DHS and Its Use of Machine Learning for Security Purposes Capstone Project

Total Length: 2970 words ( 10 double-spaced pages)

Total Sources: 10

Page 1 of 10

The Influence of AI on Future Performance of Homeland Security Functions in Cyber SecurityOverviewCyber security is a crucial aspect of Homeland Security in the Digital Age. Under the DHS, cyber security efforts focus on combating cyber crime, developing and implementing a cyber incident response function, maintaining the cyber security of networks within the federal government, securing critical infrastructure, implementing cyber security governance, and sharing information in a safe and effective manner (DHS, 2018). There is a great deal of overlap between cyber security efforts and other functions of the DHS, particularly with respect to infrastructure security, border security, cargo screening, and the facilitation of legal immigration. In virtually every modern process and function, digital tools are utilized to enhance processes and create more efficient ways to achieve the Department’s security goals. Since 2018, the DHS has been tasked with stepping up its cyber security efforts. It was in the fall of that year that President Trump “signed into law the Cybersecurity and Infrastructure Security Agency Act… [elevating] the mission of the former National Protection and Programs Directorate (NPPD) within DHS and [establishing] the Cybersecurity and Infrastructure Security Agency (CISA)” (DHS, 2018). CISA now plays a crucial role in the security of the nation by bolstering the nation’s cyber security program. CISA (2018a) provides around-the-clock, 24/7 “cyber situational awareness, analysis, incident response and cyber defense capabilities to the Federal government; state, local, tribal and territorial governments; the private sector and international partners.” Preventing tragic events like the Parkland shooting through the implementation of cyber security technology is developing one aspect of DHS functions in the Digital Age (CISA, 2018b). The gathering of Big Data and the processing of that information is another (Best, 2007).This paper will summarize policies and regulations that govern and influence how DHS’s cyber security function is implemented and overseen; it will discuss the role that current technology plays in how the government, the public and the private sector are organized, trained and equipped to engage in national security; how emerging technology plays a role in the DHS’s cyber security efforts; and what opportunities, challenges and risks that emerging technology poses to DHS cyber security processes.Summary of Policies and Regulations Which Govern and Influence How the Homeland Security Cyber Security Function is Implemented and OverseenCISA is in charge of enhancing the nation’s security, resiliency in the favor of cyber attack, and the reliability of the cyber communications infrastructure of the nation. However, its scope of governance is even wider than that. For instance, it oversees rumor control efforts and has done so in 2020 by managing misinformation and disinformation campaigns via CISA’s Countering Foreign Influence Task Force (CISA Rumor Control, 2020). CISA is situated within DHS, and within CISA is situated The National Risk Management Center (NRMC), which focuses on analyzing and collaborating with other stakeholders to identify and assess risks to the nation’s security. CISA itself, however, is a standalone agency, acting in the capacity as an operational component and falling under DHS oversight.

Stuck Writing Your "DHS and Its Use of Machine Learning for Security Purposes" Capstone Project?

CISA reports to DHS and its operations are authorized by the National Protection and Programs Directorate (NPPD). The federal Computer Fraud and Abuse Act provides the government with the ability to prosecute cybercrime. The Act prohibits unauthorized access to a computer or security information. The Electronic Communications Protection Act and the Stored Communications Act both have made it a criminal act to access information with authorization. DHS similarly has the purview to operate so as to monitor and counter cyber security intrusions.The Role Current Technology Plays in How the Government, the Public, and Private Sector are Organized, Trained and Equipped to Engage in National SecurityCurrent technology…

[…… parts of this paper are missing, click here to view the entire document ]

…end (end user operations) of AI systems.The first standard would address issues related to identifying faulty logic and protecting systems from being deceived by malicious data or actors; it would also allow teams to determine the extent to which they can actually trust AI systems with respect to data inputs and outputs. Currently, it is unclear to what extent these systems can be trusted. That still needs to be worked out.The second standard would address issues related to clearing up what liabilities exist and where attribution of error should go. Mistakes have to be accounted for and the agency as well as stakeholders needs to know what the legal parameters are. The notion of jury of peers and crime prevention also has to be advanced by this standard (DHS, 2018b).The third standard would address the concern that AI systems might engage in an immoral action on behalf of the state—such as spying on civilians—or engage in unlawful activity if systems are hacked by a foreign adversary. This standard would help to prevent such from happening.The fourth standard would ensure that end users are properly trained so that they are not making mistakes with respect to hacking attempts, such as phishing scams, and that the right technical specifications for systems have been implemented to prevent deception activities. Performance-wise, this is an important standard to develop and implement.The fifth standard would ensure that data integrity and availability is available so that proper machine learning can be conducted. Machine learning cannot be of any use if the data being incorporated is malicious or faulty; so some standard with respect to monitoring for malicious data or counter-intelligence operations meant to deceive the operations of AI cyber security systems needs to be achieved. These standards should be sufficient in enabling the agency and stakeholders to achieve….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"DHS And Its Use Of Machine Learning For Security Purposes" (2020, November 28) Retrieved May 6, 2025, from
https://www.aceyourpaper.com/essays/dhs-machine-learning-security-purposes-2181427

Latest MLA Format (8th edition)

Copy Reference
"DHS And Its Use Of Machine Learning For Security Purposes" 28 November 2020. Web.6 May. 2025. <
https://www.aceyourpaper.com/essays/dhs-machine-learning-security-purposes-2181427>

Latest Chicago Format (16th edition)

Copy Reference
"DHS And Its Use Of Machine Learning For Security Purposes", 28 November 2020, Accessed.6 May. 2025,
https://www.aceyourpaper.com/essays/dhs-machine-learning-security-purposes-2181427