Computers And Homeland Security Essay

775 words - 3 pages

Computers and Homeland Security

After the terrorist attacks on September 11, 2001 security became a major concern for citizens and of course lawmakers. Unsure of what could happen next we were all afraid. Homeland Security encompasses policies, laws, organizations, and procedures designed to protect the rights and freedoms inherent in the US Constitution. Homeland defense which is sometime interchanged with Homeland Security deals with extra-territorial threats and preemptive operations (Parons & Oja, 51). Governments in many countries are devoting significant resources to combat this growing threat. In the United Stats, the Department of Homeland Security, or DHS is responsible for reducing America?s vulnerability to terrorism and leading a unified national effort to prevent terrorist attacks on American citizens and assets. The DHS mission statement is: ?We will lead the unified national effort to secure America. We will prevent and deter terrorist attacks and protect against and respond to threats and hazards to the nation. We will ensure safe and secure borders, welcome lawful immigrants and visitors, and promote free-slow of commerce? (www.dhs.gov). Technology is a key component of DHS. A part of the PROTECT system uses a computer program to depict the dispersion of toxic materials. On October 26, 2001 the President of the United States signed the Patriot Act, which was designed to define terrorist activities and provide la enforcement officials with legal tools for finding, catching, and prosecuted terrorists (Parons & Oja, 51).

Computer systems assist efforts to identify terrorists among the millions of people who travel into and within U.S. borders. Terrorists might use cell hones or e-mail to communicate and plan attacks. The National Security Agency (NSA) uses electronic intercepts to monitor worldwide ?chatter? (NSA.gov). Computerized language translation programs help English-speaking agents sift through communications in other languages. Homeland security agencies are taking steps to secure the national computer and communications infrastructure with programs that target individual computer owners, corporate computer networks, Internet service providers, and communications carriers. US-CERT was established in September of 2003. Its missions is to protect the nation?s Internet infrastructure (US-CERT.gov). It?s responsible for analyzing and reducing cyber threats and vulnerabilities, distributing cyber threat warning information, and coordinating incident response activities. US-CERT is the operational arm of the National Cyber Security Division (NCSD) at the...

Find Another Essay On Computers and Homeland Security

"The Same Agency, Different Name" Assignment: What are the Similarities in the Federal Civil Defense Administration and Office of Homeland Security, and why was it useless to create the new agency?

2062 words - 8 pages Administration (FCDA) and its duties as an office. The duty of this office, finding ways to protect the American people, can be directly compared to the creation and duties of the newly created Department of Homeland Security. President Bush explicitly spells out this new department's role through speeches and various white house documents. Both Paul Boyer's book and President Bush's speeches both present ideas of how to prepare for an attack

Privacy in computers - the effects that unstable security systems can have on large businesses and the threats they deal to databases

650 words - 3 pages information at their own will. This moral right of privacy to an individual is breached and therefore forfeits its privacy.Private records and information that are obtained in computer databases require the best available physical and electronic security available. This will ensure that all data is only accessible to authorised users. Without adequate security, almost any user could log onto these private records and view them accordingly. This opens

The Homeland Security Act

887 words - 4 pages The Homeland Security Act of 2002 impacted the American people without many of them realizing it. The act called for increased monitoring of computer networks, phone lines, and online history inside the United States and allowed the government to deport suspects (ACLU). What was created by the act has snaked its way into all aspects of our lives, creating a sense of order and restricting some freedom. However, some say that this imposition into

Homeland Security Review

1463 words - 6 pages COMPARE AND CONTRAST THE NATIONAL STRATEGY FOR HOMELAND SECURITY OF 2002 AND 2007 TO THE RECENTLY RELEASED QUADRENNIAL HOMELAND SECURITY REVIEW OF 2010. Homeland security refers to a phrase used for security efforts to protect the united state against terrorist attacks, reduce the chances of terrorist attacks and minimize and recover from damages quickly. It was formed after the September attacks of 11; 2001.It was the brain child of President

Overview On The Department Of Homeland Security

628 words - 3 pages Homeland Security leverages resources within Federal, state, and local governments, coordinating the transition of multiple agencies and programs into a single, integrated agency focused on protecting the American people and their homeland. More than 87,000 different governmental jurisdictions at the federal, state, and local level have homeland security responsibilities.Those agencies making up the Department of Homeland Security are housed in

