7-1 Journal- Information Sharing(CJ310)
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
CJ 310
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by Arielpenton on coursehero.com
7-1 Journal: Information Sharing
7-1 Journal: Information Sharing
Ariel Penton
Southern New Hampshire University
CJ 310- Intro to Homeland Security/ Counterterrorsim
Professor:
Christopher L. Elg, M.P.A.
October 15, 2023
1
7-1 Journal: Information Sharing
Prior to the tragic events of 9/11, government agencies had a different attitude toward
sharing information compared to present day. The approach to information sharing
was characterized by a complex web of issues, which impeded effective cooperation
and coordination among agencies. Government agencies often kept information to
themselves. They were protective with their intelligence and data, often driven by
concerns about jurisdiction, budget allocation, and a lack of standardized protocols for
information sharing. This culture of compartmentalization was prominent within
agencies such as the CIA, FBI, and NSA, which held critical counterterrorism
information but were reluctant to share it with other agencies.
Information gathered at the local level was hindered by the lack of clear channels for
dissemination to higher government levels. Local law enforcement agencies collected
valuable intelligence but faced obstacles when trying to share this information with
state and federal agencies. These hurdles included issues related to communication
platforms, data classification, and a lack of resources for data sharing.
Information collected at the federal level was similarly challenged in terms of sharing
with state and local agencies. Federal agencies like the FBI and CIA were often
reluctant to disseminate sensitive intelligence to local authorities. This lack of
cooperation hindered efforts to combat terrorism effectively, as local law enforcement
agencies could not leverage the valuable resources available at the federal level.
In the aftermath of 9/11, there were significant reforms aimed at improving
information sharing. The creation of the Department of Homeland Security (DHS)
and the establishment of the National Counterterrorism Center (NCTC) played pivotal
roles in enhancing inter-agency coordination and intelligence sharing. These entities
acted as intermediaries, breaking down barriers that had hindered effective
counterterrorism efforts. The 9/11 Commission Report prompted legal and structural
changes that fostered a greater willingness to share intelligence among agencies, as
the collective imperative for national security took precedence over internal divisions.
The implementation of initiatives like the "fusion centers" at the state and local levels
facilitated the flow of information from the state to federal agencies. Additionally, the
development of standardized communication systems and protocols improved the
speed and accuracy of information sharing. Collaboration became more streamlined,
enabling agencies to work together with a common purpose to prevent terrorist
activities.
In conclusion, the government's attitude toward information sharing has transformed
significantly since the events of 9/11. The tragedy exposed the inherent weaknesses in
the pre-9/11 approach, which was marked by a lack of collaboration and coordination.
Post-9/11, reforms and initiatives have fostered a more open, integrated, and effective
system of information sharing among government agencies, leading to improved
counterterrorism efforts and enhancing national security.
2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Could you please help with the question below please and thank you I need it as detailed as possible: This is not a graded question just a practice question...
Info:
Honeytokens - Lance Spitzner, the leader of the Honeynet Project, has defined the term honeytoken as “a digital or information system resource whose value lies in the unauthorized use of that resource"
- Helps to track whether the information is being stolen or not.
- For example, hospital security will make fake accounts on the medical data of individuals for example, and if someone accesses that account, it means the system has been compromised.
More info:
Honeytokens
Lance Spitzner, the leader of the Honeynet Project, has defined the term honeytoken as “a digital or information system resource whose value lies in the unauthorized use of that resource” [5]. Honeytokens can be any digital data. They can consist of documents, images, or even data such as a phony login/password combination. A honeytoken may be any…
arrow_forward
(**no chatGPT and feel free to provide the reference link)
Scenario:
Recent EY’s Global Information Security Survey 2021 - finds Chief Information Security Officers (CISOs) and security leaders battling against a new wave of threats unleashed by COVID-19 highlighted the current state of cybersecurity and the challenges that organisations face in protecting their data and systems. The growing vulnerability of an IT risk has received a lot of attention in the survey report. Overall, the 2021 EY Global Information Security Survey report provides valuable insights into the current state of cybersecurity, the challenges that organizations face, and strategies for improving cybersecurity resilience and preparedness in the face of emerging threats.
a) Identify any TWO(2) key challenges faced by CISOs to balance the competing demands of cybersecurity while preserving business innovation and growth. (Give me around more than 150 words)
arrow_forward
Question 6
You must give a word count for any question with a maximum word limit.
