Computers in Homeland Security

900 Words2 Pages

Computers in Homeland Security Ever since September 11th, 2001, our nation has been completely obsessed with our own security and prevention of another tragic incident. Through this experience leaders of our country have developed a system that would allow civilians of the status of our nation?s safety. It is called Homeland Security. Homeland Security was developed with several purposes. These include: increase overall preparedness, particularly for catastrophic events, Create better transportation security systems to move people and cargo more securely and efficiently, Strengthen border security and interior enforcement and reform immigration processes, Enhance information sharing with our partners, Improve DHS financial management, human resource development, procurement and information technology, Realign the DHS organization to maximize mission performance (Home Land Security Agenda). President Bush even came up with a color code that warns the nation of the terror threat. Red means severe. Orange is High. Yellow is elevated. Blue is guarded. Green is low. However, it is made up of some of the most advanced technology in the world. These computers allow the leaders to use their color coded system to send out warnings which allow us to prevent being vulnerable. Computers are the technology and they are what the government relies on to ensure that we are all safe. One important part of the Homeland Security is the US-CERT. The US-CERT program was invented in 2003, and severs as our internet infrastructure. This branch of Homeland Security is run by the National Cyber Security Division. The acting director of US-CERT is Donald A. Purdy Jr. It protects our internet from cyber attacks. This technology is responsible for analyzing and reducing cyber threats and vulnerabilities, disseminating cyber threat warning information, as well as coordinating incident response activities. The locations of US-CERT are in Arlington, Virginia and Pittsburg, Pennsylvania. ?It relates to the Department of Homeland Security because it was established to serve as the federal government?s cornerstone for cyber security coordination and preparedness, including implementation of the National Strategy to Secure Cyberspace? (Department of Homeland Security). This technology regulates the internet protocols in hopes to make virus and cyber attacks easier to detect and prevent. They also are targeting such crimes as identity theft, financial fraud, and network intrusions. Another crucial point of this security system is being ready for the worst.

Open Document