Criminal Law: Terrorism, Insider Threats, Homeland Security Report

Verified

Added on  2022/08/18

|6
|1227
|249
Report
AI Summary
This report provides an in-depth analysis of terrorism, insider threats, and homeland security. It begins by defining terrorism and highlighting its impact, emphasizing the importance of protecting a nation's community and infrastructure. The report delves into the National Infrastructure Protection Plan (NIPP), explaining its risk management framework and the roles of various agencies. It also examines insider threats, detailing how companies can protect sensitive information through employee training and categorization. Furthermore, the report explores the US's efforts in preventing terrorism, including the role of the Department of Homeland Security and the National Terrorism Advisory System. The conclusion stresses the importance of public awareness and governmental action in countering terrorism, emphasizing the seriousness of the threat and the need for basic knowledge on the subject.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
RUNNING HEAD: CRIMINAL LAW 0
Terrorism, insider threats, and
homeland security
March 8
2020
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CRIMINAL LAW 1
Introduction
Terrorism is the unlawful use of violence and intimidation. Threatening civilians, scaring
them with unlawful activities is considered as terrorism (Whittaker, 2012). This report will
highlight the importance of protecting the community or nation. This report is an in-depth
analysis of the domestic infrastructure protection plan and functions of a countrywide
infrastructure protection plan. Terrorism activities can also be performed in the form of cyber-
crimes and data stealing. This report will suggest how companies or the organization can protect
their sensitive information from getting leaked to terrorists. Further, this report will be analyzing
how the US is dealing with the prevention of terrorism.
Infrastructure protection plan
It is necessary to protect the community of the critical infrastructure and key resources
(CKIR) of the US for the country's safety, community wellbeing and protection, and monetary
strength. CKIR includes bodily or virtual assets, systems, and networks that would have an
incapacitating impression on security, people's health or safety, and national economic security.
The national infrastructure protection plan (NIPP) offers synchronized process that is used to
create national significances, areas, and necessities for serious infrastructure and key resource
protection. Federal means are useful in an effective manner to reduce helplessness, determine
intimidations, and diminish the concerns of attacks and other occurrences. This plan identifies
the bodily, cyber, and human reflections required for the effective application of defensive
programs and resiliency strategies. The main feature of a NIPP is to manage the risk. It sets forth
an inclusive risk administration framework and clearly defines the roles and duties for the
department of the nation's security, federal sector-specific agencies, and other tribal, territorial,
and private sector partners. This plan establishes the process for combining significances,
vulnerability, and threat information to produce a systematic and rational assessment of national
or sector risk.
National infrastructure protection plan: risk Management Outline
NIPP involves physical, cyber, and human risk controlling. This plan always tries to advance
the protection of CIKR. There is a cycle on which a NIPP manages the risk (Lewis, 2019).
Document Page
CRIMINAL LAW 2
Set goals and objectives: the chief step is to set a goal or objectives so that all the
resource allocation and planning can take place for better results in the end.
Recognise assets, systems, and networks: once goals or objectives are decided it is
essential to identify the assets, systems, and networks available for use.
Assess risks: it is essential to assess the risk as well for the better and safe future. It is
essential to identify the consequences, vulnerability, and threats in the nation.
Prioritize: after concluding the above steps national infrastructure plan divides the issues
and prioritizes them according to the situation. They classify issues and works on the
ones that are urgent.
Implement programs: NIPP makes programs that support goals or objectives and
implements them for effectiveness.
Measure effectiveness: after all the steps are performed than the NIPP measures the
effectiveness of the strategy.
Why companies need to understand and create a protocol for insider threats
Insider threat is essentially threats related to information that is present on the network.
Insider threat involves three channels. Employees that have legitimate access to the system and
data as a part of their job, temporary workers contracted to do a job within the company, and
outside insider that has gained access to the network through the acquisition of the private
passwords of devices.
It is essential for both private and government companies to protect their data.
Information such as an organization's internal security information or money account
information. This kind of information is too protected for the company's safety. It is not always
hateful performers outside the group that are at fault, insider threats are a actual danger as well
that shouldn’t be ignored.
Protect Organizations from Insider Threats
Implement Prevention Training for Insider Threats
The organization must instrument an effective management structure to educated its
employees and proactively detect threatening signs to minimize insider threats. Organizations
Document Page
CRIMINAL LAW 3
should implement annual cyber security or data privacy training curriculum that is well designed
for employees. Employees should get trained not just with files or documents (Guido). Training
should be interactive and should involve employees. Employees should be able to recognize the
difference between malicious emails and valid ones.
Minimize Risk by Categorization
Separating employees in different categories will surely minimize the risk. Employees
can be categorized into two groups’ privileged employees and standard employees.
Privileged employees: those that have access to sensitive information and data are
privileged employees and are most trusted by the company. Also, these employees have a huge
risk to an insider threat that is the reason they should be provided with a more secure system and
networks. Remaining employees can be categorized as the standard employee of the company.
They require less restriction compared to privileged employees.
Prevention from terrorism
Protecting the American individuals from terrorism threats remains at the highest priority.
Homeland security was formed to protect American individuals from terrorist threats and there
only priority is to protect the nation from terrorism. The United States faces danger from
terrorist's activities. For protecting the US from these activities states use weapons of mass
destruction such as radiological, chemical, biological, and nuclear weapons. The department of
homeland security works every day to protect American individuals from danger (security,
2019).
There is a separate department established for generating terrorism information. The
national terrorism advisory system links information about terrorist threats. They provide
detailed information to the government, public, and first responders about emerging issues, to
look up for the solution.
Conclusion
Terrorism is a serious threat internationally. The more important fact is how the nation's
government and public dealing with this threat. In summary, this report aims to make people
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CRIMINAL LAW 4
aware of terrorist activities and prevention from unlawful violence. Countering terrorism is a
major challenge for the US. It is essential for the government and the public to have basic
knowledge about the topic and seriousness attached to it.
Document Page
CRIMINAL LAW 5
References
Guido, M. D. (n.d.). Insider threat program best practices. In 2013 46th Hawaii International.
Conference on System Sciences, 1831-1839.
Lewis, T. G. (2019). Critical infrastructure protection in homeland security: defending a
networked nation. John Wiley & Sons.
security, H. (2019, February). Preventing Terrorism. Retrieved March 08, 2020, from Homeland
security: https://www.dhs.gov/topic/preventing-terrorism
Whittaker, D. J. (2012). The terrorism reader. Routledge.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]