Premium Essay

Mitigation Strategies and Solutions

In:

Submitted By imnotfeelinthis
Words 1807
Pages 8
Final Project: Mitigation Strategies and Solutions
SCI/275

Water Resource specifically Water Pollution is the water resource issue I selected for my Mitigation Strategies and Solutions. According to Encyclopedia.com (2010), water pollution “began in the nineteenth century as a result of urbanization, industrial development and modern agricultural practices.” Water Pollution is categorized as two sources Non-point source pollution which contributes to eutrophication in freshwater resource as a result of water pollution because usually this type of pollution results from “land runoff, precipitation, atmospheric deposition, drainage, seepage or hydrologic modification,” according to Epa.gov (2010). However, Point Source Pollution happens because the dumping of the sewage, garbage, ship oils, and other waste from human activity. These pollutants and toxins kill the ecosystem. These would be the negative human impacts. Additional effects are contaminated drinking water which can cause a variety of health problems such as, ear , eyes and throat irritation, aggravate symptoms of asthma and chronic bronchitis just to name a few. These pollutants are a threat to public health These effects from pollutants have damaging consequences on the drinking water supplies, fisheries, wildlife, and recreational use such as swimming. The growing human population is also a problem because the demand for water already exceeds the current water supply. As the human population continue to increase so will the demand the demand for water. Humans pollute the water with trash, pesticides, fertilizers, sewer overflows, oil, grease, pet’s form of waste, decaying plant materials and incompetent sewage treatment plants; this would also be a negative human impact. These all contribute to the toxic substances that eventually run off into the water system. With the

Similar Documents

Premium Essay

Global Warming: Mitigation Strategies and Solutions

...Global Warming Mitigation Strategies and Solutions David Zavala University of Phoenix/Axia College Our atmosphere took billions of years to develop into what we know today but technological advances have given today’s society the power to change the atmosphere in less than a century. The revolution that began in the late eighteenth century made it possible for inventors to create many energy-saving machines. The only energy these machines save is human energy and time because these machines use energy in the form of fossil fuels, which is made from large amounts of carbon. They were created when the organic remains of plants and animals were buried millions of years ago. Over time, heat and pressure changed the remains into coal, oil, and natural gas. When people burn fossil fuels, huge amounts of carbon dioxide and other gases are released into the atmosphere; which result in several changes to the make-up of the atmosphere. The most significant environmental problem this paper will focus on is Global Warming. People who grow flowers year-round often use a special building that has walls and a roof made of glass. The transparent glass allows insolation to enter but prevents heat loss by radiation; so when the insolation enters the green house, the sun’s energy is trapped and warms the house. This keeps the greenhouse warmer than its surroundings; carbon dioxide and water vapor are like the glass in a greenhouse. They allow insolation to reach Earth’s surface but they...

Words: 1924 - Pages: 8

Free Essay

Assessing the Potential for Urban Heat Island Mitigation Strategies and Solutions in Shanghai, China

...The Issue of the Urban Heat Island For the first time in 2008 the human population was split evenly between urban and non-urban areas (Population Reference Bureau). Now, three years later, with greater than 50 percent of people live in urban areas, a large proportion of the human population is at risk of danger from urban climate stress. Urban areas drastically alter the natural landscape of the environments they replace and along with that, feed back loops that maintain local climate and ecosystems. The common identifiers of urban and suburban areas such as large buildings, blacktop surfaces, and roof tops not only directly affect the surfaces they replaced and the ecosystems the land supported, but also the stable climate that the land supported. Natural surfaces such as meadows and forests help to maintain local climates by performing multiple environmental services. When replaced by ubiquitous urban surfaces such as vast blacktop parking lots and roads the local evapotranspiration and albedo are reduced and heat-trapping environments are created (Buyantuyev and Jianguo, 2010). The high concentration of impervious low albedo surfaces in urban areas means that heat is more concentrated in those areas compared to their surrounding natural land. This phenomenon occurs in many urban settings and is known as the Urban Heat Island effect (UHI). Since the Chinese government began its reform process in 1978, Shanghai, China has been constantly expanding and urbanizing...

Words: 4207 - Pages: 17

Premium Essay

Risk Mitigation

...Risk mitigation for business resilience White paper A comprehensive, best-practices approach to business resilience and risk mitigation. September 2007 A comprehensive, best-practices approach to business resilience and risk mitigation.  Contents 2 Overview: Why traditional risk mitigation plans fail 3 Build a comprehensive strategy for risk mitigation 3 Identifying types of risk 4 Business-driven risk 4 Data-driven risk 5 Event-driven risk 5 Risk reach and range: understanding risk and its impacts 6  elating value to risk: quantifying R impact 7 Resilience frameworks: analyzing current risk environments 8 Resilience strategy: designing a blueprint for risk mitigation 9 Achieve optimum business resilience with IBM 11 Look to a market leader in business resilience 11 For more information 11 About IBM solutions for enabling IT governance and risk management Overview: Why traditional risk mitigation plans fail A successful governance and risk mitigation strategy must operate at multiple levels with broad coverage. Risk mitigation plans at many organizations fall short simply because they are not comprehensive and fail to take into account the reach and range of all the risks that they actually face. Often this occurs when organizations only focus on specific areas of risk categories, only plan for certain types of risk or don’t understand all the different areas in their organization that particular...

