{"id":25297,"date":"2021-07-28T04:08:41","date_gmt":"2021-07-28T04:08:41","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2021\/07\/28\/you-will-explore-a-specific-sector-agency-critical-infrastructure-component-and-the-vulnerabilities-that-could\/"},"modified":"2021-07-28T04:08:41","modified_gmt":"2021-07-28T04:08:41","slug":"you-will-explore-a-specific-sector-agency-critical-infrastructure-component-and-the-vulnerabilities-that-could","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2021\/07\/28\/you-will-explore-a-specific-sector-agency-critical-infrastructure-component-and-the-vulnerabilities-that-could\/","title":{"rendered":"You will\u00a0explore a Specific Sector Agency Critical Infrastructure component and the vulnerabilities that could"},"content":{"rendered":"<p>You will\u00a0explore a Specific Sector Agency Critical Infrastructure component and the vulnerabilities that could be exposed within our nation\u2019s critical infrastructure impacting National Security. <\/p>\n<p>Specifically, your research paper will\u00a0identify vulnerabilities with one of the sixteen critical infrastructure sectors and methods to eliminate or mitigate the risk\u00a0 <br \/>Title Page: <br \/>\u00a0\u00a0\u00a0 a. Title <br \/>\u00a0 \u00a0 b. Name, Date, course <\/p>\n<p>New Page: <br \/>\u00a0I. Abstract <br \/>\u00a0\u00a0\u00a0 a. Must be short, approx 120 words, must be a brief overview of topic, subtopics, research design, and hypothesis. <br \/>\u00a0 <br \/>II. Introduction <br \/>Identify your topic and define what it is <br \/>Establish the importance of your topic (this can be done by introducing research statistics, etc describing how serious your topic is) <br \/>Identify the individuals\/population affected by the topic <br \/>Identify your subtopics and describe them <br \/>Note the objectives you will be focusing on in your research <br \/>Note the search strategies used and specific databases and the amount of existing research on your topic (example: HLS digital database, UCS, etc) <br \/>Note the existing theories that you have found on the topic <br \/>State your thesis statement <\/p>\n<p>\u00a0III.\u00a0Literature Review <br \/>\u00a0\u00a0\u00a0\u00a0\u00a0 a. This section alone must be 10-15 pages in length <\/p>\n<p>Element <br \/>Description <br \/>Executive Summary <br \/>Provide an Executive Summary of the research to include key issues from the Specific Sector Agency and component of our nation\u2019s critical infrastructure impacting National Security. <br \/>Background <br \/>Provide a background from a Specific Sector Agency and component of our nation\u2019s critical infrastructure impacting National Security. <br \/>Current CI\/Policy\/Strategy <br \/>Evaluate current policies and strategy concerning Sector Specific Agency Critical Infrastructure. <br \/>Critical Infrastructure Threat and Hazard Identification and Risk Assessment <br \/>Research using case studies and credible sources to identify potential threats, mitigating those threats and minimizing the consequences of CI\/KR failures caused by the impact of human, natural and technological events. <br \/>Recommendations <br \/>Provide sound recommendations that address current policies and strategies associated with your topic impacting National Security. <br \/>Conclusion <br \/>Provide conclusion summarizing key points <\/p>\n<p>IV. Hypothesis: <br \/>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 a. Your hypothesis is one sentence, that must be testable and measurable. <br \/>V. Conclusion: <br \/>\u00a0\u00a0\u00a0\u00a0 a. Summarize the information obtained <br \/>\u00a0\u00a0\u00a0\u00a0 b. viewpoint on your topic and variables <br \/>\u00a0\u00a0 <\/p>\n<p>\u00a0VI. Reference Page <br \/>\u00a0\u00a0 \u00a0 \u00a0 a. Must be with\u00a0credible\u00a0sources only <br \/>\u00a0\u00a0 \u00a0\u00a0\u00a0 b.\u00a0Must be in alphabetical order <br \/>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 c. Must have a space between each reference <br \/>\u00a0\u00a0 \u00a0 \u00a0 d.\u00a0Must have hanging indention <br \/>\u00a0\u00a0 \u00a0 \u00a0 e. \u00a0Every reference cited must be cited in paper (citation) <br \/>\u00a0 \u00a0 \u00a0\u00a0 f.\u00a0\u00a0Must have at least 5 references used <\/p>\n","protected":false},"excerpt":{"rendered":"<p>You will\u00a0explore a Specific Sector Agency Critical Infrastructure component and the vulnerabilities that could be exposed within our nation\u2019s critical infrastructure impacting National Security. Specifically, your research paper will\u00a0identify vulnerabilities with one of the sixteen critical infrastructure sectors and methods to eliminate or mitigate the risk\u00a0 Title Page: \u00a0\u00a0\u00a0 a. Title \u00a0 \u00a0 b. Name, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-25297","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/25297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=25297"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/25297\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=25297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=25297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=25297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}