Preview

Ipad's Security Breach Research Paper

Good Essays
Open Document
Open Document
1694 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ipad's Security Breach Research Paper
iPad’s Security Breach

Assignment #4: iPad’s Security Breach BUS 508 Business Enterprise

Professor Steven Brown

Strayer University

February 27, 2011 Discuss Goatse Security firm possible objectives when they hacked into AT&T’s Website.

Goatse Security is not a security firm. This is a loose-knit, nine-person hacker group that specializes in uncovering security flaws. Its nature has been variously described as white hat, gray hat, or black hat. The group was formed in December 2009. Goatse Security derives its name from the Goatse.cx shock site. The group’s slogan is “Gaping Holes Exposed.” In 2010, it exposed vulnerabilities in the Mozilla Firefox and Apple Safari web browsers. In June 2010, Goatse Security exposed the Email addresses of 114,000 Apple iPad users. (Polom, 2010)
…show more content…

I have also contacted the media to ensure that this incident gets the coverage it deserves. In cracking this site, I have sent specially crafted requests to the server with my browser ID spoofed to that of an iPad. Please know that while this was not instrumental in this wondrous crack, it WAS poetic in many ways. I also gave Goatsec the same warning that they gave AT&T... none at all, to patch their gaping hole. User Accounts have been deleted, and passwords changed," the note said. (Mills,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The article also identified the threat as a Pony Botnet Controller that captured and compromised over two million accounts. The possibilities of these types of threats are very real as experienced by many websites during this incident. One of the best ways to try and combat these type threats is to keep your patches and antivirus up to date, which was also mentioned in this article. According to a CNN Money article on this incident, the below website accounts were compromised during this event (Pagliery J, 2013).…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    In 2004, 18 year old Jason Salah Arabo from Michigan was arrested and pleaded guilty with conspiracy to order destructive computer attacks on business competitor’s websites from his home by remotely controlling them with a computer program called, “Bot”. Bots can be easily disguised as MP3 music files or pictures that unaware users download from public websites. Once they are downloaded, Bots will cause the virus to overload the website’s hosting computer server that result in crashing the entire system. Arabo wasn’t alone in this process. He and former 16 year old “Jasmine” Signh from New Jersey, creator of the Bot, had met Arabo on an instant messenger chat, and had agreed to help takedown Arabo’s competitor websites in exchange for Arabo’s merchandise, including designer sneakers. Arabo was running two business companies that sold throwback sports apparel such as team jerseys over the internet. Together, Arabo and Signh had designed the program in what they thought would help Arabo’s business by stopping customers from visiting and using other services.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    This crime is an example of a failure of authentication, not network break-in. ChoicePoints’s firewalls and other safeguards were not overcome or harmed. To avoid such problems in the future, the likely action that should be taken by the similar companies is to applying more authentication methods. For example by using a unique user name and determines that the person is legitimate through the input of a correct password. The other authentication mechanisms to prove the legitimate identity are user-selected passwords, system-generated passwords, passphrases, question-and-answer passwords, tokens, and various biometric characteristics and such methods entail verification of users through matching fingerprints, facial features, irises, or voices.…

    • 401 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    a server and redirects the browser to an alternate site. This method is often used to steal…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    When it comes to protecting and saving lives of the American people, private invasion used in order to locate and capture potential terrorist should be unlimited. The 911 attack has provided active proof to the American peoples of the damage that terrorist groups can impose on our society. Therefore, invading the privacy of individuals may prevent future terrorist attacks.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    independent

    • 759 Words
    • 4 Pages

    3 Speakers Credibility: I’ve seen this over and over again at my summer job as a computer technician at a nationwide computer store. You wouldn’t believe how many computers are compromised and infected.…

    • 759 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Goatse Security firm had two primary objectives when they hacked into AT&T’s website, was for exposure and security. Goatse was able to exposed AT&T security was not in the top-notch conditions that many people would have thought that a company of that worth should maintain. While being able to exposed AT&T security mishaps, Goatse was able to publicize their skills. A successful company continuously thinks of ways to promote their firm and products. Goatse Security firm promotes it name as…

    • 387 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    United Airlines Security

