User:Andrew.willman/sandbox

= Andrew Willman: Article Selection = (Each article was placed in order of which I would like to work on if possible, I also made sure to pick Low Importance pages as none were developed)

DHS Cyber Security Division
Wikipedia has tons of references within my concentration as it is often published by the Federal Government. So, within Homeland Security I would like to target a specific role of Cyber Security. That being the Department of Homeland Security Cyber Security Division. The only thing the Wikipedia site has is an external link to the DHS Cyber Security Division website with no other information, and a definition. I believe there is much more information that can be added to this Wikipedia article. For example, the article does not talk about the Cyber Security Division’s mission “to enhance the security and resilience of the nation’s critical information infrastructure and the Internet by developing and delivering new technologies, tools and techniques; conducting and supporting technology transition; and leading and coordinating research and development.” https://en.wikipedia.org/wiki/DHS_Cyber_Security_Division Adding to this document or building a new Wikipedia reference would be the addition of the Department of Homeland Security Cybersecurity Division Strategy. The actual strategy behind the division is not discussed anywhere on Wikipedia.

Current sources for editing: DHS Cyber Security Division
DHS Cybersecurity Program

This is the main website that the Cybersecurity program is found, which includes the Department of Homeland Security role with creating the Cybersecurity Program. This website also includes the Cyber Security Division’s mission under the Science and Technology Directorate. https://www.dhs.gov/science-and-technology/cybersecurity-programs

DHS Cybersecurity Strategy

United States Department of Homeland Security Cybersecurity Strategy as of May 15, 2018. Which talks about how the division identifies risk, reduction of vulnerabilities, along with mitigation of the cyber incidents. https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf

Science & Technology Cyber Security Division Overview Video

This is also the defining of the Cyber Security Division’s mission located here which is worded slightly different than the main webpage as I believe it to be the actual division’s mission over the Science and Technology Directorate. https://www.dhs.gov/science-and-technology/sts-cyber-security-division-overview-video

Cybersecurity and Infrastructure Security Agency (Act)
The Cybersecurity and Infrastructure Security Agency (CISA) has a decently developed wikipedia source. However, the actual Act behind CISA signed in 2018 by President Donald Trump to move CISA under the Department of Homeland Security has not been covered at all. The CISA Act wikipedia page is within scope of the WikiProject United States and has also been rated as a Stub-Class with Low-importance on the projects importance scale.

Current sources for editing: Cybersecurity and Inftrastructure Security Agency Act
Public Law 115-278 Nov. 16, 2018

This is the official document signed by congress which reinstated the CISA under the CISA Act of 2018 to be an amended to the Homeland Security Act of 2002. To now place CISA under the Department of Homeland Security.

CISA Fact Sheet 2018

The website GovDelivery has published a file under the United States Department of Homeland Security, a "Fact Sheet" defining the missions behind CISA after the Act was signed in 2018.

DHS CISA Budget Overview Fiscal Year 2020

The Budget Overview talks about how the CISA leads the national efford to defend Critical Infrastructure against the threats of today. Going on to say how Congress recognized the role played by CISA has never been more important, thus the signing of the CISA Act of 2018.

Side note: FY 2020 Budget funds $1.1B to improve security of U.S. Cyber Infrastructure.

Automated Information System
There is also basically no information on Automated information system or Automated information systems security as it is defined under the WikiProject Telecommunications as Low-importance.

Current sources for editing: Automated Information System & Automated Information Systems Security
Development of an Automated Information System University Management

[https://pdf.sciencedirectassets.com/277811/1-s2.0-S1877042814X00364/1-s2.0-S1877042814043626/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEE4aCXVzLWVhc3QtMSJHMEUCIQCCc2J9ObPvEmwWO3cOeucRCHxOIGS2wYXn3wpbW3xbyAIgV8TFtxqzkSDLTdZd9DnoJhiQlwusoaGvIuu7sEIJ08cqvQMI9v%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARACGgwwNTkwMDM1NDY4NjUiDHzg1BwU9b0qY0WBWyqRAz7kiVw2a7OmSZTZ%2Fu7KQuietJNUPQMLk1xmB2x82CRB6Y%2F7OhaRDwFUbEn63RBLqLJ7ZDS%2FUolEP%2BtCGwXcG0D9d1WSaIaek9sQy8BuDNXRtdypFDYa0mMPbRkva2au%2BPqxcVtXW6jqgyePF3HTz4bdboFMK2JG84zP%2BQZiTqjkibuaSEbxtRtgKaNagax9HPr2Gmkf1MiKelJ3GenBpHEr%2F1mWdi2WQLIDRPHqeq%2BegouClSDRUAyv1DUjl22U6klnbJPNmpgmq%2FQyyFAU5JPjDY7s7IBxKzt%2FyPtei6Je7m1tUU2e%2Fc%2B%2FG6tKW7yX7SHWYy8ZmxrAkcmiywTM4YC%2BWf5eeOJ9510z8T2dKhEmb8dZtwPHwROxZeSbb8uP63L9fcXOsS1KzLgK9i4KYe%2FbdUjhsY4IUiY91TJtWQCvmYH2hdahlLdxpDe3s4jeUZqqjDkQIc5USAsq%2FZbMaEP6Ses9ixtT6pIoRLhlEJp408A%2FUVeVA4JVwANjRqBRW3pdGIWV77A84qlF2UkJAGoJMJXugfIFOusBaM%2FRNkgn8etOVRqjNALzuuQq7GG0D22Kvk5AQTftrrh3s90VTw3d6Zb2qOsGWVdYTxSRjqfQqEWKKFTzwR9BjFK%2BoTRGRvUolNBfOwgGFdmNwzmaGAbEQkO8AoD7RczoGp9XRfJXrgA5iwKq4XRDV61c6yQboQdl0LXQZ6evtuYQJ7O4biIOCByvVag%2Flp2tpl21qyQyBjFQhANDljd8Yab%2BaVVeD5iq0sWXD5TkHKKyd5xs3WVBEYg2syMj%2B6ASjLUUMm69HninGzKfYtpNjXxmYsKEjZkGl0LXT7CWpVs12beoSV8DjNooWg%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200209T223416Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTYUCU3QLNK%2F20200209%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=1f5ad3b19bc1604481ffb8fd8b3f920cf17548463714887a6cf9c59891ca7968&hash=7f398fb4df81605ce542ec6eb51c22f336a72c8de22f4d42cc926593ed5a9cb8&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S1877042814043626&tid=spdf-cb1f496b-f0ba-420b-9b0e-b4487783adbf&sid=8da78e1b44db7147bf79040483697b644fd6gxrqa&type=client CY-ICER 2014] discusses the idea of a framework towards improving the efficiency of university management.

U.S Department of Health and Human Services

NISTIR 4636 The National Instituie of Standards and Technology published a report a Automated Information Systems Security Program Handbook. The source is however considered Legacy by NIST.