JUS4700500 Threat Assessment and Behavioral Analysis

JUS-470 Topic 2 Assessment of Assets Matrix Instructions: Complete Part I and II below. Remember that you are assessing assets in the environment being used for the TAP. Use industry terminology. Be sure to cite three to five relevant scholarly sources in support of your content. Use only sources found at the GCU Library, government websites or those provided in Topic Materials. This assignment uses a scoring guide. Please review the scoring guide prior to beginning the assignment to become familiar with the expectations for successful completion. While APA style is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center. You are required to submit this assignment to Turnitin. Refer to the directions in the Student Success Center. Part I: Brainstorming list of Assets Instructions: For the first part of this assignment, brainstorm to determine all of the assets in the chosen environment. Be sure to include all “types’ of assets, e.g., “things” as well as information assets, “people” assets, and moving assets. That list will be used to help complete the Matrix in Part II (the list below is a starting point; there may be more or less assets in your specific environment). 1. 2. 3. 4. 5. 6. 7. 8. 9. Part II: Evaluation of Assets Instructions: Complete the matrix below regarding the evaluation of assets in your environment. Please note the instructions for each section of the matrix. Additionally, you can add to this matrix if more space is needed. A. Be sure to include all “types” of assets, e.g., “things” as well as information assets, “people” assets, and moving assets. Use your brainstorm list to help with this. B. Catalogue and audit your assets, e.g. How many groups of people, buildings, etc. do you have in the environment? C. Rank the value of assets D. Who and/or what is the most vulnerable to be attacked? Give your rationale. A. Assets B. State Asset Value C. Rank Asset Value D. Rank Vulnerability of Assets Ex. People Ex. How many people and/or groups of people? Ex. The people are #1 in value. Ex. The people are ranked #2 vulnerability because the building is a bank, making it #1. References
Read less

Leave a Reply

Your email address will not be published. Required fields are marked *