Computers And Homeland Security Essay

1002 words - 4 pages

Computers and Homeland Security

Homeland Security is one of the most important departments in the United States. The United States Department of Homeland Security job is to reduce our vulnerability to terrorism and lead a national effort to help prevent terrorist attacks on our nation (Computer Concept, pg. 50). As technology evolves over the course of time, computers end up playing a crucial role in homeland security.

Computer systems are used throughout everyday lifestyles in order to make difficult tasks much simple. The government utilizes such systems in order to support their efforts in locating suspected terrorists throughout U.S. boundary lines. There are several software programs, which can be used in helping homeland security become successful. One program is known as the MATRIX, which is an abbreviation for the Multistate Anti-terrorism Information Exchange System. The MATRIX collects, analyzes, and exchanges terrorist and criminal intelligence data among state and federal agencies. It is a useful program because it contains data, such as criminal histories, driver licenses, and vehicle registrations. .

Computer technology has greatly increased the success of homeland security throughout recent years. It has increased the efficiency of homeland security because without software such as the MATRIX, identifying terrorists and locating criminal histories would become much more time consuming. Receiving satellite pictures and interfering phone calls with suspected terrorists would consume valuable time in the security process. Computers are beneficial because they can increase the speed of the security process and help us locate vital information with greater ease.

However, there are several disadvantages to having computers as the main source of aid in homeland security. One negative component of computers is that hackers often find methods to penetrate the information barriers. “Homeland security agencies are trying to secure the national computer with programs that target individual computer owners, corporate computer networks, internet service providers, and communications carriers” (Computer Concepts, pg. 51). The main purpose of the program US-CERT is to reduce the vulnerability of computer systems. Hackers usually try to harm computers by placing viruses or worms in them, but the US-CERT program helps reduce the damage of these viruses and worms. US-Cert reduces damage by sending mail to the computer when threats and vulnerabilities are found.

The National Security Agency “coordinates, directs, and performs highly specialized activities to protect U.S. government information systems and produce foreign signals intelligence information” ( Without the NSA the systems of the government would not be able to function...

Find Another Essay On Computers and Homeland Security

"The Same Agency, Different Name" Assignment: What are the Similarities in the Federal Civil Defense Administration and Office of Homeland Security, and why was it useless to create the new agency?

2062 words - 8 pages Administration (FCDA) and its duties as an office. The duty of this office, finding ways to protect the American people, can be directly compared to the creation and duties of the newly created Department of Homeland Security. President Bush explicitly spells out this new department's role through speeches and various white house documents. Both Paul Boyer's book and President Bush's speeches both present ideas of how to prepare for an attack

Privacy in computers - the effects that unstable security systems can have on large businesses and the threats they deal to databases

650 words - 3 pages information at their own will. This moral right of privacy to an individual is breached and therefore forfeits its privacy.Private records and information that are obtained in computer databases require the best available physical and electronic security available. This will ensure that all data is only accessible to authorised users. Without adequate security, almost any user could log onto these private records and view them accordingly. This opens

The Homeland Security Act

887 words - 4 pages The Homeland Security Act of 2002 impacted the American people without many of them realizing it. The act called for increased monitoring of computer networks, phone lines, and online history inside the United States and allowed the government to deport suspects (ACLU). What was created by the act has snaked its way into all aspects of our lives, creating a sense of order and restricting some freedom. However, some say that this imposition into

Homeland Security Review

1463 words - 6 pages COMPARE AND CONTRAST THE NATIONAL STRATEGY FOR HOMELAND SECURITY OF 2002 AND 2007 TO THE RECENTLY RELEASED QUADRENNIAL HOMELAND SECURITY REVIEW OF 2010. Homeland security refers to a phrase used for security efforts to protect the united state against terrorist attacks, reduce the chances of terrorist attacks and minimize and recover from damages quickly. It was formed after the September attacks of 11; 2001.It was the brain child of President

Overview On The Department Of Homeland Security

628 words - 3 pages Homeland Security leverages resources within Federal, state, and local governments, coordinating the transition of multiple agencies and programs into a single, integrated agency focused on protecting the American people and their homeland. More than 87,000 different governmental jurisdictions at the federal, state, and local level have homeland security responsibilities.Those agencies making up the Department of Homeland Security are housed in

