Nobody downloaded yet

Assignment 4: ipad security breach - Essay Example

Comments (0) Cite this document
iPad Security Breach Over the past few years, there have been tremendous changes in information and technology (IT). This includes the development of gargets that are more advanced and are stylistic as well. This is indicated by their increased applications despite being reduced in size to increases their portability…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Assignment 4: ipad security breach
Read TextPreview

Extract of sample "Assignment 4: ipad security breach"

Download file to see previous pages Despite these benefits, users of such gadgets face security threats touching on the confidentiality of their accounts as a result of malicious hacking into IT systems. Hacking into a Web site, a real-world case involving a known company It is never justifiable to hack into a Web site belonging to an individual or a company. This is because such an action leads to unauthorized access of information of a company or its customers. The cumulative effect of this is fear and embarrassment to businesses. Fear results from the potentialities that such hackers could pose as the company and conduct an illegal parallel business or post compromised notices to its website or customers. Hacking into the website of a company also brings fear among their customers and in worse situations the withdrawal of these customers. This finally reduces business for the organization. Hacking could also result to psychological torture to the customers of the company for fear that some of their confidential information has been revealed. The situation is worse if the hacking involves high-ranking people in the society and the group responsible for the hacking is a media company. This is because of the fear that such information will be availed to the public and compromise their personal image or even critical national matters like security. Generally, the action amounts to a security breach. A breach in a company’s security through hacking and it potential effects were witnessed when a group named Goatse Security obtained the subscriber data for many iPad owners. In this situation, the victim was Apple company and its affected customers included politicians, government officials, a top military officer, popular corporate officers, many other important and famous people. It also included accounts for companies in the technology industry like Microsoft, Amazon, AOl, Microsoft and thousands of other iPad owners (Tate, 2010 a). Tate (2010 a) states that data given by Goatse Security indicates that over 114,000 user accounts were compromised as a result of the hacking. In the above case the information exposed included the e-mail addresses and network ID’s. According to CNN News (June 10, 2010), the security breach was as a result of a security hole in AT&T’s network and it occurred as Goatse Security to exploited vulnerabilities of this network. AT&T was made aware of the breach and the security hole was closed. The above scenario has a potential of straining and even breaking ties between business partners. In this situation, Apple has remained silent over the issue leaving its partner AT&T to fight to contain the damaged public relations (PR) and to apologize for the mishap. This is because the problem resulted from AT&T operating the server without strong security controls. Victimised businesses/organisations are forced to use a lot of resources to win the trust of their customers once again. According to Tate (2010 b), AT&T had to fight to stop the spread of iPad fear among iPad owners. A corporate ethics statement for a computer security firm that would allow or encourage activities like hacking In the process of running its business operations, no firm is authorized to threaten the safety and confidentiality of the customers of another firm, directly or indirectly. Importance of social responsibility by organizations ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Assignment 4: ipad security breach Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from
(Assignment 4: Ipad Security Breach Essay Example | Topics and Well Written Essays - 1250 Words)
“Assignment 4: Ipad Security Breach Essay Example | Topics and Well Written Essays - 1250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Assignment 4: ipad security breach

E-crime investigation. Security breach on a Linux Operation System

...the probability of threats. The probable vulnerabilities and system flaws will enable the intruder to use as resources for breaching in the system. It summarizes both factors, including physical and information security which shows positive and negative impacts of these factors. There are significant advantages for using vulnerability assessments. The approach is to focus on security Ability to identify probability of threats before hacker uses it. Keeping the system updated with latest virus updates and security patches. Develop expertise for the home PC user Eliminates data loss The first phase of vulnerability assessment is the investigation phase. The investigation...
12 Pages(3000 words)Assignment

IPad's Security Breach

...with would be censored, in order to prevent them from threats and unauthorized access. Unfortunately, he was not able to protect the email addresses (Fpolom's blog). Gawker media was not guilty and was not socially responsible for the security breach that has happened. In addition, Gawker never asked from AT&T regarding their position from the impact of the breach (Fpolom's blog). 4 Factors a CEO should consider Current business trends are integrated to facilitate processes and functions via computing devices. Organizations maintain critical data on servers that are protected by efficient hardware based or software based security appliances on a low...
6 Pages(1500 words)Assignment

IPad's Security Breach

...of the breach from spreading to other parts of the network as well. For detecting the characteristics of the security breach on immediate basis, preliminary assessment is an essential task to perform. The task provides characteristics of the threats that facilitate to develop a plan, containing all the actions that need to be followed. As per the scenario, email addresses of thousands of people were compromised. It is the responsibility of an organization to notify their valued customer, what has happened, and what will be the consequences linked with the breach. There are many methods to notify the customer. For example, email, telephone, SMS etc. 4...
5 Pages(1250 words)Assignment