Words: 2961 - Pages: 12

Premium Essay

Ifsm 370 Project 2: White Paper Instructions

...IFSM 370 Project 2: White Paper Instructions Follow Below Link to Download Tutorial https://homeworklance.com/downloads/ifsm-370-project-2-white-paper-instructions/ For More Information Visit Our Website ( https://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com Introduction This is an individual project. Each student must complete a White Paper that proposes a telecommunications solution to address a communications problem for a business organization. The target audience will be the organization’s Chief Information Officer (CIO). The White Paper deliverable is an MS Word document. If you have never written a white paper, you should conduct some research and review sample white papers to understand the content and format associated with these professional documents. The completed White Paper deliverable is due by 11:59 PM Eastern Time on the due date shown in the Course Schedule. See the Additional Information section of the syllabus for the penalty for late or missed assignments and projects. The White Paper is valued at 12% of the course grade. Scenario Ullman, Manly, & Ulysses Corporation With 75,000 customers worldwide, 250 employees working in four locations in the United States and three European offices, and a catalog of more than 100,000 parts, Ullman, Manly & Ulysses Corporation (UMUC) relies on its network for its survival. In the past decade, UMUC has seen its business grow from just one location...

Words: 1357 - Pages: 6

Premium Essay

Risk Management

...To improve project chances for success, this work investigates common risk impact areas to perceive a foundation that can be used to define a common approach to software risk management. Based on typical risk impact areas on software development projects, we propose three risk management strategies suitable for a broad area of enterprises and software development projects with different amounts of connected risks. Proposed strategies define activities that should be performed for successful risk management, the one that will enable software development projects to perceive risks as soon as possible and to solve problems connected with risk materialization. We also propose a risk-based approach to software development planning and risk management as attempts to address and retire the highest impact risks as early as possible in the development process. Proposed strategies should improve risk management on software development projects and help to create a successful software solution. Table of contents: 1. Introduction 4 2. Risks In Software Development 5 3. Risk Management 7 4. Strategies For Risk Management 7 5. Conclusion 11 6. References 12 Introduction Nowadays, software is...

Words: 2496 - Pages: 10

Free Essay

Ddos

...Cloud Based DDoS Mitigation If you can afford it, ensure that your Internet Service Provider gives you a clean pipe using cloud based DDoS mitigation. If you use multiple links, ensure that both links are protected. There is always a signficant amount of residual DDoS that will flow through. That's why you need a DDoS mitigation system in your network to handle the remainder of the attack. IntruGuard helps cloud service providers with solutions for DDoS attack mitigation as well. If your service provider doesn't provide DDoS attack mitigation services, you must take care of your own network to avoid collateral and other damages. Edge Router Access Control Lists Access lists in the router can be used to block certain addresses, if such addresses can be known a priori. But websites open to the public are, by nature, open to connections from individual computers, which are exactly the agents hackers use to initiate attacks. Robust edge routers provide a robust data center infrastructure. They are the key to a solid foundation. Their high performance makes them sustain large DDoS attacks without performance loss. Juniper Routers provide the ability to perform packet-filtering and black-hole routing combined with Traffic Flow Filtering capability data center administrator today use primarily two methods to mitigate attacks once they have been discovered by the NOC; packet filters, and black-hole routing. Packet filters, also referred to as firewall filters or access...

Words: 1301 - Pages: 6

Premium Essay

Risk Managment Plan for Smartphone

...Risk Management Plan For Smartphone | | | 2/24/2013 | | * Table of Contents 1 Introduction 4 1.1 Purpose 5 1.2 Objectives 5 1.3 Risk Management Scope 5 1.4 Background 5 1.5 Supporting Products 6 1.6 Referenced Products 6 2 Roles and Responsibilities 6 2.1 Roles and Responsibilities 6 2.2 Support Infrastructure Tools 8 2.3 Training 8 3 Risk Management Process 9 3.1 Identity 9 3.2 Analyze 10 3.2.1 Probability of Occurrence 10 3.2.2 Probability of Impact 10 3.2.3 Risk Factor 11 3.3 Plan Response 12 3.4 Monitor/Control 13 3.4.1 Communication 14 3.4.2 Reporting 15 3.4.3 Performance Measurement 16 3.4.4 Continual Process Improvement 16 3.4.5 Audit 16 Document Revision History | Date | Version | Updates Provided By: | Summary of Updates | 02/03/2013 | 1.0 | Komal Shah | New document | | | | | | | | | | | | | Product/Project Manager’s Signature Your signature indicates that risk management plan has been plan has been prepared with input from content experts and is in compliance with applicable project standards Written By: Dept. #: Date: Komal Shah – Project Manager Reviewer’s Signature Your signature indicates that as content expert, you have reviewed this document and it accurately and completely reflects the requirements necessary to implement...

