Homeland Security CJ 355 Unit 6 Professor David R. Thompson

24
Homeland Security Homeland Security CJ 355 CJ 355 Unit 6 Unit 6 Professor David R. Professor David R. Thompson Thompson

description

Homeland Security CJ 355 Unit 6 Professor David R. Thompson. What Is Risk Assessment?. - PowerPoint PPT Presentation

Transcript of Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Page 1: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Homeland SecurityHomeland SecurityCJ 355CJ 355Unit 6Unit 6

Professor David R. ThompsonProfessor David R. Thompson

Page 2: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

What Is Risk Assessment?What Is Risk Assessment?

Page 3: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

A Report That Shows An A Report That Shows An Organization’s Vulnerabilities And Organization’s Vulnerabilities And

The Estimated Cost Of Recovery In The Estimated Cost Of Recovery In The Event Of Damage. It Also The Event Of Damage. It Also

Summarizes Defensive Measures Summarizes Defensive Measures And Associated Costs Based On And Associated Costs Based On

The Amount Of The Risk The The Amount Of The Risk The Organization Is Willing To Accept Organization Is Willing To Accept

(The Risk Tolerance)(The Risk Tolerance)

Page 4: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

DHS Defines Threat Assessment DHS Defines Threat Assessment As A Systematic Effort To Identify As A Systematic Effort To Identify And Evaluate Existing Or Potential And Evaluate Existing Or Potential Terrorist Threats To A Jurisdiction Terrorist Threats To A Jurisdiction And Its Target Assets. Due To The And Its Target Assets. Due To The Difficulty In Accurately Assessing Difficulty In Accurately Assessing Terrorist Capabilities, Intentions, Terrorist Capabilities, Intentions,

And Tactics, Threat Assessments And Tactics, Threat Assessments May Yield Only General Information May Yield Only General Information

About Potential RisksAbout Potential Risks

Page 5: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Identifying The ThreatsIdentifying The Threats

Natural Hazard Or Natural Hazard Or DisastersDisasters

FloodFlood WindWind Earthquakes Earthquakes

(seismic)(seismic) HurricanesHurricanes TornadosTornados

Human Caused Human Caused HazardsHazards

Hazmat LeakHazmat Leak Nuclear AccidentNuclear Accident Transportation Transportation

AccidentAccident Criminal ActivityCriminal Activity

Page 6: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Terrorism Or Terrorist ActivityTerrorism Or Terrorist Activity

Vehicle BombsVehicle Bombs Suicide BombsSuicide Bombs Hand Placed Or Thrown BombsHand Placed Or Thrown Bombs Covert EntriesCovert Entries Mail BombsMail Bombs Airborne ContaminationAirborne Contamination C.B.R. AgentsC.B.R. Agents

Page 7: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

The Most Common Weapon Of The Most Common Weapon Of Terrorism Is The BombTerrorism Is The Bomb

Page 8: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

TechnologyTechnologyCyberterrosimCyberterrosimBiological Agents Biological Agents Chemical/Radiological Chemical/Radiological

Page 9: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Cyber terrorismCyber terrorism

Use Of Computers To Attack Technological Use Of Computers To Attack Technological TargetsTargets

Physical Attacks On Computer NetworksPhysical Attacks On Computer Networks Computer Hacking With A Body Count Computer Hacking With A Body Count

(Grossman, 1999)(Grossman, 1999) The Ways Terrorists Might Use Computers The Ways Terrorists Might Use Computers

And Information Networks (Council On And Information Networks (Council On Foreign Relations, 2004)Foreign Relations, 2004)

Page 10: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Examples Of Cyber terrorismExamples Of Cyber terrorism

Defacement Of WebsitesDefacement Of Websites Computer VirusComputer Virus Bogus Computer ChipsBogus Computer Chips Trojan HorsesTrojan Horses Back DoorsBack Doors Overloading An Electrical SystemOverloading An Electrical System The Internet Is A Command And The Internet Is A Command And

Control SystemControl System

Page 11: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Biological AgentsBiological Agents

Bacterial Or ViralBacterial Or Viral Natural PoisonsNatural Poisons VirusesViruses BacteriaBacteria PlaguesPlagues

Page 12: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Most Threatening Biological AgentsMost Threatening Biological Agents

Small PoxSmall Pox AnthraxAnthrax PlaguePlague BotulismBotulism Tularemia And Hemorrhagic FeverTularemia And Hemorrhagic Fever

Page 13: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Examples Of Biological AttacksExamples Of Biological Attacks

1984 Oregon Religious Group 1984 Oregon Religious Group Spreads Bacteria In Local Salad Bars Spreads Bacteria In Local Salad Bars To Influence An ElectionTo Influence An Election

2001 Anthrax Sent Via U.S. Mail2001 Anthrax Sent Via U.S. Mail

Page 14: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Chemical And RadiologicalChemical And Radiological

RadiationRadiation Nerve AgentsNerve Agents Blood AgentsBlood Agents Chocking AgentsChocking Agents Blistering AgentsBlistering Agents

Page 15: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Chemical / Radiological EffectsChemical / Radiological Effects

Loss Of Bodily Fluids / FunctionsLoss Of Bodily Fluids / Functions BurnsBurns Respiratory FailureRespiratory Failure DeathDeath

Page 16: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Most ThreateningMost Threatening

Dirty Bomb (Conventional Explosive Dirty Bomb (Conventional Explosive Used To Spread Chemical Or Used To Spread Chemical Or Radioactive)Radioactive)

Nuclear BombNuclear Bomb

Page 17: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Critical InfrastructureCritical Infrastructure

Agriculture And FoodAgriculture And Food Public Health And Health CarePublic Health And Health Care Drinking WaterDrinking Water Wastewater Treatment SystemWastewater Treatment System EnergyEnergy Banking And FinanceBanking And Finance National Monuments And IconsNational Monuments And Icons Defense Industrial BaseDefense Industrial Base

Page 18: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Critical Infrastructure ContinuedCritical Infrastructure Continued

Information TechnologyInformation Technology ChemicalChemical Transportation SystemsTransportation Systems Emergency ServicesEmergency Services Postal And Shipping Postal And Shipping DamsDams Government FacilitiesGovernment Facilities Commercial FacilitiesCommercial Facilities NuclearNuclear

Page 19: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

What Is The Possibility Or What Is The Possibility Or Likelihood Of An Attack?Likelihood Of An Attack?

1.1. Is It A Tempting Target Based On Is It A Tempting Target Based On The Goals And Motivations Of The The Goals And Motivations Of The Group?Group?

2.2. Does The Group Have The Does The Group Have The Capability To Carry Out The Attack?Capability To Carry Out The Attack?

Page 20: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Risk = Threat x Vulnerability x Risk = Threat x Vulnerability x CriticalityCriticality

Page 21: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Risk Is Defined As The Extent Risk Is Defined As The Extent To Which An Asset Is Exposed To Which An Asset Is Exposed

To A Hazard Or DangerTo A Hazard Or Danger

Page 22: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Threat Times Vulnerability Threat Times Vulnerability Represents The Probability Of Represents The Probability Of An Unwanted Event Occurring, An Unwanted Event Occurring,

And Criticality Equals The And Criticality Equals The Consequence Of Loss Or Consequence Of Loss Or Damage To The Critical Damage To The Critical

Infrastructure Or Key AssetInfrastructure Or Key Asset

Page 23: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Discussion Of The 911 AttacksDiscussion Of The 911 Attacks

Page 24: Homeland Security CJ 355 Unit 6 Professor David R. Thompson

QuestionsQuestions