371 wk7 forumBased upon research of your state of residence or home state compare current training and selection criteria against criteria covered in the ASIS guide. What are the shortcomings and what recommendations would you suggest. The student must ensure the syllabus requirements for assignments are met. Reminder: 500 words minimum for initial post and 200 words for student responses. Initial posts are due no later than 11:55PM EST on Friday and student responses are due no later than 11:55PM EST on Sunday370 wk7 forum/ the other thing with the slides is due next sunday”Thoroughly” answer the “two” end of chapter critical thinking or review questions from this week’s assigned reading (“one” question from the end of “each” chapter). Your choice which two, but one from “each” chapter).Special Notes: Before answering, first repeat the questions. Lastly, ensure you use your course text book via in-text citations with a matching reference to support and enhance your answers. Additional outside (non-course text book) sources (“properly” cited and referenced per the APA) are highly encouraged for superior scores.IMPORTANT / HELPFUL FORUM DISCUSSION NOTES: You will post one response to the forum discussion prompt and a “minimum of two responses (more “substantive” responses for a “superior” score) to your classmates (or instructor, if a follow-up question is asked) each discussion week (weeks 1 – 3 and 5 – 7). “Single space only” in forums. Importantly, to keep everyone on the same sheet of music, “post only during the current course week” (do “not” post in advance).The response to each forum prompt must be a minimum of “500 words” in length (“excluding” the directions, questions, quotations, notes, or references). Each of the required two responses to your classmates (or instructor) must be a minimum of “200 words” in length. Threats & Countermeasures Project Presentation:Identify and explain three “specific” 21st century security threats discussed “anywhere” in our textbook. Secondly, identify and relate countermeasures (security strategies, tactics, countermeasures, etc.) to prevent and/or mitigate the specific threats.Explain each of your three threats in three separate project sections (one for each threat). Each threat section of your project must be “concisely” “titled” with the name of the threat (e.g. Insider Threats; Perimeter Threats; etc.). Following each threat section, a detailed and “titled” “countermeasures” “sub-section” must be included. Each countermeasure should be a third level sub-heading. For example, ABC Threat (heading), Countermeasures (sub-heading), and then each specific countermeasure (third level sub-heading).NOTE: Include extensive speaker notes on each slide. Speaker notes are just as you would be presenting the presentation to an audience. Lack of, or inadequate speaker notes will result in a substantial deduction in your overall grade.Mandatory Project Format (sequence and specific headings):Slide 1:Title slide (similar to an APA title page – title, name, date, etc., but no running head)Slide 2:Introduction (do not forget to introduce your project)Slide 3 to as necessary:Threat #1 – Title a specific “threat” (e.g., Insider Cyber Threats – do use threat #1 or Insider Cyber “Security” – “security” is not a threat; be concise and ensure “Threat is in the title). Do not use locations, vulnerabilities or some other type of general research topic. Ensure each threat is specific (e.g., employee theft threats, commercial robbery threats, airline terrorism threats, cargo theft threats, insider cyber threats, etc.) and “not” broad/general threats (e.g., internal threats, external threats, terrorism threats, transportation threats, cyber threats, etc.).Countermeasures (general introduction to your specific countermeasures to follow) Specific Countermeasure (security strategy, tactic, etc. specific to the identified/discussed threat) Specific Countermeasure (continue for as many countermeasures you have identified)Next Slide to as necessary Threat #2Countermeasures (general introduction to your specific countermeasures to follow) Specific Countermeasure (security strategy, tactic, etc. specific to the identified/discussed threat) Specific Countermeasure (continue for as many countermeasures you have identified)Next Slide to as necessaryThreat #3Countermeasures (general introduction to your specific countermeasures to follow) Specific Countermeasure (security strategy, tactic, etc. specific to the identified/discussed threat) Specific Countermeasure (continue for as many countermeasures you have identified)Next Slide Conclusion (title this section Conclusion) Common point loss for those who omit this slide.Final Slide/sReferences: Use a minimum of six “outside” (non-textbook) credible sources to support your research project. Your final slide will be titled References. Recall to adhere to the APA for reference formatting: alphabetize (common point loss), only first initials for first names (common point loss), double space references, use a second/third line 0.5” hanging indent, References must have matching in-text citations in the body of your project (and vice versa). Do “not” list only electronic links/websites.Length Requirements: Each threat and countermeasures section must be a minimum of three slides; maximum of four slides. Most points awarded will be derived from the countermeasures portion of project. Therefore, the threat portion of each section should be relatively short with the majority of each section addressing how to counter (deter/prevent and/or mitigate) the specific threat.TIPS to Avoid Loss of Points: Follow all above instructions.Do “not” use contractions (don’t, isn’t, etc.) or “I,” “me,” “you,” “we,” and “her/him” in academic writing. Avoid “crowding” slides with too much content (words, generally). Use the speaker notes section at the bottom the slide to place most of your wording.Tips for a High Quality/Superior Slide Presentation: Enhance your slides with data (charts, graphs, etc.) and perhaps some professional graphics (images, diagrams, etc.) and “some” color to make it more content rich and visually appealing. “Only” presentations that follow the above directions and are both content rich and visually appealing will receive “superior scores.”Projects must be submitted/uploaded into Assignments as an attached “MS PowerPoint” document only for grading. Lastly, avoid any plagiarism issues, and do include use previously used work from other classes.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download