The Roles of Computer Science Corporation in Homeland Security - Assignment Example

Comments (0) Cite this document
The paper "The Roles of Computer Science Corporation in Homeland Security" is focused on the peculiarities of the business led by CSC. Reportedly, Computer Science Corporation is a private firm that provides information technology services as well as professional services…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
The Roles of Computer Science Corporation in Homeland Security
Read TextPreview

Extract of sample "The Roles of Computer Science Corporation in Homeland Security"

Computer Science Corporation Virginia, USA 12345 11th Feb U.S. Department of Homeland Security
Washington, D.C. 205228
Dear Randy Ready
Re: The Roles of Computer Science Corporation in (CSC) Homeland Security
In response to the letter you wrote in regard to the private sector roles in Homeland security. I vindicate the following issues in reference to the above stated Company.
Computer Science Corporation is a private firm that provides information technology (IT) services as well as professional services. Its headquarters are located in Virginia. The role of the Corporation to the Department of Homeland Security (DHS) has solely been on the provision of information regarding threats to cyber infrastructure. The advancement of the likely threats as well as the trends of emerging cyber threats to the country have in many occasions been availed by the company with the sole purpose of combating these threats. In addition, the corporation is also in partnership with other companies in various ISACs where they share information acquired through various sources.
However, the company has faced numerous challenges. The quality of information received has been one of the major blows. Besides that, there have been legal constraints that have hampered sharing information since in case the information shared is flawed the corporation is likely to be sued. In addition, the shareholders are skeptical in investing in incentives infrastructure that are not geared towards profit making.
The DHS in collaborative effort should help in protecting companies in legal constraints that are related to situations where information availed is realized to be a flawed content. This will motivate various private entities in availing information without hesitation.
Student’s signature
Student Name Read More
Cite this document
  • APA
  • MLA
(“The Roles of Computer Science Corporation in Homeland Security Assignment”, n.d.)
Retrieved from
(The Roles of Computer Science Corporation in Homeland Security Assignment)
“The Roles of Computer Science Corporation in Homeland Security Assignment”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Roles of Computer Science Corporation in Homeland Security

Homeland Security

...?Running Head: HOMELAND SECURITY Homeland Security In America, homeland security has always been a matter of concern long before the September 11 attacks. For decades, national and international terrorist groups have attacked the homeland of America to disrupt its internal interests and facilities. These events did not create many waves and so any programs regarding counterterrorism did not fetch much help from the government. Only the massive and destructive nature of the September 11 attacks in 2001 managed to shake the US Federal government out of its torpor to make terrorism a major issue in public, political and...
8 Pages(2000 words)Research Paper

Organizational communication strategies

10 Pages(2500 words)Essay

Homeland Security basis for carrying out extensive searches on the communication patterns and even banking accounts. References Bazan, E.B. (2008). The foreign intelligence surveillance act: Overview and modifications. New York: Nova Science Publishers, Inc. Darmer, K. (2004). Civil Liberties VS. National Security. New York: Prometheus Books. Doyle, C. (1996, June 9). Antiterrorism and Effective Death Penalty Act of 1996. Retrieved January 28, 2011, from Scientist Federation of American: Howard, R.D., Forest, J.J. and Moore, J.C. (2006). Homeland security and terrorism: Readings and interpretations. New York: McGraw-Hill Hulnick, A. S. (2004)....
9 Pages(2250 words)Assignment

Effective anti-terrorist tactics/organizations

...disregard the commencing of international trade and commerce, on similar grounds stand the Far-right extremists who consider globalization a conspiracy and are against the concentration of power, and then there are the Radical Environmentalists who disparage capitalism, and consider the corporate power a threat to the whole planet (Bennett, Hess & Orthmann, 2006). These threats are not only critical for the national security, but also for the economic growth, and the sustainability of the private sector (Bennett, Hess & Orthmann, 2006). The most effective American Anti-terrorist Organization: Post 9/11 attacks, the initial priority of the President George W Bush JR. and the Congress was to improve the...
12 Pages(3000 words)Research Paper

Information Management and Information Technology

..., there was extensive use of networks to disseminate information, and there emerged the role of network managers whose main role was to manage information that was being disseminated through the electronic and computer systems. This individuals performed complex work, such as management of computer software’s and hardware’s (Lucey, 2005, p. 37). On this note therefore, information management is a powerful mechanism of controlling information, and it is essential for large business organizations to have a department of information management. In summary, information management involves mechanisms put in place to retrieve, organize, acquire, secure and maintain information. Information technology on the other hand involves the use... in the...
10 Pages(2500 words)Essay

Homeland Security

...will focus on cyber security threat that has been a challenge to the United States of America’s Homeland security. Cyber security Cyber threats have been a challenge, both in past and present, to the United States. The policy makers and the Department of Homeland Security have been working hard to deal with issues relating to cyber security. The fight has been backed up by the use of technology that is ubiquitous and heavily relied on in present day life activities like personal and professional pursuits, building processes of the corporate and supporting the activities of the state. The items built by...
5 Pages(1250 words)Case Study

Homeland Security

...HOME LAND SECURITY: AN ANALYSIS ON OSAMA BIN LADEN AND HOME MADE JIHADISTS of unit Osama bin Laden’s intended strategies in response to the “Arab Spring When the Arab spring sprout Osama bin Laden viewed the events as an opportunity to spread his ideology to the Muslim world. From his letter, several facts arise in relation to his intentions and strategies to the Muslim world. Osama viewed himself as a person with the role of guiding the Muslims not to settle for less solution that he referred to as half solutions1. Osama wanted to use the media to incite parts of the Muslim world so as to rise and rebel against their rulers whom he viewed as being oppressive and with western ideologies towards the...
2 Pages(500 words)Essay

Roles in homeland security

...ROLES IN HOMELAND SECURITY The term homeland security is an umbrella phrase used by Americans to refer to the coordinated effort by the entire nation so as to have a homeland that is secure, safe, and one that can withstand terrorism and other dangers so as the Americans aspirations and interests, and the way they live can develop well through the efforts of the nation to hinder terrorist attacks within the US, minimize the vulnerability to terrorism, and reduce the damage that results from the attacks that do happen (Bullock, et al 2012). The term came about in 2003 when many agencies of the government were reorganized...
5 Pages(1250 words)Essay

Homeland Security

..., it uses outdated technologies in its disaster response programs in spite of the $ 14 Billion allocated to FEMA (Kramer & Hellman, 2013). The lack of oversight has allowed it to engage in fiscal mismanagement. For instance, its new Washington D. C headquarters had $ 1.5 billion in cost overruns while it recorded $ 8.7 billion in unearned employee overtime (Ehley, 2014). The generous budgets allocated to the Transportation Security Agency and the Department of Homeland Security should be subject to reductions. The subsequent savings should focus on other activities that can have a more direct impact on enhancing the ability of this country to prevent the occurrence of another terrorist...
7 Pages(1750 words)Essay

Reconstructing the Homeland Security Department for the 22nd Century

...of Homeland Security Act of 2002 in November, 2002 (“DHSA2002”), creating a new United States government department which involved the largest restructuring of government in over fifty years. Over 150,000 employees in over 25 bureaus and directorates were a part of this new agency of the government and although the final structure of the Department of Homeland Security was to remain in flux, it was expected that the new department will act to band together the functions of widely disparate government entities in order to transform homeland security and provide a higher level of security to the Americans from a number of...
16 Pages(4000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic The Roles of Computer Science Corporation in Homeland Security for FREE!

Contact Us