Analyzing DHS Strategies for Handling Cyber Threats in the US

Verified

Added on  2023/04/22

|4
|413
|481
Report
AI Summary
This report examines the strategies the Department of Homeland Security (DHS) should employ to counter cyber threats, particularly those from other nations. The primary objective of the DHS is to protect American interests and national security by securing both public and private information networks. To achieve this, the DHS focuses on a series of synchronized activities to protect critical infrastructure, administration networks, and combat cybercrime. The report highlights DHS strategies, including securing the Federal network and information, centralizing the management and oversight of Federal citizen cybersecurity, and ensuring DHS has the right access to agency information systems. The report also references the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. The report concludes by emphasizing the importance of protecting the country’s information and information systems to manage cybersecurity risks and heighten the security and elasticity of the country’s information and information systems.
Document Page
Running head: IT WRITE UP 1
IT Write Up
Name
Institution Affiliation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT WRITE UP 2
Abstract
This paper discusses various strategies that should applied by the Department of Homeland
Security to counter the merging cyber threats from other nations.
Keywords: Department of Homeland Security (DHS) and Cyber threats
Document Page
IT WRITE UP 3
How Department of Homeland Security Should Handle Cyber Threats to Protect the
National Infrastructure
The primary objective of the DHS is protecting the way of life Americans and the
interests of American National Security. Therefore, the critical aspect is to protect American
information networks that is both public and private. To achieve this, it calls for a sequence
of synchronized activities dedicated to protecting critical infrastructure, administration
networks and combating cybercrime. As a result, the goal of DHS is to manage cyber security
risks to heighten the security and elasticity of the country’s information and information
systems. In this sense, DHS has put forth the following strategies to combat the emerging
cyber-attacks organized by other nations which include:
Secure the Federal network and information: the duty of securing the Federal
networks which comprises national security systems and Federal information systems is the
responsibility of the Federal Government (Infrastructure & Technology, 2017). Therefore,
DHS should clarify the pertinent authorities, accountability and responsibilities across and
within the department and agencies tasked with securing Federal information systems when
establishing standards for effective cybersecurity risk management.
There is need to centralize the management and oversight of the Federal citizen
cybersecurity. Further the government should act to allow DHS in securing the Federal
agency and department networks, intelligence community (IC) and department of defence
(DoD) systems. Accordingly, this will help to ensure that DHS has the right access to agency
information systems for purposes of cybersecurity which could allow it take direct action to
protect systems from different risk spectrums (Trump, 2017).
Document Page
IT WRITE UP 4
References
Infrastructure & Technology. (2017). Presidential Executive Order on Strengthening the
Cybersecurity of Federal Networks and Critical Infrastructure | The White House.
Retrieved from https://www.whitehouse.gov/presidential-actions/presidential-
executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/
Trump, D. J. (2017). National security strategy of the United States of America. Executive
Office of the President Washington Dc Washington United States.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]