Nobody downloaded yet

IPad's Security Breach - Essay Example

Comments (0) Cite this document
Summary
Running Head: iPad’s SECURITY BREACH AT&T‘s iPad’s Security Breach [Name of Student] [Name of Institution] Introduction In June 2004, Apple suffered an embarrassment when a security breach exposed personal details of its iPad’s owners, among them influential politicians, businessmen, corporate CEOs, and the U.S military (Tate, 2011)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
IPads Security Breach
Read TextPreview

Extract of sample "IPad's Security Breach"

Download file to see previous pages Subsequent to this breach of AT&T’s security, a lot of security issues have since arisen for the firm and other computer security firms. In addition, many interested parties have questioned the justification of hacking activities as well as the role of ethical statements and policies of computer security firms, which promote activities such as website hacking. This paper explores the subjects of the possibility of the justification of hacking, computer security firms’ ethics that promote hacking, and the social responsibilities of media firms such as Gawkers Media LLC. Justification of Hacking into Websites Most hackers state that they hack into websites not as criminals but as interested parties seeking to identify flaws in computer systems or reveal certain information. By hacking, they claim, it becomes possible for computer security firms to prevent or rectify any damaging security leaks. However, due to the side effects of hacking and the damages it causes to computer firms’ images and business, questions have a risen on the issue of justification for hacking and activities. While others insist that hacking can never be justifiable, others believe it is a justifiable practice, depending on the reasons for which it is done (Harper’s Forum, 1999). ...
peoples’ data worldwide, hackers believe they compel these companies to ensure that they have tamperproof systems that keep their clients’ data confidential. Therefore, hackers are watchdog for the public on the security weaknesses of technology firms. Hacking is thus justifiable since it addresses the vulnerabilities inherent in technology products that expose clients’ confidential information (Harper’s Forum, 1999). Hacking could also be justifiable if its exposes illegal political activities by discredited groups. In addition, hacking may be justified if it reveals certain publicly important information, which the public is denied by governments, organizations, or politicians. Importantly, hackers reveal malpractices and criminal activities that may be happening without the knowledge of the public and the law enforcement agencies. That is, when a hacker discovers the criminal operations of certain individuals or organizations and such reports are sent to law enforcers, that hacking is certainly justified since it benefits the society and does not harm the public or any private person in any way (Harper’s Forum, 1999). Various factors have been found to promote hacking activities. Among these factors are the various ethical statements by computer security firms. Corporate Ethics Statement That Promote Hacking The ethical issue regarding the freedom to access information is perhaps the number one motivator of hackers to indulge in their activities. In fact, the ethic on which hackers justify their actions is that they investigate issues, allowing every individual in the society to gain information and knowledge on the various hidden issues affecting their lives (Ermann, 1997). Once a corporate computer firm issues ethical statements that emphasize the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IPad's Security Breach Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/business/1437414-ipadyies-security-breach
(IPad'S Security Breach Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/business/1437414-ipadyies-security-breach.
“IPad'S Security Breach Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/business/1437414-ipadyies-security-breach.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF IPad's Security Breach

Ipad

...? I am here in front of you to talk about iPad. Who doesn’t have an iPad here in our Well I guess, you better listen to me for I will tell youwhy you should directly go to an Apple store after this class and grab your own iPad. iPad has become one of the most looked after product of technology. Before, we only have Apple desktops and laptops, Ipod shuffle, Ipod video, to Ipod touch, and then Iphone and now the IPad. It’s really amazing how technology can advance so much. I won’t be surprised anymore if there will be new gadgets soon that can transport us to a new world. Let us first look at the features of the iPad. “There’s more to it....
4 Pages(1000 words)Essay

IPad's Security Breach

..., email, telephone, SMS etc. 5 Security Breach Notification Via Email Dear Valued Customer, Our security team has discovered a security breach on 10 June 2010, compromising 114,000 email addresses of our respected iPad customers. In order to track and remove the threat from the network, we have performed some tasks in order to ensure your safety, the tasks are: We have shutdown I pad email services temporarily for all the users. We have developed a dedicated highly skilled security team to scrutinize and penetrate in-depth investigation of the security breach along with its reason of...
6 Pages(1500 words)Assignment

