1 / 24

Homeland Security CJ 355 Unit 6 Professor David R. Thompson

Homeland Security CJ 355 Unit 6 Professor David R. Thompson. What Is Risk Assessment?.

Download Presentation

Homeland Security CJ 355 Unit 6 Professor David R. Thompson

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Homeland SecurityCJ 355Unit 6Professor David R. Thompson

  2. What Is Risk Assessment?

  3. A Report That Shows An Organization’s Vulnerabilities And The Estimated Cost Of Recovery In The Event Of Damage. It Also Summarizes Defensive Measures And Associated Costs Based On The Amount Of The Risk The Organization Is Willing To Accept (The Risk Tolerance)

  4. DHS Defines Threat Assessment As A Systematic Effort To Identify And Evaluate Existing Or Potential Terrorist Threats To A Jurisdiction And Its Target Assets. Due To The Difficulty In Accurately Assessing Terrorist Capabilities, Intentions, And Tactics, Threat Assessments May Yield Only General Information About Potential Risks

  5. Natural Hazard Or Disasters Flood Wind Earthquakes (seismic) Hurricanes Tornados Human Caused Hazards Hazmat Leak Nuclear Accident Transportation Accident Criminal Activity Identifying The Threats

  6. Terrorism Or Terrorist Activity • Vehicle Bombs • Suicide Bombs • Hand Placed Or Thrown Bombs • Covert Entries • Mail Bombs • Airborne Contamination • C.B.R. Agents

  7. The Most Common Weapon Of Terrorism Is The Bomb

  8. Technology Cyberterrosim Biological Agents Chemical/Radiological

  9. Cyber terrorism • Use Of Computers To Attack Technological Targets • Physical Attacks On Computer Networks • Computer Hacking With A Body Count (Grossman, 1999) • The Ways Terrorists Might Use Computers And Information Networks (Council On Foreign Relations, 2004)

  10. Examples Of Cyber terrorism • Defacement Of Websites • Computer Virus • Bogus Computer Chips • Trojan Horses • Back Doors • Overloading An Electrical System • The Internet Is A Command And Control System

  11. Biological Agents • Bacterial Or Viral • Natural Poisons • Viruses • Bacteria • Plagues

  12. Most Threatening Biological Agents • Small Pox • Anthrax • Plague • Botulism • Tularemia And Hemorrhagic Fever

  13. Examples Of Biological Attacks • 1984 Oregon Religious Group Spreads Bacteria In Local Salad Bars To Influence An Election • 2001 Anthrax Sent Via U.S. Mail

  14. Chemical And Radiological • Radiation • Nerve Agents • Blood Agents • Chocking Agents • Blistering Agents

  15. Chemical / Radiological Effects • Loss Of Bodily Fluids / Functions • Burns • Respiratory Failure • Death

  16. Most Threatening • Dirty Bomb (Conventional Explosive Used To Spread Chemical Or Radioactive) • Nuclear Bomb

  17. Critical Infrastructure • Agriculture And Food • Public Health And Health Care • Drinking Water • Wastewater Treatment System • Energy • Banking And Finance • National Monuments And Icons • Defense Industrial Base

  18. Critical Infrastructure Continued • Information Technology • Chemical • Transportation Systems • Emergency Services • Postal And Shipping • Dams • Government Facilities • Commercial Facilities • Nuclear

  19. What Is The Possibility Or Likelihood Of An Attack? • Is It A Tempting Target Based On The Goals And Motivations Of The Group? • Does The Group Have The Capability To Carry Out The Attack?

  20. Risk = Threat x Vulnerability x Criticality

  21. Risk Is Defined As The Extent To Which An Asset Is Exposed To A Hazard Or Danger

  22. Threat Times Vulnerability Represents The Probability Of An Unwanted Event Occurring, And Criticality Equals The Consequence Of Loss Or Damage To The Critical Infrastructure Or Key Asset

  23. Discussion Of The 911 Attacks

  24. Questions

More Related