Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its connection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic destruction comes in two forms: natural and man-made. For most of history the man-made variety came in the form of warfare and required the combined resources of a nation state. All that changed March 20th, 1995. On that date, members of a quasi-religious cult in Japan attacked the Tokyo subway system using Sarin gas. It was the first deployment of a weapon of mass destruction my a non-state actor. The power of destruction once reserved to nation states was now available to small groups, even individuals. The incident was a wake up call for governments around the world. Defense establishments designed to keep rogue states in check were practically useless against non-state actors. Overnight, the number of potential enemies multiplied a hundred, maybe even a thousand-fold. In response to the Tokyo Subway Attacks, the United States took measures to protect itself from WMD attack by non-state actors. Those measures were still being enacted when the nation was attacked on 9/11. On September 11, 2001, nineteen hijackers inflicted as much damage as the Imperial Japanese Navy on December 7, 1941. The investigating 9/11 Commission noted the attacks for their "surpassing disproportion". The hijackers had achieved WMD effects without using WMD. They did this by subverting the nation's transportation infrastructure, turning passenger jets into guided missiles. Again, the security implications were profound. Non-state actors seeking to inflict domestic catastrophic destruction did not need to import, fabricate, or acquire WMD as the nation was surrounded by the means of its own destruction in the form of critical infrastructure. The vulnerability of critical infrastructure had not gone unnoticed. Again, in response to the Tokyo Subway attacks, which themselves had been an attack on Japanese infrastructure, President Clinton in 1996 commissioned a panel to investigate the threat to United States' infrastructure. The panel replied in 1997 that there was no immediate threat to US infrastructure, but they were concerned with the growing risk of cyber attack. The same cyber physical systems that fueled the explosive growth of the Internet were being incorporated into Industrial Control Systems that underpinned much of the nation's critical infrastructure. The panel noted that the knowledge and skills necessary to mount a cyber attack on the nation's infrastructure was growing. As a result of this observation, President Clinton in 1998 ordered the protection of US critical infrastructure, especially from cyber attack. Following 9/11, critical infrastructure protection and cybersecurity were designated core missions in the 2002 Homeland Security Act establishing the new Department of Homeland Security. They remain core missions to this day, but many don't see the connection. The connection is this: cybersecurity is essential to critical infrastructure protection, which is essential to homeland security, which is about safeguarding the United States from domestic catastrophic destruction. I look forward to working with you in the coming lessons. Best wishes and good luck!
About this Course
학습자 경력 결과
공유 가능한 수료증
완료하는 데 약 7시간 필요
학습자 경력 결과
공유 가능한 수료증
완료하는 데 약 7시간 필요
- 5 stars
- 4 stars
- 3 stars
HOMELAND SECURITY & CYBERSECURITY CONNECTION - IT'S NOT ABOUT THE TERRORISTS의 최상위 리뷰
Thank You Mr. Richard White for making a hard course seems easy and enlighten us specially about the "it's all about the terrorist" notion people have when it comes to Homeland Security.
You changed up the last question. You originally identified 16 critical infrastructures. Could you please email me the first question and solution? Thank you! I loved the course!
Great course look forward to learning more and building skills to support our nation's defense and growth from " come what may" to be a better nation in the future.
This course really makes you think about what you really need to know to start learning about homeland security and how cybersecurity is interrelated to it.
Thsi course is very detailed and easy to understand. The professor for the course had a proper command over the language and the delivery timing is perfect.
The instructor was very knowledgeable on the subject matter and the course was very informative. Just wish there were more questions in the course review.
This was a great course. I learned a ton and now have access to some great materials I didn't previously know about ahead of a job I am taking with DHS.
As a law enforcement officer this course truly broadens my horizon and skillset and I recommend it to anyone who serves on the border.
Study materials are very focused an in line with the objectives. Course instructor is very enthusiastic with lots of energy.
Dept of Homeland Security. What it does, why it does it the past and the future.\n\nGreat overview of DHS mission.
Information provided is very informative and the Instructor, Dr. White is very knowledgeable and friendly.
Is very interesting, and very informative. Thank you so much to my instructors for instructing Ana Pelayo.
Homeland Security and Cybersecurity 전문 분야 정보
자주 묻는 질문
강의 및 과제를 언제 이용할 수 있게 되나요?
강좌에 등록하면 바로 모든 비디오, 테스트 및 프로그래밍 과제(해당하는 경우)에 접근할 수 있습니다. 상호 첨삭 과제는 이 세션이 시작된 경우에만 제출하고 검토할 수 있습니다. 강좌를 구매하지 않고 살펴보기만 하면 특정 과제에 접근하지 못할 수 있습니다.
이 전문 분야를 구독하면 무엇을 이용할 수 있나요?
강좌를 등록하면 전문 분야의 모든 강좌에 접근할 수 있고 강좌를 완료하면 수료증을 취득할 수 있습니다. 전자 수료증이 성취도 페이지에 추가되며 해당 페이지에서 수료증을 인쇄하거나 LinkedIn 프로필에 수료증을 추가할 수 있습니다. 강좌 내용만 읽고 살펴보려면 해당 강좌를 무료로 청강할 수 있습니다.
환불 규정은 어떻게 되나요?
재정 지원을 받을 수 있나요?
Where is Lesson 5?
In the process of restructuring this specialization to conform with Coursera design guidelines, it was decided that Lesson 5 was more appropriate to Module 4 instead of Module 2. A lesson place mark was added to Module 2 to note the move. Otherwise, no lessons were forgotten or harmed in making this specialization.
궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.