HSM 438 Weekly Discussion Posts Week 1 – 5
HSM 438 Week 1 Discussion Post 1: Identify which type of information attack described in the Week One readings poses the greatest threat to the United States and its citizens. Explain why you believe this information attack is the greatest threat.
HSM 438 Week 1 Discussion Post 2: Describe which theory from Chapter Three of Digital Crime and Digital Terrorism best explains the origin and development of the hacker subculture in digital environments. Identify one strength and one weakness of this theory in describing hacker behavior.
HSM 438 Week 2 Discussion Post 1: Describe what is meant by the “hacker subculture” and identify at least one value that drives the hacker subculture. Read the transcript (Frontline: Tapes and Transcripts) for Hacking Into an Ordinary Home Computer and The Most Underreported Hacking Attacks, video excerpts from the Frontline episode, “Hackers,” and read the interviews found at the website Frontline: “Hackers: Who Are Hackers?” to help formulate your opinions. Do you think this hacker value system can ultimately be used to disrupt and deter hackers in the future?
HSM 438 Week 2 Discussion Post 2: Describe what is meant by a “Denial-of-Service” attack. Do you believe that denial-of-service attacks could realistically be used as part of a cyberterrorism or cyber warfare campaign? Is there any evidence of this technique being used successfully by nation-states as part of warfare?
HSM 438 Week 3 Discussion Post 1: Describe the difference between cyberbullying and cyberstalking. Recent cases of cyberbullying have received national attention. Do you think cyberbullying is a crime? Is cyberbullying an act that should be pursued legally in U.S. courts of law?
HSM 438 Week 3 Discussion Post 2: Identify two challenges that law enforcement and intelligence organizations face when policing hate groups on the Internet. Do you think that police should be able to gather evidence on extremist groups via the Internet? How does the USA Patriot Act, the Electronic Communications Privacy Act and Title III wiretaps help or hinder police from investigating extremist groups on the internet. Support your answer.
HSM 438 Week 4 Discussion Post 1: Describe at least two reasons why local law enforcement and municipalities face challenges when investigating computer crimes. Identify at least one key component that local law enforcement agencies should have to improve their investigative response.
HSM 438 Week 4 Discussion Post 2: Identify at least two considerations that must be addressed when developing a search warrant application during an investigation of computer-related crime. How does a single crime scene or multiple crime scenes affect cyber investigations?
HSM 438 Week 5 Discussion Post 1: Describe the difference between firewall protection and encryption protection within the domain of information security and infrastructure protection domain. Assess which type of protection you believe is the most vital (firewalls or encryption) for securing digital information.
HSM 438 Week 5 Discussion Post 1: Chapter Fourteen of the course text, Digital Crime and Digital Terrorism, provides eight forecasts for the potential future of digital crime and digital terrorism. Identify which of these eight forecasts you believe is most likely to come true. Provide at least two reasons why you believe that forecast is the most accurate. What is the biggest challenge that the criminal justice system faces in trying to defend against the forecast you selected?