaningful feedback. Refrain from general feedback, such as simply stating “good job.” Your feedback to other students is most helpful if you not only point out weak areas but also offer suggestions for improvement. The best feedback takes a three-stage approach to identify what was done well, weaknesses, and areas for improvement.
Part 2
Create an outline of your Unit 4 IP Key Assignment draft based on the (Defense Industrial Base Sector) for peer review. There is no specific order for your final product (Key Assignment), but you should demonstrate good organization skills and comprehensive inclusion of the main elements. Y be as specific and detailed as possible. For example, do not simply state “Risk Assessment.” Instead (as an example), state: specifically
Risk Assessment of the as the most critical Defense Industrial Base Sector node of the East Coast.
This asset is chosen as most critical because…
Threats considered include erosion, user demand, earthquake, terrorist attack…
Consequences considered include, loss of all reserved water in dam, impact on agriculture, damage or destruction to lower dams…
The most likely “Threats” include…
Remember, this is an example of being comprehensive and specific; your node, priorities, conditions, and so forth may necessitate other elements in your outline.
Ensure the submitted outline is in appropriate outline format as a minimum:
Introduction
Hook
Background
Thesis statement
with
Conclusion
Summary/synthesis
Importance of topic
Strong closing statement
ensure all submitted works score less than 10 percent on turnitin originality verification check
For assistance with your assignment, please use the following resources, and course materials.
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.367.1996&rep=rep1&type=pdf
Lewis, T. (2005). Critical infrastructure strategy and strategic principles. Retrieved from the Naval Postgraduate School’s Center for Homeland Defense and Security Web site: http://www.chds.us/?media/resources&collection=63&type=LECTURE.
Lewis, T. (2005). Simple risk. Retrieved from the Naval Postgraduate School’s Center for Homeland Defense and Security Web site: http://www.chds.us/?media/resources&id=2676&type=LECTURE
National Infrastructure Protection Plan: Partnering to enhance protection and resiliency. (2009). Retrieved from the U.S. Department of Homeland Security Web site: http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf
National infrastructure protection plan: Partnering to enhance protection and resiliency. (2009). Retrieved from the U.S. Department of Homeland Security Web site: http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more