Private Security and Critical Infrastructure Assets

875 words - 4 pages with policing, homeland security, corrections and other related area. By constructing and developing the data it is assured that the information gathered is accurate and maybe useful to private security functions. Works Cited U.S. Department of Homeland Security. Voluntary Private Sector Preparedness Accreditation and Certification Program. Washington D.C. ; U.S. Department of Homeland Security, 2008. http://

Critical Infrastructure Protection

1217 words - 5 pages Introduction When it comes to protecting an infrastructure, careful planning and coordination needs to take place. Protecting an infrastructure takes an important security initiative called Critical Infrastructure Protection (CIP). The United States critical infrastructure is protected by the Department of Homeland Security. Examine three areas of the Department of Homeland Security: mission, operations and responsibilities The first area is

Homeland Security

1870 words - 7 pages Homeland Security PAGE 1 Homeland SecurityNameCourseInstructorDateHomeland SecurityThe United States of America used to be confident in the knowledge that the country was safe from war and acts of terrorism due to the fact that America is surrounded by oceans and seas that effectively deter any violent attacks upon the country. The Japanese proved this theory wrong when they successfully attacked Pearl Harbor and engaged the United States as

PSCI 1050 Short Essay Three

763 words - 4 pages Security. Ever since the attacks on the United States in 2001, a new, much stronger emphasis on securing and protecting the borders of the United States has been taking place. For example following the attacks, the Department of Homeland Security was created by the passing of the Homeland Security Act in 2002. This act also created the cabinet level position of Security of Homeland Security. This new agency was the start of the Homeland Security

What is Cyber Security?

1085 words - 5 pages stored on computers that are attached to the Internet. Many tasks that were once done by hand are now done out through the use of a computer. Our increased reliance on computers and the massive amount of sensitive information stored on networks, the operation of cyber security programs is required to effectively block hazardous or predatory cyber-attacks and any acts of identity theft. This papers purpose is to inform and help with ways to

Computer Security

1948 words - 8 pages applications that can be run on company computers. The policy should also provide standards for testing unknown applications and limit diskette sharing."The speed, virulence, and maliciousness of cyber attacks have increased dramatically in recent years. Accordingly, the Department of Homeland Security would place an especially high priority on protecting our cyber infrastructure from terrorist attack by unifying and focusing the key cyber security

Similar Essays

Computers And Homeland Security Essay

775 words - 3 pages Computers and Homeland Security After the terrorist attacks on September 11, 2001 security became a major concern for citizens and of course lawmakers. Unsure of what could happen next we were all afraid. Homeland Security encompasses policies, laws, organizations, and procedures designed to protect the rights and freedoms inherent in the US Constitution. Homeland defense which is sometime interchanged with Homeland Security

Homeland Security And Tsa Essay

1231 words - 5 pages States Department of Homeland Security (DHS), usually recognized as Homeland Security, is a Cabinet subdivision of the Federal Government of the United States with the accountability of protecting the region of the United States from radical attack and responding to natural disasters. The subdivision was created from 22 existing federal agencies in response to the terrorist attacks of September 11, 2001. While the Department of Defense is charged

Department Of Homeland Security And Its Acronyms

1401 words - 6 pages Introduction This paper will briefly discuss the formation of the Department of Homeland Security (DHS). With every government program or agency comes an alphabet soup of acronyms and DHS is no different from the rest. To better understand the agency and concepts that comprise DHS, this paper will also examine acronyms associated with DHS. They are QHSR, HSE, NRF, NIMS, ICS, and UC. Each will get a description while highlighting and

Homeland Security Chapter Four Summary And Essay

1429 words - 6 pages Chapter 1-3 showed the beginnings of homeland security and the expansion and growth of Homeland Security. Chapter 4 shows the actions of homeland security, and the steps they take toward a problem to access it. The DHS above all needs to realized and understand how to address an attack quickly and efficiently, and have counter measure put into place beforehand. The DHS must be able to access the risks of any situation, and must decipher the