This paper discusses the different types of cyber-attack, current science and technology, effectiveness of Department of Homeland Security, and tools, tactics, and techniques made available by the organization. The different categories of cyber-attack, such as eavesdropping attack, XSS attack, password attack, SQL injection attack, drive-by attack, Man-in-the middle (MitM) attack, DoS, and phishing attack are discussed. The paper also highlights the extensive development in the field of science and technology and the effectiveness of the Department of Homeland Security in managing national cyber security risk. The tools, tactics, and techniques used by the organization to minimize illegal cyber activities, provide quick response to any cyber security incidents, and ensure reliability of a cyber echo system are also discussed.