Key issue / Introduction
The Department of Homeland Security was created in 2002 to protect the homeland security of the United States. Cybersecurity is a goal of the department and involves the protection against the unauthorized or illegal use of electronic information or data. It involves the protection of computers, networks, data and programs. Cybersecurity involves a number of factors. Those will malicious intentions can have operated from any place in the world. Cyberspace and systems that are physical have strong linkages. Vulnerabilities to cyberspace are difficult to reduce. Those who invade and attack cyberspace are difficult to identify due to the complexity of the cyber network. And, cyberspace had the potential to pose serious threats to critical governmental infrastructure. The cause for the increase in factors that must be addressed by cybersecurity is the growth in technology. Wide scale invasions on infrastructure operations can cause damage or a disruption of services that have the potential to impact the operation of the government, the American society as well as the daily lives of American citizens. The Department of Homeland Security, in response to these threats, must create a cybersecurity system that addresses each of these issues but also must do so in a manner that forgoes the invasion of privacy of American citizens. A key issue in cybersecurity today is the impact of homeland security activities and programs on the protection of privacy of citizens. The protection against cyber-attacks including breaches, phishing and fraud requires the Department of Homeland Security to incorporate a variety of programs and activities. To date, these programs and activities include education, coordination, regulation, response, research, development and the providing of incentives as well as criminal investigations, and sharing of information.
Research Question
Has the programs and activities created by the Homeland Security to address cybersecurity resulted in the protection of privacy of American citizens?
Research Hypothesis
Research Variables
The measurable variables evaluated in this paper include the public’s perception of privacy and the adequacy of cyber security. The variables include the extent of control that American citizens feel that they have over the amount of personal information being obtained by companies, the confidence level that Americans have in the level of cyber security offered by the Department of Homeland Security, and the level of protection and regulation expected by American citizens. Each of these variable will be determined by an evaluation of the literature available through the Department of Homeland Security website, a variety of surveys pertaining the nature of America’s perception of privacy in this regard and the available scholarly research pertaining to the topic produced within the last ten years.
Literature Review
Chickowski, E. (2016, April 28). Government Cybersecurity Performance, Confidence Bottoms Out. Retrieved from Risk: http://www.darkreading.com/risk/government-cybersecurity-performance-confidence-bottoms-out/d/d-id/1325311
In this journal article, the author discusses a couple of studies conducted concerning the confidence that Americans have in the government’s providing of cybersecurity. The study reveals that the confidence level is low,
Clark, R. (2009). Privacy impact assessment: Its origins and development. Computerlaw & Security Review, 25(2), 123-135.
A privacy impact assessment is conducted by the Department of Homeland Security to identify and mitigate risks of privacy for citizens. The assessment is intended to ensure that policies regarding privacy are adhered to and to determine what risks and effects policies are resulting in.
Keller, J., Lai, R., & Perlroth, N. (2015, July 29). How Many Times Has Your Personal Information Been Exposed to Hackers? Retrieved from The New York Times: http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html?_r=0
This is a New York Times article reviewing the issue of privacy invasions, the article provides information about the number and impact of cyberattacks on American citizens,
Madden, M., & Rainie, L. (2015). Ameicans' Attitudes About Privacy, Security and Surveillance. Retrieved from Pew Research Center: http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/
This article provides the results of a study conducted to determine how Americans feel and their privacy in relations to cybersecurity. The article is useful for this research as it specifically addresses one of the variables to be considered.
Prieto, D., & Evan, W. (2012). Cybersecurity & the Department of Homeland Security. The Aspen Institute of Homeland Security Group's Cyber Working Group.
This article is an evaluation of cybersecurity as it relates to the Department of Homeland Security. It has provided invaluable information for this paper as it details the activities and programs offered by the Department of Homeland Security for cybersecurity.
Seifert, J. W. (2007). Data Mining and Homeland Security: An Overview. Congressional Research Service.
This article is a report created for Congress relating to data mining, the report provides information about the Department of Homeland Security’s role in data mining as well as its role in protecting the privacy of American citizens.