Private Security and Critical Infrastructure Assets

875 words - 4 pages with policing, homeland security, corrections and other related area. By constructing and developing the data it is assured that the information gathered is accurate and maybe useful to private security functions. Works Cited Homelandsecurity.com U.S. Department of Homeland Security. Voluntary Private Sector Preparedness Accreditation and Certification Program. Washington D.C. ; U.S. Department of Homeland Security, 2008. http:// www.fema.gov/media/fact_sheets/vpsp.shtm.

Critical Infrastructure Protection

1217 words - 5 pages Introduction When it comes to protecting an infrastructure, careful planning and coordination needs to take place. Protecting an infrastructure takes an important security initiative called Critical Infrastructure Protection (CIP). The United States critical infrastructure is protected by the Department of Homeland Security. Examine three areas of the Department of Homeland Security: mission, operations and responsibilities The first area is

Homeland Security

1870 words - 7 pages Homeland Security PAGE 1 Homeland SecurityNameCourseInstructorDateHomeland SecurityThe United States of America used to be confident in the knowledge that the country was safe from war and acts of terrorism due to the fact that America is surrounded by oceans and seas that effectively deter any violent attacks upon the country. The Japanese proved this theory wrong when they successfully attacked Pearl Harbor and engaged the United States as

PSCI 1050 Short Essay Three

763 words - 4 pages Security. Ever since the attacks on the United States in 2001, a new, much stronger emphasis on securing and protecting the borders of the United States has been taking place. For example following the attacks, the Department of Homeland Security was created by the passing of the Homeland Security Act in 2002. This act also created the cabinet level position of Security of Homeland Security. This new agency was the start of the Homeland Security

What is Cyber Security?

1085 words - 5 pages stored on computers that are attached to the Internet. Many tasks that were once done by hand are now done out through the use of a computer. Our increased reliance on computers and the massive amount of sensitive information stored on networks, the operation of cyber security programs is required to effectively block hazardous or predatory cyber-attacks and any acts of identity theft. This papers purpose is to inform and help with ways to

Computer Security

1948 words - 8 pages applications that can be run on company computers. The policy should also provide standards for testing unknown applications and limit diskette sharing."The speed, virulence, and maliciousness of cyber attacks have increased dramatically in recent years. Accordingly, the Department of Homeland Security would place an especially high priority on protecting our cyber infrastructure from terrorist attack by unifying and focusing the key cyber security

Similar Essays

Computers And Homeland Security Essay

1002 words - 4 pages Computers and Homeland Security Homeland Security is one of the most important departments in the United States. The United States Department of Homeland Security job is to reduce our vulnerability to terrorism and lead a national effort to help prevent terrorist attacks on our nation (Computer Concept, pg. 50). As technology evolves over the course of time, computers end up playing a crucial role in homeland security

Homeland Security And Tsa Essay

1231 words - 5 pages States Department of Homeland Security (DHS), usually recognized as Homeland Security, is a Cabinet subdivision of the Federal Government of the United States with the accountability of protecting the region of the United States from radical attack and responding to natural disasters. The subdivision was created from 22 existing federal agencies in response to the terrorist attacks of September 11, 2001. While the Department of Defense is charged

Department Of Homeland Security And Its Acronyms

1401 words - 6 pages Introduction This paper will briefly discuss the formation of the Department of Homeland Security (DHS). With every government program or agency comes an alphabet soup of acronyms and DHS is no different from the rest. To better understand the agency and concepts that comprise DHS, this paper will also examine acronyms associated with DHS. They are QHSR, HSE, NRF, NIMS, ICS, and UC. Each will get a description while highlighting and

Homeland Security Chapter Four Summary And Essay

1429 words - 6 pages Chapter 1-3 showed the beginnings of homeland security and the expansion and growth of Homeland Security. Chapter 4 shows the actions of homeland security, and the steps they take toward a problem to access it. The DHS above all needs to realized and understand how to address an attack quickly and efficiently, and have counter measure put into place beforehand. The DHS must be able to access the risks of any situation, and must decipher the