Be on schedule.Score better.

support@savemydegree.com

EN

Our Services

Get 15% Discount on your First Order

write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by

write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Note: There are 2 parts to this assignment.

Part 1

For this Discussion Board assignment, complete the following:

  • Based upon the network that you have selected to study this term, explain whether it is a scale-free or small-world network. Your network will not be both. Start with understanding how these each operate and how they differ. Identify your network, and answer the following:
    • Is your network scale free or small world? How do you know? Which principles of scale-free or small-world networks apply to your selected network and the interdependencies between and among its assets, nodes, and links?
    • Is your network also a cascading network? Specifically, why do you believe it is or is not?
  • How does understanding the difference between scale-free and small-world networks help to plan protective measures more successfully?
    • How can understanding your type of network potentially impact your vulnerability and risk analyses?
    • Provide at least 2 examples of how understanding your network better in this respect helps you understand potential vulnerabilities and defend against them.

Part 2

On August 1, 2007, the I-35W Bridge in Minneapolis, Minnesota collapsed, killing 13 people and injuring 121. The U.S. Fire Administration, an entity within the Federal Emergency Management Agency (FEMA), produced a technical report covering the response, recovery activities, and lessons learned regarding this catastrophic event.

This report is available for download.

Under the M.U.S.E. offerings for this Phase, look for the item titled “FEMA Report on MN Bridge Collapse.” Review and study this presentation before answering the following questions. You may also conduct external research, but if you do, be sure to select professional source documents such as FEMA after action reports, engineering records, and lessons. Be sure to answer the following questions:

  • What potential vulnerabilities can be associated with the I-35W bridge collapse?
    • Consider this type of list an organized form of brainstorming. Think of vulnerabilities as gaps in security or protection, structural flaws, or the likelihood of something bad happening. Do not limit the list of vulnerabilities at first; it can be reduced to the most likely or most potentially costly items at a later time.
  • How does the environment impact which vulnerabilities are most likely or even possible?
    • As you contemplate potential vulnerabilities, use the 360-degree analysis this course continues to reinforce. Notice how the vulnerabilities expand, contract, change, or are eliminated based on various changing conditions. In this case, such a view should include assessing environments comprised of natural, manmade, and combined conditions. For example, think about the time of day and time of year it was when the bridge collapsed. An example question might be: Does the season impact the degree or depth of a vulnerability to this bridge? Or, how much greater might the loss of life had been if the collapse occurred in the winter?
  • Based on the list of potential vulnerabilities, what potential costs or consequences might result from each?
    • After listing the vulnerabilities and questions, reduce the list to the most likely possibilities, and consider the potential costs or consequences of each vulnerability. Again, think in a 360-degree way of what might constitute costs or consequences. Do not get stuck on what the actual outcome resulted in, but also consider how much worse or how differently it might have turned out.
  • How do you select the most likely vulnerabilities from a list of many?

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Instructions PreparationView the Technology in Corrections BriefingLinks to an external site. video that introduces you to the types of challenges to

Instructions Preparation View the Technology in Corrections BriefingLinks to an external site. video that introduces you to the types of challenges to corrections operations and challenges you to find solutions. Download the Week 10 Assignment Template Download Week 10 Assignment Template and use it to complete this assignment. Review Electronic Monitoring of Offenders: An Ethical

Intern Tittle: deputy court clerk Descriptive Essay: Proposal for Descriptive Essay: Deputy Court Clerk InternshipObjective:This descriptive essay aims to

Intern Tittle: deputy court clerk Descriptive Essay: Proposal for Descriptive Essay: Deputy Court Clerk InternshipObjective:This descriptive essay aims to provide a detailed overview of the internship site and the intern’s role as a deputy court clerk. It will evaluate the legal authority, scope of activities, organizational structure, funding, goals, policy

Examine ethical issues within the criminal justice system and abroad and explain their social impact INSTRUCTIONS Students must identify an article that

Examine ethical issues within the criminal justice system and abroad and explain their social impact INSTRUCTIONS Students must identify an article that describes a modern ethical issue (criminal justice, forensic science, research science, medicolegal, social, etc.). The sources should come from major news outlets (e.g., BBC, NPR, Washington Post, New York Times,

Over the years, the style and practice of leadership within law enforcement agencies has gradually changed. In the past, leadership was primarily relegated

Over the years, the style and practice of leadership within law enforcement agencies has gradually changed. In the past, leadership was primarily relegated to one individual within the department. However, there has been a transformation in leadership theory resulting in a more dynamic, multifaceted nature of teamwork, inclusion, and dispersed

Deliverable Create a presentation for fellow officers and decision-makers that addresses each of the following, as they relate to your chosen technology

Deliverable Create a presentation for fellow officers and decision-makers that addresses each of the following, as they relate to your chosen technology (from last week’s activity LexisNexis Investigator, Motorola Solutions Command Central Records). The goal is to include details that provide significant insight into areas such as its adoption, use,