Friday, November 1, 2019

Homeland Security Case Study Example | Topics and Well Written Essays - 1250 words

Homeland Security - Case Study Example The actions of this department are what are amalgamated into the term Homeland security. The main focus of this formation is to deal with issues of the domestic population, building the necessary infrastructure to deal with both internal and the external aggressions and threats, sovereignty and the protection of the U.S territory. Inside the United States of America, the â€Å"Homeland Security† concept recombines and extends to the state agencies’ entities and responsibilities. The Homeland security research lays down the composition and formation of the Homeland Defense and the Homeland Security. These include the Transportation Security Administration, the Secret Service of the United States, United States Citizenship and Immigration Services, Americas Immigration and Customs Enforcement, Border and Customs Protection and the United States Coast Guard. Others Include the Federal Emergency Management Agency, the United States National Guard, among other departments adding up to one hundred and eighty-seven companies. The functions of the Homeland security are a major responsibility of the state (Berman & Flint, 2003). There have been several issues that affect the United States of America and that the Department Of Homeland Security has been grappling to deal with over years and presently. These issues include terror attack threats, immigration, capabilities, resource allocation, civil liberties, incident response, transportation security, intelligence, biotechnology, cyber security, infrastructure, funding allocation, border control among other issues. This paper will focus on cyber security threat that has been a challenge to the United States of America’s Homeland security. Cyber threats have been a challenge, both in past and present, to the United States. The policy makers and the Department of Homeland Security have been working hard to deal with issues relating to cyber security. The fight has been backed up by the use of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.