1 / 14

Homeland Security and the Internet

Homeland Security and the Internet. 28 January 2002. Agenda. What is Homeland Security? The Homeland Security Mission IT in Homeland Security An Architectural Concept “What Can I Do?”. What is Homeland Security?.

adamdaniel
Download Presentation

Homeland Security and the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Homeland Securityand theInternet 28 January 2002

  2. Agenda • What is Homeland Security? • The Homeland Security Mission • IT in Homeland Security • An Architectural Concept • “What Can I Do?”

  3. What is Homeland Security? • The deterrence, prevention, and preemption of, and defense against, aggression targeted at U. S. territory, sovereignty, population, and infrastructure as well as the management of the consequences of such aggression and other domestic emergencies • Those actions that protect the common good domestically against attack • Those actions that advance the common good domestically • Those actions that both protect and advance the common good internationally • Includes, but not limited to: • Homeland Defense -- the deterrence, prevention, and preemption of and defense against direct attacks aimed at U. S. territory, population, and infrastructure • Civil Support -- DoD support o civilian authorities for natural and manmade domestic emergencies, civil disturbances, and designated law enforcement efforts.

  4. The Homeland Security Mission • Develop and coordinate the implementation of a comprehensive national strategy to secure the United States from terrorist threats or attacks • Work with executive departments and agencies, state and local governments, and private entities to ensure the adequacy of the national strategy to: • Detect terrorist attacks within the United States • Prepare for terrorist attacks within the United States • Prevent terrorist attacks within the United States • Protect against terrorist attacks within the United States • Respond to terrorist attacks within the United States • Recover from terrorist attacks within the United States • Periodically review and coordinate revisions to that strategy as necessary

  5. The Intelligence Cycle

  6. IT in Homeland Security • A “digital nervous system” for a unified Homeland Security system linking • Federal agencies • States • Local/Municipal • NGOs/PVOs • International • Supports collaboration among and within all echelons • Supports sharing of information resources among and within all echelons • Supports sharing of information services (business processes)

  7. An Architectural Concept Individuals, organizations, and systems of all user agencies (Federal, state, local, NGOs, etc.) participating in the Homeland Security Information System Tools, services, etc. offered by any participating agency for the use of all. Hosting, support, etc., to be provided by the offering agency or by a commercial service under contract. A distributed, virtual environment. Resources offered by any participating agency or available from commercial providers under contract. Can range from a simple data server to a complete legacy system that provides needed information.

  8. Business Process Tier

  9. Integration Tier

  10. Resource Tier

  11. The Magnitude of the Problem/Opportunity • Federal Government involvement involves virtually all Departments and Agencies • 50 State Governments • ~130 Major Municipalities • Thousands of smaller municipalities • Tens of NGOs/PVOs

  12. “What Can I Do?” • Need mature MDA tools • Need standards for typical business process APIs • Need additional content standards • Need products based on those standards • Need new multi-enterprise approaches to security • What architectural solutions should be considered?

More Related