Explain the degree to which your state or region is at risk and vulnerable to the threats or hazards.

For your Final Project, you apply concepts and theories presented in the course to develop a homeland security plan for the state or region in which you reside.

Your Final Project must be presented as a 13- to 15-page (NOT INCLUDING REFERENCES, TITLE PAGE, OR ABSTRACT), double-spaced, APA-formatted project.

In your Final Project:

Identify the state or region in which you currently reside. (NEW YORK)

Describe at least three threats or hazards that might affect your state or region.

Explain the degree to which your state or region is at risk and vulnerable to the threats or hazards.

Explain whether you would or would not support the use of a per capita funding formula for federal homeland security preparedness grant funding for your state or region. Justify your decision.

Describe the roles and responsibilities of your state and local agencies in homeland security efforts.

Describe your state or region’s reliance on the federal government for assistance with homeland security efforts.

Describe specific elements you would include in contingency planning for terrorist events or other hazards that might affect your state or region. Be sure to explain why you would include each element.

Explain the collaboration and communication that would and should occur between your state, local, federal, and regional agencies in homeland security efforts.

Describe at least three challenges related to information sharing and establishing interoperable communications among your local and state agencies and federal agencies. Then explain the implications of each challenge on your state or region and how you might address the challenges.

Explain the role of technology in homeland security efforts in your state or region.

Explain ethical and legal implications of homeland security policies on your state or region and how you would address them.

Assignment should be 13 TO 15 pages words with at least 9 references…. MULTIPLE USE OF SPLIT INTEXT CITATION AND PAGE NUMBERS…TRY TO USE THE ASSIGNMENT READINGS IF POSSIBLE.

It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the context of ethics and the readings for this class

To get maximum points you need to follow the requirements listed for this assignments 1) look at the page limits 2) review and follow APA rules 3) create subheadings to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.

REMEMBER IN APA FORMAT JOURNAL TITLES AND VOLUME NUMBERS ARE ITALICIZED.

Readings

Article: Haglund, D. G. (2003). North American cooperation in an era of homeland security. Orbis, 47(4), 675–691.
Use the Academic Search Premier database, and search using the article’s title.

Online Article: Archick, K., Ek, C., Gallis, P., Miko, F. T., & Woehrel, S. (2006). European approaches to homeland security and counterterrorism. Retrieved from http://www.fas.org/sgp/crs/homesec/RL33573.pdf

Online Article: Benjamin, D. (2008). Strategic counterterrorism. Retrieved from http://www.brookings.edu/~/media/Files/rc/papers/2…

Online Article: Graham, B., Talent, J., Allison, G., Cleveland, R., Rademaker, S., Roemer, T., et al. (2008). World at risk: The report of the Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism. Retrieved from http://www.absa.org/leg/WorldAtRisk.pdf

o”Executive Summary”

Optional Resources

Course Text: Introduction to Homeland Security: Principles of All-Hazards Risk Management

oChapter 5, “Intelligence and Counterrorism”

Online Article: Carafano, J. J., & Weitz, R. (2007). Enhancing international collaboration for homeland security and counterterrorism. Retrieved from http://s3.amazonaws.com/thf_media/2007/pdf/bg2078….

Online Article: Laegreid, P., & Serigstad, S. (2004). Organizing for homeland security: The case of Norway. Retrieved from http://www.ub.uib.no/elpub/rokkan/N/N12-04.pdf

Online Article: Arcos, C. (2004). The role of the Department of Homeland Security overseas. Retrieved from http://s3.amazonaws.com/thf_media/2004/pdf/hl840.p…

find the cost of your paper

What is the difference between a session key and a master key?

Task1:words:350 What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so? Task2:no words limit satisfy….

List ways in which secret keys can be distributed to two communicating parties.

Task1:words:350 What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so? Task2:no words limit satisfy….

cha-Discussions

Task1:words:350 What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so? Task2:no words limit satisfy….