SlideShare a Scribd company logo
1 of 2
Download to read offline
The Department of Homeland Security (DHS) consists of U.S. Customs and Border Protection,
Federal Emergency Management Agency, U.S. Immigration and Customs Enforcement,
Transportation Security Administration, United States Coast Guard and the United States Secret
Service.
The DHS strategic plan states: “The Department of Homeland Security’s overriding and urgent
mission is to lead the unified national effort to secure the country and preserve our freedoms.
While the Department was created to secure our country against those who seek to disrupt the
American way of life, our charter also includes preparation for and response to all hazards and
disasters.”
Explain both data warehouses and data mining and describe how they could be used in the DHS.
Solution
Data warehouse :
In computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse
(EDW), is a system used for reporting and data analysis, and is considered a core component of
business intelligence.[DWs are central repositories of integrated data from one or more disparate
sources. They store current and historical data and are used for creating analytical reports for
knowledge workers throughout the enterprise. Examples of reports could range from annual and
quarterly comparisons and trends to detailed daily sales analysis.
The data stored in the warehouse is uploaded from the operational systems (such as marketing or
sales). The data may pass through an operational data store for additional operations before it is
used in the DW for reporting.
Data mining : Data mining is an interdisciplinary subfield of computer science. It is the
computational process of discovering patterns in large data sets involving methods at the
intersection of artificial intelligence, machine learning, statistics, and database systems.
The ways we can use data mining in DHS is :
1) Evaluating use of credit cards by people working in DHS
2)Evaluating patterns of security issues like cybercrime , any illegal transportation issues , mine
details about borde protection people
3)Identifying fraud activities in all departments if any
4)In forecasting of upcoming security issues based on past patterns using data mining
5)In call details analysis , to analyze all the incoming and outgoing calls if they are from people
who cause harm to the country
6)For detecting any malicious intrusions
7)Detect Attacks on critical infrastructurs if any
Data warehousing in dHS : A data warehouse is a collection of data that's:

More Related Content

Similar to The Department of Homeland Security (DHS) consists of U.S. Customs a.pdf

Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Insecurity Insight
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
hartrobert670
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
LizbethQuinonez813
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
Numaan Huq
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
Alexander Decker
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
cowinhelen
 

Similar to The Department of Homeland Security (DHS) consists of U.S. Customs a.pdf (20)

Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
Offices of cia
Offices of ciaOffices of cia
Offices of cia
 
Offices of cia
Offices of ciaOffices of cia
Offices of cia
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
A frame work for data warehouse for nigerian police force
A frame work for data warehouse for nigerian police forceA frame work for data warehouse for nigerian police force
A frame work for data warehouse for nigerian police force
 
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jarHow to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jar
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Research Method EMBA chapter 12
Research Method EMBA chapter 12Research Method EMBA chapter 12
Research Method EMBA chapter 12
 
Marshaling Data for Enterprise Insights
Marshaling Data for Enterprise InsightsMarshaling Data for Enterprise Insights
Marshaling Data for Enterprise Insights
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 

More from armcomputers

i have a runable code below that works with just guessing where the .pdf
i have a runable code below that works with just guessing where the .pdfi have a runable code below that works with just guessing where the .pdf
i have a runable code below that works with just guessing where the .pdf
armcomputers
 
Find Tukey-Kramer resultsa. Group 1 to Group 2 Different Not D.pdf
Find Tukey-Kramer resultsa. Group 1 to Group 2 Different  Not D.pdfFind Tukey-Kramer resultsa. Group 1 to Group 2 Different  Not D.pdf
Find Tukey-Kramer resultsa. Group 1 to Group 2 Different Not D.pdf
armcomputers
 
Female copperhead snakes have the ability to reproduce both sexually.pdf
Female copperhead snakes have the ability to reproduce both sexually.pdfFemale copperhead snakes have the ability to reproduce both sexually.pdf
Female copperhead snakes have the ability to reproduce both sexually.pdf
armcomputers
 
Describe one derived trait in humans (Homo sapiens).SolutionThe.pdf
Describe one derived trait in humans (Homo sapiens).SolutionThe.pdfDescribe one derived trait in humans (Homo sapiens).SolutionThe.pdf
Describe one derived trait in humans (Homo sapiens).SolutionThe.pdf
armcomputers
 
Chickens vary in color. Black and white color variation can be traced.pdf
Chickens vary in color. Black and white color variation can be traced.pdfChickens vary in color. Black and white color variation can be traced.pdf
Chickens vary in color. Black and white color variation can be traced.pdf
armcomputers
 
{c}Problem Run For Charity (charityrun.c)Charity Runs are a pop.pdf
{c}Problem Run For Charity (charityrun.c)Charity Runs are a pop.pdf{c}Problem Run For Charity (charityrun.c)Charity Runs are a pop.pdf
{c}Problem Run For Charity (charityrun.c)Charity Runs are a pop.pdf
armcomputers
 
Why is the 16S rRNA gene a preferred marker for the identification, .pdf
Why is the 16S rRNA gene a preferred marker for the identification, .pdfWhy is the 16S rRNA gene a preferred marker for the identification, .pdf
Why is the 16S rRNA gene a preferred marker for the identification, .pdf
armcomputers
 
What is the good producing business What is the good producing.pdf
What is the good producing business What is the good producing.pdfWhat is the good producing business What is the good producing.pdf
What is the good producing business What is the good producing.pdf
armcomputers
 

More from armcomputers (20)

Homework 3 P11Is this relation a function    (Write either Yes.pdf
Homework 3 P11Is this relation a function    (Write either Yes.pdfHomework 3 P11Is this relation a function    (Write either Yes.pdf
Homework 3 P11Is this relation a function    (Write either Yes.pdf
 
i have a runable code below that works with just guessing where the .pdf
i have a runable code below that works with just guessing where the .pdfi have a runable code below that works with just guessing where the .pdf
i have a runable code below that works with just guessing where the .pdf
 
Find Tukey-Kramer resultsa. Group 1 to Group 2 Different Not D.pdf
Find Tukey-Kramer resultsa. Group 1 to Group 2 Different  Not D.pdfFind Tukey-Kramer resultsa. Group 1 to Group 2 Different  Not D.pdf
Find Tukey-Kramer resultsa. Group 1 to Group 2 Different Not D.pdf
 
Female copperhead snakes have the ability to reproduce both sexually.pdf
Female copperhead snakes have the ability to reproduce both sexually.pdfFemale copperhead snakes have the ability to reproduce both sexually.pdf
Female copperhead snakes have the ability to reproduce both sexually.pdf
 
Explain some of the commonly held misconceptions about cloning. Why .pdf
Explain some of the commonly held misconceptions about cloning. Why .pdfExplain some of the commonly held misconceptions about cloning. Why .pdf
Explain some of the commonly held misconceptions about cloning. Why .pdf
 
Describe nN when the number of positive divisors of n is i) p2 for .pdf
Describe nN when the number of positive divisors of n is i) p2 for .pdfDescribe nN when the number of positive divisors of n is i) p2 for .pdf
Describe nN when the number of positive divisors of n is i) p2 for .pdf
 
Describe one derived trait in humans (Homo sapiens).SolutionThe.pdf
Describe one derived trait in humans (Homo sapiens).SolutionThe.pdfDescribe one derived trait in humans (Homo sapiens).SolutionThe.pdf
Describe one derived trait in humans (Homo sapiens).SolutionThe.pdf
 
Consider the table below How many featuresattributes are in this s.pdf
Consider the table below  How many featuresattributes are in this s.pdfConsider the table below  How many featuresattributes are in this s.pdf
Consider the table below How many featuresattributes are in this s.pdf
 
Chickens vary in color. Black and white color variation can be traced.pdf
Chickens vary in color. Black and white color variation can be traced.pdfChickens vary in color. Black and white color variation can be traced.pdf
Chickens vary in color. Black and white color variation can be traced.pdf
 
{c}Problem Run For Charity (charityrun.c)Charity Runs are a pop.pdf
{c}Problem Run For Charity (charityrun.c)Charity Runs are a pop.pdf{c}Problem Run For Charity (charityrun.c)Charity Runs are a pop.pdf
{c}Problem Run For Charity (charityrun.c)Charity Runs are a pop.pdf
 
write a program that given a list of 20 integers, sorts them accordi.pdf
write a program that given a list of 20 integers, sorts them accordi.pdfwrite a program that given a list of 20 integers, sorts them accordi.pdf
write a program that given a list of 20 integers, sorts them accordi.pdf
 
Why is the 16S rRNA gene a preferred marker for the identification, .pdf
Why is the 16S rRNA gene a preferred marker for the identification, .pdfWhy is the 16S rRNA gene a preferred marker for the identification, .pdf
Why is the 16S rRNA gene a preferred marker for the identification, .pdf
 
Why do SSDs benefit from a scheduler like noopSolutionThe def.pdf
Why do SSDs benefit from a scheduler like noopSolutionThe def.pdfWhy do SSDs benefit from a scheduler like noopSolutionThe def.pdf
Why do SSDs benefit from a scheduler like noopSolutionThe def.pdf
 
which of the following types of orgnisms possess the enzyme catalase.pdf
which of the following types of orgnisms possess the enzyme catalase.pdfwhich of the following types of orgnisms possess the enzyme catalase.pdf
which of the following types of orgnisms possess the enzyme catalase.pdf
 
Which of the five factors of production is most important for creati.pdf
Which of the five factors of production is most important for creati.pdfWhich of the five factors of production is most important for creati.pdf
Which of the five factors of production is most important for creati.pdf
 
What is the good producing business What is the good producing.pdf
What is the good producing business What is the good producing.pdfWhat is the good producing business What is the good producing.pdf
What is the good producing business What is the good producing.pdf
 
What is the future of PKI Acceptance of PKI solutions—and product s.pdf
What is the future of PKI Acceptance of PKI solutions—and product s.pdfWhat is the future of PKI Acceptance of PKI solutions—and product s.pdf
What is the future of PKI Acceptance of PKI solutions—and product s.pdf
 
An easy temperament is best characterized asoptionshigh so.pdf
An easy temperament is best characterized asoptionshigh so.pdfAn easy temperament is best characterized asoptionshigh so.pdf
An easy temperament is best characterized asoptionshigh so.pdf
 
A protein that was isolated by a team of university scien4sts is sus.pdf
A protein that was isolated by a team of university scien4sts is sus.pdfA protein that was isolated by a team of university scien4sts is sus.pdf
A protein that was isolated by a team of university scien4sts is sus.pdf
 
A laser beam strikes one end of a slab of material of length L = 42..pdf
A laser beam strikes one end of a slab of material of length L = 42..pdfA laser beam strikes one end of a slab of material of length L = 42..pdf
A laser beam strikes one end of a slab of material of length L = 42..pdf
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Recently uploaded (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

The Department of Homeland Security (DHS) consists of U.S. Customs a.pdf

  • 1. The Department of Homeland Security (DHS) consists of U.S. Customs and Border Protection, Federal Emergency Management Agency, U.S. Immigration and Customs Enforcement, Transportation Security Administration, United States Coast Guard and the United States Secret Service. The DHS strategic plan states: “The Department of Homeland Security’s overriding and urgent mission is to lead the unified national effort to secure the country and preserve our freedoms. While the Department was created to secure our country against those who seek to disrupt the American way of life, our charter also includes preparation for and response to all hazards and disasters.” Explain both data warehouses and data mining and describe how they could be used in the DHS. Solution Data warehouse : In computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence.[DWs are central repositories of integrated data from one or more disparate sources. They store current and historical data and are used for creating analytical reports for knowledge workers throughout the enterprise. Examples of reports could range from annual and quarterly comparisons and trends to detailed daily sales analysis. The data stored in the warehouse is uploaded from the operational systems (such as marketing or sales). The data may pass through an operational data store for additional operations before it is used in the DW for reporting. Data mining : Data mining is an interdisciplinary subfield of computer science. It is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The ways we can use data mining in DHS is : 1) Evaluating use of credit cards by people working in DHS 2)Evaluating patterns of security issues like cybercrime , any illegal transportation issues , mine details about borde protection people 3)Identifying fraud activities in all departments if any 4)In forecasting of upcoming security issues based on past patterns using data mining 5)In call details analysis , to analyze all the incoming and outgoing calls if they are from people who cause harm to the country 6)For detecting any malicious intrusions
  • 2. 7)Detect Attacks on critical infrastructurs if any Data warehousing in dHS : A data warehouse is a collection of data that's: