Ipad's Security Breach

Submitted by: Submitted by

Views: 605

Words: 1135

Pages: 5

Category: Business and Industry

Date Submitted: 03/11/2011 04:31 PM

Report This Essay

Running Head: IPAD'S Security Breach

IPAD'S Security Breach

Leslie Medlock

Professor Janet Durgin

The Business Enterprise

December 1, 2010

Discuss Goatse Security firm possible objectives when they hacked into AT&T Website:

In reviewing the different television news reports and articles written on the IPad's security breach that was discovered by Goatse Security firm I would have to say that Goatse Security objectives and motives were very unprofessional. This is a company that uses their skill sets to make other companies look really bad in the public eyes. Spencer Ante of the Wall Street Journal really highlighted their objectives which were, "to expose security holes" and once these security holes have been exposed, "to make them public to show off their skills and generate new business for the security firm". This is a security consulting firm that consist of 9 employees that their daily job duties are hacking into other companies websites.

Argue for or against computer hacking as an ethical corporate strategy for computer security firms:

I feel it is very unethical for a security firm to hack into any companies websites as an ethical corporate strategy without prior permission from the company. According to(Aaron, R., 2010). As with all types of activities which have a darker side, there will be dishonest people presenting drawbacks. The possible drawbacks of ethical hacking include:

* The ethical hacker using the knowledge they gain to do malicious hacking activities.

* Allowing the company's financial and banking details to be seen.

* The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system.

* Massive security breach.

However in today's society companies now hire ethical hackers also know as "penetration testing" and "intrusion testing" to explore their companies own defenses. If any weaknesses...

Related Essays

Ipad's Security Breach
iPads Security Breach The first part of this assignment will discuss the objectives behind which Goatse Security Firm has hacked the website of AT&T. The next
Ipad's Security Breach
Running Head: IPADS SECURITY BREACH Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked
Ipad’s Security Breach
Head: iPads Security Breach Natacha Iton Dr. Michael Padgett Business 508: Contemporary Business August 07, 2011 Assignment 4: iPads Security Breach In
Ipad's Security Breach
iPads Security Breach Samantha Phillips Dr. Prakash G. Menon BUS 508: The Business Enterprise May 29, 2011 Justifying Hacking into a Web site In 2010