Purchase Solution

DHS Cyber-Security Policy

Not what you're looking for?

Ask Custom Question

Department of Homeland Security Cyber-Security Policy

Detail a brief history of the issue, what some of the aspects of the policy are, and discuss how the policy helps or hinders national security. Details of each best practice will be included. Finally, be sure to address biblical foundations

Outline

Introduction
I. DHS Cyber threats and their impact on national security.
1. Assessing the evolving cybersecurity risk.
II. DHS cybersecurity challenges and its impact on national security.
III. DHS managing national cybersecurity risk.
IV. Development and Implementation of cybersecurity policies
1. Risk identification.
2. Vulnerability reduction.
3. Protecting critical infrastructure.
V. Strengthening the security and reliability of the cyber ecosystem to improve national security.

Purchase this Solution

Solution Summary

The Department of Homeland Security's Cyber-Security Policy is discussed in a structured manner in this response. The related references are also provided.

Solution Preview

1.1 The evolving cyber-security risk is formidable. From the point of view of national security, the cyber-space and its supporting infrastructure are vulnerable to several types of cyber threats and dangers. There are countries, groups, and militia that are antagonistic to the United States and these have armies of cyber actions who break through vulnerabilities, misappropriate information and funds, and have developed capabilities of unsettling, destroying, or intimidate the supplies of essential services and goods. For example, there are rogue states that have developed cyber armies that can cause energy supply outages in several states of the United States. Such attacks have the potential of disrupting, stopping, or damaging critical national infrastructure, lives, and processes. Such cyber-attacks can be more devastating than destruction by conventional warfare. From the biblical perspective, cyber-attacks are no less than demons. "in later times some will abandon the faith and following deceiving spirits and things taught by demons" (See: 1 Timothy 4:1). Cyber attacks are no less than attacks by demons. From the perspective of the bible, the DHS should take steps to identify cyber threats and prevent them from breaching national security (1). Currently, the Cybersecurity and Infrastructure Security Agency has been tasked with building national ability to protect critical infrastructure against cyber attacks. From the perspective of the Bible, our country must make itself aware of heinous schemes of rogue nations and our country's enemies. "So that Satan might not outwit us. For we are not unaware of his schemes" (See: 2 Corinthians 2:11). To know the schemes of "Satan" and counter them, the CISA develops and provides incident response services, assessment capabilities, and cybersecurity tools. The efforts of the CISA are focused on protecting the government networks, essential operations, and government agencies from cyber attacks.

2. The greatest challenges to DHS stem from cyber attacks such as social engineering, ransomware, and DDoS attacks. These are designed to spy on National Security Assets, conduct economic espionage, and disrupting the national information infrastructure. For example, a cyberattack is made to get information on the key decisions made by the National Security Council (2). The impact on national security can be devastating. DHS faces serious challenges from cyber threats. The enemies of the USA can easily exploit the vulnerabilities of cloud computing and third-party software to harm the US Government. Several government employees can be misled through scareware, quid pro quo, and phishing emails. These are responsible for most of the breaches in government security. From the point of view of the Bible, " The demons begged Jesus, "if you drive us out, send us into the herd of pigs'" (See: Matthew 8:31) the cybercriminals are the demons that reside in the herd of pigs. Cyber attacks are dangerous as these are a new form of terrorism that DHS needs to counter. Cybercriminals can cause more destruction, devastation, and death than conventional terrorists. "A spirit glided past my face and the hair on my body stook on end" (See: Job 4:15). A cyber-attack can make the hair on anyone's body stand on end.

3. DHS's management of national cybersecurity risk is based on combating cybercrime, cyber incident response, and promoting incident sharing. In addition, DHS manages national cyber-security by protecting important infrastructure, protecting federal networks, and proving training/ ...

Solution provided by:
Education
  • BSc , University of Calcutta
  • MBA, Eastern Institute for Integrated Learning in Management
Recent Feedback
  • "I read your comments, and thank you for this feedback. Do I need to find other studies that applied this methodology Ive used? That's where I'm stuck at."
  • "Thank you kindly sir. "
  • "Excellent and well explained. --Thank you kindly. "
  • "Awesome notes. I appreciate you."
  • "I have the follow-up project and I will assign that to you very soon. "
Purchase this Solution


Free BrainMass Quizzes
Basic Social Media Concepts

The quiz will test your knowledge on basic social media concepts.

Production and cost theory

Understanding production and cost phenomena will permit firms to make wise decisions concerning output volume.

Organizational Behavior (OB)

The organizational behavior (OB) quiz will help you better understand organizational behavior through the lens of managers including workforce diversity.

Change and Resistance within Organizations

This quiz intended to help students understand change and resistance in organizations

Situational Leadership

This quiz will help you better understand Situational Leadership and its theories.