CJUS 382
Airport Assessment Part 2 Instructions
You have now been tasked with developing a report for airport administrators. This report must include a risk analysis and recommendations for minimizing threats and vulnerabilities. As with Part 1, this assessment is based on your knowledge gained from the information in this course and any outside sources you locate (scholarly, governmental, or academic). You will need to conduct research outside the text. For instance, using a risk assessment tool from a credible source (with proper citations) may be useful.
Prepare a formal report on your findings and recommendations. The report must follow strict APA guidelines and at least 4 sources must be properly cited. This report will include a qualitative analysis. As such, spreadsheets must be developed to clarify your findings and position. The report must consist of 900–1,400 words. This assignment is due by 11:59 p.m. (ET) on Friday of Module/Week 8.
The outline of the report must include at a minimum:
· Introduction
[Provide a brief introduction outlining the purpose and scope of this report.]
· Overview and Impact
[Discuss the potential critical infrastructure(s) impacted. What are the consequences? Include the level of impact (e.g., local, state, national, and/or global). Provide considerations for threat sources and motivations. Address any legal requirements and responsibilities.]
· Risk Assessment
[Develop a qualitative risk analysis method (see the risk matrix below) with a risk rating system. For instance, low, medium, and high with assigned numerical values for each (e.g., 1 to 5 equals low and so on). You may modify or use this matrix as you own without citations. However, you may also develop your own or use a different model]
Risk Matrix
Negligible
(1)
Minor
(2)
Limited
(3)
Critical
(4)
Catastrophic
(5)
Highly Likely (5)
5
10
15
20
25
Likely (4)
4
8
12
16
20
Possible (3)
3
6
9
12
15
Unlikely (2)
2
4
6
7
10
Remote/Rare (1)
1
2
3
4
5
[Using the information in Part 1 of your report, develop and present a risk assessment. Based on the previous instructions, each risk should be rated with a specific risk level. This section should include a presentation of all risks in a clear and concise format.]
· Recommendations
[Develop logical recommendations for minimizing risks. Consideration should be given to cost effectiveness. For instance, one security measure such as a perimeter fence can eliminate multiple risks. Present recommendations in a simple and logical format.]
· Summary and Conclusion
[Summarize your findings. Fu
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more