What are the various profiles of insiders who may compromise your systems?

** BEFORE YOU BID **
** PLEASE READ THE ENTIRE REQUEST **
*This is a request for a powerpoint based off this assignment(Included below: Week 5 Security Technology: Access Controls, Firewalls, VPNs, and Intrusion Detection). I need an awesome powerpoint presentation based the documents attached. All sources must be cited within the text or mentioned within the videopresentation according to APA guidelines and must appear at the end ofyour essay on a separate Reference List page or on the last page of your PowerPoint presentation.
1) Week 5 Security Technology: Access Controls, Firewalls, VP.docx
Essentiallyit should sum up the attached assignment in the powerpoint presentation you create. The Presentation with slidesand notes has to be in between 4-5 minutes? So there has to be enoughslides and Speaker notes to allow for that. The example I attached andreferenced below was provided in class to base my presentation off of,it was 17 slides. I have attached a copy as an example. Please do notre-use the slides. See below for the specifics required to complete thiseffort.
Please useGrammarly on THE SPEAKER NOTES, to check/make sure it flows in a presentation conversation and is notall run-on sentences. Also it has to relate back to the assignment attached.
——————————————————————————————————————–Please remove any tags from images, notes and power point file so the original owner cannot be determined.———————————————————————————————————————
Below is the original Assignment explanation that was completed. The result is the attached docx named (Week 5 Security Technology: Access Controls, Firewalls, VP.docx )
Week 5 Security Technology: Access Controls, Firewalls, VPNs, and Intrusion DetectionPlease refer to our APA Manual or visit thePurdue Owl website at:https://owl.english.purdue.edu/owl/resource/560/01/ for assistance withAPA formatting and style guidelines.
Theessay option requires a minimum of 850 words not including sources. Please use Grammarly to make sure it is not all run-on sentences and flows.
Include APA standards for style, citations,references, and format. Be sure to include a title page with your nameand the name of the essay. Please refer to our APA Manual or visit thePurdue Owl website at: https://owl.english.purdue.edu/owl/resource/560/01/ for assistance with APA formatting and style guidelines.
You must use at leastfour (4) sources from professional websites or scholarly journals. Someexamples include www.sans.org, www.wired.com, www.cert.org, and www.nsa.gov.
You may not use Wikipedia, ask.com, or other related dictionary sites.
All sources must be cited within the text or mentioned within the videopresentation according to APA guidelines and must appear at the end ofyour essay on a separate Reference List page or on the last page of yourPower Point presentation.
Option 2: Insider ThreatsAnalyzethe current state of insider threats to computer systems andinfrastructure in terms of numbers, costs and potential problems.What are the various profiles of insiders who may compromise your systems?Whatmethods can companies take to thwart insider threats? (Think of methodssuch as personnel checks, monitoring access, risk management services,suspicious activity, etc).