Integrating Federal Approaches to Post-Cyber Incident Mitigation
This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and techn...
Gespeichert in:
Veröffentlicht in: | Journal of homeland security and emergency management 2013-01, Vol.10 (1), p.1-28 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 28 |
---|---|
container_issue | 1 |
container_start_page | 1 |
container_title | Journal of homeland security and emergency management |
container_volume | 10 |
creator | Givens, Austen D. Busch, Nathan E. |
description | This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation. |
doi_str_mv | 10.1515/jhsem-2012-0001 |
format | Article |
fullrecord | <record><control><sourceid>walterdegruyter_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1515_jhsem_2012_0001</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1515_jhsem_2012_00011011</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-2dbf5ceff03bc1cb2e3f1c88bdab7c0dfcd7da3c46d40111eb84de09d666f4483</originalsourceid><addsrcrecordid>eNp1kE1LAzEQhoMoWKtnr_sHYjP52N3ixVKsFip60HPIx6Td0u6WJEX237u1XoWBmcszvO9DyD2wB1CgJttNwj3lDDhljMEFGYGSFa2EUpdkxGEqaSlKuCY3KW0Z40owMSJPyzbjOprctOtigR6j2RWzwyF2xm0wFbkrPrqU6by3GItl6xqPbS7emtysB6hrb8lVMLuEd397TL4Wz5_zV7p6f1nOZyvqOBeZcm-DchgCE9aBsxxFAFfX1htbOeaD85U3wsnSSwYAaGvpkU19WZZBylqMyeT818UupYhBH2KzN7HXwPRJgP4VoE8C9EnAQDyeiW-zyxj9UPPYD4fedsfYDln_I2EY8QPpiGSo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Integrating Federal Approaches to Post-Cyber Incident Mitigation</title><source>De Gruyter journals</source><creator>Givens, Austen D. ; Busch, Nathan E.</creator><creatorcontrib>Givens, Austen D. ; Busch, Nathan E.</creatorcontrib><description>This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.</description><identifier>ISSN: 2194-6361</identifier><identifier>EISSN: 1547-7355</identifier><identifier>DOI: 10.1515/jhsem-2012-0001</identifier><language>eng</language><publisher>De Gruyter</publisher><subject>cybersecurity ; defense ; homeland security ; mitigation ; public policy</subject><ispartof>Journal of homeland security and emergency management, 2013-01, Vol.10 (1), p.1-28</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c223t-2dbf5ceff03bc1cb2e3f1c88bdab7c0dfcd7da3c46d40111eb84de09d666f4483</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.degruyter.com/document/doi/10.1515/jhsem-2012-0001/pdf$$EPDF$$P50$$Gwalterdegruyter$$H</linktopdf><linktohtml>$$Uhttps://www.degruyter.com/document/doi/10.1515/jhsem-2012-0001/html$$EHTML$$P50$$Gwalterdegruyter$$H</linktohtml><link.rule.ids>314,780,784,27915,27916,66515,68299</link.rule.ids></links><search><creatorcontrib>Givens, Austen D.</creatorcontrib><creatorcontrib>Busch, Nathan E.</creatorcontrib><title>Integrating Federal Approaches to Post-Cyber Incident Mitigation</title><title>Journal of homeland security and emergency management</title><description>This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.</description><subject>cybersecurity</subject><subject>defense</subject><subject>homeland security</subject><subject>mitigation</subject><subject>public policy</subject><issn>2194-6361</issn><issn>1547-7355</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNp1kE1LAzEQhoMoWKtnr_sHYjP52N3ixVKsFip60HPIx6Td0u6WJEX237u1XoWBmcszvO9DyD2wB1CgJttNwj3lDDhljMEFGYGSFa2EUpdkxGEqaSlKuCY3KW0Z40owMSJPyzbjOprctOtigR6j2RWzwyF2xm0wFbkrPrqU6by3GItl6xqPbS7emtysB6hrb8lVMLuEd397TL4Wz5_zV7p6f1nOZyvqOBeZcm-DchgCE9aBsxxFAFfX1htbOeaD85U3wsnSSwYAaGvpkU19WZZBylqMyeT818UupYhBH2KzN7HXwPRJgP4VoE8C9EnAQDyeiW-zyxj9UPPYD4fedsfYDln_I2EY8QPpiGSo</recordid><startdate>20130101</startdate><enddate>20130101</enddate><creator>Givens, Austen D.</creator><creator>Busch, Nathan E.</creator><general>De Gruyter</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20130101</creationdate><title>Integrating Federal Approaches to Post-Cyber Incident Mitigation</title><author>Givens, Austen D. ; Busch, Nathan E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-2dbf5ceff03bc1cb2e3f1c88bdab7c0dfcd7da3c46d40111eb84de09d666f4483</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>cybersecurity</topic><topic>defense</topic><topic>homeland security</topic><topic>mitigation</topic><topic>public policy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Givens, Austen D.</creatorcontrib><creatorcontrib>Busch, Nathan E.</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of homeland security and emergency management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Givens, Austen D.</au><au>Busch, Nathan E.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Integrating Federal Approaches to Post-Cyber Incident Mitigation</atitle><jtitle>Journal of homeland security and emergency management</jtitle><date>2013-01-01</date><risdate>2013</risdate><volume>10</volume><issue>1</issue><spage>1</spage><epage>28</epage><pages>1-28</pages><issn>2194-6361</issn><eissn>1547-7355</eissn><abstract>This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.</abstract><pub>De Gruyter</pub><doi>10.1515/jhsem-2012-0001</doi><tpages>28</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2194-6361 |
ispartof | Journal of homeland security and emergency management, 2013-01, Vol.10 (1), p.1-28 |
issn | 2194-6361 1547-7355 |
language | eng |
recordid | cdi_crossref_primary_10_1515_jhsem_2012_0001 |
source | De Gruyter journals |
subjects | cybersecurity defense homeland security mitigation public policy |
title | Integrating Federal Approaches to Post-Cyber Incident Mitigation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T04%3A28%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-walterdegruyter_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Integrating%20Federal%20Approaches%20to%20Post-Cyber%20Incident%20Mitigation&rft.jtitle=Journal%20of%20homeland%20security%20and%20emergency%20management&rft.au=Givens,%20Austen%20D.&rft.date=2013-01-01&rft.volume=10&rft.issue=1&rft.spage=1&rft.epage=28&rft.pages=1-28&rft.issn=2194-6361&rft.eissn=1547-7355&rft_id=info:doi/10.1515/jhsem-2012-0001&rft_dat=%3Cwalterdegruyter_cross%3E10_1515_jhsem_2012_00011011%3C/walterdegruyter_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |