Description
Student are required to write an analytic paper, 12 page (double spaced, Time New Roman font). in length, NOT including the cover page and reference page. You may select any topic that relates to Homeland Security that is of interest to you. Keep in mind that this is an analytic research paper so it should not be overly descirptive. You should therefore construct your paper around a specific question/thesis.
Explanation & Answer
Attached.
Running Head: CYBERSECURITY
1
Full Title:
Student Name:
Institution:
CYBERSECURITY
2
WHY IS CYBERSECURITY VITAL IN HOMELAND SECURITY?
Introduction
Cybersecurity also known as information technology security refers to ways of protecting
computers, programs, networks and data from unauthorized access and attacks that are aimed for
exploitation.it mainly covers four areas namely: Application Security, Information Security,
Disaster Recovery and Network Security.
Homeland security is an American National Security that ensures a homeland that is safe, secure
from terrorism and other security threats that may affect the American citizens.
Cybersecurity is a very important aspect to critical infrastructure protection, which is essential to
the homeland security that safeguards the United States from domestic catastrophic destruction.
A well planned and well-coordinated cyber-attack on essential infrastructure could lead to the
worst catastrophe in US history.
Body
How cybersecurity and Homeland Security Intersect
Cybersecurity is listed among the main pillars of Homeland Security’s work alongside other
aspects such as intelligence and national defense.
The three main way in which intersection occurs are:
1. The National Defense and Cybersecurity
Threats made against the country are handled by the Department of Homeland Security and, in
today's world, most of the cyber threats causing concern are exactly of this nature.
In the current world, most people are more worried about individuals who hijack our networks
than those with the ability to hijack our flights.
CYBERSECURITY
3
This has led to merging of efforts between the cybersecurity specialists and the DHS at this
particular time in history. Items under protection mainly are the country’s transportation, energy,
diplomacy, and even the power grid. The hacking of these items could cause a major effect on
the security and operations of the nation.
Homeland security and cybersecurity engage in teamwork to monitor the internet and social
media for terrorist activity. The cybersecurity teams will follow up on the online trends and
activities then report their findings to the Homeland Security who respond effectively to these
threats to keep the country safe.
Homeland Security also helps in Looking into the future cybersecurity threats through putting up
of events such as “Terrorism Prevention”, an event which Secretary Nielsen describes as a way
“to better crowd-source our defenses against terror” in collaboration with, law enforcement,
social service providers, and others who have insight into this effort.
These events provide opportunities for professionals in the two industries to work together and
also giving cooperate, employees, a chance to help in the creation of policies and technology that
will help in safeguarding the country in future
2. Roles of Homeland security and cybersecurity within technology companies
There are many cases in which homeland security agents and cybersecurity specialists
collaborate with specialists in technology companies who have similar data-protection goals.
As much as Tec companies are mostly working to protect their customers instead of the national
data, it doesn’t hinder Homeland Security and the government’s cybersecurity teams from
relying on these experts’ knowledge and skills to help in offering security to the country.
CYBERSECURITY
4
3. Enforcement of cybersecurity practices and policies by Homeland Security
Citizens might know some acts of government legislation established to secure the nation (e.g.
the ‘Patriot Act’) but there are other existing policies, algorithms, and regulations put in place
and enforced by Homeland Security that people are not familiar with. This is especially true in
regards to cybersecurity.
Teams of cybersecurity experts from homeland security usually take years working on protocols
and systems to secure the country, especially after learning from a threat they were not prepared
for in the past.
A large population in America is dependent on the internet in their day to day activities, critical
services, and economic prosperity. Quick and massive growth in Internet access and networked
devices has promoted a lot of opportunities and innovation. This high level of connectivity to the
internet, however, has also introduced a lot of cyber risks for the United States and its citizens. A
Lot of serious threats are evolving as nation-states, terrorists, individual criminals, transnational
criminal organizations, and other malicious actors have migrated their activities into the digital
world. Introduction of the delivery of essential services such as electric power, finance,
transportation, water, and health care through the internet or Cyberspace also brings about new
vulnerabilities and creates a room for potentially catastrophic consequences from cyber
incidents. Increase the number of devices connected to the internet and dependence on global
CYBERSECURITY
5
supply chains has complicated the national and international risk picture. Cybersecurity is one of
the main aspects of homeland security’s core missions of the U.S.
