Discuss two criticisms of the nipp model

Discuss two criticisms of the nipp model

Write a two to four (2-4) page paper in which you

Analyze the National Infrastructure Protection Plan and Risk Management Framework, located at

http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf,

and conclude how it has been designed to protect the nation’s critical infrastructure.

1. Determine the purpose of the feedback loop design and argue how it strengthens or weakens the model. Justify your response.

2. Decide if taking a “risk management” approach is suitable for protecting the nation’s critical infrastructure. Support your response.

3. Choose the one (1) step that is the most important or has the greatest impact on the other steps of the Risk Management Framework and describe why.

4. Discuss two (2) criticisms of the NIPP model and suggest ways of dealing with those criticisms.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the national infrastructure plan in the context of strategic targets.

Use technology and information resources to research issues in homeland security.

Write clearly and concisely about topics related to Homeland Security Organization and Administration using proper writing mechanics and technical style conventions.

315 Assignment

Assignment 2: Briefing Report

Review the briefing report titled “Federal Protective Service: Actions needed to resolve delays and inadequate oversight issues with PS’s risk assessment and management program” located at

http://www.gao.gov/new.items/d11705r.pdf.

Most of the changes that have taken place within the Federal Protective Service (FPS) have been reactive as a result of specific events such as the Oklahoma City bombing and terrorist events of September 11, 2001. This insinuates that there ould be other potential threats that are being ignored because they have yet to be exploited.

Write a three to four (3-4) page paper in which you:

1. Evaluate the security measures taken by the FPS and determine if the measures are comprehensive enough, given any potential threats not mentioned in the report.

2. Compare the security measures provided by the FPS to those of a commercial building with which you are familiar.

3. Describe the weaknesses that still exist within the protocols defined by the FPS.

4. Describe the security measures that you see at your nearest federal building as well as the security measures that you believe may not be obvious to other observers.

5. Use at least two (2) quality resources in this assignment including the suggested FPS Website. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.

The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Summarize the methods and practices related to perimeter security.

Use technology and information resources to research issues in security assessment and solutions.

Write clearly and concisely about topics related to security assessment and solutions using proper writing mechanics and technical style conventions.

Order from us and get better grades. We are the service you have been looking for.