The Importance Of Homeland Security: The Right To Privacy

Improved Essays
Cybersecurity is arguably as important if not exceeds the US Military in importance. The private sector, civilian businesses and personnel, lost more than one trillion dollars in 2008 as a result of cyberattacks. The four and a half million dollar Predator, the name of a certain type of military drone, had its camera feed hacked by a twenty-six dollar piece of software widely available on the Internet. The government nor the private sector are immune to security breaches, but which group is better equipped to protect America’s interests? Some critics will claim the private sector should set the standard for companies to follow. Opponents believe only the government has the power to establish a baseline for which the government and the …show more content…
A prime example of the US responding to existential threats was the creation of the Department Homeland Security (DHS) eleven days after 9/11. DHS was nominated with the monumental task of cybersecurity. In 2008, the Pentagon had one hundred thousand attempted breaches. Criminals take the path of least resistance to make their heists. Of all successful attempts on American soil, only two percent of the successful breaches happened to government computers. This means ninety-eight percent of all successful attacks breached private sector companies. Who has the better track record when it comes to protecting valued …show more content…
The Bush administration created the DHS which made an entire branch in the department of defense dedicated to cybersecurity. The Obama administration strengthened the initial groundwork laid out by the previous administration by bringing in the private sector and foreign governments to combat the constant threats. Cyber Information Sharing and Collaboration Program (CISCP) is an initiative created by the government to allow the sharing of attacks and breaches within a vetted group of companies and government agencies. As of July 2015, 125 various private sector companies shared twenty-eight thousand indicators to help combat intrusions. The government has an additional 156 companies requesting permission to join this cyber task force. Working as a team instead of individuals, money, time and resources are saved. The government has reached out to various agencies within the government to practice drills. The Environmental Protection Agency participates in drinking water and waste treatment plant exercises to attempt to overcome possible malicious intrusions. Furthermore, the US government is able to make negotiations with foreign governments such as China to stop future private sector intrusions. The US private sector receives more intrusion attempts from China than any other country in the world. This agreement is not something the private sector would have been able to

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Triton Multi-INT

    • 505 Words
    • 3 Pages

    I am a little concern about the bidding or proposal against RMF effort. There is tremendous work need to be done for the RMF compliance that leading to an ATO. Without the ATO, even your system is built with the state-of-the-art technology, you are not allow to operate in the field. I do not see that importance reflect on the proposal. I am not sure whether Triton Multi-INT (or the Triton baseline) is a program of record that needs an ATO or it only needs to be RMF compliance.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Fireeye Case

    • 622 Words
    • 3 Pages

    The relationship conveys organized expert technical insight from FireEye to measure an individual organization's threat exposure, with ACE's Loss Mitigation Services package, a multi-tier offering that helps organizations fully comprehend and mitigate their cyber security risk. Together, the companies will provide enhanced visibility into the cyber security preparedness of each client, permitting cyber insurance to be personalized specifically for their risk profile. Today's shifting threat landscape makes it dreadful for even the most security-conscious organization to assure that they will not be the victim of a cyber-attack. Outdated defenses are proving ineffective in contradiction of escalating sophisticated threat actors, making breaches inevitable.…

    • 622 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyberterrorism Cons

    • 120 Words
    • 1 Pages

    An enormous threat and instrument for warfare, “cyberterrorism”, with all its iterations, has potential for momentous damage, especially within infrastructures. With the potential for causing civil war, cyber sabotage is very likely to cause state to state interchanges. There is even a larger potential for war between nonstate entities. Just because there is no “ground zero physical crater”, it does not mean the scope of damage is not as significant. A Cyberterrorism preparation fund may be something most major corporations and governments need in this modern internet-technological age.…

    • 120 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Public perceptions concerning civil liberty infringement by government entities can be reduced by increasing public awareness of non-sensitive, unclassified information sharing across public communication portals in a manner that is concise and easily digestible. This assertion seems to be supported by the myriad of public outcries demanding more transparency in homeland security policies and procedures. Homeland security is formulated around the basic principle that the government is dutifully bound to provide for the safety and security of the nation. This rudimentary duty is expected in spite of a landscape populated with dynamic, evolving threats that can be slowly emergent or unpredictable (Margarit, 2010). This mission is further complicated by a number of inhibitions and stumbling…

    • 238 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    The article Leveraged Resources and Systems Changes in Community Collaboration by Gabriel Kuperminc and Christopher Harper (2014) emphasizes “the ability of diverse partners to come together to enact systematic changes to improve the health of individuals and communities.” The authors present a variety of examples that shows that changes in policy promote a successful, collaborative leverage of resources from state, federal and private partners. Inter-organizational collaboration is an essential part of community health and empowerment. The proper allocation of resources is attributed to policy implementation and the liability for some partners to accept a risk. The proper funding of programs/projects allows collaborative activities to function…

    • 1604 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Terrorism is a constant concern for the world. Many wonder when the next terrorist attack is going to occur. Since nobody knows when the next attack will happen, Americans need to prepare for the possibility of future attacks. Terrorist attacks are more prevalent now than in the last decade.…

    • 1873 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    The permeation and diffusion of cyber responsibilities across different government agencies is to be expected based on the technological development of cyber. Cyber technology exponentially spread through every aspect and sector of society and government agencies were forced to integrate and assume cyber responsibilities just by the nature of the domain. This has resulted in several government agencies responsible to multiple title authorities having cyber under their…

    • 1692 Words
    • 7 Pages
    Great Essays