Power Point Gov
Upcoming SlideShare
Loading in...5

Like this? Share it with your network


Power Point Gov






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Power Point Gov Presentation Transcript

  • 1. Homeland Security and Cyberterrorism By Ariel Flug
  • 2. What is The Department of Homeland Security?
    • There are sixteen agencies in the intelligence community, each with a unique cultural responsibility.
    • Homeland Security plays an important role in securing the countries Federal, State and Local governments and protecting and preserving its people and their freedoms.
  • 3. U.S Top Secret Files: A Hot Topic
    • The Department of Homeland Security was formed after the September eleventh attack in an attempt by the Federal government to manage all matters relating to the safety of the United States.
    • Computer systems in the military are scanned thousands of times a day by hackers desperately trying to break into government networks.
    • Many safeguards have been put in place in order to secure the many systems of the military.
  • 4. Cyberterrorism
    • Cyberterrorism may seem a fictional or futuristic threat in which the international community has little to worry
    • With the internet becoming increasingly more accessible to people of all ages, there is a growing fear that perhaps cyberspace will become next as a victim of or launch pad to the Global War on Terror.
  • 5. Cyberterrorists
    • Cyberspace offers numerous opportunities for terrorist organizations to exploit their message and propaganda to the world with little effort.
    • With terrorists from all around the world recognizing that it is becoming progressively more difficult to enter the United States or any other developed country, or publicize their messages through media outlets, the internet is serving as a useful alternative.
  • 6. Should the United States be worried about a Cyberterror attack.
    • Defending the homeland from internal and external threats remains the top priority, especially since 9/11.
    • In today’s dangerous and complex world there is no room for error, and DHS along with the other federal departments and agencies must act swiftly and competently to ensure the protection of United States citizens.
  • 7. Levels Of Government
    • Each of the three levels of government have their own regulations and policies on the issue of cyberterriorism and whether the United States should be concerned about a possible attack.
    • It is absolutely essential that information pertinent to United States security be shared with not only every intelligence agency, but also to the first responders and national guard.
  • 8.
    • It is the responsibility of the Department of Homeland Security to assign local responders such as police and firemen with intelligence reports given that they provide the most assistance during a crisis.
    • Individual homeland security and public safety web sites designed to keep U.S citizens updated with security information have been created for each for the fifty states.
  • 9.
    • Internet accessibility shows how reliant a country is on information technology, and how effective a cyberattack could be.
    • Stronger domestic security has allowed State government officials to recognize the severity of protecting computer networking technology .
  • 10. New York Status
    • New York, being an attractive target for any type of terrorism has numerous regulations if confronted with a dangerous situation.
    • New York Alert (NY-ALERT) is New York State’s all-hazards alert and notification system.
    • It is designed to provide immediate emergency information through e-mail, texts, pagers and cell phones.
  • 11. Level of Importance
    • Cyberterrorism is without question an exceptionally prevalent concept; nevertheless it is one that has been inconsistently and minimally researched.
    • It is essential for more studies to be crafted forthcoming to better examine the flaws and vulnerabilities of information technology.
  • 12. What to do Next?
    • Common tools such as the internet are available for world wide criminals to use with extraordinarily less difficulty than otherwise more conventional methods of attack.
    • The question now becomes, how likely is a cyberterrorist attack, and furthermore how likely is such an attack on the U.S.