Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission

Approved for public release; distribution is unlimited === Following the 9/11 terror attacks, the Department of Homeland Security (DHS) was mandated to ensure the security of the nation’s cyber-supported critical infrastructure, which is predominantly privately owned and outside of the control of th...

Full description

Bibliographic Details
Main Author: Lowery, Edward W.
Other Authors: Kiernan, Kathleen
Published: Monterey, California: Naval Postgraduate School 2015
Online Access:http://hdl.handle.net/10945/44608
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-44608
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-446082015-02-19T04:03:29Z Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission Lowery, Edward W. Kiernan, Kathleen Fernandez, Lauren National Security Affairs Approved for public release; distribution is unlimited Following the 9/11 terror attacks, the Department of Homeland Security (DHS) was mandated to ensure the security of the nation’s cyber-supported critical infrastructure, which is predominantly privately owned and outside of the control of the U.S. government. This thesis examines the development of the government’s cyber-security policies and primary operational entities through their lawful authorities and capabilities. The thesis also examines and contrasts the effectiveness of DHS’s technology-centric, cyber-security approach, the deterrent effect realized through law enforcement cyber operations, and the suitability and effectiveness of the utilization of military or intelligence agencies, specifically the FBI, National Security Agency or Department of Defense, to fulfill the nation’s domestic cyber-security mission. Evidence suggests that DHS has consistently chosen to devote disproportionate budgetary resources to develop defensive technologies of questionable effectiveness, initiate redundant information-sharing programs, and develop cyber incidence response teams while not fully utilizing the U.S. Secret Service’s legal authorities and capabilities in furtherance of the department’s mission. Recommendations are offered to develop a whole-of-government cyber-security policy for an effective, integrated, cyber-security operation through the utilization of agency-specific authorities and capabilities, while protecting our nation’s critical infrastructure and our citizens’ civil liberties. 2015-02-18T00:17:53Z 2015-02-18T00:17:53Z 2014-12 Thesis http://hdl.handle.net/10945/44608 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. Monterey, California: Naval Postgraduate School
collection NDLTD
sources NDLTD
description Approved for public release; distribution is unlimited === Following the 9/11 terror attacks, the Department of Homeland Security (DHS) was mandated to ensure the security of the nation’s cyber-supported critical infrastructure, which is predominantly privately owned and outside of the control of the U.S. government. This thesis examines the development of the government’s cyber-security policies and primary operational entities through their lawful authorities and capabilities. The thesis also examines and contrasts the effectiveness of DHS’s technology-centric, cyber-security approach, the deterrent effect realized through law enforcement cyber operations, and the suitability and effectiveness of the utilization of military or intelligence agencies, specifically the FBI, National Security Agency or Department of Defense, to fulfill the nation’s domestic cyber-security mission. Evidence suggests that DHS has consistently chosen to devote disproportionate budgetary resources to develop defensive technologies of questionable effectiveness, initiate redundant information-sharing programs, and develop cyber incidence response teams while not fully utilizing the U.S. Secret Service’s legal authorities and capabilities in furtherance of the department’s mission. Recommendations are offered to develop a whole-of-government cyber-security policy for an effective, integrated, cyber-security operation through the utilization of agency-specific authorities and capabilities, while protecting our nation’s critical infrastructure and our citizens’ civil liberties.
author2 Kiernan, Kathleen
author_facet Kiernan, Kathleen
Lowery, Edward W.
author Lowery, Edward W.
spellingShingle Lowery, Edward W.
Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission
author_sort Lowery, Edward W.
title Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission
title_short Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission
title_full Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission
title_fullStr Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission
title_full_unstemmed Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission
title_sort closing the cyber gap: integrating cross-government cyber capabilities to support the dhs cyber security mission
publisher Monterey, California: Naval Postgraduate School
publishDate 2015
url http://hdl.handle.net/10945/44608
work_keys_str_mv AT loweryedwardw closingthecybergapintegratingcrossgovernmentcybercapabilitiestosupportthedhscybersecuritymission
_version_ 1716730894786494464