25 Sep 2022

122

Homeland Security's Cybersecurity Efforts

Format: APA

Academic level: University

Paper type: Capstone Project

Words: 1013

Pages: 3

Downloads: 0

There has been a skyrocket in the number of cybercrimes in the recent past due to the development of novel software, malware, viruses, among other risky means. Although t he development of Cybersecurity has successful in dealing with cybercrimes , much efforts are still needed because cybercrime is still evolving . Cybersecurity is a novel field that protects information systems against cybercrimes ( Kosseff , 2018) . Cyber threats pose a variety of unique concerns to governments, business companies, and organizations, including the challenges in dealing with critical issues about information safety. Due to daily increase in cyber threats, there is a need to do more research to advance the Cybersecurity field . 

RQ: What are the best strategies in dealing with cybercrimes in Homeland Security? 

Almost every day, one will hear of an instance s of cybercrime activity, whether in the form of intellectual property theft, embezzlement, fraud, or other criminal activities. Organizations, state and federal governments, and people are increasingly becoming wary of the increased number of cybercrime. Government comprehends that these attacks, especially on critical infrastructures such as financial institutions, can have detrimental effects on the economy. As a result, any government must devise effective cybersecurity strategies to prevent future cyberattacks on critical infrastructure. Many people often use cybercrime prevention strategies and cybersecurity strategies terms interchangeably, not knowing that they bear some differences. Although the terms complement each other, they are not identical. Cybercrime prevention strategies, directly and indirectly, deal with crime prevention and criminal justice programs, practices, and policies. Contrary, cybersecurity strategies offer a roadmap o n cybersecurity matters, including cybercrime prevention, by outlining objectives, measures, action plans, and responsible institutions. Therefore, the government must develop better cybersecurity strategies and solutions counter the ever-growing and evolving c yber threats. The research question will also prompt the researcher to identify the most significant cyber threats affecting Homeland Security before suggesting the best strategies against these threats. In answering the research question, considerations to some aspects are vital in the study, such as the effects of cyber threats on the overall company performance, the leading cause of cyber threats (internal and external), and the strategies developed. Regarding the three parts of the study question, the following hypothesis will guide the research.  

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Hypotheses 

There is a direct relationship between a cyber threat and a company's performance 

There is no direct relationship between the cyber threats facing an organization and the organization’s workforce.  

There is a direct relationship between cyber security strategies and the safety of organizational information. 

  Regarding the first hypothesis, the research will aim at finding out whether there is any relationship between cyber threats and company's performance. This hypothesis partially answers the research question by dealing with the effects of cyber threats on an organization 's performance. At this level, the research will first identify the cyber threats affecting Homeland Security Company. Secondly, a better analysis of the effects of these threats will be done by the company as this is important when focusing on setting the best emergency strategies for information security reasons.  

This hypothesis will also guide the research on the specificity of the threats, whether each threat has a specific outcome or produces various results. Some cyberthreats are specific to the kind of damage caused, while others cause diverse effects. This information will also be necessary for the research, especially when designing the best strategies for doing away with cyber threats.  

The second hypothesis brings a comparison between the cyber threats and the Homeland Security workforce. This hypothesis is a guideline on finding out whether the company's cyber crimes are coming from internal or external. By carrying out the research, it will be possible to determine whether the company's employees are also part of the causative agents to the company's threats.  

Through analysis of different data, it will be evident on the major causes of most cybercrimes facing the company. Homeland security is one of the most technologically advanced company's and thus least expected to suffer from cyber threats, unlike other developing companies. However, if the company's workforce is leaking secretes, intruders will automatically attack the company. This research will therefore find out whether the company's employees also take part in perpetuating cybercrimes.  

The last hypothesis is bringing a correlation between the strategies adopted and the company's overall information safety. This hypothesis is a guide that largely answers the research question, as it evaluates the effectiveness of the strategies adopted. However, before evaluating the strategy, the research will first propose several strategies and solutions that will help the company avoid cyber threats and other related risks.  

Homeland Security will utilize the suggested solutions, evaluate them, and develop the best strategies to promote the company's Cybersecurity. The company will consider various factors before selecting the best and effective method. Cost, profitability, technicalities in the process, and the strategy's impacts on the regular running of the company will be the key factors to consider.  

Common Arguments from Media and in Academia 

According to Benzel (2015), Homeland Security faces various threats: malware, phishing, Trojan horse, and viruses. These threats pose considerable damages to the company's information as intruders use them to hack and access its data. The threats often alter or delete the company's data, thus affecting its overall performance. This argument supports the first hypothesis on the relationship between cyber threats and the company's performance. 

Coulson ( 201 8 ) indicate that people perpetrate most cybercrimes within the company. Most data and information within the Homeland Security is encrypted, and security details are only known to those who work in that field. Any unauthorized access to such information might have happen only with the help of a person within the organization . This argument disagrees with the second hypothetical statement, as there is proof that there is a direct relationship between the company's cyber threats and its workforce.  

Lastly, utilizing a full-service online security suite, using strong passwords, periodic updates of software, and managing all settings regarding social media are some of the best strategies for dealing with cybercrimes (Dawson et al., 2021). This argument provides some of the best strategies to help Homeland Security company counter the ever-increasing cyber threats. The argument is congruent to the third hypothesis on the relationship between the strategies adopted and Homeland security's overall information security. 

In conclusion, this research project preparation on Homeland Security’s Cybersecurity identifies one study question: What are the best strategies in dealing with the common cybercrimes in Homeland Security. In answering the research question, the paper has suggested three hypothetical statements that guide the entire research. From Academia and Media sources, it is evident that; there is a direct relationship between the cyber threats and both the company’s performance and workforce. 

References 

Benzel, T. (2015). A Strategic p lan for c ybersecurity r esearch and d evelopment.  IEEE Security and Privacy Magazine 13 (4), 3–5. 

Coulson, T., Mason, M., & Nestler, V. (2018). Cyber c apability p lanning and the n eed for an e xpanded c ybersecurity w orkforce.  Communications of the IIMA, 16 (2), 1-9. 

Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the c hallenge of c ybersecurity in c ritical i nfrastructure s ectors.  Revista Academiei Fortelor Terestre, 26 (1), 69–75. 

Kosseff , J. (2018). Defining c ybersecurity l aw . Iowa Law Review, 103 (3), 985-1031. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Homeland Security's Cybersecurity Efforts.
https://studybounty.com/homeland-securitys-cybersecurity-efforts-capstone-project

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 143

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 135

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration