StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

IPad's Security Breach - Essay Example

Cite this document
Summary
Running Head: iPad’s SECURITY BREACH AT&T‘s iPad’s Security Breach [Name of Student] [Name of Institution] Introduction In June 2004, Apple suffered an embarrassment when a security breach exposed personal details of its iPad’s owners, among them influential politicians, businessmen, corporate CEOs, and the U.S military (Tate, 2011)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
IPads Security Breach
Read Text Preview

Extract of sample "IPad's Security Breach"

Download file to see previous pages

Subsequent to this breach of AT&T’s security, a lot of security issues have since arisen for the firm and other computer security firms. In addition, many interested parties have questioned the justification of hacking activities as well as the role of ethical statements and policies of computer security firms, which promote activities such as website hacking. This paper explores the subjects of the possibility of the justification of hacking, computer security firms’ ethics that promote hacking, and the social responsibilities of media firms such as Gawkers Media LLC.

Justification of Hacking into Websites Most hackers state that they hack into websites not as criminals but as interested parties seeking to identify flaws in computer systems or reveal certain information. By hacking, they claim, it becomes possible for computer security firms to prevent or rectify any damaging security leaks. However, due to the side effects of hacking and the damages it causes to computer firms’ images and business, questions have a risen on the issue of justification for hacking and activities.

While others insist that hacking can never be justifiable, others believe it is a justifiable practice, depending on the reasons for which it is done (Harper’s Forum, 1999). . peoples’ data worldwide, hackers believe they compel these companies to ensure that they have tamperproof systems that keep their clients’ data confidential. Therefore, hackers are watchdog for the public on the security weaknesses of technology firms. Hacking is thus justifiable since it addresses the vulnerabilities inherent in technology products that expose clients’ confidential information (Harper’s Forum, 1999).

Hacking could also be justifiable if its exposes illegal political activities by discredited groups. In addition, hacking may be justified if it reveals certain publicly important information, which the public is denied by governments, organizations, or politicians. Importantly, hackers reveal malpractices and criminal activities that may be happening without the knowledge of the public and the law enforcement agencies. That is, when a hacker discovers the criminal operations of certain individuals or organizations and such reports are sent to law enforcers, that hacking is certainly justified since it benefits the society and does not harm the public or any private person in any way (Harper’s Forum, 1999).

Various factors have been found to promote hacking activities. Among these factors are the various ethical statements by computer security firms. Corporate Ethics Statement That Promote Hacking The ethical issue regarding the freedom to access information is perhaps the number one motivator of hackers to indulge in their activities. In fact, the ethic on which hackers justify their actions is that they investigate issues, allowing every individual in the society to gain information and knowledge on the various hidden issues affecting their lives (Ermann, 1997).

Once a corporate computer firm issues ethical statements that emphasize the

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IPad's Security Breach Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/business/1437414-ipadyies-security-breach
(IPad'S Security Breach Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/business/1437414-ipadyies-security-breach.
“IPad'S Security Breach Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/business/1437414-ipadyies-security-breach.
  • Cited: 0 times

CHECK THESE SAMPLES OF IPad's Security Breach

Binding Contracts Assignment

Name: Course: Date: Binding contracts Question 1 A contract refers to an agreement that has been entered by two or more parties who has the intentions of making such an agreement legally binding (Atiyah, 1986 p197).... Contracts can be entered into either orally through a word of mouth or through writing....
5 Pages (1250 words) Assignment

Mobile Devices Security

The paper ''Mobile Devices security'' tells that During the contemporary period, it can be observed that the use of mobile devices is prevalent and growing rapidly as users heavily depend on them to communicate and perform other different business activities.... The advancement in technological development has made it possible to access the internet over mobile devices but the issue of security from cyberattacks is of greater importance in this case....
8 Pages (2000 words) Literature review

IranianSyrian Relations

Before commenting on Syrian-Iranian relations, it is highly essential that we give a brief account of both countries in the context of their individual geo-political settings for the purpose of clear understanding of their relationships inter se in the ensuing paragraphs of this paper. … Syria is an Arab country that lies in the east of Mediterranean Sea and southwest of Asia....
14 Pages (3500 words) Essay

Network Security from Hackers

The employees should be educated on how to avoid suspicious emails (Minimizing the impact of the RSA SecurID breach, 2011).... Security monitoring technologies should be used to monitor changes in user privileges and also add manual approvals to critical infrastructure and software (Minimizing the impact of the RSA SecurID breach, 2011).... Help desks activities and any other activities that may result in information leakage should also be examined (Minimizing the impact of the RSA SecurID breach, 2011)....
4 Pages (1000 words) Essay

Justification of Hacking into Websites

hellip; This paper illustrates that in June 2004, Apple suffered an embarrassment when a security breach exposed personal details of its iPad's owners.... This research presents the justification of hacking, computer security firms' ethics that promote hacking, and the social responsibilities of media firms such as Gawkers Media LLC.... This hacking was the work of a website security group called Goatse security, which shared the iPad's users IDs and personal information with a media firm called Gawker Media, LLC It is evidently clear from the discussion that most hackers state that they hack into websites not as criminals but as interested parties seeking to identify flaws in computer systems or reveal certain information....
5 Pages (1250 words) Essay

Wall Street Journal Article Oct 20, 2014

The Touch ID allows users to purchase items within apps by using Apple Pay payment services in addition to also acting as a security feature (Wakabayashi, 2014).... On Oct 16, 2014, an interesting article was published in the technology section of the Wall Street Journal pertaining the unveiling of iMac and iPad Air 2....
6 Pages (1500 words) Essay

IPads Security Breach

This paper, iPads security breach, declares that group of expert hackers breached Eidos Montreal website compromising 25,000 email addresses along with 350 resumes dated May 13, 2011.... nbsp;… As the paper highlights, the statement given by the concerned personnel of the organization was not credible as the security breach clearly demonstrated loopholes in their security architecture.... The statement given by the concerned personnel of the organization was not credible as the security breach clearly demonstrated loopholes in their security architecture....
7 Pages (1750 words) Assignment

Cyber Breaches in Different Companies

A cyber security breach affected nearly forty three thousand to fifty five thousand customers of Bartell Hotels in 2014.... Zendesk suffered a cyber security breach in 2013 that affected its three consumers, Tumblr, Pinterest and Twitter.... suffered a cyber security breach that affected three sixty thousand and eighty three 'North American credit card accounts' in 2011.... underwent a security breach when the hackers were able to draw thirteen million dollars from ATM machines in six countries just in a day in 2011....
11 Pages (2750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us