This question tests your understanding of Block 3. Additionally, you are expected to follow the guidance on report writing that is provided in Section 1.5 of Block 2 Part 1.
The introduction to Block 3 included part of a speech by Martha Lane Fox, in which she spoke of the need for greater digital understanding.
For this question you are required to write a short report on digital understanding for a non-technical audience.
Your report should contain two main sections:
How has your digital understanding changed because of studying TM112 Block 3?
You should explain what you have learned. Give at least one example of an activity that you have completed as part of TM112 Block 3 which has changed your digital understanding. Explain how it has changed your understanding: what understanding did you gain by doing it? You should support your explanation with at least one reference to the module materials.…
arrow_forward
WASHINGTON, United States - Facebook said Wednesday personal data on as many as 87 million users was improperly shared with British political consultancy Cambridge Analytica.
The new figure eclipses a previous estimate of 50 million in a further embarrassment to the social network roiled by a privacy scandal.
The anouncement came as Facebook unveiled clearer terms of service to enable users to better understand data sharing, and as a congressional panel said chief executive Mark Zuckerberg would appear next week to address privacy issues.
Facebook's chief technology officer Mike Schroepfer released the new figures on affected users as he discussed implementation of new privacy tools for users of the huge social network.
"In total, we believe the Facebook information of up to 87 million people -- mostly in the US -- may have been improperly shared with Cambridge Analytica," he said.
The new estimate could depen the crisis for Facebook, which has been pressured by the disclosures on…
arrow_forward
As the number of internet-connected devices hit the roof of billions, the protection of data,preventing it from falling into the wrong hands, and keeping it secure is an increasinglyimportant part of any organization’s ability to manage and protect critical and confidentialinformation.In this regard, you are asked to do some research, and write a report that answers thefollowing points:You should tackle the following points:1. What does the term DLP stand for? Define DLP and its role? 2. There are some common unintentional data loss refrains. State 3 refrains, and listtwo examples of each refrain that causes data loss. 3. Briefly discuss three general causes of data loss. 4. Data protection is a general term that encompasses several measures. Explain threeof these measures. 5. In the light of what you have read about DLP, what do you conclude?
arrow_forward
Why did Facebook go down on October 4, 2021? Explain from networking perspective.
Please write a report:
Instructions:
Use proper referencing for your report.
Your report should be 3 to 5 pages long.
Include a conclusion section where you will write your critical comments.
You need not to implement anything or you need not to propose anything.
This is not a group report. You have to do it individually.
arrow_forward
1. After reading the information presented in this module and other sources, write a one-page paper that outlines five recommendations for improving the privacy of e-mail in an organization. Your recommendations should also highlight ways that minimize or eliminate corporate data leakage.
2. After reading the information presented in this module and other sources, write a one-page paper that describes GDPR. Describe how businesses may benefit from this compliance. Research three companies that have been sued by the European Union. Which privacy issues were violated by each company?
3. The admissions office of Southern State University needs a simple and easy-to-follow Web policy document to send to its incoming freshmen. The document should tell students how to behave while on the Web. After reading the information presented in this module and other sources, create a document that includes a 10-item bulleted list highlighting the key issues of which incoming students should be aware.…
arrow_forward
Give an example of a security breach for each of the six dimensions of e-commerce security identified in Chapter 5. For instance, what would be a privacy incident? (Please use the book. See book details, you can find it free online - eBook ISBN 13: 978-1-292-34321-1, E-Commerce 2021 Business, Technology, & Society by Kenneth C. Laudon and Carol Guercio Traver, Sixteenth Edition, Global Edition).
Have you ever been the victim of a data breach or cybercrime? If not, what steps do you take to protect yourself online? If yes, what changes have you made to your online behavior to reduce the incident from happening again?
arrow_forward
In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…
arrow_forward
data privacy may not be applicable in which of the following scenario?
1) an AP targeted at children for entertainment 2) a platform developmentally for knowledge Exchange with no motive of financial incentive
3)a platform being hosted in a country with no DP laws but targeted at data subject from a country with stringent TP loss
4)a website food is maintaining knowledge than that allows an anonymous access
arrow_forward
EXPLORE FOUR EVERYDAY ETHICAL DILEMMAS RELATED TO CS
Present an abbreviated case study with an ethical dilemma related to the field and discipline of Computer Science, Data Science, and Cybersecurity.
arrow_forward
How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy of internet users?
Given the growing security and privacy concern about how companies handle internet users’ data, multiple approaches have been suggested on how to address the issue. Among the suggested solutions are calls for companies to actually pay Internet users to use their data (e.g. see here, here, and here) and/or stricter regulations on companies’ using and sharing users’ data. Do you agree/disagree with such suggested solutions? Why or why not? List some examples of business ideas and/or regulatory ideas that you think would help address security and privacy concern going forward.
arrow_forward
Once a person has been authenticated in an organization's network, that user is granted access to certain data based on the information security concept of least privilege. Your CEO and CIO need authentication and authorisation methods for the company. Recommendations should include strategies for mitigating the effects and hazards posed by vulnerabilities. Be a 9- to 11-slide, multimedia-rich presentation in Microsoft PowerPoint for the WHO (World Health Organization), and make sure to include: Descriptions of at least three jobs performed by members of the organization WHO (World Health Organization). At least three typical attacks on access control techniques, including the password policy vulnerability mentioned in the vulnerability report, are discussed. Countermeasures for reducing vulnerabilities and mitigating possible access control mechanism assaults. A multimedia presentation should contain graphics, images, video clips, or audio.
arrow_forward
READ!
Facebook says 87 million may be affected by data breach
WASHINGTON, United States - Facebook said Wednesday personal data on as many as 87 million users was improperly shared with British political consultancy Cambridge Analytica.
The new figure eclipses a previous estimate of 50 million in a further embarrassment to the social network roiled by a privacy scandal.
The anouncement came as Facebook unveiled clearer terms of service to enable users to better understand data sharing, and as a congressional panel said chief executive Mark Zuckerberg would appear next week to address privacy issues.
Facebook's chief technology officer Mike Schroepfer released the new figures on affected users as he discussed implementation of new privacy tools for users of the huge social network.
"In total, we believe the Facebook information of up to 87 million people -- mostly in the US -- may have been improperly shared with Cambridge Analytica," he said.
The new estimate could depen the crisis…
arrow_forward
READ!
Facebook says 87 million may be affected by data breach
WASHINGTON, United States - Facebook said Wednesday personal data on as many as 87 million users was improperly shared with British political consultancy Cambridge Analytica.
The new figure eclipses a previous estimate of 50 million in a further embarrassment to the social network roiled by a privacy scandal.
The anouncement came as Facebook unveiled clearer terms of service to enable users to better understand data sharing, and as a congressional panel said chief executive Mark Zuckerberg would appear next week to address privacy issues.
Facebook's chief technology officer Mike Schroepfer released the new figures on affected users as he discussed implementation of new privacy tools for users of the huge social network.
"In total, we believe the Facebook information of up to 87 million people -- mostly in the US -- may have been improperly shared with Cambridge Analytica," he said.
The new estimate could depen the crisis…
arrow_forward
READ!
Facebook says 87 million may be affected by data breach
WASHINGTON, United States - Facebook said Wednesday personal data on as many as 87 million users was improperly shared with British political consultancy Cambridge Analytica.
The new figure eclipses a previous estimate of 50 million in a further embarrassment to the social network roiled by a privacy scandal.
The anouncement came as Facebook unveiled clearer terms of service to enable users to better understand data sharing, and as a congressional panel said chief executive Mark Zuckerberg would appear next week to address privacy issues.
Facebook's chief technology officer Mike Schroepfer released the new figures on affected users as he discussed implementation of new privacy tools for users of the huge social network.
"In total, we believe the Facebook information of up to 87 million people -- mostly in the US -- may have been improperly shared with Cambridge Analytica," he said.
The new estimate could depen the crisis…
arrow_forward
READ!
Facebook says 87 million may be affected by data breach
WASHINGTON, United States - Facebook said Wednesday personal data on as many as 87 million users was improperly shared with British political consultancy Cambridge Analytica.
The new figure eclipses a previous estimate of 50 million in a further embarrassment to the social network roiled by a privacy scandal.
The anouncement came as Facebook unveiled clearer terms of service to enable users to better understand data sharing, and as a congressional panel said chief executive Mark Zuckerberg would appear next week to address privacy issues.
