this the only thing do for 370 no forum or responses Threats & Countermeasures Project Presentation:Identify and explain three “specific” 21st century security threats discussed “anywhere” in our textbook. Secondly, identify and relate countermeasures (security strategies, tactics, countermeasures, etc.) to prevent and/or mitigate the specific threats.Explain each of your three threats in three separate project sections (one for each threat). Each threat section of your project must be “concisely” “titled” with the name of the threat (e.g. Insider Threats; Perimeter Threats; etc.). Following each threat section, a detailed and “titled” “countermeasures” “sub-section” must be included. Each countermeasure should be a third level sub-heading. For example, ABC Threat (heading), Countermeasures (sub-heading), and then each specific countermeasure (third level sub-heading).Mandatory Project Format (sequence and specific headings):Slide 1:Title slide (similar to an APA title page – title, name, date, etc., but no running head)Slide 2:Introduction (do not forget to introduce your project)Slide 3 to as necessary:Threat #1 – Title a specific “threat” (e.g., Insider Cyber Threats – do use threat #1 or Insider Cyber “Security” – “security” is not a threat; be concise and ensure “Threat is in the title). Do not use locations, vulnerabilities or some other type of general research topic. Ensure each threat is specific (e.g., employee theft threats, commercial robbery threats, airline terrorism threats, cargo theft threats, insider cyber threats, etc.) and “not” broad/general threats (e.g., internal threats, external threats, terrorism threats, transportation threats, cyber threats, etc.).Countermeasures (general introduction to your specific countermeasures to follow) Specific Countermeasure (security strategy, tactic, etc. specific to the identified/discussed threat) Specific Countermeasure (continue for as many countermeasures you have identified)Next Slide to as necessary Threat #2Countermeasures (general introduction to your specific countermeasures to follow) Specific Countermeasure (security strategy, tactic, etc. specific to the identified/discussed threat) Specific Countermeasure (continue for as many countermeasures you have identified)Next Slide to as necessaryThreat #3Countermeasures (general introduction to your specific countermeasures to follow) Specific Countermeasure (security strategy, tactic, etc. specific to the identified/discussed threat) Specific Countermeasure (continue for as many countermeasures you have identified)Next Slide Conclusion (title this section Conclusion) Common point loss for those who omit this slide.Final Slide/sReferences: Use a minimum of six “outside” (non-textbook) credible sources to support your research project. Your final slide will be titled References. Recall to adhere to the APA for reference formatting: alphabetize (common point loss), only first initials for first names (common point loss), double space references, use a second/third line 0.5” hanging indent, References must have matching in-text citations in the body of your project (and vice versa). Do “not” list only electronic links/websites.Length Requirements: Each threat and countermeasures section must be a minimum of three slides; maximum of four slides. Most points awarded will be derived from the countermeasures portion of project. Therefore, the threat portion of each section should be relatively short with the majority of each section addressing how to counter (deter/prevent and/or mitigate) the specific threat.TIPS to Avoid Loss of Points: Follow all above instructions.Do “not” use contractions (don’t, isn’t, etc.) or “I,” “me,” “you,” “we,” and “her/him” in academic writing. Avoid “crowding” slides with too much content (words, generally). Use the speaker notes section at the bottom the slide to place most of your wording.Tips for a High Quality/Superior Slide Presentation: Enhance your slides with data (charts, graphs, etc.) and perhaps some professional graphics (images, diagrams, etc.) and “some” color to make it more content rich and visually appealing. “Only” presentations that follow the above directions and are both content rich and visually appealing will receive “superior scores.”Projects must be submitted/uploaded into Assignments as an attached “MS PowerPoint” document only for grading. Lastly, avoid any plagiarism issues, and do include use previously used work from other classes.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download