JUS-470 Topic 1 TAP Part I: Overview of Assessment and Analysis

JUS-470 Topic 1 TAP Part I: Overview of Assessment and Analysis

 

Instructions: Access the information on the environment that you will be using to create your threat assessment plan, and then address the following questions. Each question need to be answered by using the terminology of the industry. Please note the word-count for each of the questions that follow.

Be sure to cite three to five relevant scholarly sources in support of your content. Use only sources found at the GCU Library, government websites or those provided in Class Resources.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

While APA style is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

Bachelor of Science in Justice Studies

4.3: Assess strategies and guidelines for using technology in case management and administration.

 

  • Explain The Advantages Of Having A Threat Assessment Plan. (100-200 Words)

A threat valuation strategy is crucial to every institute since it has several benefits. A threat assessment plan protects organizations against losses. It identifies and understands potential risks hence limiting liabilities. It also identifies exposure by determining weaknesses in the security system (Ennis et al., 2015). Consequently, the plan designs necessary actions to minimize or eliminate the threatening events. Notably, it assesses and remediates threat areas. The assessment plan also determines the necessity of new security requirements. Understanding the security vulnerabilities in an organization determines the required steps to eliminate or manage these weaknesses and improve the organization’s security. It also improves the planning of an organization in making smart purchases.

The information a threat assessment plan provides aids in appropriate budgeting. After an organization identifies its weaknesses through the plan, it can avoid potential overspending on a problem that does not need an expensive solution. Furthermore, a threat assessment plan improves decision-making. The comprehensive information enables members of an organization to understand the significant security threats and what should be done to counter such problems. It also boosts IT employees’ productivity as they can better understand their systems. It helps them plan for future changes.

  • Explain The Core Elements Of A Threat Assessment Plan (150-250 Words)

A threat valuation plan’s core features include managing, managing, and assessing threats (Miller, 2014).

Identifying the Threat

People need to know when, when, and how to report threat concerns for the established order to identify threats easily. For instance, Miller (2014) underlines that in Washington, D.C., an intercom announcement encourages commuters to “say something if they see something.” It is also vital for the established order to express that the tips received will be sensibly and with judgment handled. Sometimes, people get reluctant to report for fear of entangling themselves in trouble or wrongly implicating someone (Meloy, 2015).

Assessing the Threat

After identifying the threats, you must assess them after evaluating information from several sources (Vossekuil et al., 2015). The hazard conditions will come in easy reach in carrying out a risk valuation. The threat matrix or odds surrounding substance uses the factors of the chance of a threat occurring and its possible waves. The possibility might be standard, truncated, extraordinary, or acute. To assess the likelihood of a threat, one can use history and location to evaluate its probability of occurring.

Managing the Threat

Lastly, assess the reactions you have put in domicile and the procedure. Make certain whether you did appropriate documentation and valuation of the threats. Consequently, Set up controls. Some controls consist of creating policies, documenting emergency response plans, and training employees. Also, see the efficiency of the reins: and how firm you can react to a threat. Look at the obtainable means to discourse the threats. Recap the procedure as you fit in any new data.

  • Discuss The Use Of Technology In Threat Assessment In 600-750 Words, By Addressing The Following:
  • Identify The Types Of Technology That Is Being Used For Threat Assessment By Local, State, And Federal LE Agencies.

Threat assessment requires the use of machineries to oversee its operations successfully. Technology can be hard or soft (Bryne & Marx, 2017). Firm technology is the hardware part of technology, while soft technology consists of software used in threat valuation. The hard technology consists of Mobile data centers, Metal detectors, Video in patrol cars, Computers in squad cars, Citizen Protection devices, CCTV, Street lighting, and Ignition interlocks. Soft technology includes Risk assessment tools, Threat assessment tools, Creating watch lists, Amber alerts, and Crime mapping.

 

  • Identify The Technologies Being Used By The Emergency Management And Private Threat Protection Fields.

Additionally, the technologies or rather machineries utilized here include the use of drones. Drones can be used in places where human beings cannot reach them. The drones assist in surveillance. Moreover, they do not need anyone’s presence within them to operate. They are controlled from afar. They can also work underwater and in the air. Another technology used is mobile phones. These gadgets provide several services that provide huge aid in emergency management (Byrne& Marx, 2017). The services they provide include the internet, cameras, and text messages. They can also provide location-based services. These services can help significantly during crisis or emergency management. The internet through its social display place, voice calls, and text messages help the family members, public, and friends keep in trace.