Facebook's chief technology officer Mike Schroepfer released the new figures on affected users as he discussed implementation of new privacy tools for users of the huge social network.
"In total, we believe the Facebook information of up to 87 million people -- mostly in the US -- may have been improperly shared with Cambridge Analytica," he said.
The new estimate could depen the crisis…
arrow_forward
MGMT eCash Inc. dataset dating back from June 2016 to November 2017, on currency trades for a subset of the more than 2000 cryptocurrencies in existence.
propose one to implement and also how the company will organize itself to handle security
From the perspective of Office Administration (Operations, structure of a broker.
Request information from TWO other departments that could assist in your investigation. Please specify both the TYPE, and specific CONTENTS of the report you are requesting (Unit 3 types of output)
arrow_forward
Week 3: Discussion Standards for Evidence Collection & Volatile Data Collection 22 unread replies.22 replies. Submit your initial post for one of these two options. Option 1- Evidence Collection Standards Discuss the similarities and differences in standards for collecting evidence in private, civil, and criminal investigations. Describe the likely places where the different types of investigations will occur. Describe who will be involved in each type of investigation. Option 2 Volatile Data Describe volatile data, including situations when a forensic examiner would need to collect it. Explain the possible forensic relevance of volatile data. Explain differences in recommendations for first responders and forensic specialists for collecting volatile data. What equipment and resources would a forensic specialist need to collect volatile data?
arrow_forward
1-State some of data types.
2-Identify six attributes of quality information.
3-How is data different from information? Information from knowledge?
4-What is knowledge management? How might it be used?
5-Identify the five basic components of any computer-based information system.
6-Distinguish between a decision support system and an expert system.
7-What is the difference between an intranet and an extranet?
8-What is m-commerce? Give two examples of the use of m-commerce.
9-Identify the steps in the systems development process and state the goal of each.
10-Identify and briefly discuss several global challenges associated with information systems.
11-What is the difference between a value chain and a supply chain?
12-What is technology diffusion?
13-What are some general strategies employed by organizations to achieve competitive advantage?
14-List and describe popular job-finding Internet sites.
15-Describe the role of the CIO.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Could you please help with the question below please and thank you I need it as detailed as possible: This is not a graded question just a practice question... Info: Honeytokens - Lance Spitzner, the leader of the Honeynet Project, has defined the term honeytoken as “a digital or information system resource whose value lies in the unauthorized use of that resource" - Helps to track whether the information is being stolen or not. - For example, hospital security will make fake accounts on the medical data of individuals for example, and if someone accesses that account, it means the system has been compromised. More info: Honeytokens Lance Spitzner, the leader of the Honeynet Project, has defined the term honeytoken as “a digital or information system resource whose value lies in the unauthorized use of that resource” [5]. Honeytokens can be any digital data. They can consist of documents, images, or even data such as a phony login/password combination. A honeytoken may be any…arrow_forward(**no chatGPT and feel free to provide the reference link) Scenario: Recent EY’s Global Information Security Survey 2021 - finds Chief Information Security Officers (CISOs) and security leaders battling against a new wave of threats unleashed by COVID-19 highlighted the current state of cybersecurity and the challenges that organisations face in protecting their data and systems. The growing vulnerability of an IT risk has received a lot of attention in the survey report. Overall, the 2021 EY Global Information Security Survey report provides valuable insights into the current state of cybersecurity, the challenges that organizations face, and strategies for improving cybersecurity resilience and preparedness in the face of emerging threats. a) Identify any TWO(2) key challenges faced by CISOs to balance the competing demands of cybersecurity while preserving business innovation and growth. (Give me around more than 150 words)arrow_forwardQuestion 6 You must give a word count for any question with a maximum word limit. This question tests your understanding of Block 3. Additionally, you are expected to follow the guidance on report writing that is provided in Section 1.5 of Block 2 Part 1. The introduction to Block 3 included part of a speech by Martha Lane Fox, in which she spoke of the need for greater digital understanding. For this question you are required to write a short report on digital understanding for a non-technical audience. Your report should contain two main sections: How has your digital understanding changed because of studying TM112 Block 3? You should explain what you have learned. Give at least one example of an activity that you have completed as part of TM112 Block 3 which has changed your digital understanding. Explain how it has changed your understanding: what understanding did you gain by doing it? You should support your explanation with at least one reference to the module materials.…arrow_forward
