Premium Essay

Hazards & Vulnerability

In:

Submitted By Chaitys
Words 4332
Pages 18
Hazard & Vulnerability of Dhaka City
5 page ■ Dhaka City Population Area Urbanization River

■ Recent few incidents case study ■ Historical Hazard

■ Analysis and severity of hazards & vulnerability

Bangladesh is a unitary, independent and sovereign Republic known as the People’s Republic of Bangladesh. Bangladesh emerged as an independent country on March 26, 1971. The war of liberation ended on 16 December 1971 with the victory of Bangladesh forces and the surrender of the occupying Pakistani Army in Dhaka, the capital of Bangladesh.
From its beginning as a small city with a few thousand people, Dhaka actually experienced dramatic turns upward and today it has become one of the fastest growing mega cities of the world. Its existence as a major urban agglomeration has been consistent over a period of 400 years. Even the most developed cities in the world today cannot boast 400 years of uninterrupted and organised existence that Dhaka does as a historic city.
In the 16th century during the reign of Mughal Emperor Akbar it was a thana or military outpost having a population of only 3000 people with an area of 2 km² (UNEP, 2005). Then turning Dhaka into a capital city of the eastern province in 1608 by Subedar Islam Khan was epoch making. Since then Dhaka has experienced actual urbanisation and trends of development.

Area
Dhaka is located in central Bangladesh at 23°42′0″N 90°22′30″E, on the eastern banks of the Buriganga River. The city lies on the lower reaches of the Ganges Delta and covers a total area of 360 square kilometres (140 sq mi). It consists of eight principal thanas and 16 auxiliary thanas. In total the city has 130 wards and 725 mohallas. Dhaka district has an area of 1463.60 square kilometres (565 sq mi).
Climate
Tropical vegetation and moist soils characterize the land, which is flat and close to sea

Similar Documents

Premium Essay

Hazard Vulnerability Assessment

...The Philadelphia Water Department, Baxter Water Treatment Plant Anthony Vega, Denise Youmans, Christopher Williams, Stephen Glenn, Darnell Jessie Immaculata University EPM 301 Report Summary The purpose of this assessment is designed to look at the hazard vulnerability and exploitation potential surrounding The Philadelphia Water Department, Baxter Water Treatment Plant located at 9001 State Road in Philadelphia, Pa. The treatment plant must be prepared for every emergency when considering the safety of the community. This assessment is a detailed analysis of the possible catastrophic events that could occur in or near the water treatment plant and an inquisition into the possible contingency plans in the event that a catastrophe occurs. This assessment is designed to identify and assess hazards to which the Baxter Treatment Plant is ill-prepared to respond and strengthen these weak areas. Methods We, as a group, conducted site visits and surveys of the property. A point of contact was established within the Philadelphia Water Department, but the Water Department policies dictate that written approval for a site visit must be approved by higher level management. These policies and the limited amount of time in the accelerated semester did not allow us to complete an internal site visit. As a contingency, we evaluated the site from the exterior. Physical surveillance was conducted allowing us to observe the visible security of the premises. The building is surrounded...

Words: 4007 - Pages: 17

Premium Essay

Computer Forensics and Cyber Crime

...survey or audit can also be referred to as a vulnerability analysis. A security survey is an exhaustive physical examination whereby all operational systems and procedures are inspected thoroughly (Fischer & Green, 2004). A security survey involves a critical on-site examination and analysis of a facility, plant, institution, business or home to determine its current security status, its current practices deficiencies or excesses, determine level of protection needed, and ways of improving overall security levels are recommended. A security survey can either be done by in-house personnel or by external security consultants. However, outside security experts are preferred their approach to the job would be more objective and would not take some parts of the job for granted therefore resulting to a more complete appraisal of current conditions. A security survey/audit should be carried out regularly so as keep improving to and up to date especially with the growing rate of technology. Overall objectives of a security survey are: determination of current states of security, location various weaknesses in the security defenses, determination of level of protection required and finally give recommendations for the establishment of a total security program (Fischer & Green, 2004). Some weaknesses identified in the process of a security survey may be: vulnerability to injury, death or destruction by natural causes, vulnerability of corporate assets to outside and within criminal...