Big data technology is also used for emergency management. Its capability to process more information than a number of modes like drones and phones in the course of a disaster aids significantly. The information eases the generation of appropriate reactions to catastrophes. Further, the Internet of Things (IoT) is also essential in emergency management. This real-time technology passes on data on a disaster’s likely happenings through measuring device. The report helps during inadequate preparations. Another technology used is Artificial Intelligence (AI). Some set of rules may make PCs try to be like human beings, therefore artificial intellect. Artificial Intellect assists in identifying calamities like earthquakes. Timely detection of such disasters helps hasten response and avoid possible significant losses.

Robots can also be used in emergency management. Robots have measuring device and computer chip that allow them to liberate missions in dwellings where human beings would not have been able to, bearing in mind the prospective risks involved (Byrne & Marx, 2017). Social media podiums such as Twitter and Facebook also equip users with features that hasty them to streak themselves not dangerous if there is an emergency. The report saves the organization team from accounting for individuals in the tragedy zone.

  • Give Examples Of The Technologies And How The Technology Is Used In Threat Management.

There are various technologies utilized in managing menace. Among them is user behavior analytics. This technology helps in identifying unauthorized access. If a person acquires unapproved access to a password or username, actions analytics can sense when the individual starts carrying out mischievous actions and raise a red flag. By raising the red flag, the system administrators can block those activities (Byrne & Marx, 2017). Another technology is hardware authentication. This technology covers the inadequacies of usernames and passwords. Data loss prevention also manages threats in an organization. Encryption and tokenization can inhibit data loss by computer-generated attackers. Supplementary, Cloud keeps information safe by inhibiting impostors who may want to snip or alter it.

  • Assess The Viability Or Effectiveness Of The Various Technologies Used By These Threat Management Fields.

The most important risk plans, including the less expensive and non-complex tools, can help in trailing risks and reporting them. Such devices consist of MS Office and others. Social media firms use social media podiums to trail customer replies and opinion to take fast act should they be worried (Byrne & Marx, 2017). Also, integration and information analytics enable firms to set hazard information points in their enormous databases to become aware of any threat to information and unauthorized access. Information Drawing out can also assists identify if a machine flops or scheme is about to take place.

References

 

Vossekuil, B., Fein, R. A., & Berglund, J. M. (2015). Threat assessment: Assessing the risk of targeted violence. Journal of Threat Assessment and Management2(3-4), 243.

Meloy, J. R., Mohandie, K., Knoll, J. L., & Hoffmann, J. (2015). The concept of identification in threat assessment. Behavioral Sciences & the Law33(2-3), 213-237.

Byrne, J., & Marx, G. (2017). Technological innovations in crime prevention and policing. A review of the research on implementation and impact. Journal of Police Studies, 20(3), 17–40.

Ennis, L., Hargreaves, T., & Gulayets, M. (2015). The Integrated Threat and Risk Assessment Centre: A PROGRAM evaluation investigating the implementation of threat management recommendations. Journal of Threat Assessment and Management, 2(2), 114–126. https://doi.org/10.1037/tam0000040

Miller, A. (2014, February). Threat assessment in action. Monitor on Psychology. Retrieved from https://www.apa.org/monitor/2014/02/cover-threat#:~:text=Threat%20assessment%20involves%20three%20functions,generally%20react%20to%20situations%20violently.

 

 

 

 

 

 

 

 

JUS-470 Topic 2Assessment of Assets Matrix

Instructions: Complete Part I and II below. Remember that you are assessing assets in the environment being used for the TAP. Use industry terminology.

Be sure to cite three to five relevant scholarly sources in support of your content. Use only sources found at the GCU Library, government websites or those provided in Class Resources.

This assignment uses a scoring guide. Please review the scoring guide prior to beginning the assignment to become familiar with the expectations for successful completion.

While APA style is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.

 

Part I: Brainstorming list of Assets

Instructions: For the first part of this assignment, brainstorm to determine all of the assets in the chosen environment. Be sure to include all “types’ of assets, e.g., “things” as well as information assets, “people” assets, and moving assets.That list will be used to help complete the Matrix in Part II (the list below is a starting point; there may be more or less assets in your specific environment).

  1. Technologies like communication networks
  2. Information. E.g., proprietary, trademarks and copyrights, patents, and employees’ and customers’ personal information.
  3. Systems like alarms, management information systems (MIS), Decision Support Systems (DSS) and Transaction Processing Systems. (TPS)
  4. Facilities like business premises.
  5. Equipment such as industrial computers and automobiles (through tracking)
  6. Processes like automated manufacturing and supply chains.
  7. IT infrastructures like company computers, tablets, and other portable computers (PCs)
  8. Software such as Microsoft word and antiviruses
  9. Social networks like the company’s website.

