Homeland Security CJ 355 Unit 6 Professor David R. Thompson
-
Upload
brandee-canute -
Category
Documents
-
view
30 -
download
0
description
Transcript of Homeland Security CJ 355 Unit 6 Professor David R. Thompson
![Page 1: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/1.jpg)
Homeland SecurityHomeland SecurityCJ 355CJ 355Unit 6Unit 6
Professor David R. ThompsonProfessor David R. Thompson
![Page 2: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/2.jpg)
What Is Risk Assessment?What Is Risk Assessment?
![Page 3: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/3.jpg)
A Report That Shows An A Report That Shows An Organization’s Vulnerabilities And Organization’s Vulnerabilities And
The Estimated Cost Of Recovery In The Estimated Cost Of Recovery In The Event Of Damage. It Also The Event Of Damage. It Also
Summarizes Defensive Measures Summarizes Defensive Measures And Associated Costs Based On And Associated Costs Based On
The Amount Of The Risk The The Amount Of The Risk The Organization Is Willing To Accept Organization Is Willing To Accept
(The Risk Tolerance)(The Risk Tolerance)
![Page 4: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/4.jpg)
DHS Defines Threat Assessment DHS Defines Threat Assessment As A Systematic Effort To Identify As A Systematic Effort To Identify And Evaluate Existing Or Potential And Evaluate Existing Or Potential Terrorist Threats To A Jurisdiction Terrorist Threats To A Jurisdiction And Its Target Assets. Due To The And Its Target Assets. Due To The Difficulty In Accurately Assessing Difficulty In Accurately Assessing Terrorist Capabilities, Intentions, Terrorist Capabilities, Intentions,
And Tactics, Threat Assessments And Tactics, Threat Assessments May Yield Only General Information May Yield Only General Information
About Potential RisksAbout Potential Risks
![Page 5: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/5.jpg)
Identifying The ThreatsIdentifying The Threats
Natural Hazard Or Natural Hazard Or DisastersDisasters
FloodFlood WindWind Earthquakes Earthquakes
(seismic)(seismic) HurricanesHurricanes TornadosTornados
Human Caused Human Caused HazardsHazards
Hazmat LeakHazmat Leak Nuclear AccidentNuclear Accident Transportation Transportation
AccidentAccident Criminal ActivityCriminal Activity
![Page 6: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/6.jpg)
Terrorism Or Terrorist ActivityTerrorism Or Terrorist Activity
Vehicle BombsVehicle Bombs Suicide BombsSuicide Bombs Hand Placed Or Thrown BombsHand Placed Or Thrown Bombs Covert EntriesCovert Entries Mail BombsMail Bombs Airborne ContaminationAirborne Contamination C.B.R. AgentsC.B.R. Agents
![Page 7: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/7.jpg)
The Most Common Weapon Of The Most Common Weapon Of Terrorism Is The BombTerrorism Is The Bomb
![Page 8: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/8.jpg)
TechnologyTechnologyCyberterrosimCyberterrosimBiological Agents Biological Agents Chemical/Radiological Chemical/Radiological
![Page 9: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/9.jpg)
Cyber terrorismCyber terrorism
Use Of Computers To Attack Technological Use Of Computers To Attack Technological TargetsTargets
Physical Attacks On Computer NetworksPhysical Attacks On Computer Networks Computer Hacking With A Body Count Computer Hacking With A Body Count
(Grossman, 1999)(Grossman, 1999) The Ways Terrorists Might Use Computers The Ways Terrorists Might Use Computers
And Information Networks (Council On And Information Networks (Council On Foreign Relations, 2004)Foreign Relations, 2004)
![Page 10: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/10.jpg)
Examples Of Cyber terrorismExamples Of Cyber terrorism
Defacement Of WebsitesDefacement Of Websites Computer VirusComputer Virus Bogus Computer ChipsBogus Computer Chips Trojan HorsesTrojan Horses Back DoorsBack Doors Overloading An Electrical SystemOverloading An Electrical System The Internet Is A Command And The Internet Is A Command And
Control SystemControl System
![Page 11: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/11.jpg)
