EconPapers    
Economics at your fingertips  
 

Integrating Federal Approaches to Post-Cyber Incident Mitigation

Givens Austen D. () and Busch Nathan E.
Additional contact information
Givens Austen D.: King’s College London, London, UK
Busch Nathan E.: Christopher Newport University, Newport News, VA, USA

Journal of Homeland Security and Emergency Management, 2013, vol. 10, issue 1, 1-28

Abstract: This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.

Keywords: cybersecurity; defense; homeland security; mitigation; public policy (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations:

Downloads: (external link)
https://doi.org/10.1515/jhsem-2012-0001 (text/html)
For access to full text, subscription to the journal or payment for the individual article is required.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:bpj:johsem:v:10:y:2013:i:1:p:1-28:n:1

Ordering information: This journal article can be ordered from
https://www.degruyter.com/journal/key/jhsem/html

DOI: 10.1515/jhsem-2012-0001

Access Statistics for this article

Journal of Homeland Security and Emergency Management is currently edited by Irmak Renda-Tanali

More articles in Journal of Homeland Security and Emergency Management from De Gruyter
Bibliographic data for series maintained by Peter Golla ().

 
Page updated 2025-03-19
Handle: RePEc:bpj:johsem:v:10:y:2013:i:1:p:1-28:n:1