1. Purpose
Among one of the missions of The U.S. Department of Homeland Security is to protect and preserve the security of the Cyberspace in the country. The principal objective of this Security Plan is to give instructions and direction for the Department’s workers and help the Homeland Security to create best practices and strategies in the IT security system.
2. Scope
This policy needs to be applied to all users, employees, contractors, suppliers and to all IT resources such as e-mails, files, data, messages and documents controlled or administered by The Department of Homeland Security.
3. Policy Intention
The Department of Homeland IT security policy must be uniform, stable, consistent, efficient, effective and compatible with best practices Information Security in the Department. It is the purpose of this security policy to create and implement the best security plans, strategies, and practices throughout the Department. Also, it is the intention of this policy to create safe and secure Cyberspace.
4. Protecting Cyberspace
Building secure and safe cyberspace and Communications system in the country is the top priority of the department. In its kind the Cybersecurity Framework of the Department is the most comprehensive and efficient one. The Department of Homeland Security performing the following activities to secure the cyberspace efficiently:
Checking and assessing organizations capacity of cyber-attacks defensive mechanisms and potentials.
Evaluate
The purpose of Homeland Security is to protect the country from foreigners entering illegally. There is border control, Coast Guard and Secret Service (Schwartz, 11/29/16). This system is still effective today, with approximately 200,000 Department of Homeland Security employees and airports now have screening due to the Transportation Security Administration that took place in 2002 (Schwartz, 11/29/16). Protection is the priority in order to avoid all the possibilities of another terrorist attack and the Department of Homeland Security definitely helped by limiting a certain percentage of another
The Department of Homeland Security supplies a national protection plan concerning critical infrastructure security. This plan targets a wide audience, including public and private critical infrastructure owners and administrators. Managing risks through identifying, deterring, and disrupting threats to critical infrastructure is the direct focus of this plan. The ability of an organization to reduce the impact of a threat that has occurred and reducing the impact of one that may occur is essential to an active security posture. Compromise of a critical infrastructure such as oil, airports, or traffic flow management could result in a major loss of life or resources (Department of Homeland Security, 2013).
In this research paper, I am going to discuss the plan that the Department of Homeland Security has set forth for the years of 2012-2016. This plan outlines the entire vision of the department to essentially accomplish their missions and goals. The plan consists of missions varying from border security to cyber security. We must not forget the men and women on the front line working hard to ultimately secure and provide safety for the United States of America.
Since the creation of the Homeland Security Act in 2002 after the 9/11, attack the department has come across challenges and criticism from the government and private sectors alone. Since the Homeland Security Act of 2002 it has been amended in carrying out the effects of the 9/11 Commission Act of 2007. The activity report has shown it provides a strong well-rounded and strategic foundation of the highest priorities in which it ensures the department will invest and operate in a producing unified fashion to make decisions that will strengthen the department unity of effort. Moreover, the department will continue to give support to the five basic homeland security missions and continue to support missions set forth in the
Homeland security in the US has been tasked with a number of duties. Some of the duties and capabilities
Homeland security has been designed in order to better their actions in defense against evolving terrorist threats. The creation of the Department of Homeland Security affect resources designated for local criminal justice organizations. This is mainly because; the homeland security information network has to securely collaborate with partners across geographic and jurisdictional boundaries on weapons and other resources. They redirect resources used by local criminal justice agencies to combat crime (Stojkovic, Kalinich&Klofas, 2011). This is due to the goals and environments change that outpace technology and resources available to the criminal justice administrators.
