Post on 01-Jan-2016
description
transcript
Homeland SecurityHomeland SecurityCJ 355CJ 355Unit 6Unit 6
Professor David R. ThompsonProfessor David R. Thompson
What Is Risk Assessment?What Is Risk Assessment?
A Report That Shows An A Report That Shows An Organization’s Vulnerabilities And Organization’s Vulnerabilities And
The Estimated Cost Of Recovery In The Estimated Cost Of Recovery In The Event Of Damage. It Also The Event Of Damage. It Also
Summarizes Defensive Measures Summarizes Defensive Measures And Associated Costs Based On And Associated Costs Based On
The Amount Of The Risk The The Amount Of The Risk The Organization Is Willing To Accept Organization Is Willing To Accept
(The Risk Tolerance)(The Risk Tolerance)
DHS Defines Threat Assessment DHS Defines Threat Assessment As A Systematic Effort To Identify As A Systematic Effort To Identify And Evaluate Existing Or Potential And Evaluate Existing Or Potential Terrorist Threats To A Jurisdiction Terrorist Threats To A Jurisdiction And Its Target Assets. Due To The And Its Target Assets. Due To The Difficulty In Accurately Assessing Difficulty In Accurately Assessing Terrorist Capabilities, Intentions, Terrorist Capabilities, Intentions,
And Tactics, Threat Assessments And Tactics, Threat Assessments May Yield Only General Information May Yield Only General Information
About Potential RisksAbout Potential Risks
Identifying The ThreatsIdentifying The Threats
Natural Hazard Or Natural Hazard Or DisastersDisasters
FloodFlood WindWind Earthquakes Earthquakes
(seismic)(seismic) HurricanesHurricanes TornadosTornados
Human Caused Human Caused HazardsHazards
Hazmat LeakHazmat Leak Nuclear AccidentNuclear Accident Transportation Transportation
AccidentAccident Criminal ActivityCriminal Activity
Terrorism Or Terrorist ActivityTerrorism Or Terrorist Activity
Vehicle BombsVehicle Bombs Suicide BombsSuicide Bombs Hand Placed Or Thrown BombsHand Placed Or Thrown Bombs Covert EntriesCovert Entries Mail BombsMail Bombs Airborne ContaminationAirborne Contamination C.B.R. AgentsC.B.R. Agents
The Most Common Weapon Of The Most Common Weapon Of Terrorism Is The BombTerrorism Is The Bomb
TechnologyTechnologyCyberterrosimCyberterrosimBiological Agents Biological Agents Chemical/Radiological Chemical/Radiological
Cyber terrorismCyber terrorism
Use Of Computers To Attack Technological Use Of Computers To Attack Technological TargetsTargets
Physical Attacks On Computer NetworksPhysical Attacks On Computer Networks Computer Hacking With A Body Count Computer Hacking With A Body Count
(Grossman, 1999)(Grossman, 1999) The Ways Terrorists Might Use Computers The Ways Terrorists Might Use Computers
And Information Networks (Council On And Information Networks (Council On Foreign Relations, 2004)Foreign Relations, 2004)
Examples Of Cyber terrorismExamples Of Cyber terrorism
Defacement Of WebsitesDefacement Of Websites Computer VirusComputer Virus Bogus Computer ChipsBogus Computer Chips Trojan HorsesTrojan Horses Back DoorsBack Doors Overloading An Electrical SystemOverloading An Electrical System The Internet Is A Command And The Internet Is A Command And
Control SystemControl System
Biological AgentsBiological Agents
Bacterial Or ViralBacterial Or Viral Natural PoisonsNatural Poisons VirusesViruses BacteriaBacteria PlaguesPlagues
Most Threatening Biological AgentsMost Threatening Biological Agents
Small PoxSmall Pox AnthraxAnthrax PlaguePlague BotulismBotulism Tularemia And Hemorrhagic FeverTularemia And Hemorrhagic Fever
Examples Of Biological AttacksExamples Of Biological Attacks
1984 Oregon Religious Group 1984 Oregon Religious Group Spreads Bacteria In Local Salad Bars Spreads Bacteria In Local Salad Bars To Influence An ElectionTo Influence An Election
2001 Anthrax Sent Via U.S. Mail2001 Anthrax Sent Via U.S. Mail
Chemical And RadiologicalChemical And Radiological
RadiationRadiation Nerve AgentsNerve Agents Blood AgentsBlood Agents Chocking AgentsChocking Agents Blistering AgentsBlistering Agents
Chemical / Radiological EffectsChemical / Radiological Effects
Loss Of Bodily Fluids / FunctionsLoss Of Bodily Fluids / Functions BurnsBurns Respiratory FailureRespiratory Failure DeathDeath
Most ThreateningMost Threatening
Dirty Bomb (Conventional Explosive Dirty Bomb (Conventional Explosive Used To Spread Chemical Or Used To Spread Chemical Or Radioactive)Radioactive)
Nuclear BombNuclear Bomb
Critical InfrastructureCritical Infrastructure
Agriculture And FoodAgriculture And Food Public Health And Health CarePublic Health And Health Care Drinking WaterDrinking Water Wastewater Treatment SystemWastewater Treatment System EnergyEnergy Banking And FinanceBanking And Finance National Monuments And IconsNational Monuments And Icons Defense Industrial BaseDefense Industrial Base
Critical Infrastructure ContinuedCritical Infrastructure Continued
Information TechnologyInformation Technology ChemicalChemical Transportation SystemsTransportation Systems Emergency ServicesEmergency Services Postal And Shipping Postal And Shipping DamsDams Government FacilitiesGovernment Facilities Commercial FacilitiesCommercial Facilities NuclearNuclear
What Is The Possibility Or What Is The Possibility Or Likelihood Of An Attack?Likelihood Of An Attack?
1.1. Is It A Tempting Target Based On Is It A Tempting Target Based On The Goals And Motivations Of The The Goals And Motivations Of The Group?Group?
2.2. Does The Group Have The Does The Group Have The Capability To Carry Out The Attack?Capability To Carry Out The Attack?
Risk = Threat x Vulnerability x Risk = Threat x Vulnerability x CriticalityCriticality
Risk Is Defined As The Extent Risk Is Defined As The Extent To Which An Asset Is Exposed To Which An Asset Is Exposed
To A Hazard Or DangerTo A Hazard Or Danger
Threat Times Vulnerability Threat Times Vulnerability Represents The Probability Of Represents The Probability Of An Unwanted Event Occurring, An Unwanted Event Occurring,
And Criticality Equals The And Criticality Equals The Consequence Of Loss Or Consequence Of Loss Or Damage To The Critical Damage To The Critical
Infrastructure Or Key AssetInfrastructure Or Key Asset
Discussion Of The 911 AttacksDiscussion Of The 911 Attacks
QuestionsQuestions