StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The US Department of Homeland Security - Research Paper Example

Cite this document
Summary
The paper "The US Department of Homeland Security" states that the nations’ relative approach or method to the cyber battle space and the traditional warfare can be included within DHS's strategic plan. This plan would help in combating the conduct of cyber attacks and traditional warfare…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
The US Department of Homeland Security
Read Text Preview

Extract of sample "The US Department of Homeland Security"

U.S. Department of Homeland Security& Apos; s Role in Combatting Cybersecurity I. INTRODUCTION Compare the Current Cyber War to the Reactive U.S. Approach Nations Major Wars I.E. WWII/War on Terror. Cyber threat is one of the most danger risks, which is being faced by the US. In recent times, more usage of computers and social media has certainly gauged cyber threats, which can be reduced by the correction of technical system as well as improving the structure of cyber security. Currently, the cyber war has been increased due to increased level of disturbances emerge in the computer networks and rising complexities that are prevalent within the operational or technological domain. While comparing the present cyber war towards the reactive US approach nation’s major wars i.e. WWII or War on Terror, considerable changes in the same can be apparently observed. One of such changes can be ascertained in secret services along with information operations. In this present day context, these particular aspects became quite modernized as compared to the earlier years due to rapid technological advancements (Geers 9-158). The Criticalness of Cyber Security and DHSs National Role W/Obama Quote. On 12th February 2013, Obama passed an order to enhance the critical infrastructure of cyber security in the US. This order passed by Obama supported in building, developing as well as maintaining public-private relationships with other partners and operators to create risk based cyber security system by sharing different information. According to Obama, the role of cyber security and the Department of Homeland Security (DHS) is to improve the infrastructure of the framework of cyber security by transferring the required information related to the protection of cyber threats and following proper guidelines as well as rules (Waltzman, Giancarlo and Webb 1-4). II. THESIS This research paper intends to explain the responsibility of securing the nations and determine the infrastructure of cyberspace that can restrict in facing cyber threats or attacks on business and governmental policies. Apart from this, the research paper laid utmost focus on revealing the fact that the Department of Homeland Security must prioritize cybersecurity for ensuring the integrity of different nations, civilian and government networks as per the desired level. The research paper also deals with assessing the roles played by the Department of Homeland Security in the domain of cybersecurity. To address the above discussed aspects, the following objectives need to be attained: To identify the reasons of recently occurring cyber threats and attacks in the US To recognize the best possible solutions to overcome cyber attacks on businesses and governments To assess the internal as well as external threats related to cyber attacks To assess the roles of DHS in mitigating cyber attacks To develop new methods for the improvement of cyber security III. ASSESSING THE THREATS POSED IN THE CYBER REALM Comparison of Internal to External Threats (Government Accountability Office 2012). In cyber realm, varied sorts of internal as well as external threats persist that are duly considered to be major threats. The cyber threats or attacks can arise due to more usage of internet for business or personal purpose and the problems prevalent in computer networks. The internal threats in relation to cyber realm are recognized as such threats that are occurred internally. On the other hand, external threats in the cyber realm are those threats that take place externally. The external threats can be occurred due to technological problems persist in cyberspace, problems in networks and also the presence of viruses in the same (Swan 1-18). In contrast, internal threats are regarded as the system operation threats as well as the problems related to wireless and wired network system. On the other hand, external threats in the cyber realm can be the threats rise from the activities conduct by the terrorists and also the emergence of chemical as well as biological attacks among others. External threats can also be the problems that prevail in the infrastructure of cyber security and the organizational structure or operational process. Criminal groups and the hackers can also be duly considered as the external threats in the context of cyber realm (Swan 1-18). Internal Threats: Dangers Posed By Employees Both Intentional/Unintentional. A computer threat is a serious risk, which might create problems in cyber realm or in cyber security. The threats related to cyber or computer can be intentional as well as accidental. In this regard, international threat is viewed to be such threat, which can occur through computer hackers or the illegal activities perform by the criminals. On the other hand, accidental threat is the threat that can happen through the occurrence of natural disasters such as fire and earthquake among others. Internal threats are mainly seen to prevail in the computer systems, networks, operating modules, wire based as well as wireless technologies and software applications among others. These internal threats can be intentional or unintentional as well as accidental (Ngoma 1-22). These threats might rose from the computer hackers or these can be occurred accidentally in the form of causing natural disasters. Unintentional or accidental threats can be occurred at any time. Therefore, the government of the US should take certain possible steps to reduce these sorts of threats for ensuring integrity amid the nations and the governments as well. The government should also develop effective strategic guidelines to ensure better infrastructure for reducing internal threats. Through the development in IT (Information Technology) infrastructure, it is anticipated that the intentional as well as the unintentional threats can be reduced by a certain level, as this helps to enhance knowledge as well as information related to management and operational process concerning efficient handling of such threats (Ngoma 1-22). External Threats: Criminal Groups/Hackers/Nations Reference Recent Sony Pictures Denial of Service. Cybercrime refers to the conduct of criminal actions or activities that are usually performed by criminal groups or hackers. Criminal groups and hackers contribute massively in generating external threats that can be segregated into two types namely intentional and unintentional threats. The external threats with reference to the recent Sony Pictures can be reckoned as the infrastructure and the web application problem. It has been apparently observed that Sony Pictures has experienced a cyber attack in the form of having attacks in its denial of service. In response, Sony got involved in using the technique of using its own hackers to mitigate the situation in the form of stifling websites that are identified to be spreading stolen files. This activity performed by Sony eventually deciphers the positive use of hackers in resolving the issue concerning cyber attack (Washington 1-40). Justifiably, criminal groups and hackers possess accurate knowledge or information about how to hack other systems and create problems in the operational systems (Washington 1-40). IV. ASSESSING DHSs ROLE IN CYBERSECURITY Federal Responsibility of Safeguarding National Assets. National assets or national wealth can be defined as total value of goods as well as services owned by the nations. National assets are regarded as quite important for serving national interests and ensuring greater stability in every domain. Thus, there lays the requirement of safeguarding national assets in an efficient manner. In this regard, for safeguarding the national assets, the Federal government needs to enhance the communication and information system by following common principles. Apart from this, the Federal government also requires to maintain confidentiality and privacy of following such guidelines to protect the national assets. The information about the national assets should be kept confidential and only be disseminated to the authorized officials (Washington 1-14). More importantly, the Federal should make better use of different operational models during the time of working together towards safeguarding the national assets and attaining the predetermined objectives of the nations. The Federal is also ought to improve the national strategy for promoting and securing information sharing for safeguarding the national assets. The national assets or wealth should be protected for the development as well as preserving the effectiveness of the nations. Therefore, Federal should develop the planning process and implement the protection plan to protect the national assets (Washington 1-14). International Responsibility in Defending the Infrastructure. There lays the presence of certain international responsibilities in the domain of defending or caring the infrastructure. In this similar context, the public-private relationship plays an indispensable part in defending the infrastructure. This relationship is also important to overcome the challenges created by the new technologies as well as threats of recent traditions. The infrastructure can be defended by forming, developing as well as maintaining proper collaboration with the government. By enhancing the information sharing system, infrastructure can also be protected. To protect the infrastructure, the government of the US developed the National Infrastructure Protection Center (NIPC). Notably, national strategy also plays an influential part in protecting the infrastructure of the organizations (Eckert 1-24). It will be vital to mention that for controlling the manufacturing costs of the organizations, the necessary infrastructure needs to be protected. Based on the different approaches of international responsibility, there must lay the requirement of developing a regulatory system to defend the infrastructure. By enhancing the international communication system and the rules as well as the regulations of the government, the necessary infrastructure can also be protected. Specially mentioning, the improvement in the international responsibilities and also the different leadership strategies internationally might aid in protecting the infrastructure by a considerable level (Eckert 1-24). Domestic Responsibility Educating the Nations Citizens. Education is regarded as an important aspect for every individual in this modern day society. Through education, people can improve their communication standards and also retrieve information related to their work. Therefore, educating the nations’ citizens has certain major domestic responsibilities to be performed. In this regard, one of such responsibilities can be implementing new strategies for safeguarding the interests of the citizens (United Nation 1-79). In relation to domestic responsibilities, innovative ideas and advanced technologies must be introduced for facilitating the education system of the citizens of the nation. Apart from this, one of the important responsibilities includes making deliberate efforts towards lessening the inequality prevalent within the education system of the nation. The respective government of the nation is ought to introduce new strategies for promoting national ownership, making