Response should be a minimum of 250 words and include direct questions. You may challenge, support or supplement another studentâ€™s answer using the terms, concepts and theories from the required readings. Also, do not be afraid to respectfully disagree where you feel appropriate; as this should be part of your analysis process at this academic level.
One of the biggest challenges facing homeland security and homeland defense in the next year is container security. According to Docker Inc. (2019) “A container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another” (Docker Inc., 2019, Paragraph 1). Since containers necessarily integrate multiple elements into their employment and function securing them is a complex challenge. Critical elements associated with container security are securing the container pipeline, application, environment, and infrastructure. The container must also be effectively integrated with existing security tools and policies, in order to ensure that they remain effective for the organization, without having a negative impact on operations (Red Hat Inc., 2019). Concern for securing containers is increasing as the use of containers continuously increases across the enterprise. Mike Vizard (2019) cited a survey of 311 cybersecurity experts, which determined that seventy-five percent of organizations running over 100 containers to support their operations experienced no less than one cybersecurity event. This same study determined that only six percent of the organizations surveyed were free of concerns about container security and only twenty-nine percent remain confident (Vizard, 2019). One potential cause for security issues among containers is the vulnerability identified by criminals. Exploiting the weaknesses in the configuration and employment of containers (which are increasingly used in production environments) enables criminals to achieve their desired objectives in the most effective way. This threat has resulted in forty two percent of the survey’s respondents avoiding the use of containers in their operations, for fear of assuming security vulnerabilities associated with their adoption (Vizard, 2019). In the next five years, illegal influence in the next United States general election will be a major challenge. While the recent conclusion of Robert Mueller’s inquiry into Russian interference with the 2016 election suggests that there was no illegal collusion between Russia and President Trump’s campaign there is evidence that suggests that Russia did attempt to skew the election through social media fraud and hacking (Yourish, Buchanan, & Watkins, 2018). Additionally some states are compromising the security of American elections by facilitating the potential interference and unauthorized voting. In 2015 California approved automatic voter registration for people procuring a driver’s license or conducting a transaction involving their state identification. Since then the California DMV confirmed that 1,500 people have been improperly registered to vote in the state, indicating the potential for non-citizens to cast ballots in national elections (Bollag, 2018). Issues within the Democratic National Committee (DNC) revealed domestic threats to the sanctity of the election process as well. In 2016 Hillary Clinton gained leverage over the DNC by paying off a large portion of the exorbitant debt that Barrack H. Obama’s campaign had accumulated, rendering the committee heavily indebted to Mrs. Clinton. As a result senior leaders within the DNC agreed to support Clinton’s campaign prior to her nomination as the democratic national candidate (Brazile, 2017). This reveals a critical vulnerability within the nomination and election process in the country, one that is likely to be targeted in future elections. The biggest challenge facing homeland security in the next ten years will undoubtedly be technological in nature. Some analysts have predicted a vast diminishing of available jobs, as computer automation becomes more and more widespread, within the economy. This could foster trying conditions for unqualified employees, with fewer opportunities to earn a living. Automated transportation is another element of technology becoming increasingly integrated into modern society. This element hosts obvious vulnerabilities to well-equipped and highly proficient thieves, desiring to acquire vehicles or potentially their cargo, by exploiting networked connections. Regardless of upcoming threats, sustaining the critical principles of agency cooperation, resourcing, and threat analysis will enable security organizations to sustain homeland security and defense.
Bollag, S. (2018). California DMV: Non-citizens may be registered to vote. The Associated Press. Retrieved from: https://www.apnews.com/f5f245dbff474013a5f4bda673818138
Brazile, D. (2017). Inside Hillary Clinton’s secret takeover of the DNC. Politico, LLC. Retrieved from: https://www.politico.com/magazine/story/2017/11/02/clinton-brazile-hacks-2016-215774
Docker Inc. (2019). What is a container?. Docker Inc. Retrieved from: https://www.docker.com/resources/what-container
Red Hat Inc. (2019). What is container Security?. Red Hat Inc. Retrieved from: https://www.redhat.com/en/topics/security/containe…
Vizard, M. (2019). Survey finds growing container security concerns. MediaOps Inc. Retrieved from: https://containerjournal.com/2019/01/10/survey-fin…
Yourish, K., Buchanan, L., and Watkins, D. (2018). A timeline showing the full scale of Russia’s unprecedented interference in the 2016 election, and its aftermath. The New York Times. Retrieved from: https://www.nytimes.com/interactive/2018/09/20/us/politics/russia-trump-election-timeline.html