Integrating Federal Approaches to Post-Cyber Incident Mitigation

This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and techn...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of homeland security and emergency management 2013-01, Vol.10 (1), p.1-28
Hauptverfasser: Givens, Austen D., Busch, Nathan E.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 28
container_issue 1
container_start_page 1
container_title Journal of homeland security and emergency management
container_volume 10
creator Givens, Austen D.
Busch, Nathan E.
description This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.
doi_str_mv 10.1515/jhsem-2012-0001
format Article
fullrecord <record><control><sourceid>walterdegruyter_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1515_jhsem_2012_0001</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1515_jhsem_2012_00011011</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-2dbf5ceff03bc1cb2e3f1c88bdab7c0dfcd7da3c46d40111eb84de09d666f4483</originalsourceid><addsrcrecordid>eNp1kE1LAzEQhoMoWKtnr_sHYjP52N3ixVKsFip60HPIx6Td0u6WJEX237u1XoWBmcszvO9DyD2wB1CgJttNwj3lDDhljMEFGYGSFa2EUpdkxGEqaSlKuCY3KW0Z40owMSJPyzbjOprctOtigR6j2RWzwyF2xm0wFbkrPrqU6by3GItl6xqPbS7emtysB6hrb8lVMLuEd397TL4Wz5_zV7p6f1nOZyvqOBeZcm-DchgCE9aBsxxFAFfX1htbOeaD85U3wsnSSwYAaGvpkU19WZZBylqMyeT818UupYhBH2KzN7HXwPRJgP4VoE8C9EnAQDyeiW-zyxj9UPPYD4fedsfYDln_I2EY8QPpiGSo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Integrating Federal Approaches to Post-Cyber Incident Mitigation</title><source>De Gruyter journals</source><creator>Givens, Austen D. ; Busch, Nathan E.</creator><creatorcontrib>Givens, Austen D. ; Busch, Nathan E.</creatorcontrib><description>This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.</description><identifier>ISSN: 2194-6361</identifier><identifier>EISSN: 1547-7355</identifier><identifier>DOI: 10.1515/jhsem-2012-0001</identifier><language>eng</language><publisher>De Gruyter</publisher><subject>cybersecurity ; defense ; homeland security ; mitigation ; public policy</subject><ispartof>Journal of homeland security and emergency management, 2013-01, Vol.10 (1), p.1-28</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c223t-2dbf5ceff03bc1cb2e3f1c88bdab7c0dfcd7da3c46d40111eb84de09d666f4483</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.degruyter.com/document/doi/10.1515/jhsem-2012-0001/pdf$$EPDF$$P50$$Gwalterdegruyter$$H</linktopdf><linktohtml>$$Uhttps://www.degruyter.com/document/doi/10.1515/jhsem-2012-0001/html$$EHTML$$P50$$Gwalterdegruyter$$H</linktohtml><link.rule.ids>314,780,784,27915,27916,66515,68299</link.rule.ids></links><search><creatorcontrib>Givens, Austen D.</creatorcontrib><creatorcontrib>Busch, Nathan E.</creatorcontrib><title>Integrating Federal Approaches to Post-Cyber Incident Mitigation</title><title>Journal of homeland security and emergency management</title><description>This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.</description><subject>cybersecurity</subject><subject>defense</subject><subject>homeland security</subject><subject>mitigation</subject><subject>public policy</subject><issn>2194-6361</issn><issn>1547-7355</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNp1kE1LAzEQhoMoWKtnr_sHYjP52N3ixVKsFip60HPIx6Td0u6WJEX237u1XoWBmcszvO9DyD2wB1CgJttNwj3lDDhljMEFGYGSFa2EUpdkxGEqaSlKuCY3KW0Z40owMSJPyzbjOprctOtigR6j2RWzwyF2xm0wFbkrPrqU6by3GItl6xqPbS7emtysB6hrb8lVMLuEd397TL4Wz5_zV7p6f1nOZyvqOBeZcm-DchgCE9aBsxxFAFfX1htbOeaD85U3wsnSSwYAaGvpkU19WZZBylqMyeT818UupYhBH2KzN7HXwPRJgP4VoE8C9EnAQDyeiW-zyxj9UPPYD4fedsfYDln_I2EY8QPpiGSo</recordid><startdate>20130101</startdate><enddate>20130101</enddate><creator>Givens, Austen D.</creator><creator>Busch, Nathan E.</creator><general>De Gruyter</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20130101</creationdate><title>Integrating Federal Approaches to Post-Cyber Incident Mitigation</title><author>Givens, Austen D. ; Busch, Nathan E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-2dbf5ceff03bc1cb2e3f1c88bdab7c0dfcd7da3c46d40111eb84de09d666f4483</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>cybersecurity</topic><topic>defense</topic><topic>homeland security</topic><topic>mitigation</topic><topic>public policy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Givens, Austen D.</creatorcontrib><creatorcontrib>Busch, Nathan E.</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of homeland security and emergency management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Givens, Austen D.</au><au>Busch, Nathan E.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Integrating Federal Approaches to Post-Cyber Incident Mitigation</atitle><jtitle>Journal of homeland security and emergency management</jtitle><date>2013-01-01</date><risdate>2013</risdate><volume>10</volume><issue>1</issue><spage>1</spage><epage>28</epage><pages>1-28</pages><issn>2194-6361</issn><eissn>1547-7355</eissn><abstract>This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.</abstract><pub>De Gruyter</pub><doi>10.1515/jhsem-2012-0001</doi><tpages>28</tpages></addata></record>
fulltext fulltext
identifier ISSN: 2194-6361
ispartof Journal of homeland security and emergency management, 2013-01, Vol.10 (1), p.1-28
issn 2194-6361
1547-7355
language eng
recordid cdi_crossref_primary_10_1515_jhsem_2012_0001
source De Gruyter journals
subjects cybersecurity
defense
homeland security
mitigation
public policy
title Integrating Federal Approaches to Post-Cyber Incident Mitigation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T04%3A28%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-walterdegruyter_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Integrating%20Federal%20Approaches%20to%20Post-Cyber%20Incident%20Mitigation&rft.jtitle=Journal%20of%20homeland%20security%20and%20emergency%20management&rft.au=Givens,%20Austen%20D.&rft.date=2013-01-01&rft.volume=10&rft.issue=1&rft.spage=1&rft.epage=28&rft.pages=1-28&rft.issn=2194-6361&rft.eissn=1547-7355&rft_id=info:doi/10.1515/jhsem-2012-0001&rft_dat=%3Cwalterdegruyter_cross%3E10_1515_jhsem_2012_00011011%3C/walterdegruyter_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true