• Home
  • Blog
  • University of Management and Technology Threats to Safety and Security Paper

University of Management and Technology Threats to Safety and Security Paper

0 comments

Assignment

Write a 4-5 page paper in APA format (not including the cover page and reference page). A recommended outline template is attached here and posted in the Student Resources. Would you please use the APA Sample provided to complete your assignment? You must provide at least five references in your paper and use in-text citations to your research materials.

For this assignment, you will need to do some additional research. There are some articles provided below that may help you with this task.

Cacas, M. (2012). Sharing homeland security information. Signal, 66(6), 30-32. Retrieved from https://search.proquest.com/docview/923669815?acco…

Gareau, S. E. (2004). The development of guidelines for implementing information technology to promote food security. Agriculture and Human Values, 21(4), 273-285. doi:http://dx.doi.org/10.1007/s10460-003-1203-9

Franz, G. J., Pendall, D. W., & Steffen, J. D. (2010). Host nation information requirements: Achieving unity of understanding in COIN. Military Intelligence Professional Bulletin, 36(2), 15-21. Retrieved from https://search.proquest.com/docview/1016489169?acc…

Assessing threats to safety and security in your area (Montana)

Threats to safety and security take numerous forms— accidents, human error, fire, natural and environmental disasters, civil liability, substance abuse, civil disorder, and crime in all its many types. Assess and address your vulnerability to these threats by taking the following steps:

1. For Montana, research the statistics available on each of these threats. For example, consult FBI reports on various types of crimes in your area, and look for studies on the other types of threats and how the findings relate to your area.

2. Select a human and natural hazard in your community that may materialize into a threat. Explain in detail why this is a concern or issue. Focus on how the management of the information security is used to address the hazard or threat.

3. Formulate a strategy for addressing the threats you identified in Question 2. For instance, what kind of contingency plan or disaster-recovery strategy would you recommend to address this threat? Address the management of the information security.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}