the education to be a mandate for the citizens (United Nation 1-79). V. DEFINING THE WAY AHEAD FOR DHS CYBERSECURITY Development of Cyber Threat Intelligence Integration Center. Cyber threat intelligence integration center is regarded as a vital authority based on which, threats related to cyber or computer can be reduced. This intelligence center provides benefits in terms of reducing the threat of cyber security, therefore greater improvement and development of this intelligence center is required. This will certainly help in altering the model of the security system from reactive to proactive, making the communication system to get improved at large (Inside Cyber Security 1-2). Through the improvement of cyber threat intelligence center, the organizational process can be improved and the problems prevalent in the network systems can also be reduced at large. This is one of the prime ways of DHS cyber security through which future attacks can be protected. Through the development of this center, certain possible solutions and measurable actions can be recognized to protect cyber security by overcoming the threats of cyber attacks. The role of DHS in this regard mainly lay in protecting cyber security by improving the infrastructure of cyber as well as computer systems (Inside Cyber Security 1-2). Importance of Collaborative Vigilance across Federal/State/Local/Tribal Realms. The collaborative vigilance across tribal, local, state and federal realm is essential for developing the Homeland Security Strategic Plan, which has the possibility to reduce the conduct of cyber attacks and enhance the operations of cyber or computer systems. It is also important to safeguard the national as well as international infrastructure. It is essential for enhancing the intelligence security center and respond effectively towards the attacks perform by the terrorists (DHS 1-23). The above discussed formation of collaboration can easily understand the threats of the nation and also find out effective measures to protect such threats. This will also help in developing the communication level among the people. It is also important to protect the infrastructure and improve the leadership strategies for the development of the nations (DHS 1-23). VI. CONCLUSION Reiterate The Nations Relative Approach To The Cyber Battle Space And Traditional Warfare. The nations’ relative approach or method to the cyber battle space and the traditional warfare can be included within DHSs strategic plan. This plan would help in combating against the conduct of cyber attacks and traditional warfare. It is projected that the plan helps to identify the threats or attacks related to cyber that can be harmful for the computer systems (Inside Cyber Security 1-2). Tie Back To The Significance And Evolution Of Cyber-Attack Response Mentioned In Papers Thesis Statement. The development of DHS is essential to safeguard cyber security as the priority in future. It plays certain major roles based on which cyber attacks could be overcome. This plan is also important for enhancing the network systems and software applications as well. The major significance of this plan is to protect cyber security from the conduct of cyber attacks and also safeguard the infrastructure for future use (DHS 1-23). Link The Criticality Of The Nations Approach In Cyber Ops To The Potential For Success/Failure In The Future. The nations’ approach in cyber ops to the potential is mainly for attaining greater success in future. This particular approach or method of the nation might provide active support in safeguarding national security by the way of diminishing cyber attacks. It also helps in enhancing the communication system and maintaining the collaboration developed, which can prove to be beneficial for future development (DHS 1-23). Works Cited DHS. “Department of Homeland Security Strategic Plan”. Homeland Security. (2012): 1-23. Print. Eckert, Sue. “Protecting Critical Infrastructure: The Role of the Private Sector.” University of Pittsburgh. (2015): 1-24. Geers, Kenneth. “Strategic Cyber Security.” Cooperative Cyber Defence Centre of Excellence. (2011): 9-158. Print. Inside Cyber Security. “Fact Sheet: Cyber Threat Intelligence Integration Center.” Office of the Press Secretary. (2015): 1-2. Print. Ngoma, Sylvester. “Vulnerability of IT Infrastructures: Internal and External Threats.” Information Technology Educator. (2012): 1-22. Print. Swan, Darin. “Assessing Primary Cyber Threats to an International Airport’s Critical Information Systems.” University of Maryland University College. (2015): 1-18. Print. United Nation. “The United Nations Development Agenda: Development for All.” Goals, Commitments and Strategies Agreed At The United Nations World. (1990): 1-79. Print. Washington. “Cyber-Criminal Activity and Analysis.” White Paper. (2005): 1-40. Print. Washington. “National Strategy for Information Sharing and Safeguarding.” President of the United State. (2012): 1-14. Print. Waltzman, Howard W., Giancarlo, Angela E. and Webb, E. Brantley. “Improving Critical Infrastructure Cybersecurity: An Analysis of President Obama’s Executive Order.”Advanced In-House Counsel Course. (2013): 1-4. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“U.S. Department of Homeland Security's Role in Combatting Research Paper”, n.d.)
Retrieved de https://studentshare.org/miscellaneous/1682162-us-department-of-homeland-securityaposs-role-in-combatting-cybersecurity
(U.S. Department of Homeland Security'S Role in Combatting Research Paper)
https://studentshare.org/miscellaneous/1682162-us-department-of-homeland-securityaposs-role-in-combatting-cybersecurity.
“U.S. Department of Homeland Security'S Role in Combatting Research Paper”, n.d. https://studentshare.org/miscellaneous/1682162-us-department-of-homeland-securityaposs-role-in-combatting-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF The US Department of Homeland Security

Actions Againsts Terrorism

The US Department of Homeland Security Advisory Council has reflected on the threats of terrorism and proposed relevant recommendations.... department of homeland security Washington, D.... Actions Againsts Terrorism 3 REFERENCESUS Department homeland security Advisory Council.... This is very significant, while the state is engaged with friendly interactions among Muslim and Islamic societies, the security and safety of their territories as well as their people from potential risks and attacks should be a top priority....
2 Pages (500 words) Essay

United States Uniform Personnel Identification System

The major study of this thesis paper is to guarantee an impregnable security of the citizens of the United States of America through the introduction of unique Identity Cards displaying biometric holograms and microchip identifiers conjoined with the implementation of the.... ... ...
35 Pages (8750 words) Thesis

Homeland Security

It can be said that The US Department of Homeland Security came into being in the wake of the 9/11 terrorists to keep America safe from natural and man-made disasters.... The department of homeland security in US has an annual budget of more... If one were to define homeland security, it would be something like this : homeland security is the action taken by a domestic government to prevent, detect, respond to, and recover from terrorist attacks and also natural disasters....
4 Pages (1000 words) Research Paper

Effective Means of Homeland Security

This definition of the effectiveness of The US Department of Homeland Security constitutes of various facts such as: the security services cannot stop all the terrorist attacks from taking place, the services have to create a strategy for both the longer run and the shorter run and the services should counter terrorist activities while balancing citizens interests, minimizing financial cost and making sure that citizens freedom is never at stake.... The number one and the task that needs to be given high priority by the department of homeland security of US are to counter terrorist activities in the most effective manner....
2 Pages (500 words) Essay

Issues in Homeland Security

The US Department of Homeland Security, 24, PDF document.... The primary objective of the department of homeland security (DHS) is to ensure the security of the US from the terror attacks, emergencies, man-made hazards, and.... However, there are Issues in Homeland Security al Affiliation Issues in Homeland Security The department of homeland security is a special department under the administration of the US federal government.... The primary objective of the department of homeland security (DHS) is to ensure the security of the US from the terror attacks, emergencies, man-made hazards, and natural calamities and respond to it (Webster, 2008, p....
1 Pages (250 words) Essay

National Incident Management Systems

The transport security administration secure flight program the DHS does conduct a passenger watch-list matching of one hundred percent for covered United States plane operator as well as foreign air carrier planes that fly within, out of and into the US (department of homeland security, 2013).... eferencesDepartment of homeland security.... department of Labor , 2015).... department of Labor , 2015).... department of Labor ....
2 Pages (500 words) Essay

A Response to a Potential Terrorist Attack on Critical Infrastructures and Key Assets

According to The US Department of Homeland Security (USDHS, 2004, 2), the NIMS embody pertinent concepts, principles, terminologies and process required for the efficient coordination of all responding agencies in terms of preparing, responding and recovering (PRR) from all domestic incidents including terrorist attacks.... The scope of responsibilities in security and safety includes detection of any kind of intrusion and initiating appropriate actions to ward off and prevent harm or damage to the county, and in preparing, responding and recovering from potential terrorist attacks....
6 Pages (1500 words) Case Study

State Security and Peoples Liberty: The US Policy

As a result of this occurrence, The US Department of Homeland Security, the agency in charge of the security of the US, border patrol, counter-terrorism planning and implementation, as well as the other agencies of the government had to review and overhaul the intelligence system and strategies so that same or similar attacks would not happen again.... The other viewpoint suggests the creation of the Security Intelligence Service under the department of homeland security....
2 Pages (500 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us