Cj 682 9-1 Journal Assigment
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
682
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by CountOctopus1696
1
CJ 682 Module Nine Journal
Viktoria Prifti
CJ 682 Threat Assessment – 9-1 Journal
Professor Henderson
11/19/2023
2
Vulnerability Assessment
The vulnerability assessment relied on a methodology that assigned each factor a specific
rating with a subsequent explanation. Suffice it to say that the results were informative and I am
confident of their application at Hanscom Air Force Base. However, I have a few reservations
about the potential threat elements and the potential site population capacity data [ CITATION
Hom15 \l 1033 ]. Nonetheless, it was a bit difficult reaching a conclusion considering that the air
force base lacks the requisite information due to its criticality. The burgeoning question arising
from the assessment is whether there is a high potential for mass casualties in the event of an
attack on the base [ CITATION USD202 \l 1033 ]. I would change my approach to the
assessment by incorporating information from government agencies to understand the criticality
level. Also, I feel that the report offers an objective overview due to its approach towards
vulnerabilities based on existent and potential threats.
Consequence Analysis
The consequence analysis implemented a quantitative approach complemented with
record reviews. This strategy was effective although there were issues regarding the validity of
the data sourced from specific websites or records. However, the reviewer was able to reach a
valid conclusion regarding the likelihood of an attack on the air force base and its impact on the
surrounding community [ CITATION Han232 \l 1033 ]. I had some questions about the effects of
public confidence considering that the base is largely military. Also, another analyst would view
the conclusions as tenable and objective which allows for implementation in leadership decision-
making.
3
Countermeasures
The researcher implemented an objective approach using secondary data to evaluate the
countermeasures. The method was effective in gleaning viable insights which led to conclusive
results and top-tier conclusions. Nonetheless, it was quite easy to reach the conclusions although
they are subject to peer review and evaluation. I had questions about the efficiency of the high
tech, low-tech and no-tech approaches due to their novelty [ CITATION Uni12 \l 1033 ]. These
questions were however addressed through effective research which enhanced the validity of the
conclusion. As a leader, I would implement the report due to its objectivity and tenable
recommendations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
References
U.S. Department of State Bureau of Counterterrorism. (2020).
Annex of Statistical Information
Country Reports on Terrorism 2019.
Development Services Group, Inc.
Hanscom Air Force Base. (2023).
About Us
. Retrieved from Hanscom:
https://www.hanscom.af.mil/
United States. Department of Homeland Security. (2012).
Buildings and Infrastructure
Protection Series: Primer to Design Safe School Projects in Case of Terrorist Attacks and
School Shootings.