Goals of Homeland Security in Cybersecurity
1. Assess evolving cybersecurity Risk
To understand the evolving cybersecurity risks to be able to manage and overcome the
new risks that evolve.
2. Secure the Governments information System
This is through the reduction of vulnerabilities to ensure the achievement of an adequate
level of cybersecurity
3. Protect Critical Infrastructure
This will be done by having partnerships with key stakeholders to ensure the
cybersecurity risks are adequately managed.
4. Prevent and disrupt criminal use of cyberspace
5. Respond Effectively to Cyber Incidents
This is through the establishment of proper coordination among the agencies and other
stakeholders.
6. Strengthen the security and reliability of the cyber ecosystem
7. Improve the management of DHS cybersecurity activities.
CYBERSECURITY
6
Guiding Principles
For Homeland Security to attain the cybersecurity goals it has to align its departmental activities
with the following guiding principles:
1. Risk prioritization.
The first and foremost thing is to safeguard the American citizens and prioritize efforts to
concentrate on systemic risks and major cybersecurity threats and vulnerabilities facing
citizens and homeland.
2. Cost-effectiveness.
Cyberspace is complicated and Homeland security focuses on increasing cybersecurity often
should be evaluated and put first to ensure the best outcomes for investments are put in place.
3. Innovation and agility.
Cyberspace brings up a domain with new risks showing up. Although technology leads to
new risks, it also creates room for innovation. Homeland Security must lead by example in
remaining agile in its efforts to keep up with evolving threats and technologies.
4. Collaboration.
Internet growth has been driven by the private sector and the security of cyberspace is cutting
across challenges. To accomplish cybersecurity goals, work must be done collaboratively.
5. Global approach.
international engagement and collaboration are needed to attain national cybersecurity goals.
Homeland security must participate internationally to control global cyber risks.
6. Balanced equities.
CYBERSECURITY
7
Cyberspace encourages people and causes prosperity in the entire world. Cybersecurity is not
an end unto itself, and efforts to mitigate cybersecurity risks must also support international
commerce, strengthen international security, and foster free expression and innovation.
7. National values.
Homeland Security must maintain privacy, civil rights, and civil liberties according to laws
and policies. It encourages cybersecurity programs to attain success by enhancing privacy
protections from the outset and employing a layered approach to privacy and civil liberties
oversight.
Why cybersecurity is vital for homeland security
The United States encounters thousands of threats from terrorist groups, foreign states and
governments, and individuals who want to cause chaos. Homeland Security's mission of
protecting American interests and property has become more difficult in the past years. The
linking of critical systems, large vulnerabilities in network security, and the sheer volume of
information to be processed all highlight the evolving nature of threats Homeland Security must
address daily. Homeland Security is adapting to the increase in cyber threats and tools utilization.
Infrastructure is a major target for cyber-attacks, in both harsh governments and cyber-terrorist
groups. Homeland Security came up with 16 sections of the economy and society that might be a
target of cyber-attacks. A prosperous, large scale cyber-attack on any of the 16 sections could
lead to America's life alteration for moths, causing vulnerability of the United States to
traditional assaults. The purpose of vulnerability is an outdated industrial control system that was
installed with the infrastructure some years back when almost every system had its network
facility. The last ten years and above, efforts have been made to digitize and automate important
CYBERSECURITY
8
systems, which violated the system which had their networks by tying it into a larger computer
network. Since the computer network is attached to the internet, hackers can alter the industrial
control system and wreak havoc on everything from the power grid to transportation networks
and more.
Sony, JP Morgan Chase has been affected by data breaches in more than 4years in the past. This
resulted in hedge loss of a lot of customer data. Recent studies indicate that the data loss cost the
company more than $3.8 million. The loss of Data concerns Homeland security due to certain
reasons:
•
ill-gotten data can be utilized by hackers to steal identities of unsuspecting people, leading
terrorist to raise money that will facilitate their illegal activities.
•
A lot of investments should be directed into insurance premiums and security upgrades, plus the
cost of reconfiguration of servers passing across information to clients/customers on any data
breach.
•
Hidden costs, like the erosion of public opinion and destruction of the brand, lead to long-term
financial problems for American companies.
