Homeland security in Virginia : Working toward a more secure commonwealth

نویسندگان

  • Steven Davis
  • James Bohland
  • Jody Hershey
چکیده

Nearly four years after the events of Sept. 11, 2001, vulnerabilities remain in homeland security preparedness both nationally and in the commonwealth. A national survey of city mayors found, for example, that only one in 10 cities had received first-responder funding by Aug. 1, 2003, which at the time confirmed that “the long-sought federal funding for our cities’ first responders has been both diluted and delayed.” i Since 2001, more than $23 billion has been appropriated to support state and local preparedness efforts, but it is estimated that between $8 billion and $9 billion is still unspent and sitting in the administrative pipeline at multiple governmental levels. Increasingly, Congress and other leaders are demanding greater accountability of how homeland security funds are spent and the return on investment in this critical function. Because Virginia is home to many defense installations and federal agencies, it is a “target-rich” environment. By James Bohland, Jody Hershey, and Helen Horton

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power

Cryptocurrencies like Bitcoin have proven to be very successful in practice and have gained lots of attention from the industries and the academia. The security of Bitcoin-like systems is based on the assumption that the majority of the computing power is under the control of honest players. However, this assumption has been seriously challenged recently and Bitcoin-like systems will fail when ...

متن کامل

Security Engineering – FY17 Systems Aware Cybersecurity

Stephen Adams, University of Virginia Bryan Carter, University of Virginia Krishnamurthy Vemuru, University of Virginia Carl Elks, Virginia Commonwealth University Tim Bakker, Virginia Commonwealth University Kryzsztof Cios, Virginia Commonwealth University Georgios Bakirtzis, Virginia Commonwealth University Aidan Collins, Virginia Commonwealth University Nancy Mead, Carnegie Mellon University...

متن کامل

2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely∗

Cryptocurrencies like Bitcoin have proven to be a phenomenal success. Bitcoin-like systems use proofof-work mechanism which is therefore considered as 1-hop blockchain, and their security holds if the majority of the computing power is under the control of honest players. However, this assumption has been seriously challenged recently and Bitcoin-like systems will fail when this assumption is b...

متن کامل

TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake

We design and implement TwinsCoin, the €rst cryptocurrency based on a provably secure and scalable public blockchain design using both proof-of-work and proof-of-stake mechanisms. Di‚erent from the proof-ofwork based Bitcoin, our construction uses two types of resources, computing power and coins (i.e., stake). Œe blockchain in our system is more robust than that in a pure proof-of-work based s...

متن کامل

Toward A Cognitive Analysis of Insider Threats An Examination of User Password Choice

This product is part of the RAND Infrastructure, Safety, and Environment working paper series. RAND working papers are intended to share researchers' latest findings and to solicit informal peer review. They have been approved for circulation by RAND Infrastructure, Safety, and Environment but have not been formally edited or peer reviewed. Unless otherwise indicated, working papers can be quot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005