    • 367 Words
    • 2 Pages

    Security experts say that this scheme is a big step towards better online security. This program of rewrding hackers for disclosing problems in the correct way makes the internet safer for everyone.…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    THE ONLY PROFESSIONAL AND EASY WAY FOR THE GENUINE AND SERIOUS PEOPLE TO HACK AOL, YAHOO AND HOTMAIL PASSWORDS!!…

    • 481 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Innovation of Ipad

    • 874 Words
    • 4 Pages

    Technology has been moved towards advancement day after day bringing new and improved devices and system. People are always on the verge of inventing something new and exciting. About a decade ago, mobile phone was rarely used by people but now everyone has a smartphone with all the possible gadgets in it like camera, video player, internet and more. Talking about disruptive technology which almost replaced any other company in new innovation was Apple. Apple launched iPhone which was one of the major successes in disruptive technology because it provided every bit of comfort to its user while using it. When apple launched ipad in 2010 there was a huge marketing and hype about its new innovated technology in the market. It was 10 inch tablet which runs on IOS (iphone operating system) as any other apple product. The ipad only runs apps from the Apple App Store. There are thousands of these applications available in the iTunes from movies, songs, games and more. The ipad is not a necessity like the smartphone which do have the same gadget however it improves the quality of life of its users. Ipad has been used by the first author in two units offered by the Department of Statistics at Macquarie University (Sydney, Australia): a second-year Introduction to Probability unit (PROB) and a masters-level unit Mathematical Background for Biostatistics (BCA), delivered through the Biostatistics Consortium of Australia (Simpson, 2009). The use of technology, particularly the use of ipad, has supported a different mode of teaching in these two units that takes account of the general needs of the students and it enables students to be responsive to their individual requests. The ipad has been used as a way to involve, and motivate students through high-level presentation and communication tools. It has changed the approach in learning, experience simpler and deeper. Students will now experience the most amazing textbooks they’ve ever…

    • 874 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security Issues

    • 291 Words
    • 2 Pages

    The article talks about the most unexpected of data breaches. Mostly in cyber crime, data-thieves, target large-scale networks as a means of hijacking important information about credit card numbers of customers or other bank details. However, in this situation, the on-campus clinic database of UC Berkeley (University of California) was breached. "Coughing up tons of data about parents, students and spouses" (Fox, 2009). The unexpected nature of this security breach may be overlooked, since it is "just" a schools clinical database. However such systems contain invaluable information to identity thieves. Information like credit card numbers addresses, etc, which could undermine the safety and security of the individual. This indicates a shift from the normal conventional attacks on financial institutions to poorly secured alternative databases, where cyber criminals can retrieve information about people. The article stipulates that in such a situation, the end users are no longer the weakest link in the security chain. In this sense, most of the blame cannot be put on the end users. "The distinction belongs to the corporations above the chain" (Fox, 2009). It is necessary as end users to keep our computers and all other relevant information safe. However, if companies who are in charge of such sensitive information employ an insecure and shoddy way of doing their job, then security will always be an issue. My verdict is, companies who house information, should know that all data is relevant to a client. So, important mechanisms and policies should be put in place to secure their data.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In order for the organisation to communicate and connect with various organisations, markets, business and appeal to other disciplines (Berkhout, Hartmann & Trott, 2010); these processes will need to be managed efficiently and effectively by a sole figure who establishes and distributes these cycles. Apple addressed the consumer’s needs and wants by introducing a smart MP3 player that subjugated competitor products for years. The IPod is a clear example on how an organisation can correctly execute the Cyclic Innovation Model.…

    • 841 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Anti-Virus Software

    • 974 Words
    • 4 Pages

    Leung, Linda, (November 10, 2004) “Security: End users are your first line of defense” Computerworld…

    • 974 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Androids Under Attacks

    • 1225 Words
    • 5 Pages

    Android & Co started in 1913 when Arthur and Clarence, both from the audit firm of Price bought out a small audit firm in Illinois to form Arthur, Clarence & Co, which became Androids & Co in 1918. Android headed the firm of Androids & Co until his death in 1945.Besides, Android who is founder of Androids & Co was a zealous supporter of high standards in the accounting industry. In 1945, Leonardo Sparky, who succeeded Android at the founder’s death, continued this emphasis on honesty. For many years, the Android’s motto was “Think Straight, Talk Straight”.…

    • 1225 Words
    • 5 Pages
    Better Essays