10.People, including contractors, employees, and vendors.

 

Part II: Evaluation of Assets

Instructions: Complete the matrix below regarding evaluating assets in your environment. Please note the instructions for each section of the matrix. Additionally, you can add to this matrix if more space is needed.

  1. Be sure to include all “types” of assets, e.g., “things” as well as information assets, “people” assets, and moving assets. Use your brainstorming list to help with this.
  2. Catalog and audit your assets, e.g., How many groups of people, buildings, etc., do you have in the environment?
  3. Rank the value of assets
  4. Who and/or what is the most vulnerable to be attacked? Give your rationale.
A. Assets B. State Asset Value C. Rank Asset Value D. Rank Vulnerability of Assets
Ex. People Ex. How many people and/or groups of people? Ex. The people are #1 in value. Ex. The people are ranked #2 vulnerability because the building is a bank, making it #1.
People The organization comprises a team of a hundred people, two of whom work as virtual teams. People are ranked the number one asset since they are the ones who run the organization (Shafieezadeh et al., 2015). Their contribution through strength, commitment, knowledge and dedication go beyond monetary valuation as mere assets. People are ranked #2 in terms of vulnerability since the company operates in a financial industry that attracts attackers targeting other easier and more convenient assets.
Information The company gathers, records and stores diverse information types that are potential attack targets. The information includes people’s protected information, such as names, birth dates, and financial positions. Information systems are the second most valuable asset of the organization since they ease and improve the institution’s efficiency. The system are the #1 most vulnerable to threats due to their complexities that attract different attack types. Similarly, leaked protected information cannot be equated to any monetary value since it involves individuals’ dignity and privacy.
Facilities Examples of the facilities valuable to the organization include its strategic physical location, This class of asset is ranked #4 in business value. It is the actual position where the business meets its people to facilitate daily business operations. Facilities are ranked #8 in vulnerability to threats. Attackers would have to present themselves on the premises to launch their attack physically. (Ayyub et al., 2007). This can be cumbersome due to law enforcers’ involvement in preventing this form of crime.
Systems The organization comprises chains of information systems like the DDS and MIS that runs daily operations. Systems are the #3 most valuable assets of the organization. They guarantee that the intended roles are executed to precise standards, which is critical in the financial industry, and forms the foundation onto which all other organization functions are anchored. Systems are also ranked as the #5 most vulnerable assets to attacks due to their interconnectedness and ease of access from any point of connection (Shafieezadeh et al., 2015). The interconnectivity maximizes the risks of unauthorized access.
IT Infrastructure Many IT infrastructures support the organization’s function. They include PC for employees, Wi-Fi, modems, the cloud and routers. Infrastructure is ranked #6 most valuable asset. It supports the organization to operate seamlessly by streamlining operations, minimizing workload and optimizing teams’ productivity. This asset class is ranked #6 in vulnerability due to the potential of anticipated interactions between programs that creates loopholes for attacks. Their attack can paralyze the entire organization leading to significant losses, potential ransom and a negative business image.
Software The company utilizes various software, including FIS profile, CorePlus and BankWare to record and manage customer transactions. The software is ranked #7 in the value of the company’s assets. Software is ranked #4 in vulnerability due to the numerous flaw, weaknesses and glitches inherent to this technology (threat source) that is a target for malicious exploitation.

 

Processes The company offers diverse financial processes, including credit card processing, cash deposit and withdrawal, loan processing and balance checking. Processes are ranked #8. They are critical to the organization’s revenue generation and sustainability. They minimize redundancy and improve efficiency leading to better investment management (Webster et al., 2008). Processes are ranked #9 in vulnerability. The login functionality of many bank websites and mobile banking apps is publicly available. This makes the processes reachable and for exploitation by attackers.
Networks The organization utilizes numerous networks, like communication networks, to link with internal and external stakeholders. Networks are ranked the #5 most valued assets of the organization. They offer means for an organization to interact and guarantee coordination and cooperation among teams for better service delivery. Networks are ranked #3 in vulnerability due to the many risks of unauthorized access involved. Examples include weak password policies, inadequate or lack of protection against attacks, insider threats and previously compromised accounts. Besides, a single attack can impact a large fleet of devices to intensify the magnitude of the attack.
Equipment The bank has a pool of critical equipment, including cash recyclers, cash counters, and depository safes. Equipment is ranked #9 most valuable asset since it plays supplementary roles in daily operations and is easily substitutable. Equipment are ranked #10 in vulnerability since many are not computerized (Borum, 2015). Their threats is mostly physical threats.
Social networks Social networks are critical to the company’s marketing strategies and are critical in driving revenue. Social networks are the least valuable asset of the ten identified assets due to their ease of substitution. For example, the company can opt for other marketing strategies apart from using social networks. Social networks are ranked #7 due to inherent threats of attacks such as social engineering that have spillover to an organization’s financial position.

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Borum, R. (2015). Assessing risk for terrorism involvement. Journal of Threat Assessment and Management, 2(2): 63-87. Retrieved from https://journals.scholarsportal.info/details/21694842/v02i0002/63_arfti.xml

Webster, D. C., Bloom, H. & Eisen, S. R. (2008). Towards the scientific and professional assessment of violence potential in the workplace. Journal of Threat Assessment, 2(4).

Shafieezadeh, A., Cha, J. E. & Ellingwood, R. B. (2015). A decision framework for managing risk to airports from terrorist attacks. Risk Analysis, Vol. 35, No. 2, 2015

Ayyub, M. B., McGill, L. W. & Kaminskiy, M. (2007). Critical asset and portfolio risk analysis: An all-hazard framework. Risk Analysis, Vol. 27, No. 4, 2007

 

 

 

JUS-470 Topic 3TAP Part III: Assessment of Threats

Instructions: This assignment will address prior and possible current threats to the assets in the environment (used in this project).NOTE: If you conduct research on your environment and are unable to find any history of actual previous threats then project the types of threats that could have existed previously in your chosen environment.

Be sure to adhere to the word count for each question.Each question need to be answered by using the terminology of the industry.

Be sure to cite three to five relevant scholarly sources in support of your content. Use only sources found at the GCU Library, government websites or those provided in Class Resources.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

While APA style is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.

 

  1. Conduct qualitative research to assess prior threats. How were the threats carried out in your environment? For example, how the shooting at Columbine was carried out.(250-350 words)

Conducting a threat assessment is a crucial examination that may be performed in every given setting. When assessing a danger, numerous factors must be considered together, including the likelihood of the threat occurring, its severity, and the potential impact it could have (Temkinet al., 2020). Identifying the threat, classifying it, evaluating its overall severity, and creating a plan to eliminate it are all key steps in any threat assessment. In an ideal world, terrorists are mostly to blame for the majority of environmental dangers. And importantly, terrorists employ a wide variety of methods and strategies in order to carry out their threats (Temkin et al., 2020).

Ultimately, the level of intricacy or simplicity of a terrorist’s chosen approach will depend on the type of attack he or she intends to conduct. These terrorists may employ suicide attacks, kidnappings, mass shootings, and bombings primarily. Terrorists employ certain tactics to instill dread in the hearts of authorities and the bodies of their victims. A school shooting similar to the one in Columbia is exemplary. Dylan Klebold and Eric Harris were responsible for the Columbine High School shooting (Temkin et al., 2020). Dylan Klebold and Eric Harris staged the attack using propane bombs, and they carried it out. They had put the bombs in the cafeteria with the intent of detonating them during lunch. Students used guys to simultaneously shoot other students and faculty personnel. They executed their plan, resulting in the deaths of at least 12 students and one teacher. The incident caused additional injuries, some of which were life-threatening. Dylan Klebold and Eric Harris ultimately turned their firearms on themselves after killing as many people as they could (Temkin et al., 2020). The propane bombs placed in the cafeteria did not detonate, but everything else went as planned. The suicidal ideation that drove Dylan Klebold and Eric Harris to conduct the atrocities they did was crucial to their decision-making processes.

 

 

 

 

 

 

 

 

  1. Determine possible threats to specific assets in the (your) environment. (100-150 words)

 

 

 

 

 

  1. Analyze the modus operandi of past threats on assets in your specific environment. Break down and outline the MO.Was it spontaneous, or was it planned? Delineate how the individual or group carried out the threat. (250-300 words)

 

 

 

 

 

 

 

 

 

 

 

  1. Identify a threat on an asset that is new to your environment. For example, if a politician comes in the building, how do we assess the threat of assassination? What is the connection between threats? (such as assassination, throwing a shoe, verbal assault, or kidnaping.)- (150-200 words)

 

 

 

 

 

 

References