Friday, September 13, 2019
IPad's Security Breach Assignment Example | Topics and Well Written Essays - 1500 words
IPad's Security Breach - Assignment Example Nonetheless, data associated with online e-commerce transactions and credit cards was available on the data servers that but not linked to the website. Similarly, many applicants have applied for recent job openings at the studio, their resumes were also stolen, revealing educational background, home address and contact numbers. However, the organization claimed that only email addresses are stolen. The companies accounted that only email addresses are stolen. However, the organization declared that the security of the website was most updated. The concerned personnel of the organization stated, ââ¬Å"We take the security of our websites extremely seriously and employ strict measures, which we test regularly, to guard against this sort of incidentâ⬠(Square enix: 25,000 email addresses taken in deus ex website hack). The statement given by the concerned personnel of the organization was not credible as the security breach clearly demonstrated loopholes in their security archite cture. One more incident related to website hacking took place in which some particular areas of the website were breached. The name of the website was daily Telegraph. It was hacked by Romanian hackers. Moreover, the areas that were hacked includes pages named as ââ¬ËShort Breaksââ¬â¢ and ââ¬ËWine and Dineââ¬â¢ correspondingly. The methodology and technology that was used to attack the site was not found. A researcher named as Chris Boyd illustrated description of the pages that were hacked. The contents of the page were ââ¬Å"sick of seeing garbage like this â⬠¦ calling us Romanians gypsiesâ⬠(Daily telegraph website hacked by aggrieved romanians). The survey concluded and justified the real world factors related to website hacking as it has its own place in the field of hacking. In order to protect websites from vulnerabilities and threats, security measures are required. Moreover, websites providing e-commerce services are even more vulnerable and require m ost updated security controls in place. 2 Ethics Statement Hacking is related to explore a security flaw that has not been addresses before. Generally, information security professionals take hacking as a concept of stealing and destroying data or any incident related to criminal activities. However, hacking illustrates brilliance of an individual to demonstrate his knowledge on the network domain as well as on the application domain. All the critical inventions associated with information security are evaluated due to hacking attacks (Introduction to computer ethics). One part of accepting hacking as a good cause is to strengthen the security architecture, but on the other hand, hacking has the capacity to facilitate individuals to steal highly confidential information from servers located in organization as well as stealing funds by credit cards and bank account. Hacking ethics are important for an organization to address. As Stephen Levy from the MIT department and Stanford, illu strated factors related to ethical hacking, which are as follows (Introduction to computer ethics): ââ¬ËAdministrative accessââ¬â¢ must be granted to every network resource, computing device and nodes. There will be no restrictions for accessing any kind of information from or within the network along with free of cost. There will be no ââ¬Ëfile access securityââ¬â¢ framework and full privileges must be given for accessing centralized
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment