The Influence of AI on Future Performance of Homeland Security Functions in Cyber Security
Overview
Cyber security is a crucial aspect of Homeland Security in the Digital Age. Under the DHS, cyber security efforts focus on combating cyber crime, developing and implementing a cyber incident response function, maintaining the cyber security of networks within the federal government, securing critical infrastructure, implementing cyber security governance, and sharing information in a safe and effective manner (DHS, 2018). There is a great deal of overlap between cyber security efforts and other functions of the DHS, particularly with respect to infrastructure security, border security, cargo screening, and the facilitation of legal immigration. In virtually every modern process and function, digital tools are utilized to enhance processes and create more efficient ways to achieve the Departments security goals. Since 2018, the DHS has been tasked with stepping up its cyber security efforts. It was in the fall of that year that President Trump signed into law the Cybersecurity and Infrastructure Security Agency Act [elevating] the mission of the former National Protection and Programs Directorate (NPPD) within DHS and [establishing] theCybersecurity and Infrastructure Security Agency(CISA) (DHS, 2018). CISA now plays a crucial role in the security of the nation by bolstering the nations cyber security program. CISA (2018a) provides around-the-clock, 24/7 cyber situational awareness, analysis, incident response and cyber defense capabilities to the Federal government; state, local, tribal and territorial governments; the private sector and international partners. Preventing tragic events like the Parkland shooting through the implementation of cyber security technology is developing one aspect of DHS functions in the Digital Age (CISA, 2018b). The gathering of Big Data and the processing of that information is another (Best, 2007).
This paper will summarize policies and regulations that govern and influence how DHSs cyber security function is implemented and overseen; it will discuss the role that current technology plays in how the government, the public and the private sector are organized, trained and equipped to engage in national security; how emerging technology plays a role in the DHSs cyber security efforts; and what opportunities, challenges and risks that emerging technology poses to DHS cyber security processes.
Summary of Policies and Regulations Which Govern and Influence How the Homeland Security Cyber Security Function is Implemented and Overseen
CISA is in charge of enhancing the nations security, resiliency in the favor of cyber attack, and the reliability of the cyber communications infrastructure of the nation. However, its scope of governance is even wider than that. For instance, it oversees rumor control efforts and has done so in 2020 by managing misinformation and disinformation campaigns via CISAs Countering Foreign Influence Task Force (CISA Rumor Control, 2020). CISA is situated within DHS, and within CISA is situated The National Risk Management Center (NRMC), which focuses on analyzing and collaborating with other stakeholders to identify and assess risks to the nations security. CISA itself, however, is a standaloneagency, acting in the capacity as an operational component and falling under DHS oversight. CISA reports to DHS and its operations are authorized by the National Protection and Programs Directorate (NPPD). The federal Computer Fraud and Abuse Act provides the government with the ability to prosecute cybercrime. The Act prohibits unauthorized access to a computer or security information. The Electronic Communications Protection Act and the Stored Communications Act both have made it a criminal act to access information with authorization. DHS similarly has the purview to operate so as to monitor and counter cyber security intrusions.
The Role Current Technology Plays in How the Government, the Public, and Private Sector are Organized, Trained and Equipped to Engage in National Security
Current technology...
…end (end user operations) of AI systems.The first standard would address issues related to identifying faulty logic and protecting systems from being deceived by malicious data or actors; it would also allow teams to determine the extent to which they can actually trust AI systems with respect to data inputs and outputs. Currently, it is unclear to what extent these systems can be trusted. That still needs to be worked out.
The second standard would address issues related to clearing up what liabilities exist and where attribution of error should go. Mistakes have to be accounted for and the agency as well as stakeholders needs to know what the legal parameters are. The notion of jury of peers and crime prevention also has to be advanced by this standard (DHS, 2018b).
The third standard would address the concern that AI systems might engage in an immoral action on behalf of the statesuch as spying on civiliansor engage in unlawful activity if systems are hacked by a foreign adversary. This standard would help to prevent such from happening.
The fourth standard would ensure that end users are properly trained so that they are not making mistakes with respect to hacking attempts, suc as phishing scams, and that the right technical specifications for systems have been implemented to prevent deception activities. Performance-wise, this is an important standard to develop and implement.
The fifth standard would ensure that data integrity and availability is available so that proper machine learning can be conducted. Machine learning cannot be of any use if the data being incorporated is malicious or faulty; so some standard with respect to monitoring for malicious data or counter-intelligence operations meant to deceive the operations of AI cyber security systems needs to be achieved. These standards should be sufficient in enabling the agency and stakeholders to achieve…
References
Carman, A. (2014). Passwords are passé. SC Magazine: For IT SecurityProfessionals, 25(10), 28-31.
CISA. (2018a). Cyber infrastructure. Retrieved from https://www.dhs.gov/CISA
CISA. (2018b). School safety and security. Retrieved from https://www.dhs.gov/cisa/school-safety-and-security
CISA Rumor Control. (2020). Retrieved from https://www.cisa.gov/rumorcontrol
Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy forSecurity's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.
DHS. (2018a). Cyber security. Retrieved from https://www.dhs.gov/topic/cybersecurity
DHS. (2018b). AI: Using standards to mitigate risks. Retrieved from https://www.dhs.gov/sites/default/files/publications/2018_AEP_Artificial_Intelligence.pdf
ECPI. (2020). New cybertechnologies. Retrieved from https://www.ecpi.edu/blog/new-cybersecurity-technologies-what-is-shaking-up-the-field#:~:text=The%20cyber%20attackers%20are%20now,attacks%20to%20steal%20specific%20data.
Heckman, J. (2019). DHS, DoD cyber officials see AI as way to ‘make the most impact’with workforce. Retrieved from https://federalnewsnetwork.com/cybersecurity/2019/09/dhs-dod-cyber-officials-see-ai-as-way-to-make-the-most-impact-with-workforce/
Hunt, G. (2018). A Shift from Cybersecurity to Cyber Resilience: 6 Steps. Retrieved from https://www.darkreading.com/threat-intelligence/a-shift-from-cybersecurity-to-cyber-resilience-6-steps/a/d-id/1333378
Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., & McQuaid, R. (2019). DevelopingCyber Resilient Systems: A Systems Security Engineering Approach (No. NIST Special Publication (SP) 800-160 Vol. 2 (Draft)). National Institute of Standards and Technology. Retrieved from https://csrc.nist.gov/CSRC/media/Publications/sp/800-160/vol-2/draft/documents/sp800-160-vol2-draft.pdf
Machine Learning It should be noted that there is a marked paucity of research material and scholarly articles existent, from the past three years, regarding the usage of intelligence tests that are deemed mainstream (i.e., not the Turing Test and more frequently utilized assessments such as any variety of the Wechsler tests or the Stanford-Binet assessment) to assess machine intelligence or that of expert systems. Machine intelligence such as IBM's
Machine Learning Method in Bioinformatics Bioinformatics involves an integrated approach involving the use of information technology, computer science to biology and medicine as professional and knowledge fields. It encompasses the knowledge associated with information systems, artificial intelligence, databases, and algorithms, soft computing, software engineering, image processing, modeling and simulation, data mining, signal processing, computation theory and information, system an d control theory, discrete mathematics, statistics and circuit theory. On the other
Netflix and Machine Learning Machine Learning (ML) represents a data analysis technique involving automation of analytical model development. This segment of AI (artificial intelligence) is grounded in the notion that a system is able to learn using information provided, discern patterns, and engage in decision-making without much human involvement required. Owing to technological advancements in computing, contemporary ML differs from ML of earlier times. The concept traces its roots to pattern
Abstract This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms
Stevens Star Model and New Tech to Improve Patient OutcomesThe Stevens Star Model of Knowledge Transformation is a framework that guides the transformation of knowledge from research into practice. This model consists of five points: discovery, summary, translation, integration, and evaluation. Each point represents a step in the process of moving from scientific evidence to practical application in patient care (Song et al., 2021). This paper shows how in the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now