Submitted by: Submitted by lnkirby
Views: 570
Words: 1656
Pages: 7
Category: Business and Industry
Date Submitted: 03/13/2011 02:51 PM
Running Head: APPLE'S SECURITY BREACH 1
Apple's Security Breach:
A Variety of Perspectives
Stacy Hardy
Strayer University
February 28, 2011
APPLE'S SECURITY BREACH 2
Abstract
This paper is basically a discussion of the worst security breach on Apple's iPad, the security company (Goatse Security) that obtained Apple customers' information, and the actions in which the security company leaked this personal information to the public without notifying Apple nor AT&T about their security breach enabling AT&T to notify its customers and Apple to repair the vulnerability. The paper further illustrates the manner in which the security company decided to unveil and specify the significance of Apple's prominent customers including government officials, politicians, well- known corporate officers, and various other famous/ important people. This paper will challenge the judgment of the security company, Apple's and AT&T's responses, as well as, Apple's likelihood of salvaging its announcement of the first iPad with such weak security measures.
APPLE'S SECURITY BREACH 3
Goatse Security Firm Possible Objectives When They Hacked AT&T
Goatse Security Firm could have maintained several possible objectives or reasons for hacking into AT&T’s network, however Gawker Media exposed a lengthy blog to the public addressing Goatse’ actions toward AT&T and the exact reason the company felt compelled to act upon Apple and their partner in such a public manner. In this lengthy blog, a member of Goatse Security states that "there was no illegal activity or unauthorized access" involved. The group says that while it did not directly contact AT&T, it "made sure that someone else tipped them off." The security firm went on to state that the security hole was closed before the vulnerability was publicized and that all the private user information it gathered, excluding a copy of which was provided to...