Cyber-Security & Cyber-Terrorism: Analyzing Homeland Security

Topics:
Words:
1045
Pages:
2
This essay sample was donated by a student to help the academic community. Papers provided by EduBirdie writers usually outdo students' samples.

Cite this essay cite-image

As it stands Homeland Security is doing their utmost to prevent cyber terrorism, but the field is always growing, introducing new ways to code and create programs, thus creating new ways for terrorism to occur. The issue is so bad that the European Union has made a convention to prevent cyber attacks in the 21st century. This allows for a standard of prosecution for those of which who have committed Cyber Attacks on whichever country it happened in.

As technology grows, so do the possible loopholes or bugs that come with human error in the matter. The same goes for legacy formats in today’s time. They may seem foolproof but there is always a backdoor into these formats, whether it be one that was found recently or one that was uncovered and never patched because it became outdated. Although the system might be “outdated” as far as industry standards go, that doesn’t prevent normal people or even less successful businesses from using these protocols, rather than having to pay a premium for the newest and latest item. Aforementioned topics don’t cover the portion that goes to Homeland Security. As any government works, there is a budget for everything, yet newer and greater things such as; Protocols, and proxies, cost more and more as time goes on. The budget that Homeland Security is alloted may seem like quite a lot of money -- 47.5 Billion as of 2018 -- the majority of which goes to other departments rather than the department of Cyber Security within Homeland Security. Around 804.4 million dollars is allotted for the protection of Homeland Security’s network itself. This balance includes the amount of money paid to the workers of the agency. The average Penetration Tester/Network Analyst salary is around $71,000 US Dollars. Hypothetically if more money was to be allocated to the Cyber Security department, we could invest in more talented individuals, allowing for Homeland Security to be less strained in their efforts to prevent Cyber Terrorism. This also creates a less saturated career field, allowing more individuals to complete their aspirations while protecting the United States.

Save your time!
We can take care of your essay
  • Proper editing and formatting
  • Free revision, title page, and bibliography
  • Flexible prices and money-back guarantee
Place an order
document

Cyber Terrorism is always changing, no matter how much Homeland Security does, the agency can only do so much to prevent the issue at hand. With infinite number of ways to go about Cyber terrorism, it’s physically impossible to stop every attack on U.S Soil. Cyber Terrorism isn’t just limited to being “truly” cyber, on multiple occasions physical information has been stolen off of a computer or end device at a facility, this is still classified as cyber terrorism. The chances that Homeland Security could prevent every single action taken place against the United States is highly improbable and would cost an exorbitant amount of money, money that Homeland Security doesn’t have access to. Furthermore, within the realm of computers, there are an infinite number of coding “languages”, these lengths of code can be replicated in almost every language in a multitude of different ways, as well as the creation of new languages or different ways to code a program, thus it is impossible for Homeland Security to find a way to replicate or protect even itself from said ways of programming.

Within the realm of Cyber-Terrorism lies new technology, physically speaking. There are new flagship devices out every year, new graphics cards, CPUs, etc. Everything under the sun to create computers or handheld computing devices; A new version is made every year. With each iteration comes loopholes or mishaps that can happen after launch. Vendors like Samsung, Apple, and Google, all release what is called a, “Patch” or a “Hot Patch” for issues that come up. Specifically speaking there has been a couple occasions where these providers have to patch their new device or Operation System on said device, because there is a major flaw that poses a security risk to not only the people who had bought the device, but to the vendor itself. As the technology field grows everyday, so does the risk. With new developments comes new issues, there is not a single piece of technology that doesn’t have some flaw, wherever it might, it is still accessible by those who know of it.

One counterargument to these claims is that the Dept. of Homeland Security is not spending enough money to protect the rest of the United States’ infrastructure, but this isn’t entirely true. As the field of technology grows, network analysts and people-the-like are limited by the technology at the same time. With up and coming devices for networks, it becomes harder to connect to legacy (older) devices, as not everyone has the capability to upgrade to the latest and newest devices, it becomes more and more strained to provide end to end connectivity and security. Another counterargument to prior claims is that simply Homeland Security is not treating the issue with the severity that it deserves. That simply isn’t true, Homeland Security protects the United States’ on more than one front, it is impossible for the agency to focus on one aspect of security else the United States face an issue that it possibly couldn’t protect itself from. Homeland Security does not operate in one way, or act with one solution in mind, their goal is to find blanket solutions that can solve a great deal of issues at once without harming the public or the agency itself.

All-in-all the Dept. of Homeland Security is doing their utmost to protect the United States on every front, including Cyber Security, although this much is being done, it is impossible to prevent every happening. There will always be new loopholes, new issues, but that is just how the Technology field is as of yet, no way of going around that issue is currently possible, or within the realm of expectations for the next few years.

The issue of Cyber-Security and Cyber-Terrorism will affect every person on Earth for the next hundred years and beyond. Cyber-Security will be one of the most spoken topics in the near future, almost guaranteed as the topic is ever-growing and ever-changing, meaning that it will most certainly be around for quite a while, although the reader may not have been affected by this currently, it is almost a one hundred percent chance that they will be at one point or another.

Make sure you submit a unique essay

Our writers will provide you with an essay sample written from scratch: any topic, any deadline, any instructions.

Cite this paper

Cyber-Security & Cyber-Terrorism: Analyzing Homeland Security. (2022, September 27). Edubirdie. Retrieved December 25, 2024, from https://edubirdie.com/examples/the-issue-of-cyber-security-and-cyber-terrorism-analytical-essay-on-homeland-security/
“Cyber-Security & Cyber-Terrorism: Analyzing Homeland Security.” Edubirdie, 27 Sept. 2022, edubirdie.com/examples/the-issue-of-cyber-security-and-cyber-terrorism-analytical-essay-on-homeland-security/
Cyber-Security & Cyber-Terrorism: Analyzing Homeland Security. [online]. Available at: <https://edubirdie.com/examples/the-issue-of-cyber-security-and-cyber-terrorism-analytical-essay-on-homeland-security/> [Accessed 25 Dec. 2024].
Cyber-Security & Cyber-Terrorism: Analyzing Homeland Security [Internet]. Edubirdie. 2022 Sept 27 [cited 2024 Dec 25]. Available from: https://edubirdie.com/examples/the-issue-of-cyber-security-and-cyber-terrorism-analytical-essay-on-homeland-security/
copy

Join our 150k of happy users

  • Get original paper written according to your instructions
  • Save time for what matters most
Place an order

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via support@edubirdie.com.

Check it out!
close
search Stuck on your essay?

We are here 24/7 to write your paper in as fast as 3 hours.