logo

HSM 438 Introduction to Cyber Crime

Identify which type of information attack described in the Week One readings poses the greatest threat to the United States and its citizens. Explain why you believe this information attack is the greatest threat. Your initial post should be at least 250 words in length. Support your claims with examples from required material(s), and properly cite any references.

4 Pages722 Words287 Views
   

Added on  2023-06-03

About This Document

This article discusses the greatest cyber attack facing the United States and the hacker subculture. It also explores the theories behind hacker culture and how organizations within Homeland security are developed through cyber divisions on government agencies.

HSM 438 Introduction to Cyber Crime

Identify which type of information attack described in the Week One readings poses the greatest threat to the United States and its citizens. Explain why you believe this information attack is the greatest threat. Your initial post should be at least 250 words in length. Support your claims with examples from required material(s), and properly cite any references.

   Added on 2023-06-03

ShareRelated Documents
Running Head: HSM 438 1
HSM 438 Introduction to Cyber Crime
Name
Institution Affiliation
Date
HSM 438 Introduction to Cyber Crime_1
HSM 438 2
Week 1 Discussion 1
Greatest attack facing United State is from citizens. The unauthorized intrusions are
actions set to compromise integrity through computer resources. Unauthorized intervention
affects many classes in the United States through Personnel Management. Personal information
is compromised through the defense and military departments to cover civilians' employees. 19
million people in the US require social security through clearance applications for lost things.
Family information is addressed through data breach and social security numbers according to
Cressey, (2017). Two million personnel are compromised through social security actions. Based
on text attacks detected, city employees are required to report these issues to military
departments. The earliest malicious activities are addressed through a published timeline on
Nextgov.com.
In November 2008, social networks were supported by local people through the existing
intrusions. The disclosing possibility is discovered through OPM breach in the year 2004. This
means that unfettered access of systems is addressed through DoD personnel in the cyber sectors.
The outline of the technology involves some skills on potential harmful information. Taylor,
Fritsch & Liederbach, (2014) showed that OPM breach can generates some authorized intrusion
through personal loss, and that threaten the United States. Citizens in the United States creates
some interesting unauthorized networks which are a threat to the national government. The
greatest intrusion in the federal government is credit harms and blackmail of credit information.
There are other attacks which are an inconvenience to direct information supplied to the general
public. This means that sets of intrusions in the US are separated from information attack.
HSM 438 Introduction to Cyber Crime_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Response to Discussions on Cyber Terrorism, Malicious Programs, Hacking Detection and Choice Theory
|5
|733
|138

Analysis of Information Security Issues - OPM Data Breach
|5
|842
|267

Data Breach - Cyber Security
|4
|752
|406

Affected Computer Systems - Doc
|8
|518
|28

Wireless Technology Security
|20
|4914
|323

Vulnerability Assessment for a Hospital Set-up
|2
|580
|300