Cybersecurity / Science Technology

Some of these attacks are targeting databases of corporations, others are against the government or our critical infrastructure, some are in retaliation and are designed to be destructive, and others are designed to hold information or computers hostage until people or corporations pay ransom to get control of their computers and get their information back. Some of these attacks are by States and others by criminal elements. All of these come under the purview of the Department of Homeland Security. Prior to posting your initial post go to the UAGC Library to conduct your initial research. Identify a credible source (this is a step down from a scholarly source and includes editorials from reputable news sources and TV documentaries). Use the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance. Identify issues that are applicable to cyber security. Please ensure your references are less than 5 years old. Then go to the Department of Homeland Security website to review the Safeguard and Secure Cyberspace mission. Initial Post. 1st Post Due by Day 3. As you analyze the types of cyber-attacks, current science and technology, and the mission of the Department of Homeland Security do you believe the Department of Homeland Security is up to the task of defending and securing the nations cyberspace? Does the Department of Homeland Security have the tools, tactics, and techniques available to defend and secure the cyberspace? Your initial post must be a minimum of 300 words in length. Support your claims with in-text citations and provide an APA reference list at the end of your post for all your references. Use APA Style (Links to an external site.) as outlined in the UAGC Writing Center. Guided Response: You must respond in a substantial manner to three student or instructor posts. Will the leading edge science and technology initiatives of the Department of Homeland Security enhance security? Will it further the debate on security versus privacy? Should local law enforcement be responsible for pursuing criminal elements or is this a federal responsibility? Your response posts should be posted earlier in the week and must be a minimum of 150 words. You must take a different point of view from the initial post and advocate for a different solution to the cyber security issue. Reserve the last day of the week to respond to students who address your initial post. Make sure you support your posts and cite your sources.

The post Cybersecurity / Science Technology appeared first on .