Monday, August 26, 2019
Homeland Security Case Study Example | Topics and Well Written Essays - 1250 words
Homeland Security - Case Study Example The actions of this department are what are amalgamated into the term Homeland security. The main focus of this formation is to deal with issues of the domestic population, building the necessary infrastructure to deal with both internal and the external aggressions and threats, sovereignty and the protection of the U.S territory. Inside the United States of America, the ââ¬Å"Homeland Securityâ⬠concept recombines and extends to the state agenciesââ¬â¢ entities and responsibilities. The Homeland security research lays down the composition and formation of the Homeland Defense and the Homeland Security. These include the Transportation Security Administration, the Secret Service of the United States, United States Citizenship and Immigration Services, Americas Immigration and Customs Enforcement, Border and Customs Protection and the United States Coast Guard. Others Include the Federal Emergency Management Agency, the United States National Guard, among other departments adding up to one hundred and eighty-seven companies. The functions of the Homeland security are a major responsibility of the state (Berman & Flint, 2003). There have been several issues that affect the United States of America and that the Department Of Homeland Security has been grappling to deal with over years and presently. These issues include terror attack threats, immigration, capabilities, resource allocation, civil liberties, incident response, transportation security, intelligence, biotechnology, cyber security, infrastructure, funding allocation, border control among other issues. This paper will focus on cyber security threat that has been a challenge to the United States of Americaââ¬â¢s Homeland security. Cyber threats have been a challenge, both in past and present, to the United States. The policy makers and the Department of Homeland Security have been working hard to deal with issues relating to cyber security. The fight has been backed up by the use of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.