As a follow-up to your paper in 5.2 Assignment: Pre-Operational Threat Vectors, 

Cybersecurity Applications in Space

Important - Read this before proceeding

These instructions are based on a task we've worked on previously. If you're looking for an answer to the same assignment, you'll need to submit an order on our writers' platform to receive a unique paper that you can confidently present as your own work. Read our "How It Works" page for more information.

As a follow-up to your paper in 5.2 Assignment: Pre-Operational Threat Vectors, for this activity, create a presentation in which you will describe the following operational threat vectors and their effects:
Communication
Flight & Operation
Analysis & Dissemination
Consumers
For each threat vector, describe the
Probability the threat vector is used (high, medium, or low)
Impact of the threat vector (high, medium, or low)
Then, use the Risk Chart (PPTX) Download Risk Chart (PPTX)to determine the risk posed by the threat vector to your chosen space operation.
Rank your four chosen threats from highest to lowest risk in a list. Then, update your ranking from the activity in Module 5 by integrating these four operational threat vectors into your ranking of four pre-operational threat vectors. You will now have a new ranking including all eight threat vectors to include a new ordering of threat vector risk with the inclusion of these new threat vectors.
Provide a reference slide in APA format.