Thursday, January 2, 2020
Computers and Homeland Security Essay - 735 Words
Computers and Homeland Security After the terrorist attacks on September 11, 2001 security became a major concern for citizens and of course lawmakers. Unsure of what could happen next we were all afraid. Homeland Security encompasses policies, laws, organizations, and procedures designed to protect the rights and freedoms inherent in the US Constitution. Homeland defense which is sometime interchanged with Homeland Security deals with extra-territorial threats and preemptive operations (Parons Oja, 51). Governments in many countries are devoting significant resources to combat this growing threat. In the United Stats, the Department of Homeland Security, or DHS is responsible for reducing America?s vulnerability toâ⬠¦show more contentâ⬠¦(NSA.gov). Computerized language translation programs help English-speaking agents sift through communications in other languages. Homeland security agencies are taking steps to secure the national computer and communications infrastructure with programs that t arget individual computer owners, corporate computer networks, Internet service providers, and communications carriers. US-CERT was established in September of 2003. Its missions is to protect the nation?s Internet infrastructure (US-CERT.gov). It?s responsible for analyzing and reducing cyber threats and vulnerabilities, distributing cyber threat warning information, and coordinating incident response activities. US-CERT is the operational arm of the National Cyber Security Division (NCSD) at the Department of Homeland Security. It operates the National Cyber Alert System that identifies, analyzes, and prioritizes emerging threats, including viruses and intrusions (US-CERT.gov). Database Analysis Computers are a key tool in the fight against terrorism. Many experts believe that technology will be able to sort through mountains of data collected from intercepted phone calls, travel records, and watch lists. According to FCW.com, data mining and analytical software can be applied to databases to combine through vast amounts of digital information, discover patterns, and identify relationships that could indicate criminal activity. Similar technologies are commonly used byShow MoreRelated Computers and Homeland Security Essay836 Words à |à 4 PagesComputers and Homeland Security Homeland Security is one of the most important departments in the United States. The United States Department of Homeland Security job is to reduce our vulnerability to terrorism and lead a national effort to help prevent terrorist attacks on our nation (Computer Concept, pg. 50). As technology evolves over the course of time, computers end up playing a crucial role in homeland security. Computer systems are used throughout everydayRead MoreEssay about Computers and Homeland Security Unite794 Words à |à 4 PagesComputers and Homeland Security Unite Homeland security was created by the Bush administration in 2001 as a result of the September 11th events. It is an independent agency in the United States whose mission is to protect the nation from potential terrorist attacks. Together the agency is made up of twenty two agencies and 180,000 employees. Their main focus is ââ¬Å"intelligence and warning; boarder and transportation security; domestic counterterrorism; protecting critical infrastructure; defendingRead MoreAmerica And Its Homeland Security Online Essay1587 Words à |à 7 PagesAmerica and Its Homeland Security Online Abstract: Everyday security is provided by the states and federal government. These tasks get more difficult as new technology introduces itself. Cybersecurity is one of the most popular security sectors in todayââ¬â¢s world. There is not only cyberbullying going on in the world. Terrorism can be planned and sent from person to person over the internet. Peopleââ¬â¢s identities are being stole to help carry out these terrorist acts and this is just the being of itRead MoreElectronic Mail Acceptable Use Policy1054 Words à |à 5 PagesOperation of Information Systems/Computers directive. The Department of Homeland Security, Management Directive System MD Number: 4900 ââ¬Å"directive establishes the Department of Homeland Security (DHS) policy for the use and operation of DHS information systems and computers by individual usersâ⬠(Department of Homeland Security, n.d.). Department of Homeland Security, Management Directive System, MD Number: 4500.1 relates to DHS E-Mail Usage (Department of Homeland Security, 2003). This directive establishesRead MoreThe Impact Of Legislation On An Organization854 Words à |à 4 Pagesdecade, every individual, and organizations did paperwork with a typewriter and a cabinet or book shelf to store their files. These days our old ways is been replaced by computers and databases or cloud. This in order words mean that government organization like the department of veterans affairs do their workload with computer, databases as to the old days. This modern change makes some organization vulnerable to attackers. In other to reduce these treats from the attackers, cybersecurity rulesRead MoreThe Internet And Its Effects On The World Nation Itself853 Words à |à 4 PagesAs we all known, now in days almost everything that we see and everything that we do is throughout an electronic devise. No matter what small little thing, almost everything that you do is from a computer. For instance, to communicate with a family member (cellphone), to send a via-text, to check your e-mails, to watch television, almost everything is throughout a devise. For this same reason, government has to make sure that these devises are protected from any predator that would do bad with thoseRead MoreThe Department Of Homeland Security1602 Words à |à 7 PagesDepartment of Homeland Security The Department of Homeland Security is an agency made up of 22 different federal agencies which were combined in an effort to streamline the United States effectiveness in defending our nation. The core mission of the Department of Homeland Security include prevent terrorism and enhancing security, secure and manage our borders, enforce and administer our immigration laws, safeguard and secure cyberspace, ensure resilience to disasters (Department of Homeland Security, 2015)Read MoreCritical Infrastructure Protection1106 Words à |à 5 PagesProtecting an infrastructure takes an important security initiative called Critical Infrastructure Protection (CIP). The United States critical infrastructure is protected by the Department of Homeland Security. Examine three areas of the Department of Homeland Security: mission, operations and responsibilities The first area is the Department of Homeland Securityââ¬â¢s mission. The Department of Homeland Security (DHS) was created in 2002 by the Homeland Security Act. In 2003 the DHS started their operationsRead MoreProtecting Yourself Against the Treats of Cyberspace1022 Words à |à 5 PagesCyber Security It seems like everyone in todayââ¬â¢s society has access to a computer, a cell phone, or some other type of technology that allows information to be passed from one person to another through space. With your private information out there in cyberspace, clever thieves are finding ways to access your personal informational and to steal from you without you even knowing about it until it is too late. The thieves are taking your personal data and using it to gain access to your accountsRead MorePersonally Identifiable Information Essay1071 Words à |à 5 PagesUNDERSTANDING OUR RESPONSIBILITY REGARDING PERSONALLY IDENTIFIABLE INFORMATION IFSM 201 JULY 22, 2012 Abstract Anyone who uses computer technology today accepts the fact that their Personally Identifiable Information (PII) may or could be transmitted, collected, and used to benefit the one who receives that information. It is our responsibility to know what PII transmissions are being made available for public use over the web. Understanding all the aspects of PII and the approaches that are
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment