Premium Essay

Ipad's Security Breach

In:

Submitted By bernie
Words 1991
Pages 8
Running header: IPAD’S SECURITY BREACH

iPad’s Security Breach
The Business Enterprise- BUS 508
May 28, 2011

IPAD’S SECURITY BREACH
Abstract
Across the globe AT&T is known as the world’s leading integrated companies-applying innovative technologies to discover, develop and complete construction of the first transcontinental broadband-communications network. This paper will investigate and discuss some of the major issues involving Apple’s security breach. First determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. We will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. Secondly discuss if it is important for organizations like Gawker Media to be socially responsible; determine what factors CEOs should consider when responding to a security breach. Lastly, create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue

IPAD’S SECURITY BREACH Determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. According to Bosker (2010), recently, private information of iPad owners have been exposed through a security breach that has brought major embarrassment to Apple Company. Because of the said incident, it was speculated that buyers of the cellular-enabled tablet are susceptive to spam marketing and malicious hacking. This was written in an article, “Apple’s Worst Security Breach: 114,000 iPad Owners Exposed” (Bosker, 2010 p.3). According to Tate (2010) sadly, some CEOs, military officials and top officials were included

Similar Documents

Premium Essay

Ipad's Security Breach

...iPad’s Security Breach Samantha Phillips Dr. Prakash G. Menon BUS 508: The Business Enterprise May 29, 2011 Justifying Hacking into a Web site In 2010, McDonald’s said that customer information was exposed after a security breach involving an email marketing managing firm. McDonald’s released a statement explaining that information was obtained by an “unauthorized third party”, but added that financial information and social security numbers were not part of the data accidentally exposed. (Security Magazine, 2010) A security breach exposed iPad owners including dozens of CEOs, military officials, and top politicians. They, and every other buyer of the cellular-enabled tablet, were vulnerable to spam marketing and malicious hacking. The breach, which came just weeks after an Apple employee lost an iPhone prototype in a bar, exposed the most exclusive email list on the planet, a collection of early-adopter iPad 3G subscribers that includes thousands of A-listers in finance, politics and media, from New York Times Co. CEO Janet Robinson to Diane Sawyer of ABC News to Mayor Michael Bloomberg. It even appears that White House Chief of Staff Rahm Emanuel's information was compromised. In fact, it is believed 114,000 user accounts were compromised, although it's possible that confidential information about every iPad 3G owner in the U.S. has been exposed. (Tate, 2010) Earlier this year, the names and e-mails of customers of Citigroup Inc. and other large U.S. companies...

Words: 3288 - Pages: 14

Premium Essay

Ipad's Security Breach

...IPad’s Security Breach Hacking is one of the things that most people worry about. There is sometimes a need to share personal information to different companies and people for different reasons. Hacking is a way for others to steal, share and use personal information that does not belong to them. It is defined as the use of computer and network resources as a means of obtaining information illegally. Hacking is considered as a felony in the United States (Sabadash, V. 2004). In recent years, people have become more conscious of whom, where and when they provide personal information because they know there is a chance that their information may be taken and used without their permission. When using the internet and other sources, many choose to use secured sites or sites that they trust will protect and keep their personal information private. Although companies usually take all necessary precautions in order to keep their clients information private, there are sometimes flaws in their systems and things may be overlooked. There are many examples of weaknesses with the prevention efforts and some of them are as follows: old software or software that has not been patched, default passwords that are poorly chosen, disabled security controls and web servers with poor configuration, just to name a few (Sabadash, V. 2004). With this assignment, I have reviewed some information regarding the security breach of Apple/AT & T’s IPad. The information has influenced my...

Words: 1664 - Pages: 7

Premium Essay

Ipad's Security Breach

...ASSIGNMENT 1 ENTREPRENEURIAL LEADERSHIP HOW TO ACCESS THE PETER DRUCKER ARTICLE This is the 3rd reading required on page 8 of the Student Course Guide. Here are the steps to follow to find this article in the Strayer Library Databases. 1. Go to iCampus and log into Learning Resources Center that should be the drop-down in the Student Services on that page. 2. Click on Databases. 3. Choose BUSINESS SOURCE COMPLETE. When you do this a drop down appears. It will have 3 horizontal spaces to place your information. Choose the first empty space and type the name of the article Entrepreneurial Strategies. There is a second space with a drop-down where you select the “type” of item you put in the first space. There are several choices. In this instance select TI which stands for Title. Next scroll down and down until you see the word Publication with an empty box. Type California Management Review. Next scroll to the right. You will see boxes for dates. In each of the Year boxes type 1985. 4. Now you are ready to search. Scroll up to the search button near the top and click it. The article will appear you can print it out and save it as a PDF file to your computer. …..on the right is a small drop-down…..this is where you select what you put in the first space. There are many choices. Since I put the name of the article in the Entrepreneurial...

Words: 251 - Pages: 2

Premium Essay

Target Case Study

...information security breach at Target and how this adversely affected the organization. Be sure to include and indicate both tangible and intangible losses in preparing your response. Nature of Breach | Tangible Losses | Intangible Losses | Customer names | Consumer information | Consumer trust | Credit card numbers | Previously stored credit cards | Consumer trust | Credit card security numbers | Security numbers of credit cards | Consumer trust | Credit card expiry dates | Credit card info | Consumer trust | Customer addresses | Addresses | Consumer Trust | Sales data | Sales data | Sense of security | 2. What actions were taken by both Target and the “authorities” to address the crisis, and what is your assessment of each action taken? Actions Taken to Address the Crisis | Assessment of These Steps | Target ignores warnings | Not a great move | Department of Justice notifies stolen data existence | Good move, shouldn’t have gotten to this | Target removes malware from POS | Good move, should’ve done this sooner | | | add more rows as needed…. | | 3. What reactive steps by Target might have mitigated their losses subsequent to their discovery of the information security breach? Explain/justify your choices. Reactive Steps | Explanation | Respond to the warning signs exhibited by installed security software | Why would you invest in this security only to ignore it? | Follow procedures put in place to address a security breach...

Words: 373 - Pages: 2

Premium Essay

Jet Copies Case Problem

...“IPad’s” Security Breach BUS 508: Contemporary Business August 16, 2011 Strayer University Dr. Robert L. Kight Assignment 4: iPad’s Security Breach This document will attempt to discuss hacking into a Web site. Is it ever justifiable? The document will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. The document will discuss whether it is important for organizations like Gawker Media to be socially responsible. It will determine factors CEOs should consider when responding to a security breach. Finally, it will create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue and state the rationale. Apply your theory to a real-world case in which someone hacked into a system, including the name of the company and details. As I attempt to discuss this assignment, I could not avoid thinking about the age-old opinion that Apple products were unique, and that they were protected against criminal encroachments. As such, Apple became one of the hottest technological innovations in the industry. Today, like most other such technology, Apple is becoming increasingly vulnerable to intrusion. It is becoming a medium for posing threats to an entire corporate network as well as devices for official and unofficial use. My answer to this question is twofold. In other words qualification of any kind for such conduct must be based...

Words: 1981 - Pages: 8

Premium Essay

Ipad

...IPad’s Security Breach Apple successfully sold its first iPad on June 4th, 2010 and within days a security breach was announced. Hackers from Goatse Security firm tracked down about a 100,000 email ids of new iPad owners which included government officials, politicians, journalists, and other important famous people (IPad Security Breach, 2010). The question now arises is that what are the reasons that forced Goatse Firm from hacking into AT&T’s website? Goatse Security officials shared the email addresses and network ID’s to Gawker Media, LLC, after they informed AT&T and the vulnerability was closed (IPad Security Breach, 2010). Some expressed little concern over the security breach stating that it was “only email addresses” and not personal or financial information. The FBI doesn’t concur. AT&T responded quickly and has worked to mitigate the damage (FBI Investigating iPad Breach, 2010). Goatse’s Firm Objectives The following objectives might help us explain the possible factors that lead to the hacking of the AT&T’s website (Elinor, 2010). • The Goatse Security tricked the AT&T site into disclosing the e-mail addresses by sending HTTP (Hyper text transport protocol) requests that included SIM card serial numbers for iPads. This was because it contained serial numbers called ICC-IDs (Integrated circuit card identifiers) that are generated sequentially which helped the researchers to track down 1000’s of ids. • According to the AT&T spokesman the attack would allow...

Words: 1158 - Pages: 5

Free Essay

Ipad Security Breach

...iPad’s Security Breach Zul-Jalaal Abdullah Strayer University Shelby Oaks campus Business Enterprise-508 April 21, 2011 Dr. Carolyn Tippett Discuss Goatse Security firm possible objective when they hacked into AT&T’s Website. Here’s what happened: Goatse Security discovered a rather stupid vulnerability on the AT&T site that returned a customer email if a valid serial number for the iPAD sim card was entered. (Arrington, 2010, para. 2). An invalid number returned nothing, a valid number returned a customer email address. Goatse created a script and quickly downloaded 114,000 customer emails. It was then turned over to Gawker, after, they say, AT&T was notified and the vulnerability was closed (Arrington, 2010, para. 2). Gawker published some of the data with the emails removed. Stated Goatse: “All data was gathered from a public web server with no password, accessible by anyone on the Internet. There was no breach, intrusion, or penetration, by any means of the word. ”(Arrington, 2010, para. 2). AT&T is characterizing the incident as “unauthorized computer “hackers” maliciously exploited a function designed to make your iPad log-in process faster by pre-populating an AT&T authentication page with the email address you used to register your iPad for 3G service (Arrington, 2010, para. 3). ”We don’t see much hacking here, and we don’t see anything really malicious (Arrington, 2010, para. 3). AT&T was effectively publishing the information on the open...

Words: 1778 - Pages: 8

Premium Essay

Annotated Bibliography

...Devices in The Classroom Angel Aguilar RESEARCH WRITING WRTG 291 Annotated bibliography Gentile, M. (2012). The Importance of Managing iPads in the Classroom. Education Digest: Essential Readings Condensed for Quick Review, V78(N3), P.11-13. This article discusses a rising trend in the implementation of mobile devices into the education system. Ipad and tablets have worked their way into districts and IT managers have tackled the task of viewing the different vulnerabilities to the existing infrastructure concerning security and load management. Most devices come preexisting manufacture security features, but these features are usually deactivated from the manufacture in order to provide an open source concept. IT and district administrators look at the overview performance of the Ipad and mobile devices and to ensure optimal performance not only in hardware and software. Mobile devices cannot jeopardize the Current school privacy and security policies as each student will be allowed to access and manage their own user account. Cost of each device would have to be considered by district administrators, as each device would have a wide range of in price. Even Teacher will be tasked to apply current curriculum in class via apps, emails, and peer-to-peer configurations. In essence, this article overviews the importance of added safety features each Ipad will need and increasing flexibility teacher will have with their students. Higgins, J. (2013, August 8). BYOT:...

Words: 1849 - Pages: 8

Premium Essay

Donta'

...iPad’s Security Breach Samuel D. Brown Dr. Daniel Frost Contemporary Business - BUS508013VA016-1116-001 August 21, 2011 Security and ethical issues has become very common over the past couple years. Recently we have seen an increase in e-crime. Boone and Kurtz (2011) states that “Computers provide efficient ways for employees to share information. But they may also allow people with more malicious intentions to access information. Companies may install firewalls, use encryption software, and passwords. But as fast as software developers invent new and more elaborate protective measures, hackers seem to break through their defenses. Thus, security is an ongoing battle” (pg. 509). A great example of this is the group call “Anonymous”. They have successfully hacked into a number of companies and government agencies. They also have plans to takedown or hack in to the most popular social website, Facebook. Determine if hacking into a Website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. Over the years we have heard of individuals hacking into computers, but in the last couple of years we are seeing more and more websites being hacked into. If an individual can get convicted and arrested for breaking into a department store and taking complete control of it or even robbing a store or department store a person that hacks into a company’s website should get the same treatment...

Words: 2401 - Pages: 10

Free Essay

Pest Analysis

...Different factors affecting sony company: “Analyse of the  external environment could be assist by acronym PEST, which is standing for political, economical, sociocultural, and technological factors. It is  also known as environmental scanning. PEST is useful tool to monitor and evaluate forces and factors affecting the company in long term” J Morrison (2002). Political/legal environmental: It is roles and regulation, which has been imposed by a stable government on the business. On the other hand, these changes may expected from the government in the future by business. Political factors of Sony can be changed at any time, which could affect business of the Sony at time of change. As well as instability in political situation of country will affect the business Reduction in recession and credit crunch could cause Sony to speed up its trade; meanwhile same situation could happen for the competitors of Sony, which may affect Sony negatively. Therefore, Sony needs to be very careful to its innovation and idea generation. Sony is globalized company so that changing in international law or trade restriction could affect the way in which Sony works, and Sony needs to follow the rules and regulations, that are imposed by the government. The terms legal always cannot come with term political because most of the time, by change in the politics of a country the legal terms and condition for business environment may remain the same. So that it could be named exceptionally, separate...

Words: 1886 - Pages: 8

Free Essay

Accounting Tech

...How Technology is Changing Accounting Accounting 525 Melissa Holland-Mitchell December 20, 2014 Professor Jones K. Kasonso Computer technology is always changing, so fast that many companies will simply update their current computer system continuously. Technology and the computer are a part of our lives; it helps managers make decisions to improve business operations, allows for faster transfer of information, and is simply a basic necessity to do business in many professions including accounting. There are technological trends that will have a tremendous impact on the accounting profession: cyber security, cloud, mobile devices, and big data. The Cloud and mobile technology available today is transforming the job of the tax and accounting professionals (Proformative.com, 2012). Where technology used to be behind the scenes at the office, its use is increasingly extended beyond internal use and out to the client. Mobile accountants work remotely between 5.8 to 8.6 hours per week. By 2015 the number of mobile workers is in North America and Latin America is to exceed 212 million (Proformative.com, 2012). More accountants are using smart phones for work; mobile access allows firms to connect with clients outside of regular business hours, and other locations. Smartphone’s are quickly being adopted by the accounting professional, many still think of the Smartphone as just a mobile phone with additional features such as texting and music player. However with the...

Words: 2332 - Pages: 10

Free Essay

Information Technology Management

...INT401I/202/0/2013 Tutorial Letter 202/0/2013 Information and Technology Management IV INT401I Year module School of Computing This tutorial letter contains the model answers to assignment 1 & 2, and the Oct/Nov 2013 examination and Jan/Feb 2014 supplementary examination preparation notes. Bar code CONTENTS 1 TUTORIAL MATTER THAT YOU SHOULD HAVE RECEIVED TO DATE .................................. 3 Plagiarism ................................................................................................................................... 3 2 THE MODEL ANSWERS TO ASSIGNMENT 1 ........................................................................... 3 3 THE MODEL ANSWERS TO ASSIGNMENT 2 ........................................................................... 6 4 THE OCT/NOV 2013 EXAMINATION AND JAN/FEB 2014 SUPPLEMENTARY EXAMINATION PREPARATION NOTES ............................................................................................................12 2 INT401I/202 1 TUTORIAL MATTER THAT YOU SHOULD HAVE RECEIVED TO DATE Title Description TUTORIAL LETTER 101/0/2013 Tutorial letter 101 contains important information about your module. VERY important information. TUTORIAL LETTER 201/0/2013 TUTORIAL LETTER 202/0/2013 Tutorial letter 202 contains the model answers to assignment 1 & 2, and the Oct/Nov 2013 examination and Jan/Feb 2014 supplementary examination preparation notes (this tutorial letter). Plagiarism NB: Plagiarism is the act of taking words...

Words: 4310 - Pages: 18