Overview: In Milestones One and Two, you researched and analyzed threat and vulnerability and briefly presented the findings. In Milestone Three, since you
have already researched consequences (criticality) in assignment 6-1 and countermeasures in assignment 7-1, and calculated the level of risk in assignment 6-2,
your goal as the analyst will be to review your findings and summarize them for leadership. As a reminder, leadership decisions could impact the deployment of
personnel, equipment, and budgetary resources.
The purpose of Milestone Three is to summarize the ideas that you will present to leadership. You will complete this milestone in two sections: Consequence
Assessment and Countermeasures.
Because this milestone is also a draft of most of Sections IV and V of your final project, by completing the milestone, you will be doing most of the preparation
required for these sections of the final project, and you will benefit from your instructor’s feedback when polishing your final project draft.
When using the feedback from the instructor on this milestone, be sure to review it with the final project side by side to make sure you are addressing all critical
Prompt: Specifically, the following critical elements must be addressed:
V. Consequence Assessment: In this section, you will gauge the importance of the key asset to the community by considering the adverse consequences
that would result from the loss of or serious damage to the asset. Consequences will include human impact, economic impact, and the impact on public
confidence or government capability. You will use the information you learned in the 6-1 short paper (consequence analysis) to complete this section.
Also share all findings from your risk calculations and risk level.
Remember that you are writing this for leadership to make decisions, so it must be well-polished, organized, documented, and written in the third
person. Include the resources and methods used to make your determination.
Begin with an introduction in which you do the following:
B. Explain your consequence analysis process.
C. Explain the importance of this key asset as it applies to these things:
• Human impact
• Economic impact
• Impact on public confidence
• Impact on government capability
Next, using your earlier vulnerability analysis, describe what you believe will be the most likely attack scenario.
A. Predict the level of damage that terrorist groups could inflict on the key asset if the attack were successful. Support your prediction with
historical sector-attack examples.
D. Provide an estimate of the severity of adverse consequences if an attack were to occur on the key asset. Use the following scale: low, medium,
or high. Explain to leadership how your calculations were made in order to justify your reasoning.
Use the result of your risk assessment calculation (from Module Six) as the estimate. (Remember the lessons learned from your case study in
Module One, in which the mayor raised concerns about how your risk analysis process was done.)
VI. Countermeasures: In this section, you will use the findings from the Module Seven short paper and your understanding of vulnerabilities. Again, you
will make recommendations to leadership on how to mitigate the terrorist threat. You will use the latest technology countermeasures to address three
key areas: physical, cyber, and personnel security.
A. Recommend countermeasures to increase the security of the key asset, and explain how each countermeasure will help address the key asset’s
vulnerabilities. Your recommendations should address the following components:
i. Physical security
iii. Personnel security
B. Defend why implementing these countermeasures would help deter any known or potential terrorist threats to the key asset. Include public use images of each countermeasure. Include your CPTED strategy within the physical security section.
Guidelines for Submission: Your paper should be a minimum 4-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one inch margins. Include citations when appropriate.