Sunday, December 1, 2019
introduction Essays (1242 words) - Tablet Computers, Gawker Media
Goaste Security Objectives Apple which has been an existing computer design company since 1976 released its newest creation ipad on June 4, 2010. Apple also partnered with ATJust a few days prior to the sale of the first ipad there was publicized news that the modern device had a default within its security that could link information to potential computer hackers. The discovery of this flaw was uncovered by Goaste Security firm. The firm hacked into AT&T?s website and was able to connect the id?s of new ipad owners to their email addresses. Goaste security officials were able to seize as many as 100,000 email addresses if not more. These email addresses consisted of politicians, government officials, well-known corporate officers and many other recognized and influential people. Goaste Security then released the information of their findings to Gawker Media LLC, and then told AT&T of the error that was uncovered due to their investigational hacking. There could have been a number of reasons to why Goaste Security decided to make this information public. One objection might have been for the sole purpose of exposure. Since Goaste is a fairly new security firm and there had been no recognition of the firm before the ipad incident the firm could have been pulling a publicity stunt for its own advertisement. This seems to be the case since the firm did not take the proper steps of contact, which would have been to first make AT Furthermore Goaste Security Firm could have been trying to establish a relationship with AT&T to sway them to come on board as one of their first clients. The firm could have been doing this by showing off their skills to recognize the potential hazards for security hackers to use against AT&T. Computer Hacking Computer hacking is not an unethical strategy for security firms to use however they should get consent before being able to practice their hacking skills. Especially since the case is that their specialty is computer hacking and they are using this special interest as a profession. Before computer hacking firms use these types of proficiencies both the firms and the companies in which the firm is catering to, must have established a written document preferably a contract agreement that discloses information as to what type of services the firm will provide and the steps that a necessary to fill the duties of the contract. Moreover under no circumstances should the security firm be able to release information to any third parties about discrepancies or any other acquired facts that the firm has unveiled due to its investigation. Under no circumstances should the security firm be able to release information to any third parties about discrepancies or any other acquired facts that the firm has discovered due to its investigation. Under no circumstances should the security firm be able to publicize information about the proposed company. It should be left up to the specified public relations department to make the decision to notify the public about any information that is related to the business of any company and its shareholders. For future notions, there should be more strict rules and regulations that come into play when monitoring hackers. More security software should be invented and tested to the highest quality to prevent future hackers. Security firms should be the leaders that implement these secure tools. These firms should also stay up to date with the many different databases so that they may develop software accordingly. Gawker Media Gawker Media is a web based company that is made up of a networking blogs site. Gawker was founded in 2002 and its corporate headquarters are based in New York, New York. Goaste Security firm was the company that appertained information from AT&T?s websites that was able to view private data that could have subjected AT&T customers to targets for unauthorized hackers. After Goaste Security firm gained this information they then revealed these findings to Gawker Media. The firm then took this report and made it public knowledge. Under no course of events should Gawker
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.