400- 600 words
For this Discussion Board assignment, complete the following:
- Based upon the network that you have selected to study this term ( Communication sector), explain whether it is a scale-free or small-world network. Your network will not be both. Start with understanding how these each operate and how they differ. Identify your network, and answer the following:
- Is your network scale free or small world? How do you know? Which principles of scale-free or small-world networks apply to your selected network and the interdependencies between and among its assets, nodes, and links?
- Is your network also a cascading network? Specifically, why do you believe it is or is not?
- How does understanding the difference between scale-free and small-world networks help to plan protective measures more successfully?
- How can understanding your type of network potentially impact your vulnerability and risk analyses?
- Provide at least 2 examples of how understanding your network better in this respect helps you understand potential vulnerabilities and defend against them.
On August 1, 2007, the I-35W Bridge in Minneapolis, Minnesota collapsed, killing 13 people and injuring 121. The U.S. Fire Administration, an entity within the Federal Emergency Management Agency (FEMA), produced a technical report covering the response, recovery activities, and lessons learned regarding this catastrophic event.
This report is available for download by clicking here.
Under the M.U.S.E. offerings for this Phase, look for the item titled “FEMA Report on MN Bridge Collapse.” Review and study this presentation before answering the following questions. You may also conduct external research, but if you do, be sure to select professional source documents such as FEMA after action reports, engineering records, and lessons. Be sure to answer the following questions:
- What potential vulnerabilities can be associated with the I-35W bridge collapse?
- Consider this type of list an organized form of brainstorming. Think of vulnerabilities as gaps in security or protection, structural flaws, or the likelihood of something bad happening. Do not limit the list of vulnerabilities at first; it can be reduced to the most likely or most potentially costly items at a later time.
- How does the environment impact which vulnerabilities are most likely or even possible?
- As you contemplate potential vulnerabilities, use the 360-degree analysis this course continues to reinforce. Notice how the vulnerabilities expand, contract, change, or are eliminated based on various changing conditions. In this case, such a view should include assessing environments comprised of natural, manmade, and combined conditions. For example, think about the time of day and time of year it was when the bridge collapsed. An example question might be: Does the season impact the degree or depth of a vulnerability to this bridge? Or, how much greater might the loss of life had been if the collapse occurred in the winter?
- Based on the list of potential vulnerabilities, what potential costs or consequences might result from each?
- After listing the vulnerabilities and questions, reduce the list to the most likely possibilities, and consider the potential costs or consequences of each vulnerability. Again, think in a 360-degree way of what might constitute costs or consequences. Do not get stuck on what the actual outcome resulted in, but also consider how much worse or how differently it might have turned out.
- How do you select the most likely vulnerabilities from a list of many?
U.S fire administration releases report on I-35W bridge collapse in Minneapolis. (2008). Retrieved from U.S. Fire Administration Web site: http://www.usfa.fema.gov/downloads/pdf/publication…