You have depicted a specific network from within your sector graphically and chosen the Defense Industrial Base sector in Savannah Ga, a sub sector of the Cyber Security Infrastructure security agency (CISA). This week, you will explore in depth the nodes, assets, and links within your selected network. In 2 pages in APA 6th edition format deliver a preliminary view of the assets, nodes, and links in your network. Be concise, yet comprehensive. The following elements should be included in the paper:
Describe each node, asset, and link in the network. If these are too numerous, you may elect to describe types of assets and links.
Using the Lower Colorado Dams as an example, it is important to realize that dams can produce hydroelectric power; serve as storage sites by creating a reservoir for drinking, irrigation, and recreation; or primarily provide diversion by directing water for other uses. Some dams may also serve all of these functions.
Consider and describe the threats that might impact each node or type of node.
Links may be critical too but absorb these in considering threats to your nodes. For example, if a road links 2 power production facilities, and its impassibility in the winter means employees do not make it to work, you should simply cast this threat in terms of how it impacts the node. In other words, there is a threat of employees not reporting to work because of the remoteness of facility and routinely impassable roads.
Every node should have multiple potential threats, and these should be realistic and fully described.
Do not choose obscure or extremely unlikely threats, or you will find that infinite possibilities exist.
You must use professional and governmental sources to help identify realistic threats.
Consider and list the potential consequences each of these threats might produce.
Produce a 2-page report using your own design for its format and style, but ensure it is well-organized, clearly delivered, mechanically sound, and comprehensive in content.
If you mention sources or deliver content that is in any way derived from material or ideas that are not your own original thoughts, include proper citations.
If you produce a well-considered report for this assignment, the risk assessment you produce later in the term will be partially complete.
In considering threats and consequences, you should think critically, not superficially. For example, in the Lower Colorado Dams example, a threat to a water reservoir could be climate change, which as a consequence might lead to evaporation. But climate change may produce drought as well, which as a consequence can result in overconsumption of reservoir waters. This could threaten its availability or fair distribution for drinking, agriculture, and power production, which would impact at least 3 separate sectors. The Lower Colorado Dams illustration reveals that different dams and reservoirs impact various communities and numbers of populations in different ways. Therefore, potential consequences will vary. Consider a reservoir that serves mostly as a recreation site, versus one that provides drinking water to Las Vegas, Nevada.
For assistance with your assignment, please use the following Web resources, and course materials.
Broder, J. F. (2006). Risk analysis and the security survey (3rd ed.). Burlington, MA: Elsevier.
Lewis, T. (2005). Networks. Retrieved from the Naval Postgraduate School’s Center for Homeland Defense and Security Web site: https://www.chds.us/coursefiles/cip/lectures/networks/cip_networks_nodeslinks/player.html
Lewis, T. (2005). Simple risk. Retrieved from the Naval Postgraduate School’s Center for Homeland Defense and Security Web site: http://www.chds.us/?media/resources&id=2676&type=LECTURE
https://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf