Tuesday, October 29, 2019
U.S. Department of Homeland Security's Role in Combatting Research Paper
U.S. Department of Homeland Security's Role in Combatting Cybersecurity - Research Paper Example While comparing the present cyber war towards the reactive US approach nationââ¬â¢s major wars i.e. WWII or War on Terror, considerable changes in the same can be apparently observed. One of such changes can be ascertained in secret services along with information operations. In this present day context, these particular aspects became quite modernized as compared to the earlier years due to rapid technological advancements (Geers 9-158). The Criticalness of Cyber Security and DHSs National Role W/Obama Quote. On 12th February 2013, Obama passed an order to enhance the critical infrastructure of cyber security in the US. This order passed by Obama supported in building, developing as well as maintaining public-private relationships with other partners and operators to create risk based cyber security system by sharing different information. According to Obama, the role of cyber security and the Department of Homeland Security (DHS) is to improve the infrastructure of the framework of cyber security by transferring the required information related to the protection of cyber threats and following proper guidelines as well as rules (Waltzman, Giancarlo and Webb 1-4). This research paper intends to explain the responsibility of securing the nations and determine the infrastructure of cyberspace that can restrict in facing cyber threats or attacks on business and governmental policies. Apart from this, the research paper laid utmost focus on revealing the fact that the Department of Homeland Security must prioritize cybersecurity for ensuring the integrity of different nations, civilian and government networks as per the desired level. The research paper also deals with assessing the roles played by the Department of Homeland Security in the domain of cybersecurity. To address the above discussed aspects, the following objectives need to be attained: Comparison of Internal to External Threats (Government Accountability Office
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.