Results
Extent of control that American citizens feel that they have over the amount of personal information being obtained by companies
A Pew Research Survey evaluated the views of Americans pertaining to privacy. The results indicate that most Americans believe it is important to maintain their own privacy and confidentiality in daily activates. This opinion is especially noticeable when it comes to being aware of what information about them is being collected and who is doing the collecting. These attitudes encompass their wishes that they can preserve privacy in “their homes, at work, during social gatherings, at times when they want to be alone and when they are moving around in public”. When they are asked to consider their day to day interactions and how important privacy to them, the majority stated that these dimensions are at least “somewhat important” and many express the view that these aspects of personal information control are “very important.” Survey results in 2015 revealed that 93% of adults say that being in control of who gets information concerning them is important; 74% feel this is “very important,” while 19% say it is “somewhat important.”, 90% say that having control over what information is obtained concerning them is important—65% think it is “very important” and 25% say it is “somewhat important.” .
In a 2015 cyber-attack, hackers took personal information belonging to over 2.5 million people. Cyber-attacks occur on a daily basis in America. Whether or not Americans are aware of the threat, it exists every day in society.
Confidence level that Americans have in the level of cyber security offered by the Department of Homeland Security
The interest of privacy in cybersecurity requires the establishment of protocols and oversights by the government and by the individual. Spyware, viruses, worms, malware as well as fraud all pose a threat to American consumers. The confidence level of Americans in how the government is protecting them from such threats is not currently high. After the large breaches in the critical infrastructure of the Office of Professional Management and the Internal Revenue Service, Americans are expressing their lack of trust in cybersecurity offered by the Department of Homeland Security . A study by the SecurityScorecard found that the government ranks the lowers in cybersecurity performance among eighteen different industries which include educational institutions, healthcare organizations and legal organizations. A report created by the Government Business Council admonished the government for its cybersecurity abilities stating that “the federal government appears to still be in the beginning stages of constructing more robust cybersecurity strategies”.
Level of protection and regulation expected by American citizens in cyberspace
Using the internet affects an individual’s right to privacy in his or her own personal data. Transactions that occur on the internet produce personal information through insecure electronic transmission, trails and logs of data in email and web page tracking. Data matching also raises privacy issues on the internet. Data matching occurs there occurs a cross check by a company from one source against another. Individuals have the responsibility to ensure, to the extent possible, that their own privacy is maintained. However, many individuals expect protection from the government. This protection is provided by the Department of Homeland Security.
Analysis
As cyberspace evolves and networks become more interconnected, personal data is generated through nearly every routine activity of American citizens. Threats to security in cyberspace will grow just as the entire system of the internet has grown. These threats often include the invasion of privacy. For this reason, privacy has become a policy issue within the United States government, largely due to the growth of social and economic institutions, the increase in dependence on information and advances in information technology. Privacy values should be reinforced in order to ensure cyber security respects privacy rights. The Department of Homeland Security has instituted a variety of activities and programs to protect computers, networks, programs and data from unintended and unauthorized access, change or destruction.
President George W. Bush created the Comprehensive National Cybersecurity Initiative which sets for the role of the Department of Homeland Security in cybersecurity. The activities implemented by the Department of Homeland Security include education, coordination, regulation, response, research, development and the providing of incentives.
The creation of the Office of Infrastructure Protection and the Office of Cybersecurity and Communication have given the Department of Homeland authority to perform watch and mission functions. The Office of Infrastructure Protection is the leader of security for infrastructures. It has established programs and policies, and it conducts assessments for both state and private organizations. This officer also provides training and a variety of tools to both private and state organizations and identifies the risks that may be new and emerging. The Office of Cybersecurity and Communication monitors both the public and private domains to ensure the protect against disruptions to information that is critical.
The Cybersecurity Act of 2015 implemented for the Department of Homeland Security allows network operators to monitor the security of cyberspace, operate defensively and share information obtained regarding cybersecurity with others. The Act also promotes the Department of Homeland Security as the hub for cyber sharing. The Department of Homeland Security is to create an automated system for sharing of information that could be a threat to cyber security.
The Department of Homeland Security also created the National Infrastructure Protection Plan which establishes a plan on how the government and private entities can manage risks, and achieve security by working together. This plan includes a variety of programs and activities aimed toward cybersecurity and the protection of the privacy of Americans.
The Department of Homeland Security also engages in data mining. Data mining is used to identify fraudulent activities, and assess the risk of cybersecurity . Data analysis tools are used to identify patterns and relationships that exist in data sets. This allows the Department of Homeland Security to identify terrorism through a variety of communication networks. It also allows for identification of privacy invasions as they coincide with other types of crimes.
Information sharing is a critical aspect of the Department of Homeland Security’s cybersecurity actions. Information sharing programs have been created that allow the Department of Homeland Security to share critical information with private entities that operate critical infrastructure throughout the country. Information is also shared with government entities at the state and local levels. Information about cyber threats, cyber-attacks and vulnerabilities are shared.
The programs and activities implemented by the Department of Homeland Security are sufficient to protect the privacy of citizens.
Conclusion
The Department of Homeland Security offers programs and activities that include the education and training of individuals and companies as well as the management of a variety of programs. However, public awareness is a critical aspect of cybersecurity. Individual Americans need to be aware of cyber threats, act more safe online and ensure connections are secure. Americans are well aware of issues relating to the protection of security. The protection of privacy is important to nearly all Americans as studies have indicated. The extent of control that American citizens feel that they have over the amount of personal information being obtained by companies is an important issue as well. However, cyberattacks occur on a daily basis. The expectation of protection by the government has not yet been evaluated. The confidence level that Americans have in the level of cyber security offered by the Department of Homeland Security may also be limited as indicated in studies. Individuals have the responsibility to ensure, to the extent possible, that their own privacy is maintained. However, many individuals expect protection from the government. This protection is provided by the Department of Homeland Security. Cybersecurity involves a number of factors. Those will malicious intentions can and have operated from all over the world. Cyberspace and systems that are physical have strong linkages. Vulnerabilities to cyberspace are difficult to reduce. Those who invade cyberspace are difficult to identify due to the complexity of the cyber network. And, cyberspace also has the potential to pose serious threats to critical governmental infrastructure. The cause for the increase in factors that must be addressed by cybersecurity is the growth in technology. Wide scale invasions on infrastructure operations can cause damage or a disruption of services that have the potential to impact the operation of the government, the American society as well as the daily lives of American citizens. Homeland security, in response to these threats, must create a cybersecurity system that addresses each of these issues but also must do so in a manner that forgoes the invasion of privacy of American citizens. A key issue in cybersecurity today is the impact of homeland security activities and programs on the privacy of citizens. The protection against cyber-attacks including breaches, phishing and fraud requires the Department of Homeland Security to incorporate a variety of programs and activities. To date, these programs and activities include education, coordination, regulation, response, research, development and the providing of incentives as well as criminal investigations, data mining and sharing of information. Yet, this appears to not be enough to protect the privacy of American citizens. Citizens must also do their part in cybersecurity.
References
Chickowski, E. (2016, April 28). Government Cybersecurity Performance, Confidence Bottoms Out. Retrieved from Risk: http://www.darkreading.com/risk/government-cybersecurity-performance-confidence-bottoms-out/d/d-id/1325311
Clark, R. (2009). Privacy impact assessment: Its origins and development. Computerlaw & Security Review, 25(2), 123-135.
Keller, J., Lai, R., & Perlroth, N. (2015, July 29). How Many Times Has Your Personal Information Been Exposed to Hackers? Retrieved from The New York Times: http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html?_r=0
Madden, M., & Rainie, L. (2015). Ameicans' Attitudes About Privacy, Security and Surveillance. Retrieved from Pew Research Center: http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/
Office of Cybersecurity and Communications. (2016). Retrieved from https://www.dhs.gov/office-infrastructure-protection
Office of Infrastructure Protection. (2016). Retrieved from https://www.dhs.gov/office-infrastructure-protection
Prieto, D., & Evan, W. (2012). Cybersecurity & the Department of Homeland Security. The Aspen Institute of Homeland Security Group's Cyber Working Group.
Seifert, J. W. (2007). Data Mining and Homeland Security: An Overview. Congressional Research Service.