Computer Science Homework Help
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ M4D1: Department of Homeland Security Cybersecurity Organization Module 4 The Department of Homeland Security has many cybersec
M4D1: Department of Homeland Security Cybersecurity Organization
Module 4The Department of Homeland Security has many cybersecurity responsibilities within the U.S. Government. Some of these responsibilities were inherited with legacy organizations and others were originally assigned. In this discussion you will have the chance to assess the strengths and weaknesses of the organization and how that impacts the nation’s cybersecurity.
As always be mindful of plagiarism. The Excelsior Library Writing Help (Links to an external site.) and Online Writing Lab (OWL) (Links to an external site.) are available for assistance.
The module learning outcomes addressed in this activity are:
· Explain the roles and responsibilities of U.S Department of Homeland Security (DHS) in developing and executing national cybersecurity policy (CO #1, #3)
· Discuss the organization and manning of DHS cybersecurity activities (CO #1, #3)
Question
After completing the assigned readings for the module, please respond to the following question in your initial post of at least 300 words, properly cited using given references:
· Identify and discuss the two strengths and two weaknesses in the Department of Homeland Security’s organizational alignment for cybersecurity. Consider recent press stories and congressional testimony in your responses.
·
M4D2: Department of Homeland Security and Department of Defense coordination in cybersecurity
Module 4
One of the challenges in cybersecurity is that by its nature cyberspace does not easily conform to traditional borders and lines of demarcation between foreign and domestic threats, military and criminal threats, or between defense and homeland security responsibilities. Recalling the paradigms discussed in Module 1, the approach taken to cybersecurity can influence the tools used. The United States policy has evolved from responding to threats to critical infrastructure to advanced cybercrime and considerations of cyberwarfare. The lines are thus blurred between DHS and DOD. This discussion gives you an opportunity to assess the lines. Consider the criminal legal authorities granted to DHS that are precluded to DOD. How do the intelligence agencies fit into the picture?
As always be mindful of plagiarism. The Excelsior Library Writing Help (Links to an external site.) and Online Writing Lab (OWL) (Links to an external site.) are available for assistance.
The module learning outcomes addressed in this activity are:
· Describe how DHS works with DOD in responding to cyber threats to U.S. national security (CO #1)
· Identify the differences between DHS and DoD’s cybersecurity efforts (CO #1, #3)
Question
After completing the assigned readings for the module, please respond to the following question in your initial post of at least 300 words, properly cited using given references:
· Discuss the strengths and weaknesses granted by the Memorandum of Understanding between the Department of Homeland Security and the Department of Defense on Cybersecurity. In addition, identify and explain what changes and improvements to the memorandum you would recommend to the Secretaries of these departments.