Integrating Federal Approaches to Post-Cyber Incident Mitigation
Givens Austen D. () and
Busch Nathan E.
Additional contact information
Givens Austen D.: King’s College London, London, UK
Busch Nathan E.: Christopher Newport University, Newport News, VA, USA
Journal of Homeland Security and Emergency Management, 2013, vol. 10, issue 1, 1-28
Abstract:
This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.
Keywords: cybersecurity; defense; homeland security; mitigation; public policy (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations:
Downloads: (external link)
https://doi.org/10.1515/jhsem-2012-0001 (text/html)
For access to full text, subscription to the journal or payment for the individual article is required.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:bpj:johsem:v:10:y:2013:i:1:p:1-28:n:1
Ordering information: This journal article can be ordered from
https://www.degruyter.com/journal/key/jhsem/html
DOI: 10.1515/jhsem-2012-0001
Access Statistics for this article
Journal of Homeland Security and Emergency Management is currently edited by Irmak Renda-Tanali
More articles in Journal of Homeland Security and Emergency Management from De Gruyter
Bibliographic data for series maintained by Peter Golla ().