Homeland Security

Read Complete Research Material

HOMELAND SECURITY

Homeland Security



Homeland Security

Introduction

Today we enjoy increased sophistication in computer and internet technologies, in terms of power, storage capacity and communication speed. Various sorts of applications including personal, business and government continue to multiply on the Internet. The Internet has undoubtedly become essential for the world's economic competitiveness, innovation and well being. Though, advanced internet technologies have many advantages, However, the growth in technology also increases the opportunity of cyber crime (Edward A. 2006). The network-based applications often pose security risks to individuals as well as to the information resources of companies and governments. The world wide connectivity of computer network has made computer crime an international issue. Cyber security deals with the protection of computers, networks, databases, data centers and applications, by designing effective procedures and methodologies.

Situation of Cyber Crime

Over past few years, cyber security threats have become much more organized. Hackers or intruders now are more focused in causing and designing the systems for organized crimes. The intrusion is planned in a systematic way. Prior to intruding in any system, the hackers set the target for their goals. They look for vulnerabilities in the victim's system. We can easily observe an increase in the investment for creating new cyber threats. Also, more advanced techniques for intruding into military and defense systems have been developed during the past years, which is the major threat for the national infrastructure. Surprisingly, even less trained hackers are easily able to use those with a little experience. Threats also involve the innovation of more destructive capabilities.

Computers are now used in every area, which motivates the hackers for targeting (Lemieux F., 2011). Networks are now designed and made to facilitate every one with the sharing and distribution of data quickly and easily. Governments tend to provide access to the confidential databases, so that people may find information of interest easily. It is problematic to control access to these resources because the requirement for accessing the available information has to balance with the value of the content of that information. Therefore, intruders can easily enter into the system by using a little technology.

National Vulnerabilities to Cyber Threats

The national infrastructure is vulnerable to the cyber threats caused intentionally or unintentionally. Various groups can cause threats for the government's confidential databases or software/hardware infrastructure. The main sources of threat for the national infrastructure include criminal groups, terrorists, foreign nation who could cause security threats for the reasons of monetary gains, political advantage or the information warfare (GAO, 2012).

The cyber threats become more serious for the national infrastructure due to the vulnerabilities found in the major and supporting federal systems. The major features of information such as integrity, confidentiality and availability are highly vulnerable to risk due to the weaknesses in information security control of the national infrastructure. Therefore, the cyber threats can cause significant harm to the assets, operations and personnel of the federal government agencies.

The number of cyber security incidents has been increased to an alarming percentage over a period of past ...
Related Ads