The founding principle of homeland security is keeping the American citizens safe from terrorist threats. This is the highest priority
In order to implement these six objectives, the DHS has created four directorates: Border and Transportation Security; Emergency Preparedness and Response; Science and Technology in Support of Homeland Security; and Information Analysis and Infrastructure Protection. Their leadership includes Secretary Jeh Johnson, Deputy Secretary Alejandro Mayorkas, and Chief of Staff Christian P. Marrone Executive Secretary Dr. Kimberly O’Connor. All these people I mention are important to The Department of Homeland Security they are up to the task and are well aware of the threats that occur in the United States of America. There are some Agencies that Fall under the DHS which includes United States Immigration and Customs Enforcement encourages homeland security and public safety through the criminal and civil enforcement of federal laws governing border control, customs, trade, and immigration. The United States Secret Service protections the nation's financial organization and compensation systems to preserve the reliability of the economy, and protects national leaders, visiting heads of state and government, voted sites, and National Special Security Events. Another Agency is the United States Customs and Border Protection is one of the Department of Homeland Security’s largest and most difficult mechanisms, with an importance mission of keeping terrorists and their weapons out of the U.S. It also has an obligation for securing and enabling trade and travel while applying hundreds of U.S. regulations, including immigration and drug laws. Therefore an agency such as The United States Coast Guard is one of the five armed forces of the United States and the only military
With the creation of the Department of Homeland Security and the integration of agencies relating to the control and security of borders, air and maritime space, and transportation were created strategies to combat terrorism with the protection of critical infrastructure, and evaluation of threats with weapons of mass destruction, the Department of Homeland security also have the coordinates the investigation of information to combat
It is of significant importance that this policy be fully adhered to and implemented all the time. It will help to ensure the security of the information within the DHHS data center.
Homeland security was created by the Bush administration in 2001 as a result of the September 11th events. It is an independent agency in the United States whose mission is to protect the nation from potential terrorist attacks. Together the agency is made up of twenty two agencies and 180,000 employees. Their main focus is “intelligence and warning; boarder and transportation security; domestic counterterrorism; protecting critical infrastructure; defending against catastrophic threats; and emergency preparedness and response” (Whitehouse 1). The agency could not carry out these important tasks if it were not for the latest in computer technology.
Without a doubt, cybersecurity is one of the biggest threats the DHS faces. As technology evolves, this threat will continue to grow. What is the department doing about it? A cyber-attack could cause serious damage to our critical infrastructure if it was done properly. This is something that must be protected! The first step is to protect our federal networks and critical infrastructure. “The Department of Homeland Security (DHS) works with each federal civilian department and agency to promote the adoption of common policies and best practices that are risk-based and able to effectively respond to the pace of ever-changing threats. As systems are protected, alerts can be issued at machine speed when events are detected
Outlining the role of the Department of Homeland Security depicts how this agency was able to coordinate multi agency work to achieve one common goal,; to protect American citizens. The DHS has played a valued role in protecting our nation against terrorism while engaging in a joint agency task force to avoid any deficiencies or miscommunication that might allow terrorists the openings to attack us. The Department of Homeland Security made counterterrorism its first and ultimate goal by "detecting explosives in public spaces and transportation networks, helping protect critical infrastructure and cyber networks from attack, detecting agents of biological warfare, and building information-sharing partnerships with state and local law enforcement that can enable law
The Department of homeland security has become the center or the lead agency for cybersecurity for the United States. Cyber security operations within the DHS are focused in the Office of Cybersecurity and Communications (CS&C), which falls under the National Protection and Programs Directorate (NPPD). The five primary divisions within CS&C are “Network Security Development (NSD), Federal Network Resilience, Stakeholder Engagement and Cyber Infrastructure Resilience, The National Cybersecurity and Communications Integration Center (NCCIC) and The office of Emergency Communication”, (Bullock, 2016, p. 246). The vision of cybersecurity protection falls under two goals. The
A well written and understood security policy is key to protecting an organization from security breaches or pit falls associated with DDos , malware and virus attacks. During 2016 DDoS or distributed denial of service attacks were up by 71% and most used an attack incorporating botnet malware. Botnets are used to send email spam and engage in click fraud attacks and generate malicious traffic for DDoS attacks. These attacks can not only slow down an organizations network traffic, but can cost a company massive amounts of loss in capitol. A well-constructed security policy is the basis and structure to help create a comprehensive security program for any organization. Some key areas that need to be developed for a good security policy