Cyber Security and Information Security

.... Additionally, there are several references to financial aid which can be given as a way of helping more people attend UMUC. There are not that many references to information security, but the website does have a secure sign-in area for students and faculty designed to keep important information secure and personal to the individual. Chapter 3 P.114 4. Using the format provided in the text, design an incident response plan for your home computer. Include actions to be taken if each of the following events occur: Virus attack Power failure Fire Burst water pipe ISP failure What other scenarios do you think are important to plan for? Type of Event Virus Attack Potential...
4 Pages(1000 words)Assignment

Assignment 4

...? Module 4: Natural Hazards and Disasters: Floods Module 4: Natural Hazards and Disasters: Floods Flood is the situation in which the water in the river reaches at the level beyond its capacity. The increase in the amount of the water in the river is due to the impact of rains, fractures and rupture of dams and due to the sudden climate change (increase in temperature) that causes the snow and mountainous glaciers to melt at a faster pace. During the flood, the water in the river rushes out of the river and risks the lives and the property of people residing nearby. On the other hand it harms the irrigated fields and plants. It is the force of water that is considered the most dangerous during the flood....
5 Pages(1250 words)Assignment

Critical Evaluation of Ipad

...School Critical Evaluation of Ipad Ipad is the newest addition to computer technology. Designed by Apple Computer, Inc, Ipad makes use of the touch screen technology to add convenience and portability to the usually laptop. It is a new tablet device which does not necessitate the use of outer keyboard thus reducing its weight and size. This paper critically evaluates the Ipad project and its release in the market. Main Body Defining the aim and objectives of a project, and examine the project management environment within an organisation. With a mission of producing "high quality low cost, easy to use products, that incorporates high technology for the individual"...
8 Pages(2000 words)Assignment

Apple iPad Mini

...Apple iPad mini [Supervisor Apple iPad Mini Core value The core values regarding iPad Mini were very basic. During the design and development the iPad Mini, the company wanted something powerful and simple for customers. The company realized the need for a change in the trend of large tablet computers. It felt that the company would make a breakthrough in the market where a small change would make a significant difference. With innovation on minds of the people at Apple, the company finally developed iPad Mini. Actual product Brand name: The product being discussed in this paper is Apple’s iPad Mini. Developed and designed by Apple Inc., iPad Mini was released on 2nd November 2012. Apple Inc. is one of the largest producers... of...
3 Pages(750 words)Assignment


.... However, if the guardians are unwilling to live with her, then she may be taken to an orphanage. 3) a. Look at the oil excavation from two perspectives, the good side of it and the bad side. Think about the effect on the environs and the people. When the good outweigh the bad, then you can proceed. However, if there is any form of doubt safely etched at the deepest parts of your hearts, then abandoning such a task would be the plausible thing to do. b. Outsourcing may or may not a company’s best bet. However, outsourcing would be the best option when a company needs to speed up the production process and increase the quality of their output. Division of labor ensures that parties partake on tasks that best fit them. 4)...
2 Pages(500 words)Assignment


... of electronic postmarks will reduce the congestion in the IRS servers. This will happen as long as a taxpayer has the electronic postmark to show that the return was filed on time; he or she can upload the return after the deadline when the IRS servers are not congested. Work cited Chamberlain, Charles R. "Electronic postmarking without directly utilizing an electronic postmark server." U.S. Patent No. 7,266,696. 4 Sep. 2007. Grayson, Timothy Ray Demkiw, and Warren Lloyd Tomlin. "Electronic content management systems and methods." U.S. Patent No. 8,595,292. 26 Nov. 2013.... Introduction of Transmitters (Electronic Postmarks) During the period when the federal taxes are due, the U.S. governments Internal Revenue Service (IRS) servers are...
2 Pages(500 words)Assignment

Security another without initially testing their sizes (Natan, p. 24). This program does not employ methods like canary values or non-applicable stacks to stop buffer overflows. At this point, is very possible that the database accommodating this program is susceptible to external intrusion. Programs regularly distribute memory buffers to store various kinds of information. For instance, the program requests entry input, distributes a buffer to accommodate provided input (Natan, p. 25). 4. C2 Security is a federal evaluation for security wearing the network has been qualified for flexible resource security and auditing abilities. For instance, the SQL Server has a C2...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Assignment 4: ipad security breach for FREE!

Contact Us