-HSM 438 Introduction to Cyber Crime
HSM 438 Week 1 - Discussion 2
-HSM 438 Hacker Theory
HSM 438 Introductions to Cyber Crime
Identify which type of information attack described in the Week One readings poses the greatest threat
to the United States and its citizens. Explain why you believe this information attack is the greatest
threat. Your initial post should be at least 250 words in length. Support your claims with examples from
required material(s), and properly cite any references. Respond to at least two of your classmates’ posts
by Day 7.
After reading the different types of information attack, I believe the attack that will have the greatest
threat to the United States will be Unauthorized Intrusions. “Intrusions are any set of actions that
attempt to comprise the integrity, confidentiality or availability of a computer resource” (Taylor, Fritsch,
Liederbach & Holt, 2011 p. 26). It will cause problems in the military. The military has been using an app
called Kilswitch, and it might harm the military if it can get into the wrong hands. “Had the KILSWITCH
software stayed confined to government-owned Android devices that do not connect to cellular or
civilian WiFi networks, perhaps things would have been okay. But the app was available through the
National Geospatial-Intelligence Agency’s “GEOINT App Store” (Tom, 2018). The Kilswitch was available
to the public. People can gather information from the military, and we would not even know it. If a
person can enter into the program, they can monitor the military for a long time, and it may never be
identified. This threat could harm our military personnel who are on the ground conducting a mission.
Someone could gather information from the program and take classified information from the military. If
the app can show the location of military personnel, it might shut down an operation, and lives will be at
risk.
With this specific attack, I don’t think people are trying to do any harm with Unauthorized Intrusions.
The issue at hand will be that the software will be comprised and its integrity. It will give a massive blow
to the military. If and when the software is compromised then the Kilswitch will have to be taken down.
Another issue will be that someone can copy the app and make a model of it and sell it and use it against
the military. There have not been any known intrusions that we know of so far, but if the military keeps
this app open we might see an issue in the near future.