Title Slide: Include your name, course title, current date, and the name of your instructor.
Introduction Slide: List the four threats you chose, and in the Notes section offer a brief narrative justifying these choices
Body Slides: The slide content is listed in the outline below. For each body slide you develop, please include a paragraph in the Notes section explaining how the details you have provided in the slide are pertinent to the United Nations’ discussion on selecting and prioritizing goals.
For your first threat (this is the threat you consider to be the greatest risk/highest priority):
One slide on a brief history and assessment of the threat.
One slide on the countries most affected by the threat, and how those countries are affected (please give examples).
One slide on the countries most affected by the threat, and how those countries are affected (please give examples).
One slide on the effects of this threat on the world population as a whole.
One slide including a chart, graph, or compelling visual that relates to the content you present in body slides a–c.
For your fourth threat (this is the threat you consider to be the fourth greatest threat/highest priority):
One slide on a brief history and assessment of the threat.
One slide on the countries most affected by the threat, and how those countries are affected (please give examples).
One slide on the effects of this threat on the world population as a whole.
One slide including a chart, graph, or compelling visual that relates to the content you present in body slides a–c.
Conclusion Slide: Summarize your findings for the Assembly.
(Optional) Reference Slide: You can include full-text citations in the Notes section of each slide or provide a reference slide at the end of the presentation with the full citations of your sources.
Answer preview
The security team should make sure that they work with trusted third-party agencies.
Health organizations may use cloud services to store and manage data.
Healthcare providers must look for vendors who cannot put patient’s data at the risk.