Based on the John Harrald (et al) article titled â€œReview of Risk-Based Prioritization/Decision Making Methodologies for Dams,â€and your independent research, choose at least 1 method of vulnerability analysis and conduct a risk assessment (RA) using a model of your choice or from the example provided in this Phaseâ€™s materials. There are many models to choose from, and sector-specific plans may assist you in locating 1 for your sector.
After selecting and properly referencing the source of your RA methodology, complete the following:
- Describe how it works.
- Complete the analysis of your asset.
- Report the findings.
- Be sure to identify, list, and describe threats, vulnerabilities, consequences, and risks.
- After identifying the greatest risks, offer some realistic mitigation measures.
- These should be well-researched and sophisticated, and costs associated with these should also be presented. For example, for deterring a terrorist attack on the Hoover Dam, stating â€œuse a security guardâ€ is not specific enough, is not necessarily a realistic and true deterrent, and includes no information about this as an expense.
Your report should be 4â€“6 pages, Abstract, not including a title or reference page, may include tables, graphs, lists, or whatever format you believe clearly delivers the results of this RA.
Harrald, J. R., Renda-Tanali, I., Shaw, G. L., Rubin, C. B., Yeletaysi, S. (2004). Review of risk based prioritization/decision making methodologies for dams. Washington, DC: The George Washington University Institute for Crisis, Disaster, and Risk Management.