Governmental Bodies Managing Cyber Threats

The most pressing issue in regards to homeland security is the dependency of the major critical infrastructures on Information Technology (IT). Cybersecurity is one of the biggest threats, which the current system of homeland security has not yet learned to manage efficiently. The energy and finance sectors, as well as transportation systems in the nation partially rely on technology and electronic data. Thus, the security of these frameworks is crucial to maintain overall national security and prosperity. Federal and state agencies face the challenge of protecting confidential and sensitive data as the aforementioned systems contain massive amounts of personally identifiable information (PII) (U.S. Government Accountability Office, n.d.).

There are numerous reasons as to why this could be considered the most pressing issue. First, the risks are increasing and diversifying, including both insider threats and external destructive data breaches. The U.S. Government Accountability Office (n.d.) identifies four primary challenges in regards to cybersecurity. They include the protection of critical cyber infrastructure, the security of PII, the development of a comprehensive cybersecurity strategy, as well as the security of federal systems. Each challenge has a set of appropriate solutions, which should be implemented.

The recent cyber-attacks demonstrate the urgency of the need to develop efficient methods to address the issues. In regards to a cybersecurity strategy, the federal government has to develop a new, more comprehensive action plan in order to “mitigate global supply chain risks (…), address cybersecurity workforce management challenges, ensure the security of emerging technologies” (U.S. Government Accountability Office, n.d.). The primary solutions to secure federal systems are to invest in the implementation of government-wide initiatives, battle the weaknesses in the information systems of federal agencies, as well as enhance the response from federal authorities to cyber emergencies. In order to protect critical infrastructure, there is a need to “strengthen the federal role in protecting the cybersecurity of critical infrastructure (e.g., electricity grid and telecommunications networks)” (U.S. Government Accountability Office, n.d., para. 33). Finally, to protect personal data, the federal system has to properly control, limit, and oversee the collection of personal and sensitive data.

In addition, it is important to recognize the role of governmental bodies dedicated specifically to reviewing the federal response to cyber threats. U.S. Government Accountability Office (n.d.) notes that there is still a need for Congressional action in terms of developing and implementing the consumer privacy framework and reviewing “issues such as adequacy of consumers’ ability to access, correct, and control their personal information, and privacy controls related to new technologies” (para. 33). The Department of Homeland Security faces the rise of Internet-based threats as crime moves to the digital arena, and foreign adversaries begin to strengthen in cyberspace.

I have to admit that before starting this course, I was unaware of the nuances of the tasks performed by the Department of Homeland Security. For example, I used to believe that the primary role of the Department is to combat terrorism. Probably due to misinformed assumptions based on media reports and years of consuming easy-to-digest, viewer-friendly news, I have made false conclusions. Now, it is apparent to me that the Department of Homeland Security does not deal exclusively with terrorist threats.

In fact, studying the history of the nation’s establishment of homeland security agencies has taught me the importance of an all-hazards approach. For instance, in the 1980s, the Federal Emergency Management Agency focused primarily on nuclear threats, thus disregarding the dangers posed by natural disasters (Adamski, 2006). Therefore, it is now evident to me that the Department deals with a multitude of threats, including natural hazards, cyber attacks, terrorism, and many others. The COVID-19 pandemic has demonstrated that the dangers related to public health are also a concern of the Department of Homeland Security. After all, our nation seems to be hyper-focused on certain threats, but it does not mean that they are the only ones. In the 1980s, there was a nuclear threat, in the early 2000s, a terrorist threat after Hurricane Katrina, a natural disaster, and so on.

For me, there was never a singular “AHA” moment but rather a series of lessons, which I have found a way to integrate into my belief system. There is a common misconception surrounding the existence of faith or God’s will, and the true importance of preparation. After all, if people can rely on God for anything, they should have no concerns over their future since the Lord will protect them. Similarly, even the most secure environment on Earth could become dangerous if God decides so. However, completing the assignments for this course and re-interpreting verses from the Scripture has taught me the importance of mitigation and preparedness. Proverb 24:17 notes “Prepare your work outside; get everything ready for yourself in the field, and after that build your house.” It is crucial to recognize the role of the efforts to ensure one is prepared for a potential disaster. Learning about the emergency management stages has demonstrated how complex the process of mitigating risk and preparing for a disaster actually is.

References

Adamski, T., Kline, B., & Tyrrell, T. (2006). FEMA reorganization and the response to hurricane disaster relief. Perspectives in Public Affairs, 3, 1-36. Web.

U.S. Government Accountability Office. (n.d.). Ensuring the cybersecurity of the nation. GAO. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2022, August 30). Governmental Bodies Managing Cyber Threats. https://studycorgi.com/governmental-bodies-managing-cyber-threats/

Work Cited

"Governmental Bodies Managing Cyber Threats." StudyCorgi, 30 Aug. 2022, studycorgi.com/governmental-bodies-managing-cyber-threats/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Governmental Bodies Managing Cyber Threats'. 30 August.

1. StudyCorgi. "Governmental Bodies Managing Cyber Threats." August 30, 2022. https://studycorgi.com/governmental-bodies-managing-cyber-threats/.


Bibliography


StudyCorgi. "Governmental Bodies Managing Cyber Threats." August 30, 2022. https://studycorgi.com/governmental-bodies-managing-cyber-threats/.

References

StudyCorgi. 2022. "Governmental Bodies Managing Cyber Threats." August 30, 2022. https://studycorgi.com/governmental-bodies-managing-cyber-threats/.

This paper, “Governmental Bodies Managing Cyber Threats”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.