4 4Raise your hand when you want to give an answer. The judge must call on you before you answer. 4 4You have 5 seconds to answer from the time you.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

WMD Crime Scene Management
NATO – Credit level Exam Practice NATO in the exam Remember that NATO is an organisation concerned with military and defence issues. Do not discuss NATO.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Copyright © Allyn & Bacon 2010 Global Social Problems: War and Terrorism This multimedia product and its contents are protected under copyright law. The.
Entrepreneurship Delivered in: The Islamia University Bahawalpur Presented By: Tasawar Javed.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Economic Indicators Business Cycle.
JUNIOR SAILOR ADVANCEMENT WORKSHOP (JSAW) CTO1(SW) Germean Porter NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
Principles of Patrolling Applying Ranger School Lessons to Information Security Patrick Tatro.
Assessment Approaches: Social Indicator, Spatial, and Power Analysis.
THE CFATF MUTUAL EVALUATION PROCESS (IN A (SMALL) NUTSHELL) Robin Sykes Financial Investigations Division.
CYBER CRIME AND SECURITY TRENDS
A PowerPoint Game By Manuel Burton Evangelical Christian School
Network security policy: best practices
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Nuclear Weapons By: Adebayo Amusu Foreign Policy.
Force Protection. **Definition of terrorism “the unlawful use or threatened use of force or violence against individuals or property to coerce,
Information Security Issues at Casinos and eGaming
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Life, Money, and You Ms. Grinde.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Water Matters! Jeopardy Game Review of the Water Matters! Curricula Grades 6-8.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Security Risk Management
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
2003 Fusion Player Meeting. Introductions Who are you? What school do you go to? Who is your favorite NHL player? What do you like to do outside of hockey?
Antiterrorism. Learning Topics Introduction Identifying and selecting targets Regions Levels Vigilance Don’t be a target Responding and reporting Detection.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
Indicators of Terrorist Activity Handbook US Coast Guard Headquarters Port Security Evaluation Division (CG-3PCP-4)
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 19: Community Preparedness: Disaster and Terrorism.
Canada’s Critical Infrastructure: Stay Calm and Get on with it…. Andrew Graham School of Police Studies Queens University 1 The Future of Security: Anticipating.
© Mark E. Damon - All Rights Reserved Another Presentation © All rights Reserved
Integrated Pest Management. Learning Objectives 1.Define IPM (Integrated or Insect Pest Management). 2.Describe why IPM is important. 3.Describe what.
Navy Doctrine for ATFP NWP HM1 (SW/AW) Alburg.
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP
STEP 4 Manage Delivery. Role of Project Manager At this stage, you as a project manager should clearly understand why you are doing this project. Also.
Computer security By Isabelle Cooper.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
Resources for Paraeducators Website
Understanding the Threats of and Defenses Against Cyber Warfare.
EC week Review. Rules of Engagement Teams selected by instructor Host will read the entire questions. Only after, a team may “buzz” by raise of.
Four Corners Each corner has a sign: strongly agree, agree, strongly disagree, disagree Walk to the corner that describes how you feel about each statement:
TEFMA 2008 Sudhish Nayyar. AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities.
Computer Security By Duncan Hall.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Week 4 Seminar Investigating Significant Injuries and Lessons Learned.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
OCTAVE By Matt White. OCTAVE  OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a risk-based strategic assessment and planning.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Disaster and Emergency Management
and Security Management: ISO 28000
Understanding the Threats of and Defenses Against Cyber Warfare
COMP3357 Managing Cyber Risk
FORCE PROTECTION.
Strategic threat assessment
Cyber Security in a Risk Management Framework
CYBERTERRORISM.
Presentation transcript:

4 4Raise your hand when you want to give an answer. The judge must call on you before you answer. 4 4You have 5 seconds to answer from the time you are called on or until the question has been completely read. 4 4If you miss an answer the other teams have 5 seconds to guess. If no one gets the correct answer, the last team to control the board will choose the next question. 4 4There are two “DAILY DOUBLES” on the board. You can risk up to double the amount of the question. 4 4The team with the highest money total will win. Remember, you are competing against 2 other teams.

Terrorism Definitions Threat Level/ Threat CON Protective Measures Terrorist Operations JUST FOR FUN $100 $200 $300 $400 $400 $400 $100 $100 $100 $200 $200 $200 $200 $300 $300 $300 $300 $300 $500 FJ Things that go BOOM!