Words: 3606 - Pages: 15

Free Essay

Intersect

...Intersect Investments Transformational Leadership Problem Solution: Intersect Investments Since September 11, 2001, financial service organizations have struggled to maintain existing clientele and gain additional customers. Intersect Investment Services is no exception. The rapidly changing climate has left Intersect Financial Services, CEO Frank Jeffers with an immediate decision to transform the financial institution. Through the volatile climate changes Intersect has managed slightly to survive and has resisted change the last four years. Jeffers realizes he must make some dramatic changes if the organization is to regain its competitive status in the market place. In this paper the subject matter will identify the organization’s decision, goals, opportunities, alternatives, risks, and optimal solution. Situation Analysis Issue and Opportunity Identification The company’s CEO, Frank Jeffers has strong convictions that the company must move in a different direction by broadening its products and services to consumers. Jeffers plans to implement a customer intimacy model to provide more value, increase customer’s trust and enhance relationships. The sales and marketing executive team has an opportunity to embrace the vision that can increase profitability and the company’s clientele base. Team members, employees resistance to change, lack of stakeholders feedback, misaligned values, and beliefs among stakeholders are factors that could prevent...

Words: 2159 - Pages: 9

Premium Essay

Mba560 Corporate Compliance

...000 stores in 31 states and the District of Columbia, with a strong presence on both the East and West coasts. The Company serves the healthcare needs of its customers through its Rite Aid stores and online pharmacy, riteaid.com. Due to the breadth and scope of its businesses, the Company faces a wide range of competitive challenges including, but not limited to, other retail drugstore chains, supermarkets, convenience stores, pharmacy benefit managers and other mail order prescription providers, Internet pharmacies and ambulatory care health providers. A primary component of the Company's human resources strategy to ensure high caliber leadership is the identification, recruitment, development and placement of key management and business talent. The Rite Aid Board of Directors (the "Board") and executive management team believe that a crucial aspect of executing this strategy is a comprehensive, integrated and straightforward executive compensation platform that provides competitive and differentiated levels of pay based on corporate and individual performance while reinforcing the alignment of executive interests with those of stockholders. When a company is facing issues dealing with corporate compliance, implementing a system to deal with the compliance and corporate governance issues is the best opportunity for the company. The company should develop a process to analyze alternatives and integrate the appropriate opportunity into the company's system. The company will...

Words: 1836 - Pages: 8

Premium Essay

Possible Risks of Outsourcing

...that may or may not occur and some recommendations for different risk mitigation strategies. External service provider for data storage There are different types of people that want an easier way to store data and this is where flash drives com into the scene. The flash drives are small enough to carry with you and store data from your computer to bring with you everyone. A flash drive can hold up to 16 GB of data which is very convenient for college students or people who work for a big firm. There are also a lot of risks involved when handling a flash drive. For an example of the risks involved for using an external device is as followed; * Stolen - Someone stealing your flash drive that might have sensitive data from your company on it is a major risk. * Lost - Since the flash drive is very small and it is very easy to carry with you but because of the size it is also very easy to lose. * Damages (external) - Being damaged is very easy to a flash drive since it is very small in size. Being damaged also means the data can also be damaged or lost. Also forgetting about your flash drive in a pants pocket and then having them washed is a number reason for flash drives getting damaged. * Security (data) - viruses that can be copied to the flash drive, this happening because there is no internal security which makes the flash drive a high security risk. Risk mitigation strategy If the company is going to use flash drives the best practice...

Words: 1544 - Pages: 7

Premium Essay

Risk Management Security

...Project Part 1 Task 2 Risk Management Plan Alen Kovacevic C. Wyrick IS3110 January 29, 2013 Purpose The Senior Management of the Defense Logistics Information Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department of Defense (DOD), Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Control Objects for Information and Technology (COBIT), and Information Assurance Certification and Accreditation Process (DAICAP). Scope The risk management plan is for the organization use only and its network, including remote access company owned building in United States. Outside sources from this scope and risk management plan may cause the network infrastructure to fail or will make it a high risk structure due to the fact that the outside source may not protected to interact with other outside sources allowing hackers to infiltrate your system and steal important files. Compliances Federal Information Security Management Act (FISMA) compliance is required for federal agencies to protect their important information. Department of Homeland Security (DHS) compliance is to be required for protection to the United States against terrorists. There are other organizations...

Words: 1365 - Pages: 6

Free Essay

Mba 500/Uop - Global Communications

...Problem Solution: Global Communications The first section of the problem solution focuses on the most important past events that led to the issues and opportunities listen in Table 1. This is an analysis of the situation Global Communications finds itself in. These events are not the problem of the case but are what started the problem. In the stakeholder perspectives and ethical dilemmas section you will find various stakeholders identified, their interests, rights and values. The conflicting interests, conflicting rights, and ethical dilemmas are discussed here using the information in Table 2. The problem statement section includes what Global Communication aspires to be and the range of opportunities it must seize to achieve that vision. The end-state vision section focuses on where the company would want to me in the next few years. If all the challenges overcome, all the problems were solved and all the opportunities are realized then where would Global Communications stand. The statement directly reflects the desired end state Global Communications targets. The visions statement helped formulate the end-state goals listed in Table 3. The alternative solutions section you’ll find solutions that support my problem statement. These solutions summarize the benchmarking findings related to the problem statement, the relevance of benchmarking to Global Communications and specific solutions that give us details for Global Communications findings. Analysis of alternative solutions...

Words: 3447 - Pages: 14

Premium Essay

Risk Assessment In Risk Management

...assignment efforts Because of the dynamic and changing nature of the risk and risk management strategies, Blackhurst (2008) highlights that risk monitoring should be continuously conducted . According to Christopher et al. (2011), two types of monitoring techniques are used which are periodic and regular. Periodic monitoring assesses company’s repeated task and plans. Regular monitoring is essential in order to respond to the risks that its impact has a higher value than anticipated value . 2.2.2 Proactive approaches (supply chain based) Some of the researchers claim that, catastrophic events affects not only the company itself, but also its supplier, customer, and network, the mitigation strategies should encompass the whole supply chain . Therefore, three commonly used mitigation strategies have been discussed which comprises the entire supply chain from supply, demand, and information...

Words: 794 - Pages: 4

Premium Essay

Problemsolutiontemplateclassicairlines

...Running head: PROBLEM SOLUTION: CLASSIC AIRLINES Problem Solution: Classic Airlines University of Phoenix January 21, 2008 Problem Solution: Classic Airlines “Marketing is an organizational function and a set of processes for creating, communicating, and delivering value to customers and for managing customer relationships in ways that benefit the organization and its stakeholders” (Kerin, 2006). Marketing is a fundamental key to any businesses success and involves determining the needs, wants and desires of consumers and satisfying them to the best ability. Classic Airlines is the world’s fifth largest airline they command 375 jets serving 240 cities with about 2300 flights per day for about a quarter of a century. Classic Airlines has around 32,000 employees. They earned about $10 million on about $8.7 billion in sales. With the uncertainty about flying Classic Airlines and the industry has seen this affect stock prices, Classic Airlines in particular has seen a 10% decrease in their share prices over the past year. Classic Airlines is also dealing with low employee morale, and the consumers’ confidence also seems to be declining as well. (Anonymous, 2007a) According to their financials for the past year, Classic Airlines would have been losing money if it were not for the $15 billion aid package passed by Congress for the airline industry (Kaye, 2002), which is resulting in a $22 million Income Tax Provision...

Words: 4904 - Pages: 20

Premium Essay

Problem Solution

...Running head: PROBLEM SOLUTION: GLOBAL COMMUNICATIONS Problem Solution: Global Communications Pelesia Tillman University of Phoenix Problem Solution: Global Communications The Union is a challenge with expectations of treating employees with respect and accepting their ideas for change. The hardship at Global Enterprises are seen as an Opportunity instead of a problem The telecommunications business is booming and to stay in the business of selling advanced technology equipment, Global Communications wanted to stand by their name global by outsourcing to India and Ireland, in hopes of competing in local markets and expand globally. Relationships between the union and its workers are at odds about Global Communications going international the board wants to announce to employees not to worry about the move it simply means a chance to offer better jobs to employees and give salary increases with 15% retention bonuses for workers willing to make the move. Focusing on ways to better communicate with the union is a challenge with expectations of treating employees with respect and accepting their ideas for change. The hardships at Global Enterprises are handled. The telecommunications business is booming and to stay in the business of selling advanced technology equipment, Global Communications wanted to stand by their name Global by outsourcing to India and Ireland, in hopes of competing in local markets and expand globally. Global services has entered a new...

Words: 3362 - Pages: 14