Thursday, September 26, 2019
IPad's Security Breach Coursework Example | Topics and Well Written Essays - 1250 words
IPad's Security Breach - Coursework Example This report is concerned with understanding the practice of hackers and justification of their act and also how companies can deal with security issues like this for a more secured approach to maintain the privacy of individuals. 1. Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. Hacking is the technique of acquiring information or modification of data from a system or website. Hacking involves several purposes and itââ¬â¢s not always an illegal issue for acquiring information from the websites. Hacking can be conducted for several activities where it can be justifiable for the act as it might not harm anybody or might sometimes be done for the betterment of more secured approach. Hacking can be a justifiable action when all information of the system is free to access which donââ¬â¢t need any intellectual property and security permission. Som etimes hacking is done by people for solely learning purposes to know the system how they operate and the programming techniques used into a system or website. ... The hacker group Lulz Security used a simple SQL overloading technique to hack the systems and retrieve the passwords of the customers (Debatewise, 2011). The explanation of the hackers regarding the issue explains how the companies are less concerned about the information protection and their act is to find the loop hole of the system so that the company can rectify and review their system security to protect important information of customers who can be an important personality who rely on their system to provide information to the websites (BBC Technology, 2011). 2. Create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. As a corporate ethical statement from a computer security firm the statement should be like ââ¬ËGood offence is the best defense for the firmââ¬â¢. Computer firm encouraging hacking can influence the hackers to hack their own system and the competitors system to understand the loop hole of the security system. This can give a stronger base to the company to identify the threats to a system from the unethical hackers of the world who can be a possible threat at any point of time. Being offensive to identify the gaps and loops in the system can develop a more secured system which allows hackers to penetrate into different system and implement security programs to void those issues. These types of hackers are known as white hackers. To catch the thieves and employing the same technique of the thieves can recognize and defend the security threats of the firm (Mathew, n.d.). A person knowing the technique of hacking and implementing those techniques to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.