SlideShare a Scribd company logo
1 of 10
National Security During
Covid
Jag Jennings
Keywords
Cybercrime: criminal activities carried out by
means of computers or the Internet.
The Pentagon: the headquarters building of
the United States Department of Defense and a symbol of the United States military
Phishing: the fraudulent practice of sending emails purporting to be from reputable companies in
order to induce individuals to reveal personal information, such as passwords and credit card numbers.
U.S. Preparedness
- 56% believe the
United States was
fully unprepared for
the outbreak
COVID’s Effect in the U.S.
- Medical:
- Over 1 Million infected
- Over 70,000 dead
- Economic:
- 30 Million have filed for unemployment claims
- Stock Market Crash
- Businesses Forced to Close/File Bankruptcy
- Cybercrime:
- FBI complaints have risen from 1,000 a day to 3,000 to 4,000 a day
- Networks of government agencies and private companies compromised
- Surge attacks on The Pentagon, COVID-19 Research Centers
Allocation of Government Funds
- 93% believe
Medical
Care/Research
and Economic
Recovery should
be prioritized over
National Security
Defense Department Funding
- Current Budget of $738 Billion
- Defense undersecretary for acquisition and sustainment Ellen Lord is working with the White
House’s Office of Management and Budget to determine how much it will request in the next
COVID-19 funding bill
- House Armed Services Committee Chairman Adam Smith of Washington believes the $738 Billion
Budget should be enough for all their needs
- Does not support more funding for the Defense Department in the next recovery bill
- Earlier this year, the Pentagon reprogrammed $3.8 Billion to pay for the border wall
How COVID-19 Has Affected National Security
- 93% believe our
National Security
is more at risk
than before the
outbreak
Personal Interview Quote
“With any national or global crisis, there will be an uptick in hackers
and others that use cyberinfrastructure to exploit circumstances. As
such, I believe there will be (and has been) an increase.”
- Matthew Hayes, Xavier University CS Department
How COVID-19 Has Affected Personal Security
- 81% believe their
personal data is
more at risk than
before the
outbreak
Government Response to Attacks
- The outbreak has “exposed some genuine gaps in military planning and
readiness.”
- Former Assistant Defense Secretary Derek Chollet
- Navy is currently working to expand its servers’ ability to accommodate
more workers in the coming weeks
- The way our military thinks about warfare has been completely altered in the
face of cybercrime

More Related Content

Similar to National security during covid

There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxamrit47
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Hal Raveche, Barrons, 22 Sept 12
Hal Raveche, Barrons, 22 Sept 12Hal Raveche, Barrons, 22 Sept 12
Hal Raveche, Barrons, 22 Sept 12pberzins
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
HIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanHIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanDavid Sweigert
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Ethan S. Burger
 
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...mosmedicalreview
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]Lucy Kitchin
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMADavid Sweigert
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesPYA, P.C.
 

Similar to National security during covid (20)

There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Hal Raveche, Barrons, 22 Sept 12
Hal Raveche, Barrons, 22 Sept 12Hal Raveche, Barrons, 22 Sept 12
Hal Raveche, Barrons, 22 Sept 12
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
HIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanHIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response Plan
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
 
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
 

More from ShaynaBlum

S blum viscom2014
S blum viscom2014S blum viscom2014
S blum viscom2014ShaynaBlum
 
022019 the+pedagogy+of+design+and+technology+at+xavier+university+of+louisian...
022019 the+pedagogy+of+design+and+technology+at+xavier+university+of+louisian...022019 the+pedagogy+of+design+and+technology+at+xavier+university+of+louisian...
022019 the+pedagogy+of+design+and+technology+at+xavier+university+of+louisian...ShaynaBlum
 
Module 5 startup & product design, experiential marketing & cross cu...
Module 5  startup & product design, experiential marketing & cross cu...Module 5  startup & product design, experiential marketing & cross cu...
Module 5 startup & product design, experiential marketing & cross cu...ShaynaBlum
 
Module 4 product_design_brand_identity_marketing
Module 4 product_design_brand_identity_marketingModule 4 product_design_brand_identity_marketing
Module 4 product_design_brand_identity_marketingShaynaBlum
 
User experience design__design_process
User experience design__design_processUser experience design__design_process
User experience design__design_processShaynaBlum
 
Module 2 industry_terms_principles_of_design_5_ws
Module 2 industry_terms_principles_of_design_5_wsModule 2 industry_terms_principles_of_design_5_ws
Module 2 industry_terms_principles_of_design_5_wsShaynaBlum
 
Black Bombshell
Black BombshellBlack Bombshell
Black BombshellShaynaBlum
 
I Need a Place
I Need a Place I Need a Place
I Need a Place ShaynaBlum
 
Fashion x function
Fashion x functionFashion x function
Fashion x functionShaynaBlum
 
Ka lya ellis clean line
Ka lya ellis clean line Ka lya ellis clean line
Ka lya ellis clean line ShaynaBlum
 
Streaming in a pandemic 3
Streaming in a pandemic 3Streaming in a pandemic 3
Streaming in a pandemic 3ShaynaBlum
 
COVID 19 Social and Cultural Impact
COVID 19 Social and Cultural ImpactCOVID 19 Social and Cultural Impact
COVID 19 Social and Cultural ImpactShaynaBlum
 
Mental health before, during, and after covid 19 2
Mental health before, during, and after covid 19 2Mental health before, during, and after covid 19 2
Mental health before, during, and after covid 19 2ShaynaBlum
 
Efects of Covid 19 on Society
Efects of Covid 19 on SocietyEfects of Covid 19 on Society
Efects of Covid 19 on SocietyShaynaBlum
 
Covid 19 innovation powerpoint
Covid 19 innovation powerpointCovid 19 innovation powerpoint
Covid 19 innovation powerpointShaynaBlum
 
COVID-19 Wellness
COVID-19 WellnessCOVID-19 Wellness
COVID-19 WellnessShaynaBlum
 
X core (yellow)
X core (yellow)X core (yellow)
X core (yellow)ShaynaBlum
 
Covid 19 and Social interaction
Covid 19 and Social interactionCovid 19 and Social interaction
Covid 19 and Social interactionShaynaBlum
 
THE EFFECTS OF CORONAVIRUS ON EDUCATION
THE EFFECTS OF CORONAVIRUS ON EDUCATIONTHE EFFECTS OF CORONAVIRUS ON EDUCATION
THE EFFECTS OF CORONAVIRUS ON EDUCATIONShaynaBlum
 

More from ShaynaBlum (20)

S blum viscom2014
S blum viscom2014S blum viscom2014
S blum viscom2014
 
022019 the+pedagogy+of+design+and+technology+at+xavier+university+of+louisian...
022019 the+pedagogy+of+design+and+technology+at+xavier+university+of+louisian...022019 the+pedagogy+of+design+and+technology+at+xavier+university+of+louisian...
022019 the+pedagogy+of+design+and+technology+at+xavier+university+of+louisian...
 
Module 5 startup & product design, experiential marketing & cross cu...
Module 5  startup & product design, experiential marketing & cross cu...Module 5  startup & product design, experiential marketing & cross cu...
Module 5 startup & product design, experiential marketing & cross cu...
 
Module 4 product_design_brand_identity_marketing
Module 4 product_design_brand_identity_marketingModule 4 product_design_brand_identity_marketing
Module 4 product_design_brand_identity_marketing
 
User experience design__design_process
User experience design__design_processUser experience design__design_process
User experience design__design_process
 
Module 2 industry_terms_principles_of_design_5_ws
Module 2 industry_terms_principles_of_design_5_wsModule 2 industry_terms_principles_of_design_5_ws
Module 2 industry_terms_principles_of_design_5_ws
 
Rooted
RootedRooted
Rooted
 
Black Bombshell
Black BombshellBlack Bombshell
Black Bombshell
 
I Need a Place
I Need a Place I Need a Place
I Need a Place
 
Fashion x function
Fashion x functionFashion x function
Fashion x function
 
Ka lya ellis clean line
Ka lya ellis clean line Ka lya ellis clean line
Ka lya ellis clean line
 
Streaming in a pandemic 3
Streaming in a pandemic 3Streaming in a pandemic 3
Streaming in a pandemic 3
 
COVID 19 Social and Cultural Impact
COVID 19 Social and Cultural ImpactCOVID 19 Social and Cultural Impact
COVID 19 Social and Cultural Impact
 
Mental health before, during, and after covid 19 2
Mental health before, during, and after covid 19 2Mental health before, during, and after covid 19 2
Mental health before, during, and after covid 19 2
 
Efects of Covid 19 on Society
Efects of Covid 19 on SocietyEfects of Covid 19 on Society
Efects of Covid 19 on Society
 
Covid 19 innovation powerpoint
Covid 19 innovation powerpointCovid 19 innovation powerpoint
Covid 19 innovation powerpoint
 
COVID-19 Wellness
COVID-19 WellnessCOVID-19 Wellness
COVID-19 Wellness
 
X core (yellow)
X core (yellow)X core (yellow)
X core (yellow)
 
Covid 19 and Social interaction
Covid 19 and Social interactionCovid 19 and Social interaction
Covid 19 and Social interaction
 
THE EFFECTS OF CORONAVIRUS ON EDUCATION
THE EFFECTS OF CORONAVIRUS ON EDUCATIONTHE EFFECTS OF CORONAVIRUS ON EDUCATION
THE EFFECTS OF CORONAVIRUS ON EDUCATION
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

National security during covid

  • 2. Keywords Cybercrime: criminal activities carried out by means of computers or the Internet. The Pentagon: the headquarters building of the United States Department of Defense and a symbol of the United States military Phishing: the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  • 3. U.S. Preparedness - 56% believe the United States was fully unprepared for the outbreak
  • 4. COVID’s Effect in the U.S. - Medical: - Over 1 Million infected - Over 70,000 dead - Economic: - 30 Million have filed for unemployment claims - Stock Market Crash - Businesses Forced to Close/File Bankruptcy - Cybercrime: - FBI complaints have risen from 1,000 a day to 3,000 to 4,000 a day - Networks of government agencies and private companies compromised - Surge attacks on The Pentagon, COVID-19 Research Centers
  • 5. Allocation of Government Funds - 93% believe Medical Care/Research and Economic Recovery should be prioritized over National Security
  • 6. Defense Department Funding - Current Budget of $738 Billion - Defense undersecretary for acquisition and sustainment Ellen Lord is working with the White House’s Office of Management and Budget to determine how much it will request in the next COVID-19 funding bill - House Armed Services Committee Chairman Adam Smith of Washington believes the $738 Billion Budget should be enough for all their needs - Does not support more funding for the Defense Department in the next recovery bill - Earlier this year, the Pentagon reprogrammed $3.8 Billion to pay for the border wall
  • 7. How COVID-19 Has Affected National Security - 93% believe our National Security is more at risk than before the outbreak
  • 8. Personal Interview Quote “With any national or global crisis, there will be an uptick in hackers and others that use cyberinfrastructure to exploit circumstances. As such, I believe there will be (and has been) an increase.” - Matthew Hayes, Xavier University CS Department
  • 9. How COVID-19 Has Affected Personal Security - 81% believe their personal data is more at risk than before the outbreak
  • 10. Government Response to Attacks - The outbreak has “exposed some genuine gaps in military planning and readiness.” - Former Assistant Defense Secretary Derek Chollet - Navy is currently working to expand its servers’ ability to accommodate more workers in the coming weeks - The way our military thinks about warfare has been completely altered in the face of cybercrime