Different Methods the DHA Can Provide Privacy and Protection from Cybercrimes
This summative assignment represents the Capstone Project of the entire Homeland Security and Emergency Management degree program. For this assignment, conduct research on a Homeland Security and Emergency Management topic utilizing the steps of the scientific method. This assignment will have incremental assignments to submit during Week 1 and Week 2 of this course in order to ensure that you are progressing in proper research methodology and scope. The research question and hypothesis approval is due in Week 1 and a literature review will be due in Week 2. These assignments support the project, but they are graded separately and retain their own values separate from the Capstone Research Project.
Conduct an original research project in one of the following topic areas. For reference purposes and review, these key homeland security areas and sub-disciplines can be reviewed at the U.S. Department of Homeland Security (Links to an external site.) website
Homeland Security Activities and Programs in Cybersecurity and Privacy Protection
Name
Institution Affiliation
Course
Instructor
Date
Homeland Security Activities and Programs in Cybersecurity and Privacy Protection
Introduction
Cybersecurity and Homeland security are two distinct disciplines at critical junctures in critical situations. Exploring the nexus of homeland security and cybercrime is essential for prospective homeland security experts contemplating a cyber-concentration in their career path. Individuals interested in other specializations such as criminal law, intelligence, or domestic security are attracted to these fields. Still, only a very particular subsection of these people will possess the necessary skills, academic qualifications, and a broad array of interests to prosper in the cybersecurity industry (Beckner, 2021). The kind of people who will be attracted to the disciplines is equally interested in the tech of cyberspace since they are to protect the Nation. A significant portion of the United States government's cybersecurity apparatus is focused on the adversary, which is defined as the individuals or groups attempting and have already conducted an assault on information and technology (IT) systems. Unlike any other department in the administration, the (DHS) is unusual in that its effort to maintain national cybersecurity is generally agnostic to any particular malicious attacker but is influenced by the threats that the actor poses to the country. This In Focus outlines the Department of Homeland Security's cybersecurity responsibilities and how the Department collaborates with others to achieve those purposes. The Department of Homeland Security has several cybersecurity missions that span the range of preventive, defense, abatement, investigation, and rehabilitation. In functioning along this spectrum, the Department of Homeland Security (DHS) strives to analyze cyber hazards and utilize its awareness of those vulnerabilities to increase the security and stability of (ICT) systems. Department of homeland security has the capability and authority to provide direct help to a complainant of a cyber incident to assist that person in recovering from the incident. The paper discusses the different methods the DHS can provide privacy and protection from cybercrimes.
Research Question
Research Question: Is it possible to provide cyber security and privacy protection through homeland security operations and programs?
To ensure the protection of citizens at all levels of government, homeland security activities are essential. The capability of the Department to ensure cyber security, which is becoming an increasingly critical issue in all operational elements of enterprises, must be established as a result. A nationwide reaction to a significant cyber incident is coordinated by the Department of Homeland Security (DHS), which offers support to conceivably affected organizations, evaluates the prospective impact on critical facilities, inspects those held to account in collaboration with law enforcement agencies, and collaborates the national response to the significant cyber incidents. The Department cooperates with other government agencies with supplementary cyber operations, including the corporate sector and other non-federal operators of critical infrastructure, to achieve maximum coordination and cooperation and a comprehensive reaction to cyber incidents across the country (Srinivas, 2019). Using advanced and malevolent tactics, states and their intermediaries, multinational organized criminals, and cybercriminals aim to undermine vital infrastructure, steal copyrights and innovation, conduct espionage, and threaten democratic systems. By 2021, it is expected that cybercrime will cause annual damages of over $6 trillion. Because innovation, high energy, and digital interdependencies are all outpacing cybersecurity defenses, all warning signs point to a potential "cyber 9/11" on the horizon shortly.
All Americans benefit from the services provided by critical infrastructure, which serves as a foundation for our economic and national defense and their health and well-being. A cyber-threat to vital infrastructure is among the most severe strategic dangers facing the Nation, as it presents a risk to our government's national security, economic success, and the safety and health of the general people. Furthermore, sophisticated country attacks against state and corporate organizations, vital infrastructure suppliers, and Internet providers aid in espionage, the theft of intellectual property, the maintenance of continued network access, and the establishment of a framework for possible future attacks (Srinivas, 2019). Furthermore, physical terror and violent crime pose a danger, with attacks becoming increasingly localized and directed at sites such as shopping malls and theaters, sports stadiums, and schools. The introduction of hybrid strikes, in which adversaries employ physical and technological methods to cause and compound harm, has made the threat picture more challenging to navigate than in the past.
Hypothesis
Hypothesis: The Department of Homeland Security is sufficient to secure the cyber ecosystem.
National efforts to prevent terrorist attacks, both from within and outside its borders, to reduce America's security vulnerabilities to terrorism, minimize the damage, and recoup from terrorist attacks when they occur are referred to as homeland security (or homeland defense). Hofmanová (2019) describes how terrorism continues to evolve and take new forms. One of these types of warfare is technological warfare, which poses a severe threat.
Various programs, such as the Stop. Think. Connect program, which was initiated in 2010, put forth a significant amount of action on the part of the DHS to protect cyberspace. Average citizens now have the choice of reacting to cyberspace dangers, thanks to the formation of the Campaign Cyber Awareness. The campaign will use public service announcements to raise awareness about cyberattacks and increase cybercrime awareness.
Furthermore, it guarantees that the general public is informed of the dangers associated with cyber threats. There are efficient and productive operations in place, allowing it to adequately handle difficulties with the asset base and engagements at its disposal. Aside from that, the DHS engages with the commercial sector and several non-profit groups to promote awareness of the possible cyber risks among the public. As a result, the framework of collaborative effort has been strengthened and broadened in both depth and coverage. As a direct result of its remarkably successful methods, the DHS was capable of preventing possible losses from happening through cybercrime prosecutions and publicly announced fines.
Research Variables
The main variables of the identified hypotheses include:
•The size of cyberspace in terms of the number of available connections.
•The number of attacks that the Nation is likely to experience.
•The advancement in technology on both the attackers and the DHS.
Dependent Variable-Available Connections
Although the United States is a large and diverse country, it is also technologically advanced. Individuals employ a large number of available connection options in their regular communications. The Department of Homeland Security (DHS) is faced with supervising all such links, both secured and unsecured. The sheer scale of cyberspace presents significant difficulty for the Department of Homeland Security in carrying out its responsibilities as it continues to develop, with links and proxies becoming available daily. The (DHS) moves in on the available links; some are forced to close, while others are created to avoid the Department's actions and remain operational. This variable invalidates the assumption that the DHS is competent in preserving the cyber domain and highlights the need for further efforts to safeguard the cyber environment.
Dependent Variable-Number of Attacks
The number of cyberattacks that the United States will be subjected to is entirely unpredictable. As a result, the Department of Homeland Security must function in an unpredictable environment characterized by complexity and uncertainty. This characteristic also questions the assertion that the Department of Homeland Security adequately and effectively prepares the country for cyber-attacks.
Dependent Variable-Technological Advancement
The variable disproves the notion that the Department of Homeland Security relies on cutting-edge technology to protect the public. Newer technologies are introduced regularly, making it tough to stay up with the latest developments. Various types of malware are constantly being produced, necessitating the creation of a highly knowledgeable staff to deal with them. Even though they employ cutting-edge technologies, this variable suggests the necessity to stay up with the latest technological breakthroughs as they emerge.
Literature Review
Beckner, in his journal, states that The Department of Homeland Security's ...
👀 Other Visitors are Viewing These APA Essay Samples:
-
Hochschild's Theory of Emotion Management
4 pages/≈1100 words | 3 Sources | APA | Social Sciences | Research Paper |
-
Differences in Social Class and How Individuals Distinguish Themselves
4 pages/≈1100 words | 3 Sources | APA | Social Sciences | Research Paper |
-
How Might the Internet of Things Change Society
17 pages/≈4675 words | 4 Sources | APA | Social Sciences | Research Paper |