Columbia Southern DNS Terrorist Attack Disaster Management Presentation –

Other –

Columbia Southern DNS Terrorist Attack Disaster Management Presentation –


For this assignment, you will build off of the information that you provided in the assignments for Units IV and VI to compose a 20- to 25-slide PowerPoint presentation. Your presentation should present your briefing of the hypothetical terrorist incident that you selected in Unit IV. Make certain to include the following elements in your presentation:

  • Include an executive summary.
    • The summary should be a high-level briefing or overview of your selected critical infrastructure and the type of hypothetical terrorist incident that has taken place. This should be written to briefly capture who, what, when, where, why, and how.
  • Provide an overview of the targeted location.
    • Incorporating your Unit IV Project Topic, discuss the location that was attacked, the significance of the location to the critical infrastructure, why the location was vulnerable, and why the location was targeted.
  • Provide an overview of the attack methods used in the incident.
    • Discuss the hypothetical attack and the specific attack methods that were employed.
  • Explain the roles and responsibilities of all parties involved.
    • Outline the roles and responsibilities of various federal, state, and local agencies and governmental and non-governmental homeland security personnel that should be involved in prevention, protection, mitigation, response, and recovery of and from your chosen incident.
    • Discuss why it is important to protect critical infrastructure/high-value targets.
  • Identify the response plan’s strengths, weaknesses, opportunities, and threats (SWOT) by creating a SWOT analysis.
    • What are the strengths of the critical infrastructure in regard to its stability against terrorist incidents? What weaknesses or vulnerabilities did you find with the critical infrastructure? What opportunities do you see for the future to prevent similar incidents from happening? What threats to the critical infrastructure still exist?
  • Include a conclusion.
    • Develop a brief conclusion that addresses the overall value of this type of exercise as it relates to your current or desired position.

For additional guidance on how to perform and format a SWOT analysis, refer to the example on the webpage below, which shows how to present the information in a bulleted list:

Mind Tools. (n.d.). SWOT analysis: Discover new opportunities, manage and eliminate threats. Retrieved from

Since you will not be presenting this PowerPoint to your instructor in person, you will need to utilize the slide notes function to further explain the contents of your slides. Bold, italicized, or underlined text should be used sparingly on slides in order to maximize the prominence of key points. Each slide should address a single concept, and slides should follow a logical progression, each building on the other.

Provide in-text citations and a reference slide for any outside sources that are used, including direct quotations, paraphrased words or ideas, tables, data, and images. The title and reference slides are not included in the required slide count.