National terrorism
Explore and discuss National terrorism advisory system, three top threats (your choice) to homeland security. Your comments should address whether or not you think the current National Terrorism Advisory system framework is effective and if not suggest and defend a better alternative.
Assignment Expectations
Assignments should be at least three (3) full pages double-spaced, not counting the cover or reference page. Paper format: (a) Cover page, (b) Header, (c) Body. Submit your assignment by the last day of this module.
- Relevance: All content is connected to the question.
- Precision: Specific question is addressed. Statements, facts, and statistics are specific and accurate.
- Depth of discussion: Student presents and integrates points that lead to deeper issues.
- Breadth: Multiple perspectives and references, multiple issues/factors are considered.
- Evidence: Points are well-supported with facts, statistics, and references.
- Logic: Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
- Clarity: Writing is concise and understandable, and contains sufficient detail or examples.
- Objectivity: Writer avoids use of first person and subjective bias.
- References: Sources are listed at the end of the paper.
Support your work with peer-reviewed, government, subject matter expert sources. Your paper will not be longer than 5 pages (excluding cover sheet and reference page).
- Your organization has grown over the past few years and needs to update its security. The CEO has asked you to create a 1-page brief on the best practices and pitfalls of organizing for security in order to best manage risk-based decision making in a large organization. Your CEO would also like you to analyze the barriers for Hardening Devices, including mobile technology, and suggest solutions.Include the following in your brief:
- Bureaucratic challenges of the organization, and barriers to effective risk-informed communications
- Best practice in the acceptance or transference of risk (for example, cybersecurity, information assurance, device management, organizational management, software management, physical and cybersecurity combined)
- Solutions to barriers for Hardening Devices that include mobile technology
- How your organization will assist with optimal risk-based decision making within the organizational bureaucracy
- How updating and removing outdated software and can minimize risk
- What access control concepts and technologies will be needed for the update
- What will need to be done to increase security compliance
- Using Microsoft® Visio®, include an organizational chart for your company that includes the following:
- Key organizational positions, such as CEO, CIO, CISO, COO, CFO, and physical security officers
- How each organizational position relates to the various aspects included in your brief