Ipad’s Security Breach

Ipad’s Security Breach
Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details.
Hacking into a website is justifiable since it leads to alterations of individual pr organizational processes in diverse perspectives. The justification of the validity of hacking entails comprehensive evaluation of current issues posing challenges to the information technology systems. Hacking incorporates all procedures pertaining to retrieval of information from systems an organization or an individual. Hacking has exhibited its manifestations as a virtual event but has significant practical manifestations. Checking is performed by individual hackers basing on different intentions that vary from production to detrimental to the victims.
Hacking is performed by either individuals or organizations.
Many have perceived the practice as only having negative aspects to the receivers. The wholly negativity associated with hacking is an opinion that has received credible challenges since the process also entails better effects that can foster the development of individual life or organizations. Companies have introduced hacking services that targets creation of best consultancies to the Gawker Media. Gawker Media targets the computer systems of various organizations to determine the security holes before advising the company appropriately on the right measures to take in order to protect its data.
The resent example is when an ipad company staff lost a critical prototype in a bar of which the hacker utilized later to pose security threats to the ipad email systems. Significantly, the prototype availed means for the extraction of private email information from the people utilizing the service. This act justified the manifestation of hacking in a practical scenario besides criticizing the ipad CEO-Jobs who had previously bragged about the ipads security systems.
The breach in the ipads security system led to the exposition of the reputable personnel’s information. According to CNN video, the victims included American VIPs. Among the affected included Dian Swyer from ABC, Michael Bloomberg- the Mayor, New York and Harvey Weinstein among other political and military personnel in America.
Create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking.
The practices that can encourage entail the exercises which foster the denial of critical information whose consumption is significant for operational activities in organizations. The corporate ethics tends to alleviate all acts which may foster the access to information without the concerned owner’s permission. Among the ethical activities that can promote hacking incorporate the ethical practices claiming that:
a) Unauthorized admission to constrained databases is unethical
Limited databases tend to have crucial information which many people may desire to utilize. Such databases are critical in determining the efficiency of the modern communication systems. Individuals will always tend to access the databases through illegitimate means to obtain the services.
b) Utilization of every computer facility should incorporate greater levels of responsibilities amongst the enforcers
Improper handling of the computer facilities may result to their acquisition by the hackers who can then use the information to endanger the organization stares. The endangering activities may involve thus weakening of the organizational information and privacy systems. Significant care should be incorporated in the handling of a company’s security information.
c) Users must not browse copy or alter files in absence of the owner’s permission.
The browsing restrictions may incorporate disabling access to some sites which will incapacitate the access of the site illegally. The restriction of the site may incorporate the imposition of password to limit access to such sites. Copying and modification of private files might incorporate obtaining a resemblance of the initial copy for a personal unity.
Discuss if it is important for organizations like Gawker Media to be socially responsible.
Gawker Media is exhibitors a critical aspect of social responsibility in the global arena. Internet provides one of the most efficient social interaction modes through which people from diverse scopes of life can interact and share experiences effectively. Through the internet vital information are shared between individuals and organization. The major aspect of information is privacy. Internet is exposed to numerous security difficulties concerning the data transferred across the interface. Gawker exhibits fundamental responsibility since the company actively involves in different organizations’ computer systems to determine the weaknesses that are entailed before advising the affected on the appropriate measures go fill the security holes in the systems.
Gawker Media provides the contents to the companies and the targeted individuals in a manner which ensures no commotions and disparities within the hackers and the victims. The company exhibits its responsibility by utilizing effective measures of tackling the hacking menace. The company ensures that it offers the effective ways that offers permanent solutions to the problems. Identification of all the security holes enables the organization to determine the possible points on which the hackers can attack. Advising on the measures to take on every measure regarding the safety of the holes eventually enable the company for specificity in tackling its immediate problems. Finally the Gawker Media offers consultancy services to its clients on the best modes of realizing effective data security.
Based on this incident, determine what factors CEOs should consider when responding to a security breach.
The CEO should consider all elements regarding to the data security in the company. The CEO needs to consider the potentiality of his company’s partners and their ability to maintain data privacy. The CEO should not assume anything to be perfect, but according to Steve Jobs, he is prudent and passionate about the company. His attitude towards the company disables him to criticize the company’s operations. Basing on the incident that led to the embarrassment and serious contradiction of Steve Jobs’ statement concerning the ipad company, the CEO ought to have considered some factors before making the sentiments. The CEO mentioned a number of distinct factors that separate the ipad company from other company’s security systems that exposed him to be bragging. The CEO ought to have considered the credibility of the information he was passing in the media. By ascertaining the confidence of the information would have incorporated accessing all its partners systems to establish the theoretical relationship with the practicality.
The CEO ought to have ensured that all the workers were ethics observant. The loss of the security that contained the email information of the ipad users wouldn’t have occurred. The security hole in the AT&T website wouldn’t have leaked out the email private data to the public and the hackers.
Create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue. Explain your rationale.
We would like to inform you of the current problem regarding our email service security system. We would like to advice you to stop using our email services due to the fact that the privacy has been breached and all your connections using it might be detrimental. The privacy details in the system have been faulty and not able to effectively maintain your privacy efficiently. Kindly consider changing your passwords and if possible, you can put using your current email usage with the ipad on hold. The company has suffered the effect of exposing some security holes that have enabled the hackers into accessing the information stored. Kindly note that these are only challenges to enable for the consideration of all points of weakness and enhance our security systems. Generally, a rational recommendation has been mad for every customer stop using the email address registered in our systems because its privacy has been compromised.
The security breach emanated as a result of technical default in the security system that disabled the confidential maintenance system that is responsible for concealing the email details of our customers. Be informed that the occurrences were beyond the company’s reach but we promise our customers that such occurrences will never transpire kin the company’s fraternity.
Besides the security compromise, we would like to inform you that the company is working tirelessly on the issue and a permanent solution will soon be realized. We are sorry to all our customers but we would like to assure you of prompt corrections as possible.
References
Clevenger N (2011). IPad in the Enterprise: Developing and Deploying Business Applications. New York: John Wiley and Sons, 2011
Read FBI Investigating iPad Breach (Update): http://gawker.com/5560542/fbi-investigating-ipad-breach
AT&T Blames iPad Incident on “Malicious” Hackers: http://online.wsj.com/article/SB10001424052748703389004575305611381540180.html?KEYWORDS=ipad
Apple’s Worst Security Breach: 114,000 iPad Owners Exposed posted on the Gawker.com Web site (the company first informed of the breach). http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed
video clip (1 min 41 s) of Steve Jobs just days before Apple’s partner AT&T exposed iPad customers’ private information. http://valleywag.gawker.com/5560295/steve-jobs-bragged-about-privacydays-ago
CNN video: iPad Security Breach (2 min 15 s) http://www.cnn.com/video/#/video/tech/2010/06/10/nr.levs.ipad.security.breach.cnn?iref=allsearch
Street Journal video (3 min 35 s): AT&T’s iPad Security Breach
http://online.wsj.com/video/digits-atts-ipad-security-breach/620A87F6-BADE-49BC-A3F3-887D44B25EA6.html?KEYWORDS=ipad

Latest Assignments