Biological AgentsBiological Agents
Bacterial Or ViralBacterial Or Viral Natural PoisonsNatural Poisons VirusesViruses BacteriaBacteria PlaguesPlagues
![Page 12: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/12.jpg)
Most Threatening Biological AgentsMost Threatening Biological Agents
Small PoxSmall Pox AnthraxAnthrax PlaguePlague BotulismBotulism Tularemia And Hemorrhagic FeverTularemia And Hemorrhagic Fever
![Page 13: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/13.jpg)
Examples Of Biological AttacksExamples Of Biological Attacks
1984 Oregon Religious Group 1984 Oregon Religious Group Spreads Bacteria In Local Salad Bars Spreads Bacteria In Local Salad Bars To Influence An ElectionTo Influence An Election
2001 Anthrax Sent Via U.S. Mail2001 Anthrax Sent Via U.S. Mail
![Page 14: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/14.jpg)
Chemical And RadiologicalChemical And Radiological
RadiationRadiation Nerve AgentsNerve Agents Blood AgentsBlood Agents Chocking AgentsChocking Agents Blistering AgentsBlistering Agents
![Page 15: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/15.jpg)
Chemical / Radiological EffectsChemical / Radiological Effects
Loss Of Bodily Fluids / FunctionsLoss Of Bodily Fluids / Functions BurnsBurns Respiratory FailureRespiratory Failure DeathDeath
![Page 16: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/16.jpg)
Most ThreateningMost Threatening
Dirty Bomb (Conventional Explosive Dirty Bomb (Conventional Explosive Used To Spread Chemical Or Used To Spread Chemical Or Radioactive)Radioactive)
Nuclear BombNuclear Bomb
![Page 17: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/17.jpg)
Critical InfrastructureCritical Infrastructure
Agriculture And FoodAgriculture And Food Public Health And Health CarePublic Health And Health Care Drinking WaterDrinking Water Wastewater Treatment SystemWastewater Treatment System EnergyEnergy Banking And FinanceBanking And Finance National Monuments And IconsNational Monuments And Icons Defense Industrial BaseDefense Industrial Base
![Page 18: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/18.jpg)
Critical Infrastructure ContinuedCritical Infrastructure Continued
Information TechnologyInformation Technology ChemicalChemical Transportation SystemsTransportation Systems Emergency ServicesEmergency Services Postal And Shipping Postal And Shipping DamsDams Government FacilitiesGovernment Facilities Commercial FacilitiesCommercial Facilities NuclearNuclear
![Page 19: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/19.jpg)
What Is The Possibility Or What Is The Possibility Or Likelihood Of An Attack?Likelihood Of An Attack?
1.1. Is It A Tempting Target Based On Is It A Tempting Target Based On The Goals And Motivations Of The The Goals And Motivations Of The Group?Group?
2.2. Does The Group Have The Does The Group Have The Capability To Carry Out The Attack?Capability To Carry Out The Attack?
![Page 20: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/20.jpg)
Risk = Threat x Vulnerability x Risk = Threat x Vulnerability x CriticalityCriticality
![Page 21: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/21.jpg)
Risk Is Defined As The Extent Risk Is Defined As The Extent To Which An Asset Is Exposed To Which An Asset Is Exposed
To A Hazard Or DangerTo A Hazard Or Danger
![Page 22: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/22.jpg)
Threat Times Vulnerability Threat Times Vulnerability Represents The Probability Of Represents The Probability Of An Unwanted Event Occurring, An Unwanted Event Occurring,
And Criticality Equals The And Criticality Equals The Consequence Of Loss Or Consequence Of Loss Or Damage To The Critical Damage To The Critical
Infrastructure Or Key AssetInfrastructure Or Key Asset
![Page 23: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/23.jpg)
Discussion Of The 911 AttacksDiscussion Of The 911 Attacks
![Page 24: Homeland Security CJ 355 Unit 6 Professor David R. Thompson](https://reader036.fdocuments.us/reader036/viewer/2022062719/568132a8550346895d994cac/html5/thumbnails/24.jpg)
QuestionsQuestions