Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Module 4 Discussion 2 Department of Homeland Security and Department of Defense coordination in cybersecurity

Module 4 Discussion 2 Department of Homeland Security and Department of Defense coordination in cybersecurity

Q Module 4 One of the challenges in cybersecurity is that by its nature cyberspace does not easily conform to traditional borders and lines of demarcation between foreign and domestic threats, military and criminal threats, or between defense and homeland security responsibilities. Recalling the paradigms discussed in Module 1, the approach taken to cybersecurity can influence the tools used. The United States policy has evolved from responding to threats to critical infrastructure to advanced cybercrime and considerations of cyberwarfare. The lines are thus blurred between DHS and DOD. This discussion gives you an opportunity to assess the lines. Consider the criminal legal authorities granted to DHS that are precluded to DOD. How do the intelligence agencies fit into the picture? The module learning outcomes addressed in this activity are: • Describe how DHS works with DOD in responding to cyber threats to U.S. national security (CO #1) • Identify the differences between DHS and DoD’s cybersecurity efforts (CO #1, #3) The input of each student adds value to the course and creates a better experience for everyone. Although this is an online asynchronous course that you can access on your own schedule, your regular participation is mandatory. You will be expected to log in and participate at least two times per week on separate days throughout the term. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Please contribute at least one original post, due on Wednesday at 11:59 p.m. Eastern time, with at least two substantive replies to fellow students posted by Sunday at 11:59 p.m. Eastern time. Keep in mind that if reply posts come in Sunday evening, this is not a robust discussion. I reserve the right to ask you to contribute sooner or more frequently if this will enhance learning. Question After completing the assigned readings for the module, please respond to the following question in your initial post: • Discuss the strengths and weaknesses granted by the Memorandum of Understanding between the Department of Homeland Security and the Department of Defense on Cybersecurity. In addition, identify and explain what changes and improvements to the memorandum you would recommend to the Secretaries of these departments. Response: Your replies to classmates must be substantive; posting “I agree” is a start, but you also need to explain why. Replies should contribute to the discussion as a whole by integrating what you have learned from your required readings. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Use the EC Library resources for research assistance and to properly cite your work: • Military Leadership Research Guide (Links to an external site.) • National Security Research Guide (Links to an external site.) • Plagiarism & Copyright (Links to an external site.) • Excelsior Library Writing Help (Links to an external site.) • APA Citation Help (Links to an external site.) • Excelsior College Online Writing Lab (OWL) (Links to an external site.) Consult the Discussion Posting Guide for information about writing your discussion posts. It is recommended that you write your post in a document first. Check your work and correct any spelling or grammatical errors.

View Related Questions

Solution Preview

One major strength of the Memorandum is the way in which interdepartmental collaboration can be enhanced. This is because there are interactions among the Secretaries and the other subordinate organizational members of the both the departments (Memorandum of Agreement between The Department of Homeland Security and the Department of Defense Regarding Cybersecurity). The interactions can enable the members of both the departments to obtain valuable insights and also obtain more manpower during emergency situations. There can be mutual dependency and trust shown by the members of both the departments. There can be operations conducted in vast areas within quick time because of the availability of manpower and wide range of communication opportunities.