IPad's Security Breach

...or security breach, support staff constructs an email and forwards it to all the customers. An example of an email is given below: Dear Valued Customer, Our security team has revealed a security breach on 10 June 2010, conceding 114,000 email addresses of our respected iPad customers. In order to trail and remove the threat from the network, we have implemented some tasks in order to guarantee your safety, the tasks are: We have shutdown I pad email services momentarily for all the users. We have established a committed highly skilled security team to dissect and penetrate in-depth exploration and analysis of the...
5 Pages(1250 words)Assignment

Assignment 4: ipad security breach

...?iPad Security Breach Over the past few years, there have been tremendous changes in information and technology (IT). This includes the development of gargets that are more advanced and are stylistic as well. This is indicated by their increased applications despite being reduced in size to increases their portability. The hallmark of these advancements is the inclusion of internet in these mobile gadgets and this has increased the number of people accessing their e-mail addresses through their mobile phones. These advancements and their associated advantages have also encouraged people to store much of their personal information in their e-mail addresses so that they can access them...
5 Pages(1250 words)Essay

IPad's Security Breach

...?iPad's Security Breach Introduction A security hole in Apple’s iPad, stormed the technology industry about the threats which can affect an individual or an entire nation. AT&T, the service provider for Apple iPad accounted for a security breach as the email-ids’ of more than 1,00,000 users got exposed by a group of hackers called Goatse Security. The group claims to work for the betterment of the society with the aim to expose the security vulnerabilities of different gadgets (NPR, 2011). This issue has a great impact on the technological industry as leakage of information and personal data is an unethical practice under law which can create serious threat if not dealt seriously by the security authority. This report is concerned... ...
5 Pages(1250 words)Coursework

The Security Breach at Nelm

... The Security Breach at Nelm The security breach at Nelm has resulted in data being acquired by un ized users tapping into the system and gaining access to sensitive files. There is a concern that an insider is gaining the information on the advertising campaign and making it available to the Erm Company. There is also the possibility that an outsider has taken advantage of the system configuration and its security flaws to gain unauthorized access to the data. Nelm has taken the first step by appointing a head security officer that should report directly to the board of directors. However, there are serious flaws in the system configuration and the access control. The first concern should be that an insider might be acquiring... the...
2 Pages(500 words)Case Study

Ipad

...IPAD Executive summary The proposed report will look at factors of effective and ineffective marketing for Apple’s product, the iPad. The iPad has many familiar features to iPhone users, and may be called a product innovation. The overall conclusion of the proposed report is that Apple’s marketing of the iPad has been effective thus far, but needs more product differentiation. Current marketing situation The iPad was only introduced a few months ago, and its first-generation model is still being marketed currently. “From the manufacturer’s point of view, consumers and the trade are the two poles anchoring what should be viewed as a continuing process...
3 Pages(750 words)Research Paper

IPad's Security Breach

... iPad’s Security Breach Introduction Recently controversy hit Apple’s iPad or more specifically the iPad’s cellular network, AT&T as a security research company, Goatse Security pointed out a flaw in the security system. Goatse Security, reported to Gawker that using a script available at AT&T’s website, they were able to hack into the iPad and retrieve email addresses of possibly 11,4000 people including top celebrities, politicians, media personalities and also military personal. AT&T was informed on the breach and corrected the issue within a few...
5 Pages(1250 words)Research Paper

Sony PlayStation Network security breach

...Sony Playstation Network), discuss how the organization was targeted, including threats and vulnerabilities, plus regulatory requirements for the organization and possible liability issues. First Name, Last Name College/University Date (Sony Playstation Network), discuss how the organization was targeted, including threats and vulnerabilities, plus regulatory requirements for the organization and possible liability issues. “What is the Sony PlayStation Network security breachs impact?” Sony found that the hackers attacked their data center located at San Diego. Hackers gained the unauthorized access of customers’ data by accessing the Sony’s PlayStation Network servers. More than 77 million Qriocity and...
4 Pages(1000 words)Essay

Sony Playstation Security Breach

...developers and application developers must dance to the same tune. Sony PlayStation Network Security Breach Sony’s data center in San Diego, CA was hacked into on April 19, 2011. The hackers had gained access of customers’ data through Sony’s PlayStation Network servers. This attack on Sony is said to be the largest personal data heist in history with reports estimating that around 77 million Qriocity and PSN users’ accounts and 24.5 million Sony Online Entertainment user accounts were affected. (Better Business Bureau, 2011). Strange activities had been detected by Sony Corporation on their network system. They noticed unauthorized access of the company’s servers. A day after the attack, Sony decided...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic IPad's Security Breach for FREE!

Contact Us