Friday, January 3, 2020

Computers and Homeland Security Essay - 836 Words

Computers and Homeland Security Homeland Security is one of the most important departments in the United States. The United States Department of Homeland Security job is to reduce our vulnerability to terrorism and lead a national effort to help prevent terrorist attacks on our nation (Computer Concept, pg. 50). As technology evolves over the course of time, computers end up playing a crucial role in homeland security. Computer systems are used throughout everyday lifestyles in order to make difficult tasks much simple. The government utilizes such systems in order to support their efforts in locating suspected terrorists throughout U.S. boundary lines. There are several software programs, which can be†¦show more content†¦One negative component of computers is that hackers often find methods to penetrate the information barriers. â€Å"Homeland security agencies are trying to secure the national computer with programs that target individual computer owners, corporate computer networks, internet service providers, and communications carriers† (Computer Concepts, pg. 51). The main purpose of the program US-CERT is to reduce the vulnerability of computer systems. Hackers usually try to harm computers by placing viruses or worms in them, but the US-CERT program helps reduce the damage of these viruses and worms. US-Cert reduces damage by sending mail to the computer wh en threats and vulnerabilities are found. The National Security Agency â€Å"coordinates, directs, and performs highly specialized activities to protect U.S. government information systems and produce foreign signals intelligence information† (http://www.nsa.gov/about/index.cfm). Without the NSA the systems of the government would not be able to function as well as it does. The NSA has been with computer security research, investigating a variety of security topics. This system helping the government must be able to separate information between confidentiality and integrity to help provide system security. An operating system security mechanism makes the separation between the two. Unfortunately, many operating systems the security features to make the separation. Since many systems lack the ability toShow MoreRelated Computers and Homeland Security Essay735 Words   |  3 PagesComputers and Homeland Security After the terrorist attacks on September 11, 2001 security became a major concern for citizens and of course lawmakers. Unsure of what could happen next we were all afraid. Homeland Security encompasses policies, laws, organizations, and procedures designed to protect the rights and freedoms inherent in the US Constitution. Homeland defense which is sometime interchanged with Homeland Security deals with extra-territorial threats and preemptive operationsRead MoreEssay about Computers and Homeland Security Unite794 Words   |  4 PagesComputers and Homeland Security Unite Homeland security was created by the Bush administration in 2001 as a result of the September 11th events. It is an independent agency in the United States whose mission is to protect the nation from potential terrorist attacks. Together the agency is made up of twenty two agencies and 180,000 employees. Their main focus is â€Å"intelligence and warning; boarder and transportation security; domestic counterterrorism; protecting critical infrastructure; defendingRead MoreAmerica And Its Homeland Security Online Essay1587 Words   |  7 PagesAmerica and Its Homeland Security Online Abstract: Everyday security is provided by the states and federal government. These tasks get more difficult as new technology introduces itself. Cybersecurity is one of the most popular security sectors in today’s world. There is not only cyberbullying going on in the world. Terrorism can be planned and sent from person to person over the internet. People’s identities are being stole to help carry out these terrorist acts and this is just the being of itRead MoreElectronic Mail Acceptable Use Policy1054 Words   |  5 PagesOperation of Information Systems/Computers directive. The Department of Homeland Security, Management Directive System MD Number: 4900 â€Å"directive establishes the Department of Homeland Security (DHS) policy for the use and operation of DHS information systems and computers by individual users† (Department of Homeland Security, n.d.). Department of Homeland Security, Management Directive System, MD Number: 4500.1 relates to DHS E-Mail Usage (Department of Homeland Security, 2003). This directive establishesRead MoreThe Impact Of Legislation On An Organization854 Words   |  4 Pagesdecade, every individual, and organizations did paperwork with a typewriter and a cabinet or book shelf to store their files. These days our old ways is been replaced by computers and databases or cloud. This in order words mean that government organization like the department of veterans affairs do their workload with computer, databases as to the old days. This modern change makes some organization vulnerable to attackers. In other to reduce these treats from the attackers, cybersecurity rulesRead MoreThe Internet And Its Effects On The World Nation Itself853 Words   |  4 PagesAs we all known, now in days almost everything that we see and everything that we do is throughout an electronic devise. No matter what small little thing, almost everything that you do is from a computer. For instance, to communicate with a family member (cellphone), to send a via-text, to check your e-mails, to watch television, almost everything is throughout a devise. For this same reason, government has to make sure that these devises are protected from any predator that would do bad with thoseRead MoreThe Department Of Homeland Security1602 Words   |  7 PagesDepartment of Homeland Security The Department of Homeland Security is an agency made up of 22 different federal agencies which were combined in an effort to streamline the United States effectiveness in defending our nation. The core mission of the Department of Homeland Security include prevent terrorism and enhancing security, secure and manage our borders, enforce and administer our immigration laws, safeguard and secure cyberspace, ensure resilience to disasters (Department of Homeland Security, 2015)Read MoreCritical Infrastructure Protection1106 Words   |  5 PagesProtecting an infrastructure takes an important security initiative called Critical Infrastructure Protection (CIP). The United States critical infrastructure is protected by the Department of Homeland Security. Examine three areas of the Department of Homeland Security: mission, operations and responsibilities The first area is the Department of Homeland Security’s mission. The Department of Homeland Security (DHS) was created in 2002 by the Homeland Security Act. In 2003 the DHS started their operationsRead MoreProtecting Yourself Against the Treats of Cyberspace1022 Words   |  5 PagesCyber Security It seems like everyone in today’s society has access to a computer, a cell phone, or some other type of technology that allows information to be passed from one person to another through space. With your private information out there in cyberspace, clever thieves are finding ways to access your personal informational and to steal from you without you even knowing about it until it is too late. The thieves are taking your personal data and using it to gain access to your accountsRead MorePersonally Identifiable Information Essay1071 Words   |  5 PagesUNDERSTANDING OUR RESPONSIBILITY REGARDING PERSONALLY IDENTIFIABLE INFORMATION IFSM 201 JULY 22, 2012 Abstract Anyone who uses computer technology today accepts the fact that their Personally Identifiable Information (PII) may or could be transmitted, collected, and used to benefit the one who receives that information. It is our responsibility to know what PII transmissions are being made available for public use over the web. Understanding all the aspects of PII and the approaches that are

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.