$100 Answer : ? Who is Anyone or All? Terrorism can happen to _________ types of people or groups.

$200 Answer : ? What is False? True or False,.. Most Terrorists are Crazy or Mentally Disturbed.

$300 Answer : ? What is Cyber Terrorist? This type of attacker poses threats to military computer systems and networks and includes “hackers” and “crackers”.

$400 Answer : ? This is performed to assess critical assets and their vulnerability to terrorist attacks? What is Vulnerability Assessment?

$500 Answer : ? This product resulting from the collection, processing, integration, analysis, evaluation, and interpretation of available information concerning countries or areas is gathered to help plan against Terrorism What is intelligence?

$100 Answer : ? What is 5? The number of THREAT CONDITIONS (Now called Force Protection Conditions).

$200 Answer : ? What is FP CON BRAVO? This FP CON is defined as “more predictable threat exists” and the “Posture can be sustained for weeks or months”

$300 Answer : ? What is classified? Documents containing the protective measures, guard/ access procedures, barrier plans, RAMs, and specific locations as related to a specific FP CON is now _____________.

DJ $400 Answer : ? What is LOW, MODERATE, SIGNIFICANT, & HIGH? The 4 Threat Levels are:

$500 Answer : ? What is FP CON NORMAL? The 1st of the 5 Threat CONs that will not be applied to European Locations

$100 Answer : ? What is Bombing? The most common Terrorist Attack method

$200 Answer : ? Who is everyone? Who should play a role in battle tracking?

$300 Answer : ? What are Weapons of Mass Destruction? Terrorists could use __________ to overwhelm emergency response teams, create panic, take massive casualties, and cause loss of faith in the Governments ability to protect.

$400 Answer : ? What is Assassinations? One of the oldest tactics, in which the pre-selected victim could be a symbolic target or a political figure or even a vengeance target?

$500 Answer : ? Who is the bomb maker? The planting of the device or bomb is usually never done by this person. person.

$100 Answer : ? What is vary your routine? Or: Route of travel? Easy way to not become predictable when traveling to and from Work. to and from Work.

$200 Answer : ? What is a HARD target? Being aware of your surroundings, varying your routine maintaining a low profile etc. helps make you this?

$300 Answer : ? What is “Window” and “Middle” of the plane? The best place to sit on an airplane or jet is a__________seat in the __________of the plane.

$400 Answer : ? What is “RAM” or “Random Antiterrorism Protective Measures?” Selected security measures from higher Threat CONs which are randomly implemented during lower Threat CONs. randomly implemented during lower Threat CONs.

$500 Answer : ? What is Individual Protective Measures ? IPM stands for this?

$100 Answer : ? What is ARSON? Other than Bombings, this type of common attack is Other than Bombings, this type of common attack is characterized as: Low risk, Inexpensive, and Lethal?

$200 Answer : ? What is Simple? Terrorist operations are normally DYNAMIC and this:_______. A. Explosive B. Quick C. Simple D. Sophisticated

$300 Answer : ? What is Kidnapping? This type of terrorist attack is Very Covert, Difficult to carry out unless very well supported, easily gains media attention, and provides a “Bargaining chip”

$400 Answer : ? What is the Stockholm Syndrome? This response to being taken hostage is defined as becoming sympathetic towards the captives cause? An example of this was with Patty Hearst

DJ $500 Answer : ? What is the “Negotiation” Phase? This sometimes 5th phase of a Terrorist attack occurs primarily during Kidnapping and sometimes Sky or High Jacking.

$100 Answer : ? These usual don’t have return addresses on them. What are mail bombs?

$200 Answer : ? The Canary islands are named after this animal. What is a dog?

$300 Answer : ? When walking with a Senior military person, I should be on their _____side. What is their LEFT?

$400 Answer : ? Bombs may DEACTIVATE, but units do this when they are shut down permanently. What is INACTIVATE?

$500 Answer : ? What is the ARTILLERY? The ARMY Song was actually written by member s of and for this Branch of the Army

CATEGORY: Terrorist Operations

GOFOR IT ! Decide as a team what you are going to risk and try to beat the final score(s) of the other team(s), assuming they come up with the correct question and bet all their money on Final Jeopardy. IT FOR GO

$ ALL THE MARBLES Answer : ? What is SURVEILANCE? The “Pre-Incident” phase of an operation is the most secure phase for the terrorist and includes planning, rehearsals and this: __________.

DAILY DOUBLE ?

DAILY DOUBLE ?