Answered You can hire a professional tutor to get the answer.
I will pay for the following essay Organization of Security Plan. The essay is to be 3 pages with three to five sources, with in-text citations and a reference page.While the aims of such activities a
I will pay for the following essay Organization of Security Plan. The essay is to be 3 pages with three to five sources, with in-text citations and a reference page.
While the aims of such activities are normally driven by the need to access information enough to compromise the market plans for a business organization, it is fatal in the case of security-related organizations such as the department of Homeland security. In this paper, the aim is to prepare a security plan providing security awareness policy for the Department of Homeland Security.
The Department of Homeland security (DHS) is tasked with ensuring that the United States and its citizens are protected against countless threats faced each day. With a workforce of over 240,000 staff, the department’s role is not limited to terrorism. Rather, any activity that seems to jeopardize the security of the American people is detected and subsequently dealt with extensively before it occurs. Cyber-security is on top of the department’s list where cases of hacking are mitigated and culprits arrested where possible. Thus, cyber-attacks are very common to the DHS, and it recently stated that this was one of the major threats the US faces (Kahan, 2014). Though sometimes, mere criminals orchestrate these cases, there is no telling at whose behest they commit such crimes.
In addition to cyber-attacks, the DHS faces the issue of terrorism where terror groups would like to exploit any lapses on the department’s part. Since the department plays an integral role in detecting and averting any acts of terrorism directed at the US, this terrorism threat is indeed a real one. The vulnerabilities include the hacking of its own websites by hackers in a bid to access the highly classified materials. Further to this, the vulnerabilities the department faces are the compromise of information by its staff. While such cases might not be common, a vulnerability cannot adequately be mitigated. The non-disclosure contracts signed do not necessarily guarantee that the information pertaining to the operations happening in the department will remain secretive.
In order to ensure