Order Description
You have now been tasked with developing a report for airport administrators. This report must include a risk analysis and recommendations for minimizing threats and vulnerabilities. As with Part 1, this assessment is based on your knowledge gained from the information in this course and any outside sources you locate (scholarly, governmental, or academic). You will need to conduct research outside the text. For instance, using a risk assessment tool from a credible source (with proper citations) may be useful.
Prepare a formal report on your findings and recommendations. The report must follow strict APA guidelines and at least 5 sources must be properly cited. This report will include a qualitative analysis. As such, spreadsheets must be developed to clarify your findings and position. The report must consist of 1375.
The outline of the report must include at a minimum:
• Introduction
[Provide a brief introduction outlining the purpose and scope of this report.]
• Overview and Impact
[Discuss the potential critical infrastructure(s) impacted. What are the consequences? Include the level of impact (e.g., local, state, national, and/or global). Provide considerations for threat sources and motivations. Address any legal requirements and responsibilities.]
• Risk Assessment
[Develop a qualitative risk analysis method (see the risk matrix below) with a risk rating system. For instance, low, medium, and high with assigned numerical values for each (e.g., 1 to 5 equals low and so on). You may modify or use this matrix as you own without citations. However, you may also develop your own or use a different model]
Risk Matrix
Negligible
(1) Minor
(2) Limited
(3) Critical
(4) Catastrophic
(5)
Highly Likely (5) 5 10 15 20 25
Likely (4) 4 8 12 16 20
Possible (3) 3 6 9 12 15
Unlikely (2) 2 4 6 7 10
Remote/Rare (1) 1 2 3 4 5
[Using the information in Part 1 of your report, develop and present a risk assessment. Based on the previous instructions, each risk should be rated with a specific risk level. This section should include a presentation of all risks in a clear and concise format.]
• Recommendations
[Develop logical recommendations for minimizing risks. Consideration should be given to cost effectiveness. For instance, one security measure such as a perimeter fence can eliminate multiple risks. Present recommendations in a simple and logical format.]
• Summary and Conclusion
[Summarize your findings. Further support your position.]
Currently 2 writers are viewing this order
Order Management
Premium Service
- 100% Custom papers
- Any delivery date
- 100% Confidentiality
- 24/7 Customer support
- The finest writers & editors
- No hidden charges
- No resale promise
Format and Features
- Approx. 275 words / page
- All paper formats (APA, MLA, Harvard, Chicago/Turabian)
- Font: 12 point Arial/Times New Roman
- Double and single spacing
- FREE bibliography page
- FREE title page
0% Plagiarism
We take all due measures in order to avoid plagiarisms in papers. We have strict fines policy towards those writers who use plagiarisms and members of QAD make sure that papers are original.