Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission
Approved for public release; distribution is unlimited === Following the 9/11 terror attacks, the Department of Homeland Security (DHS) was mandated to ensure the security of the nation’s cyber-supported critical infrastructure, which is predominantly privately owned and outside of the control of th...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California: Naval Postgraduate School
2015
|
Online Access: | http://hdl.handle.net/10945/44608 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-44608 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-446082015-02-19T04:03:29Z Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission Lowery, Edward W. Kiernan, Kathleen Fernandez, Lauren National Security Affairs Approved for public release; distribution is unlimited Following the 9/11 terror attacks, the Department of Homeland Security (DHS) was mandated to ensure the security of the nation’s cyber-supported critical infrastructure, which is predominantly privately owned and outside of the control of the U.S. government. This thesis examines the development of the government’s cyber-security policies and primary operational entities through their lawful authorities and capabilities. The thesis also examines and contrasts the effectiveness of DHS’s technology-centric, cyber-security approach, the deterrent effect realized through law enforcement cyber operations, and the suitability and effectiveness of the utilization of military or intelligence agencies, specifically the FBI, National Security Agency or Department of Defense, to fulfill the nation’s domestic cyber-security mission. Evidence suggests that DHS has consistently chosen to devote disproportionate budgetary resources to develop defensive technologies of questionable effectiveness, initiate redundant information-sharing programs, and develop cyber incidence response teams while not fully utilizing the U.S. Secret Service’s legal authorities and capabilities in furtherance of the department’s mission. Recommendations are offered to develop a whole-of-government cyber-security policy for an effective, integrated, cyber-security operation through the utilization of agency-specific authorities and capabilities, while protecting our nation’s critical infrastructure and our citizens’ civil liberties. 2015-02-18T00:17:53Z 2015-02-18T00:17:53Z 2014-12 Thesis http://hdl.handle.net/10945/44608 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. Monterey, California: Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Approved for public release; distribution is unlimited === Following the 9/11 terror attacks, the Department of Homeland Security (DHS) was mandated to ensure the security of the nation’s cyber-supported critical infrastructure, which is predominantly privately owned and outside of the control of the U.S. government. This thesis examines the development of the government’s cyber-security policies and primary operational entities through their lawful authorities and capabilities. The thesis also examines and contrasts the effectiveness of DHS’s technology-centric, cyber-security approach, the deterrent effect realized through law enforcement cyber operations, and the suitability and effectiveness of the utilization of military or intelligence agencies, specifically the FBI, National Security Agency or Department of Defense, to fulfill the nation’s domestic cyber-security mission. Evidence suggests that DHS has consistently chosen to devote disproportionate budgetary resources to develop defensive technologies of questionable effectiveness, initiate redundant information-sharing programs, and develop cyber incidence response teams while not fully utilizing the U.S. Secret Service’s legal authorities and capabilities in furtherance of the department’s mission. Recommendations are offered to develop a whole-of-government cyber-security policy for an effective, integrated, cyber-security operation through the utilization of agency-specific authorities and capabilities, while protecting our nation’s critical infrastructure and our citizens’ civil liberties. |
author2 |
Kiernan, Kathleen |
author_facet |
Kiernan, Kathleen Lowery, Edward W. |
author |
Lowery, Edward W. |
spellingShingle |
Lowery, Edward W. Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission |
author_sort |
Lowery, Edward W. |
title |
Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission |
title_short |
Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission |
title_full |
Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission |
title_fullStr |
Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission |
title_full_unstemmed |
Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission |
title_sort |
closing the cyber gap: integrating cross-government cyber capabilities to support the dhs cyber security mission |
publisher |
Monterey, California: Naval Postgraduate School |
publishDate |
2015 |
url |
http://hdl.handle.net/10945/44608 |
work_keys_str_mv |
AT loweryedwardw closingthecybergapintegratingcrossgovernmentcybercapabilitiestosupportthedhscybersecuritymission |
_version_ |
1716730894786494464 |