Tuesday, December 31, 2019
Risk Assessment A New Standard Of Security For The...
Risk Assessment Vanhunnik, Tiffani HLSS302 After the events of September 11th 2001, the United States was left in a weakened state. What had happened? What had gone wrong? What did we miss? These questions are what faced a government scrambling to find a plan to ensure that these events did not have an encore. In the year following September 11th 2001 the United States government came together with selected delegates representing both parties of republicans and democrat and the 9/11 commission was erected. A new standard of security for the homeland had to be met and the establishment of the Department of Homeland Security. This brought about the question, what assets to we need to protected and how will we as government fund and protect the security of those assets? The 9/11 commission report was released on the 22nd of July, 2004. Within its pages it was discussed how the nation would move on from this tragedy in the security mind set. The document stated that between the years of 2001 and 2004 spending on Homeland Security rose more than 50 percent, increasing its allocation of funds from $354 billion for $547 billion. (National Commission on Terrorist Attacks upon the United States, 2004) With a large increase of funds that would be allocated just for the Department of Homeland Security, mountains could be moved in the upgrade of the United States national security measures. The 9/11 commission report goes onto speculate that with sudden events comes extremeShow MoreRelatedU.s. Department Of Homeland Security1668 Words à |à 7 Pages1. Purpose Among one of the missions of The U.S. Department of Homeland Security is to protect and preserve the security of the Cyberspace in the country. The principal objective of this Security Plan is to give instructions and direction for the Departmentââ¬â¢s workers and help the Homeland Security to create best practices and strategies in the IT security system. 2. Scope This policy needs to be applied to all users, employees, contractors, suppliers and to all IT resources such as e-mails, filesRead MoreCyber Security Role For Homeland Security Intelligence1153 Words à |à 5 Pagescreation of the Department of Homeland Security and with it pooled federal agencies into in umbrella for it to be centralized in order to be effective. There are three categories in which the Homeland Security Intelligence face in the 21st century. Those categories are technological, political, and cyber security. In this day in age everything from critical infrastructure, government information to money is being digitalized to the internet. Furthermore, it gave a showed a new front in which our nationRead MoreThe Department Of Homeland Security1338 Words à |à 6 Pagesits borders. Until that time the United Statesââ¬â¢ homeland security was under the jurisdiction of the Department of Justice (Masse, Oââ¬â¢Neil, Rollins, 2007). After the attack the Executive branch of the government created a new organization that would be responsible for deciding where the biggest threats to the country were. This was the birth of the Department of Homeland Security. The Department of Homeland Security is responsible for assessing all risk to the Nation within its borders and developingRead MoreManaging A Strong Risk Management Program Essay983 Words à |à 4 Pagesinevitable. In in order to maintain resilience it is important to establish a strong risk management program. It can be difficult to co nceptualize risk management as a program and a framework. It is first important to identify the critical infrastructure and key resources that require risk reduction and the mitigation of consequences. In this essay we will examine how risk management is used by the homeland security enterprise, and how that use benefits such aspects as resource allocation, strategicRead MoreInformation Security and Risk Management1473 Words à |à 6 Pagesactivity. This reversal in focus by both individuals and institutions may simply be a natural response to the reduced capabilities of al-Qaeda and other terrorist networks, as confirmed by the leading authority on terrorism and its effects, and national security analyst for the CNN network, Peter Bergen, who observed recently that the Obama administration has played a large role in reducing terrorist threats by continuing and scaling up many of former President George W. Bushs counter-terrorist methodsRead MoreThe Department Of Homeland Security1 336 Words à |à 6 PagesThe Homeland Security enterprise is tasked with protecting our country from all threats to include threats that have not yet revealed themselves. Thereââ¬â¢s a few methods used to identify these threats, but Iââ¬â¢m going to cover just one of those methods in particularly. To better explain the role of risk management, first Iââ¬â¢ll break down the steps of risk management and explain each one individually. After I have fully addressed the basics of risk management, Iââ¬â¢ll go more in depth on why the DepartmentRead MoreThe Department Of Homeland Security Supplies A National Protection Plan1528 Words à |à 7 PagesThe Department of Homeland Security supplies a national protection plan concerning critical infrastructure security. This plan targets a wide audience, including public and private critical infrastructure owners and administrators. Managing risks through identifying, deterring, and disrupting threats to critical infrastructure is th e direct focus of this plan. The ability of an organization to reduce the impact of a threat that has occurred and reducing the impact of one that may occur is essentialRead MoreRisk Assessment Of Homeland Security1371 Words à |à 6 PagesRisk Assessment in Homeland Security Given the extreme variance of threats presented across the United States as well as its territories and the expensive nature of securing and protecting everything from citizens to critical infrastructure, a system has been developed in order to determine how to best manage risks and allocate resources to protect such elements. This system is composed of formula that has been devised in order to determine the risk to a potential target and the effects of variousRead MoreEssay On Containerized Shipping1724 Words à |à 7 Pagesgrowing concern over the vulnerabilities of port security and the possible exploitation of these vulnerabilities by a terrorist organization; specifically, the use of containerized shipping. The vastness of the process of maritime operations alone creates a large opportunity for vulnerability, but add to it the different regulation requirements by all the different countries involved in the global market and there is a large difference in protection standards a nd the execution of them. This paper willRead MoreProject Part 1 Task 1 Essay1371 Words à |à 6 PagesProject Part 1 Task 1 Draft Risk Management Plan Ernest Martinez Jr. C. Flack IS3110 October 22, 2012 Purpose The Senior Management of the Defense Logistics Information Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.