Combat Cybercrime and Improve Incident Reporting
Federal departments and agencies in conjunction with other government entities, perform a big
role in the detection, prevention, disruption, and investigation of cyber threats the Nation. Most
often, the U.S is always the victim of malicious cyber activity carried out by an individual,
including citizens and non-citizens and their proxies and terrorists using network infrastructure
within and outside the U.S borders. Federal law enforcement carries out its functionality to
apprehend and arrest or capture criminals, make criminal infrastructure nonfunctional, prevent
CYBERSECURITY
9
the spread and utilization of nefarious cyber capabilities, hinder cybercriminals and other
offenders or terrorists from benefiting from their illegal actions and activities, and seize their
assets. The Administration will ensure that our Federal departments and agencies can easily
access the necessary legal authorities and materials to combat transnational cybercriminal
activity, including identifying and dismantling botnets, dark markets, and other infrastructure
used to enable cybercrime, and combatting economic espionage. To stop these cyber threats, the
enforcement of the law will collaborate with private industry to face challenges brought by
technological hinders, such as anonymization and encryption technologies, to get time-sensitive
evidence under appropriate legal process. Law enforcement actions to combat criminal cyber
activity presents itself as an instrument of national power, among other things, deterring those
activities.
Managing National Cybersecurity Risk
Homeland Security must come up with and establish innovative ways to exploit our broad
resources and skills within the Department and the homeland security enterprise to control and
be able to manage national cybersecurity risks. There are five identified pillars of Homeland
Security wide risk management approach. With the help of the goals identified across the five
pillars, work is done to ensure availability of important national functions and propel efficiency,
innovation, trustworthy communication, and economic success in ways that are consistent with
the national values and that protect the privacy and civil liberties.
The first pillar is to have a good rather better understanding of the national risk position. Having
a good understanding of the risks at the strategic level will cause us to effective allocation of
resources and give priorities on efforts to address vulnerabilities, threats, and consequences
CYBERSECURITY
10
within all cybersecurity activities. In the second pillar up to pillar four, the focus is on reducing
vulnerabilities, threats, and the possible consequences from cybersecurity occurrences.
Homeland Security gives a lead on national efforts to secure 4 federal information systems,
critical infrastructure, and other systems affecting national security, safety, and public health.
The protective efforts are mainly to reduce organizational and systemic vulnerability to
dangerous cyber activity and empower stakeholders to make informed risk management
decisions and to improve their cybersecurity. Law enforcement component works hand in hand
throughout the law enforcement community, to minimize threats by aggressively looking into,
tempering with, and overpowering criminal individuals and companies that utilize cyberspace to
practice their illegal activities. To reduce the consequences of cyber incidents, Homeland
security uses its experience and capabilities in emergency control and also to our network
protection and law enforcement capabilities. Homeland security carries out the main role in the
federal response to many cyber incidents, which in one way or another may involve physical
consequences or may not. Homeland Security collaborates with other federal agencies and
stakeholders to reduce impacts and make sure that lessons acquired from incidents are included
in future risk management strategies. Finally, Homeland Security also works to give enough
support to cybersecurity risk control and management results under the fifth pillar approach
through efforts targeted at making cyberspace more defensible. This incorporates efforts to beef
up the security and reliability of the overall cyber ecosystem and align our internal cybersecurity
efforts. Homeland Security seeks to bring to light security innovations that are advantageous to
those securing networks, and also to spearhead research, development, and technology transfer
efforts. Since cyberspace is globally inherent, Homeland Security works hand in hand with the
international community to build mass, fight for best practices, and foster responsible
CYBERSECURITY
11
international character to make sure that the Internet interment is not closed interoperable,
secure, and reliable. Homeland Security also gives priorities to the efforts that address
cybersecurity workforce challenges and encourages organizations to recruit, hire, develop, and
keep hold of individuals with a lot of skills in cybersecurity. Through these great efforts across
Components, Homeland Security works to shift the advantages away from malicious cyber
attackers and to those working to reduce national cybersecurity risks. Attaining the known
cybersecurity goals will prevent malicious cyber activity by denying access to. The main goals
and objectives in this strategy are to ensure that Homeland Security is utilizing well its resources
to attain impactful policy and operational results as part of a national cybersecurity risk
management approach.
Challenges facing federal Agencies in Cybercrime Homeland Security
1. Absence of assets, including innovation, IT experts and cash.
2. Moderate acquisitions, beca...