1,755
24
Research Paper, 2 pages (300 words)

Information technology and security research paper example

Information Technology and Security

Information technology has assisted the Homeland Security department in monitoring the country and protecting the citizens and infrastructure from terrorist attacks. The department is also mandated with the task of minimizing damage and assist in recovery in the event of terrorist attacks. The department uses information technology in several ways. First of all the department utilizes integrated surveillance intelligence systems. This is a system that monitors border activity using ground-based sensors and fixed cameras. There is also the use of computer aided detection capabilities. The system assists with the detection and preventing illegal aliens and contraband from entering the United States (Seghetti, Lake & Robinson, 2005).
The organization also utilizes computer assisted passenger pre-screening systems. This is a technology that helps the organization to identify passengers at the airport that require additional security attention. There is a database that contains a list of all the suspected terrorists known as the watch list. The individual’s booking details are checked in the database to prevent such individuals from purchasing airplane tickets. There is also stored data information that assigns a risk score on the passengers and those with high risk scores have to be subjected to higher scrutiny than the rest.
Information technology is also crucial in the monitoring of the travel of foreign nationals in terms of entry, exit and travelling within the country. The United States visitor and immigrant Status indicator technology is an advanced technology that will assist the organization to monitor the foreigners at a higher level. Last but not least, information technology has been used by Homeland Security to monitor the trade of goods in the United States. The system is known as the automated commercial environment and plays a critical role in border security.

Reference

Seghetti, L., Lake, J. & Robinson, W. (2005). Border and Transportation Security:
Selected Programs and Policies. Retrieved from: http://www. fas. org/sgp/crs/homesec/RL32840. pdf

Thank's for Your Vote!
Information technology and security research paper example. Page 1
Information technology and security research paper example. Page 2
Information technology and security research paper example. Page 3

This work, titled "Information technology and security research paper example" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Research Paper

References

AssignBuster. (2022) 'Information technology and security research paper example'. 14 September.

Reference

AssignBuster. (2022, September 14). Information technology and security research paper example. Retrieved from https://assignbuster.com/information-technology-and-security-research-paper-example/

References

AssignBuster. 2022. "Information technology and security research paper example." September 14, 2022. https://assignbuster.com/information-technology-and-security-research-paper-example/.

1. AssignBuster. "Information technology and security research paper example." September 14, 2022. https://assignbuster.com/information-technology-and-security-research-paper-example/.


Bibliography


AssignBuster. "Information technology and security research paper example." September 14, 2022. https://assignbuster.com/information-technology-and-security-research-paper-example/.

Work Cited

"Information technology and security research paper example." AssignBuster, 14 Sept. 2022, assignbuster.com/information-technology-and-security-research-paper-example/.

Get in Touch

Please, let us know if you have any ideas on improving Information technology and security research paper example, or our service. We will be happy to hear what you think: [email protected]