Paper details:
Please review attached word document labeled HSM 497 showing discussion questions 1 and 2. Please Review Required Readings instructions. Please review attached pdf articles.
Please used the Required Readings and Articles to answer discussion 1 and discussion 2.
The two discussions are separate and should be answered in a minimum of 275 words each.
Please separate the references as well , I request two references for each discussion.
Required Readings and Multimedia
1 To successfully complete this week’s discussion, “Cybersecurity Post-WikiLeaks,” read the following articles found in ProQuest
◦ Burns, J., & Somaiya, R. (2010, December 9). Hackers attack sites considered WikiLeaks foes; [Foreign Desk]. New York Times (Late Edition (east coast)), A1, Document ID: 2207644521
CITE: BURNS, J. F. (2010, Dec 09). Hackers attack sites considered WikiLeaks foes. New York Times Retrieved from http://search.proquest.com/docview/816521970?accountid=32521
◦ Vance, A., & Helft, M. (2010, December 9). Hackers give web companies a test of free speech; [Business/Financial Desk]. New York Times (Late Edition (east coast)), B1. Document ID: 2207645281
CITE: ASHLEE VANCE and, M. H. (2010, Dec 09). Hackers give web companies a test of free speech.NewYorkTimesRetrievedfromhttp://search.proquest.com/docview/816608393?accountid=32521
2 To successfully complete this week’s discussion, “Privacy and Civil Liberties,” watch the following program:
◦ Spying on the Home Front (Click on “Watch the Full Program Online
You have to click the below URL to view this Required Article.
CLICK URL http://www.pbs.org/wgbh/pages/frontline/homefront/
Discussions
To participate in the following discussions, go to this week’s Discussion link in the left navigation.
Discussions
1 Cybersecurity Post WikiLeaks
In 2010, WikiLeaks released thousands of classified U.S. documents on the Internet. Subsequent to the arrest of WikiLeaks founder Julian Assange, hackers around the world began attacking the websites of U.S. companies they believed were working against WikiLeaks. These attacks served as one of the first coordinated attacks on America’s cyber infrastructure.
Describe the role of Department of Homeland Security in cybersecurity for U.S. citizens and U.S corporations with regards to the attacks from WikiLeak supporting hackers. What can the Department of Homeland Security do?
What should the Department of Homeland Security do? Your initial post should be at least 250 words in length. Support your claims with examples from required material(s), and properly cite any references
Reference
1.
2.
Discussions
2 Privacy and Civil Liberties
As time passes since the attacks of September 11, 2001, homeland security has improved, but concerns over privacy and civil liberties have increased. Advocates for security claim that new technologies and techniques in homeland security are necessary to protect the public. Privacy advocates believe that the mining of personal information and increased surveillance have altered, negatively, the American way of life.
Watch Spying on the Home Front. Identify which side of the argument you agree with and provide at least two reasons for your position. Use lessons and arguments from your entire study in Homeland Security to support your argument.
Your initial post should be at least 250 words in length. Support your claims with examples from required material(s), and properly cite any references.
Reference
1.
2.