Words: 686 - Pages: 3

Free Essay

Cis 502 Critical Infrastructure Protection

...com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format...

Words: 1288 - Pages: 6

Premium Essay

Explain How Wealth And Age May Affect How A Person Is Affected By Natural Hazards

...The two factors that will be discussed that can decrease human vulnerability to natural hazards are Wealth and Age. The wealthier a person is the less effected they are by natural hazards. This is because of many reasons such as, when a natural hazard occurs like an earthquake, the class a person lives in may influence how a person is affected by natural hazards. If a person lives in a lower economic group the more vulnerable they are to natural hazards. The lower the class, the less wealthy they are and the more susceptible to natural hazards like earthquakes and volcanoes. The poor are unable to pay for new housing if there houses get damaged. They have less access to medical assistance and more than likely no education this means that they...

Words: 279 - Pages: 2

Free Essay

Paper

...To be able to explain why written emergency plans are drafted It is best to plan for the worst when it comes to an emergency. The HCF leaders duties is to develop a written disaster plan that explains the duties of staff and making this plan available to the staff for crisis preparation. To ensure that the safety and well being of patients are certain during emergencies. The development plan must be assigned to personnel who are familiar with the facility. Depending of the community and location. For example, California prepares for an earthquake, Florida for hurricanes, and Montana for snowstorms. It is also required by the Joint Commission to have the HCF to have a hazard vulnerability analysis under the EC 4.10. (Environmental Control). The Occupational Safety and Health Administration (OSHA) regulations an National Fire Protection Association (NFPA) and standards must also be taken into account as well as the Centers for Disease Control and Prevention (CDC) Strategic Plan for Preparedness and Response to biological and Chemical terrorism. The American Institute of Architects (AIA) has also issued certain guidelines for design and construction of facilities in locations where there is a recognized potential for certain natural disasters. This plans must provide a process to: Initiate a plan HCF role with community-wide emergency response agencies, including who is in charge, Notify external authorities Notifying Identify and assign personnel during emergencies ...

Words: 268 - Pages: 2

Premium Essay

Disaster Management

...prevention is a local and national necessity with a strong institutional basis for implementation. Institutions that develop policy, legislative and institutional frameworks for disaster risk reduction and can track the progress through specificied and measurable indicators that have greater capacity to control risks. They are also able to manage widespread consensus for involvement and compliance with disaster risk control measures in all sectors of a society Action 2: Outline, assess and monitor disaster risks and enhance pre-caution. The start of reducing disaster risk and promoting a culture of disaster resilience lies in the understanding of the hazards. The knowledge extends to the social, physical, the environmental and economic vulnerabilities to disasters that most communities suffer from, and of the ways in which hazards and proneness are changing in the short and long term. The understanding is followed by action taken on the basis of...

Words: 532 - Pages: 3

Premium Essay

Future Hazards

...1.0 INTRODUCTION Dr. Quarantelli is a widely known scholar of the social science of disasters. His first involvement in the area dates back to 1949 when he participated in the first disaster field studies in the National Opinion Research Centre (NORC) team. Quarantelli is also author and/or editor of 29 books as well as author of 101 chapters in books, 114 articles and 150 other publications mostly on disaster topics. The article chosen for this assignment was published in The Journal of Contingencies and Crisis Management (JCCM), in December 1996. JCCM is a peer-reviewed academic journal that covers all theoretical and practical aspects relating to crisis management and published by Blackwell. 2.0 ARTICLE SUMMARY The article assumes two master trends, industrialisation and urbanisation. The author discusses the likely negative and positive affects that will emanate from these trends at some stage in the future. The first trend, industrialisation, with its ever increasing development of technology, is expanding rapidly and this article provides examples on the advances in both computer technology and bio-engineering. Governments, industry and societies have an ever increasing dependence, not only on computer technology, but the linkages to other technologies and massive networks that...

Words: 2337 - Pages: 10

Premium Essay

Fire Safety Vulnerabilities

...In the fire service we deal with many hazards and risks. Believe it or not we also have vulnerabilities. Hazards, risks, and vulnerability also apply to emergency management and everyday life and when all three converge you can have a disaster on your hands. Before leaning how the three can create a disaster we must know what a hazards is, what risk is and what vulnerabilities are. First, what is a hazard? A paper cut, falling, fire, earthquake, the sun and driving are all hazards. Hazard as defined by Fire and Emergency Services COMPANY OFFICER Fourth Edition is a “Condition, substance, or device that can directly cause an injury or loss; usually refers to the source of a risk.” Hazards come for nature or natural disasters and technological or man-made disasters. Hazards are all around us and the way we interact with them will determine our risk with that hazard....

Words: 431 - Pages: 2

Premium Essay

Social Sciences

...physical and political. It would be interesting to note the extent of the applicability of this approach as it may vary from place to place due to the dynamics involved in emergency situations. An emergency is a situation that poses an immediate risk to health, life, property or environment. According to Twigg ( 2007 ), disaster is defined as the occurrence of an extreme hazard event that impacts on vulnerable communities, causing substantial damage, disruption and possible causalities, and leaving the affected communities unable to function normally without outside assistance. CBDM thus came into play as another panacea in disaster reduction. Community based disaster management is a bottom-up approach, that was cemented in 2005 Hyogo Declaration. This is a commitment by Governments to its citizens. 2005 Hyogo Declaration spells out CBDM, as strengthening community level capacities to reduce disaster risk and at the local level is especially needed, considering that appropriate disaster reduction measures at that level enable the communities and individuals to reduce significantly their vulnerability to hazards....

Words: 1587 - Pages: 7

Premium Essay

Mitigation Strategy

...Heart Hospital Hazard Mitigation Plan Hazard Vulnerability Mitigation Strategy Plan Version 1 – February 1, 2010 Heart Hospital Hazard Mitigation Plan Table of Contents I. Introduction……………………………………………… 3 A. Purpose of the Plan B. Methodology C. AZHH Background II. Risk Assessment Findings A. Hazard Identification B. Profile of Hazard Events C. Vulnerability of Assessments III. Mitigation Goals, Objectives, and Strategies IV. Implementation and Maintenance Procedures A. Implementation B. Maintenance Appendices A. Glossary of Terms B. Acronyms Version 1 – February 1, 2010 Arizona Heart Hospital Hazard Mitigation Plan Chapter 1 – Introduction A. Purpose of the Plan: This Hazard Mitigation Plan (HMP) establishes the process for implementing proactive risk management as part of the overall Emergency Management Plan. The purpose of a Hazard Mitigation Plan is to identify potential hazards, risks and vulnerabilities as identified by the Hazard Vulnerability Assessment (HVA) before they occur by prioritizing mitigation actions and providing technical support for those efforts. The purpose of this plan is to produce a program of activities through actions that will best deal with the Heart Hospital’s (HH) hazard problems, while meeting the health care needs of the community. This plan will accomplish the following objectives...

Words: 270 - Pages: 2

Premium Essay

Misconceptions Of Emergency Management

...Emergency management is about identifying risks, assessing weaknesses, and devising strategies for reducing such risks (Lindell & Prater, 2003). While there is a common theme among hazards, emergencies and disasters each has minor differences and may require various approaches by the emergency manager. The most common misconception is emergency management agencies want to eliminate all risks by establishing procedures but there is no direct way to remove the daily or infrequent events that can occur. A hazard is a source of danger or extreme event that has the potential to affect people, property, and the natural environment in a given location (Lindell & Prater, 2003). Hazards can be either natural or manmade and are detrimental to certain...

Words: 470 - Pages: 2

Premium Essay

Vulnerabilities And Increase Efficiency In Nonprofit Organizations

...Nonprofit organizations and volunteers are a great resource in disaster mitigation as well as preparedness efforts. During the decision-making stages of emergency management, risks are assessed along with possible distribution of resources. Local governments along with the public and private sectors are able to structure plans that would reduce vulnerabilities and increase efficiency in a disaster. Volunteers and members of nonprofit organizations can further reduce vulnerabilities by strengthening the community’s preparedness efforts. This will enhance a community’s ability to handle and or manage hazards/disasters. History has shown us that when a disaster occurs there is often a lack of manpower to respond community members. Hurricane...

Words: 276 - Pages: 2

Premium Essay

International Business Management

...serious need of repair.  Project Document: Risk is a powerful force in innovative organizations for the obvious reason that it means the future outcomes of decisions are uncertain and, less obviously, because it can foster decision biases like loss aversion and over-optimism. The construction or retrofitting of a school building is a valuable educational opportunity with the potential to further strengthen community ownership of the school and demonstrate hazard-resilient techniques that can be replicated in homes and other buildings. Every school must be constructed as a safer school and existing unsafe schools must be retrofitted to be disaster resilient. The Education for All will not be achieved without the construction of safer and more disaster resilient education facilities. At a time when the frequency and magnitude of extreme climatic events is rising, a growing number of the world’s school-going children are increasingly exposed to earthquakes, wildfires, floods, cyclones, landslides and other natural hazards. For example: • The Sichuan earthquake (2008) killed more than 7,000 children in their schools and an estimated 7,000 classrooms were destroyed. • The cyclone Sidr in Bangladesh (2007) destroyed 496 school buildings and damaged 2,110 more. • The Super Typhoon Durian (2006) in the Philippines caused $20m USD damage to school, including 90-100% of school buildings in three cities and 50-60% of school buildings in two other cities. • The earthquake in Pakistan...

Words: 876 - Pages: 4

Free Essay

Lab #1 Assessment

...Lab #1 – Attack & Penetration Test Plan Answer Sheet Hacking and Countermeasures 6/28/2013 MR. Walker Ramon B Kreher Jared Long Part 1: Table of Contents 1. Introduction 2. Authorization 3. Preliminary 4. Scope 5. Goals & Objectives 6. Test Plan Reporting 7. Test Plan Reporting 8. Projecting Plan and Schedule Part 2: Sample Authorization Letter The Undersigned hereby testifies that they have proper authority and agrees to offer authorization to perform the work that is specified in the statement of work for the penetration test to be conducted by Security Consulting Inc. The systems to be tested shall not be compromised and any vulnerabilities that are discovered shall be kept confidential unless federal, state, or local law requires that they be disclosed or the statement of work specifies otherwise. This Document also certifies that the undersigned testifies that the Client has sufficient disaster recovery systems and insurance in the event of an incident during or after the test procedures. Part 3: Penetration Test Client Questions If black box is selected, do not fill out question 3 or following sections. 1. Black Box | White Box (please circle one) 2. Intrusive | Non-Intrusive (please circle one 3. Test Credentials: (fill in as many as needed) Username | Password | | | | | | | | | | | | | | | E-Commerce Web-based Application Server 1. Authorized to View Source? Yes | No (please...

Words: 652 - Pages: 3

Premium Essay

Iss Unit 2 Homework

...Eric Mcknight 7/6/2012 Unit 2: Assignment 1: Calculate the window of vulnerability. To calculate the window of vulnerability (WOV) we will first need to know the amount of time It will take to get a working solution. In this case, we need a patch to solve the issue. We already know that it will take Microsoft 3 days to get a patch out to us. So, we can start with three days. After that, we need time to test the patch, and publish it out to the active directory update servers. This will usually take a few days according to the book. After it is all tested on the equipment, we need to push out the update to all of the client computers and servers. This will usually take a day or so. Also, depending on if the IT staff works on the weekends to solve the problem that will add another two days to fix the problem. So, to add it up, It takes three days to get the patch, Up to five days to test the patch, and another day or two to publish the patch out to all of the client computers. All in total, this will take around a week to solve this issue. My personal opinion is any IT personal that takes a WEEK to solve a major security breach should be fire. Personally, I would put immediate measures in place to solve the issue such as blocking the mac address, immediately writing scripts and programs to detect intrusions in the hole, and block out the attacker. Taking more than a day or two for testing is major overkill for fixing a major hole. But, that is my...

Words: 287 - Pages: 2