THANK YOU FOR SUBSCRIBING
New data processing methods are used in big data analysis to break down incredibly large data sets to identify trends and patterns. The DHS is using big data to analyze human activity in terrorist groups, allowing it to track and target high-value individuals.
FREMONT, CA: Thousands of threats are made against the United States each year by foreign governments, terrorist groups, and individuals’ intent on wreaking havoc. In recent years, the Department of Homeland Security’s safeguarding of American interests and properties has become much more complicated. The interconnectedness of critical infrastructure, massive network security vulnerabilities, and the sheer amount of data to be processed all illustrate the constantly changing nature of threats that the Department of Homeland Security (DHS) must deal with daily. DHS is responding to the increase in cyber-threats by introducing new tools.
Critical infrastructure is a prime target for both hostile governments and cyber-terrorist groups when it comes to cyberattacks. Cyberattacks could threaten 16 sectors of the economy and society, according to the DHS. An effective, large-scale attack on any of the 16 sectors could wreak havoc on American life for months, leaving the country vulnerable to conventional attacks. A system of obsolete industrial control systems is the source of the vulnerability. These systems were built with the infrastructure decades ago when almost every system was completely self-contained and connected to its own network or facility.
Over the past ten years, there has been a push to digitize and automate critical structures, which has resulted in the system’s self-containment being breached by connecting it to a wider computer network. Hackers can hack the industrial control system and create havoc on everything from the power grid to transportation networks and more because the computer network is linked to the internet. Evidence indicates that China and Russia have already breached America’s vital infrastructure, and the DHS is collaborating with private firms to enact tighter security protocols. The DHS recognizes that avoiding such an attack might be unlikely. Still, they may plan to minimize the impact of an infrastructure attack by introducing redundancies or New data processing methods are used in big data analysis to break down incredibly large data backups to restore functionality as quickly as possible.
The implementation of big data analytics to the DHS introduced new and important tools for safeguarding American interests. New data processing methods are used in big data analysis to break down incredibly large data sets to identify trends and patterns. The DHS is using big data to analyze human activity in terrorist groups, allowing it to track and target high-value individuals.