25 Sep 2022

43

Government and National Security

Format: APA

Academic level: College

Paper type: Research Paper

Words: 565

Pages: 3

Downloads: 0

The issue being debated about American National Security 

Potential cyberattacks and complex hacking pose the greatest threat to the U.S. national security (Miroff, 2018). In this kind of attacks, nation-states target another country's computers, networks, or databases in their determination to cause damage, disruption, or steal data. Other potential actors can be terrorist and extremists groups, global criminal organizations, political groupings, companies, and hacktivists. This paper seeks to discuss in detail cyber threats and complex hacking attacks on government systems and networks, two competing solutions, the preferable solution, the role of respective levels of government and branches of the federal government. 

Two Competing Solutions to this Problem 

The Department of Defense (DOD) deployed a strategy to ward off risks against China and Russia. Whereas China is demeaning the U.S military capabilities to face enemies, Russia is using the cyberspace to influence the American population and challenge democracy. The DOD plans to use its existing capabilities to gather intelligence as well as prepare for potential conflicts, which includes building forces to conduct cyberspace operations, secure and defend the department of defense data, prepare for destructive attacks towards the U.S., and integrate cyber alliances into its overall plans (Department of Defense, 2018). For that reason, there is a need to enhance the DOD's budget and funding as well as the Department of Homeland Security (DHS) order to strengthen their operations and capabilities.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The second approach is to create public awareness about cyberattacks and ways of detection and prevention. Almost the entire U.S population of approximately 325 million people has at least two digital devices at home while offices (private and government) run on modern technology; which imply that many are exposed to cyber threats. Potential attacks can be minimized if people are educated on ways of avoiding threats.

The Preferable Solution 

The ideal strategy to support the DOD and DHS through increased funding. According to Statista (2018), the Federal Information Security Management Act (FISMA); a statute that was established to protect government information and sensitive data assets against natural and human threats, spent $13.1 billion or 16.3% of the total federal IT funding in 2015. The federal IT funding is expected to reach $45.8 billion by 2019, which indicates the seriousness of the issue. Adequate funds will support the DOD and DHS security strategies of securing government, boosting the security of critical infrastructure, as well as important technologies.

The Responsibilities of the Federal, State, and Local levels of Government 

The Department of Homeland Security (DHS) under the federal government has developed policies to protect government assets against potential. Congress has also played a positive role through the continuous funding towards cybersecurity initiatives (McGalliard, 2018). The state and local governments through their chief information officers should focus on increasing their funding towards cyber threats. The money should be used specifically to create awareness among the employees and the public about cybersecurity. Also, the funds should be invested in information security to improve the security of the network, computer, and database infrastructure in key government institutions (McGalliard, 2018).

The Responsibilities of the Judiciary, the Legislature, and the Executive 

The judiciary, legislature, and executive can play significant roles in minimizing potential cyber threats to national security. The executive can propose new and more effective cybersecurity policy changes and strategies designed to safeguard the nation's cybersecurity. The legislature, on the other hand, can develop and strengthen laws for nation's cybersecurity. Lastly, the judiciary can implement the laws by prosecuting criminals and imposing fines on agencies that do not follow the laid down cybersecurity frameworks (National Conference of State Legislatures, n.d).

References

Department of Defense. (2018). Summary: Department of Defense Cyber Strategy. DoD . Retrieved from https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF

McGalliard, T. (2018, March 18). How Local Governments Can Prevent Cyberattacks. The New York Times . Retrieved from https://www.nytimes.com/2018/03/30/opinion/local-government-cyberattack.html

Miroff, N. (2018, September 5). Hacking, cyber-attacks now the biggest threat to the U.S., Trump's Homeland Security chief warns. The Washington Post. Retrieved from https://www.washingtonpost.com/world/national-security/hacking-cyberattacks-now-the-biggest-threat-to-us-trumps-homeland-security-chief-warns/2018/09/05/d0045800-b119-11e8-a20b-5f4f84429666_story.html

National Conference of State Legislatures. (n.d). Cybersecurity conversation guide: Executive branch, the legislative branch, and higher education. Retrieved from http://www.ncsl.org/documents/taskforces/NCSL_Cybersecurity_Conversation_Guide.pdf

Statista. (2018). The proposed budget of the U.S. government for cybersecurity in FY 2017 to 2019 (in billion U.S. dollars). The Statistics Portal. Retrieved from https://www.statista.com/statistics/675399/us-government-spending-cyber-security/

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Government and National Security.
https://studybounty.com/government-and-national-security-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Professional Athletes and Corrections: Aaron Hernandez

People break the law by engaging in activities that disturb the peace of others. Lawbreakers are punished in different ways that include death, fines, confinement and so forth ( Fox, 1983) . Correctional facilities...

Words: 874

Pages: 3

Views: 120

Financial Investigations: What Could Look Like Fraud But Be Explained by Industry Trends

Case Study 1 _ What are the possible fraud symptoms in this case? _ Eugene’s company is an example of businesses that participate in fraudulent documentation, intending to attract more investors. The past...

Words: 338

Pages: 1

Views: 144

Political Campaign Communication: Inside and Out

Democratic Idealism refers to academic views in which political ethics are based while campaign pragmatism is the measure of value for consultants. The theories behind perfect democracy are established from the...

Words: 286

Pages: 1

Views: 142

Understanding the Human Nature and Capitalist Society

The appraisal of Karl Marx and Adam Smith's conceptions with regards to human nature, needs, conditions, and capacities conceptualizes the ideology of capitalism and economics that echoes the illegitimate interest...

Words: 2324

Pages: 8

Views: 492

Realism Theory: Definition, Explanation, and Criticism

The international relations theory that most accurately describes the world is the realism theory. Realism is based on the principle which indicates that states strive to increase their power when compared to other...

Words: 322

Pages: 1

Views: 162

New Policy Cracks Down on US Military Force Deployability

The US military is one of the most advanced in the world today. Every year, the US spends billions of dollars for the training of its military personnel in readiness to respond rapidly and effectively to any dangers....

Words: 351

Pages: 1

Views: 121

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration