Question #1
Vulnerability is becoming a focal problem, especially with the increase use of drones and the real probability of drone hijacking by hackers.
In the field of construction, vulnerability is defined as a measure of the susceptibility of an element or combination of elements to fail once they are exposed to potentially damaging natural phenomena. It is obvious that this definition is deficient given the potential threats to in this country’s infrastructure from terrorist activities.
Traditionally, vulnerability analysis met five basic objectives. These objectives are as follows: 1) identification and quantification of hazards that can affect system, whether they are natural or derive from human activity; 2) estimation of the susceptibility to damage of components that are considered essential to providing water in case and disaster; 3) definition of measures to be included in the mitigation plan. These measures aimed to decrease the physical vulnerability of the systems components; 4) Identification of measures and procedures for developing and emergency plan; and, 5) evaluation of the effectiveness of the mitigation and emergency plans, and implementation of training activities.
In your opinion, which of the above basic objectives need revision because of increased threat brought about by cyber threats and social media prevalence (people posting pictures and snippets that could divulge information, like layouts, schedules, or problems).
What additional objective would you propose? If there is consensus on a few objectives, what are the issues that would arise if these are accepted?
Question # 2
Read the following articles:
What Americans should fear in cyberspace, by P.W. Singer, January 12, 2014
http://www.latimes.com/opinion/op-ed/la-oe-singer-cyber-security-20140122-story.html#ixzz2rB3lXtNM
What Is the Greatest Threat to U.S. National Security? By Max Boot, July 12, 2015
https://www.commentarymagazine.com/american-society/military/greatest-threat-to-national-security/
What is your biggest fear in cyber space?
Where do you think cyber threats rate compared to all threats to U.S. national security? Justify your answer.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more