Cj 682 9-1 Journal Assigment

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

682

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by CountOctopus1696

Report
1 CJ 682 Module Nine Journal Viktoria Prifti CJ 682 Threat Assessment – 9-1 Journal Professor Henderson 11/19/2023
2 Vulnerability Assessment The vulnerability assessment relied on a methodology that assigned each factor a specific rating with a subsequent explanation. Suffice it to say that the results were informative and I am confident of their application at Hanscom Air Force Base. However, I have a few reservations about the potential threat elements and the potential site population capacity data [ CITATION Hom15 \l 1033 ]. Nonetheless, it was a bit difficult reaching a conclusion considering that the air force base lacks the requisite information due to its criticality. The burgeoning question arising from the assessment is whether there is a high potential for mass casualties in the event of an attack on the base [ CITATION USD202 \l 1033 ]. I would change my approach to the assessment by incorporating information from government agencies to understand the criticality level. Also, I feel that the report offers an objective overview due to its approach towards vulnerabilities based on existent and potential threats. Consequence Analysis The consequence analysis implemented a quantitative approach complemented with record reviews. This strategy was effective although there were issues regarding the validity of the data sourced from specific websites or records. However, the reviewer was able to reach a valid conclusion regarding the likelihood of an attack on the air force base and its impact on the surrounding community [ CITATION Han232 \l 1033 ]. I had some questions about the effects of public confidence considering that the base is largely military. Also, another analyst would view the conclusions as tenable and objective which allows for implementation in leadership decision- making.
3 Countermeasures The researcher implemented an objective approach using secondary data to evaluate the countermeasures. The method was effective in gleaning viable insights which led to conclusive results and top-tier conclusions. Nonetheless, it was quite easy to reach the conclusions although they are subject to peer review and evaluation. I had questions about the efficiency of the high tech, low-tech and no-tech approaches due to their novelty [ CITATION Uni12 \l 1033 ]. These questions were however addressed through effective research which enhanced the validity of the conclusion. As a leader, I would implement the report due to its objectivity and tenable recommendations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References U.S. Department of State Bureau of Counterterrorism. (2020). Annex of Statistical Information Country Reports on Terrorism 2019. Development Services Group, Inc. Hanscom Air Force Base. (2023). About Us . Retrieved from Hanscom: https://www.hanscom.af.mil/ United States. Department of Homeland Security. (2012). Buildings and Infrastructure Protection Series: Primer to Design Safe School Projects in Case of Terrorist Attacks and School Shootings.