You have now been tasked with developing a report for airport administrators. This report must include a risk analysis and recommendations for minimizing threats and vulnerabilities. As with Part 1, this assessment is based on your knowledge gained from the information in this course and any outside sources you locate (scholarly, governmental, or academic). You will need to conduct research outside the text. For instance, using a risk assessment tool from a credible source (with proper citations) may be useful.
Prepare a formal report on your findings and recommendations. The report must follow strict APA guidelines and at least 4 sources must be properly cited. This report will include a qualitative analysis. As such, spreadsheets must be developed to clarify your findings and position. The report must consist of 900–1,400 words. This assignment is due by 11:59 p.m. (ET) on Friday of Module/Week 8.
The outline of the report must include at a minimum:
[Provide a brief introduction outlining the purpose and scope of this report.]
· Overview and Impact
[Discuss the potential critical infrastructure(s) impacted. What are the consequences? Include the level of impact (e.g., local, state, national, and/or global). Provide considerations for threat sources and motivations. Address any legal requirements and responsibilities.]
· Risk Assessment
[Develop a qualitative risk analysis method (see the risk matrix below) with a risk rating system. For instance, low, medium, and high with assigned numerical values for each (e.g., 1 to 5 equals low and so on). You may modify or use this matrix as you own without citations. However, you may also develop your own or use a different model]
[Using the information in Part 1 of your report, develop and present a risk assessment. Based on the previous instructions, each risk should be rated with a specific risk level. This section should include a presentation of all risks in a clear and concise format.]
[Develop logical recommendations for minimizing risks. Consideration should be given to cost effectiveness. For instance, one security measure such as a perimeter fence can eliminate multiple risks. Present recommendations in a simple and logical format.]
· Summary and Conclusion
[Summarize your findings. Further support your position.]