Ipad's Security Breach

Submitted by: Submitted by

Views: 471

Words: 1778

Pages: 8

Category: Business and Industry

Date Submitted: 06/09/2011 05:27 PM

Report This Essay

Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details.

A hacker is someone who is capable of modifying computer hardware or software. There are three types of hackers; white hat hacker, black hat hacker, and grey hat hacker. A white hat hacker can be an individual or group who hack a security system or computer network to expose the vulnerabilities or possible security loop holes present in the system with no criminal intent and without receiving financial gain (http://www.hackingalert.com/hacking-articles/white-hat-hacker.php). A black hat hacker can be an individual or group “who uses his computer knowledge in criminal activities in order to obtain personal benefits and exploits the weaknesses of the systems of a financial institution for receiving financial gain” (http://www.hackingalert.com/hacking-articles/white-hat-hacker.php). A grey hat hacker is in between a white and black hacker. A grey hat hacker is someone who” uses his skills for legal or illegal acts, but not for personal gains in order to prove themselves that they can accomplish a determined feat, but never do it in order to receive financial gain out of it, if that boundary is crossed, they become black hat hacker” (http://www.hackingalert.com/hacking-articles/grey-hat-hackers.php).

An example of a white hat hacking case is when a Romanian, TinKode, “hacked a file transfer protocol (FTP) server related to NASA's Earth Observation System at Goddard Space Flight Center” (http://www.gmanews.tv/story/221084/technology/white-hat-hacker-exposes-nasa-servers-vulnerabilities). He then published a screenshot of the compromised server on his site and sent an email alert of the hack to NASA's webmaster. Tinkode stated in an interview that "I don't do bad things. I only find and make public the info. Afterwards I send an email to them to fix the holes. It's like a...