There has been a skyrocket in the number of cybercrimes in the recent past due to the development of novel software, malware, viruses, among other risky means. Although t he development of Cybersecurity has successful in dealing with cybercrimes , much efforts are still needed because cybercrime is still evolving . Cybersecurity is a novel field that protects information systems against cybercrimes ( Kosseff , 2018) . Cyber threats pose a variety of unique concerns to governments, business companies, and organizations, including the challenges in dealing with critical issues about information safety. Due to daily increase in cyber threats, there is a need to do more research to advance the Cybersecurity field .
RQ: What are the best strategies in dealing with cybercrimes in Homeland Security?
Almost every day, one will hear of an instance s of cybercrime activity, whether in the form of intellectual property theft, embezzlement, fraud, or other criminal activities. Organizations, state and federal governments, and people are increasingly becoming wary of the increased number of cybercrime. Government comprehends that these attacks, especially on critical infrastructures such as financial institutions, can have detrimental effects on the economy. As a result, any government must devise effective cybersecurity strategies to prevent future cyberattacks on critical infrastructure. Many people often use cybercrime prevention strategies and cybersecurity strategies terms interchangeably, not knowing that they bear some differences. Although the terms complement each other, they are not identical. Cybercrime prevention strategies, directly and indirectly, deal with crime prevention and criminal justice programs, practices, and policies. Contrary, cybersecurity strategies offer a roadmap o n cybersecurity matters, including cybercrime prevention, by outlining objectives, measures, action plans, and responsible institutions. Therefore, the government must develop better cybersecurity strategies and solutions counter the ever-growing and evolving c yber threats. The research question will also prompt the researcher to identify the most significant cyber threats affecting Homeland Security before suggesting the best strategies against these threats. In answering the research question, considerations to some aspects are vital in the study, such as the effects of cyber threats on the overall company performance, the leading cause of cyber threats (internal and external), and the strategies developed. Regarding the three parts of the study question, the following hypothesis will guide the research.
Delegate your assignment to our experts and they will do the rest.
Hypotheses
There is a direct relationship between a cyber threat and a company's performance
There is no direct relationship between the cyber threats facing an organization and the organization’s workforce.
There is a direct relationship between cyber security strategies and the safety of organizational information.
Regarding the first hypothesis, the research will aim at finding out whether there is any relationship between cyber threats and company's performance. This hypothesis partially answers the research question by dealing with the effects of cyber threats on an organization 's performance. At this level, the research will first identify the cyber threats affecting Homeland Security Company. Secondly, a better analysis of the effects of these threats will be done by the company as this is important when focusing on setting the best emergency strategies for information security reasons.
This hypothesis will also guide the research on the specificity of the threats, whether each threat has a specific outcome or produces various results. Some cyberthreats are specific to the kind of damage caused, while others cause diverse effects. This information will also be necessary for the research, especially when designing the best strategies for doing away with cyber threats.
The second hypothesis brings a comparison between the cyber threats and the Homeland Security workforce. This hypothesis is a guideline on finding out whether the company's cyber crimes are coming from internal or external. By carrying out the research, it will be possible to determine whether the company's employees are also part of the causative agents to the company's threats.
Through analysis of different data, it will be evident on the major causes of most cybercrimes facing the company. Homeland security is one of the most technologically advanced company's and thus least expected to suffer from cyber threats, unlike other developing companies. However, if the company's workforce is leaking secretes, intruders will automatically attack the company. This research will therefore find out whether the company's employees also take part in perpetuating cybercrimes.
The last hypothesis is bringing a correlation between the strategies adopted and the company's overall information safety. This hypothesis is a guide that largely answers the research question, as it evaluates the effectiveness of the strategies adopted. However, before evaluating the strategy, the research will first propose several strategies and solutions that will help the company avoid cyber threats and other related risks.
Homeland Security will utilize the suggested solutions, evaluate them, and develop the best strategies to promote the company's Cybersecurity. The company will consider various factors before selecting the best and effective method. Cost, profitability, technicalities in the process, and the strategy's impacts on the regular running of the company will be the key factors to consider.
Common Arguments from Media and in Academia
According to Benzel (2015), Homeland Security faces various threats: malware, phishing, Trojan horse, and viruses. These threats pose considerable damages to the company's information as intruders use them to hack and access its data. The threats often alter or delete the company's data, thus affecting its overall performance. This argument supports the first hypothesis on the relationship between cyber threats and the company's performance.
Coulson ( 201 8 ) indicate that people perpetrate most cybercrimes within the company. Most data and information within the Homeland Security is encrypted, and security details are only known to those who work in that field. Any unauthorized access to such information might have happen only with the help of a person within the organization . This argument disagrees with the second hypothetical statement, as there is proof that there is a direct relationship between the company's cyber threats and its workforce.
Lastly, utilizing a full-service online security suite, using strong passwords, periodic updates of software, and managing all settings regarding social media are some of the best strategies for dealing with cybercrimes (Dawson et al., 2021). This argument provides some of the best strategies to help Homeland Security company counter the ever-increasing cyber threats. The argument is congruent to the third hypothesis on the relationship between the strategies adopted and Homeland security's overall information security.
In conclusion, this research project preparation on Homeland Security’s Cybersecurity identifies one study question: What are the best strategies in dealing with the common cybercrimes in Homeland Security. In answering the research question, the paper has suggested three hypothetical statements that guide the entire research. From Academia and Media sources, it is evident that; there is a direct relationship between the cyber threats and both the company’s performance and workforce.
References
Benzel, T. (2015). A Strategic p lan for c ybersecurity r esearch and d evelopment. IEEE Security and Privacy Magazine 13 (4), 3–5.
Coulson, T., Mason, M., & Nestler, V. (2018). Cyber c apability p lanning and the n eed for an e xpanded c ybersecurity w orkforce. Communications of the IIMA, 16 (2), 1-9.
Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the c hallenge of c ybersecurity in c ritical i nfrastructure s ectors. Revista Academiei Fortelor Terestre, 26 (1), 69–75.
Kosseff , J. (2018). Defining c ybersecurity l aw . Iowa Law Review, 103 (3), 985-1031.