Introduction to Cyber Crime: HSM 438 Week 1 Discussion Analysis

Verified

Added on  2023/06/03

|4
|722
|287
Discussion Board Post
AI Summary
This assignment presents a discussion board post for HSM 438, focusing on cyber crime. The first discussion identifies the greatest information attack threat to the United States, arguing that citizen-led unauthorized intrusions pose the most significant risk. The post highlights the compromise of personal information, including social security numbers, through data breaches and unauthorized system access, citing examples such as the OPM breach. The second discussion delves into hacker subculture, analyzing how varied theories help interpret hacker cultures and the role of social media in facilitating hacking and social engineering. The assignment references various sources to support its claims, exploring the motivations and methods of hackers, and the government's role in cyber security. The document provides an analysis of the current cyber threat landscape and the challenges faced in protecting sensitive information.
Document Page
Running Head: HSM 438 1
HSM 438 Introduction to Cyber Crime
Name
Institution Affiliation
Date
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
HSM 438 2
Week 1 Discussion 1
Greatest attack facing United State is from citizens. The unauthorized intrusions are
actions set to compromise integrity through computer resources. Unauthorized intervention
affects many classes in the United States through Personnel Management. Personal information
is compromised through the defense and military departments to cover civilians' employees. 19
million people in the US require social security through clearance applications for lost things.
Family information is addressed through data breach and social security numbers according to
Cressey, (2017). Two million personnel are compromised through social security actions. Based
on text attacks detected, city employees are required to report these issues to military
departments. The earliest malicious activities are addressed through a published timeline on
Nextgov.com.
In November 2008, social networks were supported by local people through the existing
intrusions. The disclosing possibility is discovered through OPM breach in the year 2004. This
means that unfettered access of systems is addressed through DoD personnel in the cyber sectors.
The outline of the technology involves some skills on potential harmful information. Taylor,
Fritsch & Liederbach, (2014) showed that OPM breach can generates some authorized intrusion
through personal loss, and that threaten the United States. Citizens in the United States creates
some interesting unauthorized networks which are a threat to the national government. The
greatest intrusion in the federal government is credit harms and blackmail of credit information.
There are other attacks which are an inconvenience to direct information supplied to the general
public. This means that sets of intrusions in the US are separated from information attack.
Document Page
HSM 438 3
Week 1 Discussion 2
The hacker subculture is defined through the single theory concepts that help people to
expand in a digital environment. Varied combination of theories accounts generates some good
system of interpreting hacker cultures. The convergence of time can lead to the occurrence of
crime based on Taylor culture. Smith, (2018, p. 19) stated that individual guardian against
cybercrime is addressed through presence control system policies. The use of social media link
to access information generates some skillful combination through hacking and social
engineering. Common channels involve e-mail, banks, and websites. The information is
commonly used in accounts above for family members. The internet access links have a media
for accessing actions of police through a combination of the different scenario.
According to Taylor, Fritsch & Liederbach (2014), hacker theory have little ability on
emotion people as weakness. This is because some hacker are intellectual arrogance, self-
absorption and impatient. Current online activities on the websites provide some useful strength
for different theories of connecting. Laptop users become potential hackers through the system of
smart social kids. This means that it is easier to access neighbor's connections through the access
of a router. Many hackers acquire knowledge through shared social networks and apply them in
real limitation growth. State countries sponsor many best hackers through government
management system as stated by Steinmetz & Nobles, (2017). Organizations within Homeland
security are developed through cyber divisions on government agencies. These help in protecting
on core cyber domain.
Document Page
HSM 438 4
References
Cressey, D. (2017). Theft of the nation: The structure and operations of organized crime in
America. Routledge. Retrieved from;
https://www.taylorfrancis.com/books/9781351472425
Smith, R. (2018). Crime in the digital age: Controlling telecommunications and cyberspace
illegalities. Routledge. Retrieved from;
https://www.taylorfrancis.com/books/9780203794401
Steinmetz, K. F., & Nobles, M. R. (2017). Introduction. In Technocrime and Criminological
Theory (pp. 17-26). Routledge. Retrieved from;
https://www.taylorfrancis.com/books/e/9781498745093/chapters/10.4324%2F978131511
7249-8
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism.
Prentice Hall Press. Retrieved from; https://dl.acm.org/citation.cfm?id=2655330
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]