- WASHINGTON, United States - Facebook said Wednesday personal data on as many as 87 million users was improperly shared with British political consultancy Cambridge Analytica. The new figure eclipses a previous estimate of 50 million in a further embarrassment to the social network roiled by a privacy scandal. The anouncement came as Facebook unveiled clearer terms of service to enable users to better understand data sharing, and as a congressional panel said chief executive Mark Zuckerberg would appear next week to address privacy issues. Facebook's chief technology officer Mike Schroepfer released the new figures on affected users as he discussed implementation of new privacy tools for users of the huge social network. "In total, we believe the Facebook information of up to 87 million people -- mostly in the US -- may have been improperly shared with Cambridge Analytica," he said. The new estimate could depen the crisis for Facebook, which has been pressured by the disclosures on…arrow_forwardAs the number of internet-connected devices hit the roof of billions, the protection of data,preventing it from falling into the wrong hands, and keeping it secure is an increasinglyimportant part of any organization’s ability to manage and protect critical and confidentialinformation.In this regard, you are asked to do some research, and write a report that answers thefollowing points:You should tackle the following points:1. What does the term DLP stand for? Define DLP and its role? 2. There are some common unintentional data loss refrains. State 3 refrains, and listtwo examples of each refrain that causes data loss. 3. Briefly discuss three general causes of data loss. 4. Data protection is a general term that encompasses several measures. Explain threeof these measures. 5. In the light of what you have read about DLP, what do you conclude?arrow_forwardWhy did Facebook go down on October 4, 2021? Explain from networking perspective. Please write a report: Instructions: Use proper referencing for your report. Your report should be 3 to 5 pages long. Include a conclusion section where you will write your critical comments. You need not to implement anything or you need not to propose anything. This is not a group report. You have to do it individually.arrow_forward
- 1. After reading the information presented in this module and other sources, write a one-page paper that outlines five recommendations for improving the privacy of e-mail in an organization. Your recommendations should also highlight ways that minimize or eliminate corporate data leakage. 2. After reading the information presented in this module and other sources, write a one-page paper that describes GDPR. Describe how businesses may benefit from this compliance. Research three companies that have been sued by the European Union. Which privacy issues were violated by each company? 3. The admissions office of Southern State University needs a simple and easy-to-follow Web policy document to send to its incoming freshmen. The document should tell students how to behave while on the Web. After reading the information presented in this module and other sources, create a document that includes a 10-item bulleted list highlighting the key issues of which incoming students should be aware.…arrow_forwardGive an example of a security breach for each of the six dimensions of e-commerce security identified in Chapter 5. For instance, what would be a privacy incident? (Please use the book. See book details, you can find it free online - eBook ISBN 13: 978-1-292-34321-1, E-Commerce 2021 Business, Technology, & Society by Kenneth C. Laudon and Carol Guercio Traver, Sixteenth Edition, Global Edition). Have you ever been the victim of a data breach or cybercrime? If not, what steps do you take to protect yourself online? If yes, what changes have you made to your online behavior to reduce the incident from happening again?arrow_forwardIn 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…arrow_forward
- data privacy may not be applicable in which of the following scenario? 1) an AP targeted at children for entertainment 2) a platform developmentally for knowledge Exchange with no motive of financial incentive 3)a platform being hosted in a country with no DP laws but targeted at data subject from a country with stringent TP loss 4)a website food is maintaining knowledge than that allows an anonymous accessarrow_forwardEXPLORE FOUR EVERYDAY ETHICAL DILEMMAS RELATED TO CS Present an abbreviated case study with an ethical dilemma related to the field and discipline of Computer Science, Data Science, and Cybersecurity.arrow_forwardHow do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy of internet users? Given the growing security and privacy concern about how companies handle internet users’ data, multiple approaches have been suggested on how to address the issue. Among the suggested solutions are calls for companies to actually pay Internet users to use their data (e.g. see here, here, and here) and/or stricter regulations on companies’ using and sharing users’ data. Do you agree/disagree with such suggested solutions? Why or why not? List some examples of business ideas and/or regulatory ideas that you think would help address security and privacy concern going forward.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning