Humanities Question
INSTRUCTIONS:
A substantive comment should be approximately 350 words or more.
Cite (2 or MORE) sources within your comment to support your statements.
Include at least a couple of references, properly formatted, not just a link.
Discussion: Drones and Vulnerability Analysis
Vulnerability is becoming a focal problem, especially with the increased use of drones and the real probability of drone hijacking by hackers.
In the field of construction, vulnerability is defined as a measure of the susceptibility of an element or combination of elements to fail once they are exposed to potentially damaging natural phenomena. It is obvious that this definition is deficient given the potential threats to this country’s infrastructure from terrorist activities.
Traditionally, vulnerability analysis met five basic objectives. These objectives are as follows: 1) identification and quantification of hazards that can affect a system, whether they are natural or derive from human activity; 2) estimation of the susceptibility to damage of components that are considered essential to providing water in case and disaster; 3) definition of measures to be included in the mitigation plan. These measures aimed to decrease the physical vulnerability of the components of the system; 4) Identification of measures and procedures for developing an emergency plan; and, 5) evaluation of the effectiveness of the mitigation and emergency plans and implementation of training activities.
In your opinion, which of the above basic objectives need revision because of increased threat brought about by cyber threats and social media prevalence (people posting pictures and snippets that could divulge information, like layouts, schedules, or problems).
What additional objective would you propose? If there is consensus on a few objectives, what are the issues that would arise if these are accepted?
Please post your response to this question and critique the response of at least one other student before the end of this Module.
_______________________________________________________________________________________________
Module 2 – Background
THE MILITARY PARTNERSHIPS
Required Reading
Dolan, A. M., and Thompson, R. M. (2013). Integration of drones into domestic airspace: Selected legal issues. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/natsec/R42940.pdf
Read pp. 3-11.
FEMA IS-75: Military Resources in Emergency Management (2011). FEMA. Retrieved from https://training.fema.gov/emiweb/is/is75/student%2…
Read “Integration of Military Resources in Accordance with NIMS and NRF” pp. SM III-8 to SM III-21
The Posse Comitatus Act—fact sheet (2019, September 23), Section 1385 of Title 18, United States Code (USC). U.S. Northern Command. Retrieved from https://www.northcom.mil/Newsroom/Fact-Sheets/Arti…
2018 National Preparedness Report (2018). FEMA.gov. https://www.fema.gov/media-library-data/1541781185…/
Required Websites
American Red Cross: Terrorism Preparedness: http://www.redcross.org/get-help/prepare-for-emerg…
NORAD and U.S. Northern Command Posture Statement:
http://www.northcom.mil/Portals/28/Documents/2014%…
United States Northern Command. http://www.northcom.mil/
Requirements:
Image preview for”in the field of construction, vulnerability is defined as a measure of the susceptibility of an element”
APA
480 words