Explain three specific 21st century security threats

Assignment Help English
Reference no: EM131468177

Threats & Countermeasures Project Presentation:

Identify and explain three "specific" 21st century security threats discussed "anywhere" in our textbook. Secondly, identify and relate countermeasures(security strategies, tactics, countermeasures, etc.) to prevent and/or mitigate the specific threats.

Explain each of your three threats in three separate project sections (one for each threat). Each threat section of your project must be "concisely" "titled"with the name of the threat (e.g. Insider Threats; Perimeter Threats; etc.).

Following each threat section, a detailed and "titled" "countermeasures""sub-section" must be included. Each countermeasure should be a third level sub-heading. For example, ABC Threat (heading), Countermeasures (sub-heading), and then each specific countermeasure (third level sub-heading).

Mandatory Project Format (sequence and specific headings):

Slide 1:
Title slide (similar to an APA title page - title, name, date, etc., but no running head)

Slide 2:

Introduction (do not forget to introduce your project)

Slide 3 to as necessary:

Threat #1 - Title a specific "threat" (e.g., Insider Cyber Threats - do use threat #1 or Insider Cyber "Security" - "security" is not a threat; be concise and ensure "Threat is in the title). Do not use locations, vulnerabilities or some other type of general research topic.

Ensure each threat is specific (e.g., employee theft threats, commercial robbery threats, airline terrorism threats, cargo theft threats, insider cyber threats, etc.) and "not" broad/general threats (e.g., internal threats, external threats, terrorism threats, transportation threats, cyber threats, etc.).

Countermeasures (general introduction to your specific countermeasures to follow)

Specific Countermeasure (security strategy, tactic, etc. specific to the identified/discussed threat)

Specific Countermeasure (continue for as many countermeasures you have identified)

Next Slide to as necessary

Threat #2

Countermeasures (general introduction to your specific countermeasures to follow)

Specific Countermeasure (security strategy, tactic, etc. specific to the identified/discussed threat)

Specific Countermeasure (continue for as many countermeasures you have identified)

Next Slide to as necessary

Threat #3

Countermeasures (general introduction to your specific countermeasures to follow)

Specific Countermeasure (security strategy, tactic, etc. specific to the identified/discussed threat)

Specific Countermeasure (continue for as many countermeasures you have identified)

Next Slide

Conclusion (title this section Conclusion) Common point loss for those who omit this slide.

Final Slide/s

References: Use a minimum of six "outside" (non-textbook) credible sources to support your research project. Your final slide will be titled References.

Recall to adhere to the APA for reference formatting: alphabetize(common point loss), only first initials for first names (common point loss), double space references, use a second/third line 0.5" hanging indent, References must have matching in-text citations in the body of your project (and vice versa). Do "not" list only electronic links/websites.

Length Requirements: Each threat and countermeasures section must be aminimum of three slides; maximum of four slides.

Reference no: EM131468177

Questions Cloud

Describe a benefit of maintaining an mpi : What is an MPI? Describe a benefit of maintaining an MPI. Describe a risk associated with an MPI, as well as a measure that is put in place to lower or counter.
Explore the concept of nationalism : Explore the concept of nationalism, what is it and when did it become a major global phenomenon?
Employees commitment to their employer : What impact will a flexible work schedule have on employees' commitment to their employer? What about productivity? What about company effectiveness?
How easy was it to navigate between pages : The objective of this assignment is for you to increase your knowledge about how businesses are leveraging the internet to conduct business.
Explain three specific 21st century security threats : Identify and explain three "specific" 21st century security threats.identify and relate countermeasures(security strategies, tactics, countermeasures, etc.).
Have elements of all three issues : Is this a legal, ethical, or bioethical issue? Or does it have elements of all three issues? Provide supporting evidence for your opinion.
World economy is now heavily based on the market system : Since the world economy is now heavily based on the market system,
What additional risk factors are you adding to your matrix : B6029 :Create a separate new matrix that summarizes the additional risk factors for this firm launching a management consultancy or legal services line.
Read these article on strategic thinking : Describe an incident in your life when you used strategic thinking.

Reviews

Write a Review

English Questions & Answers

  Write a profile

Write a profile on bishop poleni.

  Education system

Write a rearch paper on education system

  Write an report

The U.S. President Barack Obama said America can "win the future" by rebuilding its manufacturing sector (on June 8, 2011, after visiting an automotive training center at a community college in Virginia, outside Washington). Do you agree, and why?

  Discuss the accuracy of this statement

'Consideration does not have to be adequate or commercially realistic, nor does it need to be expressed in monetary terms, it merely needs to be "sufficient".' Discuss the accuracy of this statement.

  Write an essay on the youngest billionaire

Write an essay on the youngest billionaire

  Transformational leadership in the public sector

The more hierarchical an organization's authority structure, the lower the reported practice of transformational leadership behaviors.

  Modal verbs or modal constructions

Identify all the modal verbs or modal constructions in the passage

  Write a latter to mom thanking to adopting and caring

Write a latter to mom thanking for adopting and caring,

  Ways of knowing & authority in your discipline

To explore and become familiar with your discipline; to prepare you for your major researched essay.

  Writing an effective business letter

Prepare a letter in either block or modified block format, addressed to your employer or supervisor and copied to your marker.

  Discuss the kingdom of saudi arabia

Discuss the Kingdom of Saudi Arabia

  Developing an annotated bibliography

Developing an annotated bibliography

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd