Premium Essay

Ipad and at&T

In: Computers and Technology

Submitted By dpeacock
Words 1126
Pages 5
Goatse Security
By Derek Peacock

5-28-11
Strayer University
The Business Enterprise
Instructor: Alan Tillquist

Abstract

In this paper, I plan to determine if hacking a Web site system is justifiable and explain why Goatse Security hacking of AT&T was. Then, explain why IT Hack Solutions, a computer security firm would encourage hacking. Next, I plan to discuss why and how companies like Gawker Media are socially responsible for finding threats. Third, I plan to explain how CEOs should respond to security breach in the IT network. Finally. I will write an email by AT&T to customers explaining informing, the security breach and what was done to correct the issue.

Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details.

Yes, there are justifiable means for web site and network system to be hacked. Hacking is both a science and an art what isn’t taught by colleges. Companies that are hacked can suffer significant losses, and their customers made vulnerable to other crimes, privacy violations, and unwanted contact. However when a company wants to get business or show off skills then, hacking is like building a resume. Once hackers have proven themselves, they can show off their resume to both government and corporation for business. For example, the AT&T and Apple IPad hacking by Goatse Security was justifiable for three reasons. One showing a security breach, two exposing privacy to the public, and three as a marketing.

AT&T's email security breach shows that major brands have IT system flaws. We all know that there really isn't a way to make a perfect IT security system that is unhackable. We do know that once a flaw as been discovered, then the approbate measure are taken to prevent farther security breaches. Which...

Similar Documents

Premium Essay

Ipad

...its first iPad on June 4th, 2010 and within days a security breach was announced. Hackers from Goatse Security firm tracked down about a 100,000 email ids of new iPad owners which included government officials, politicians, journalists, and other important famous people (IPad Security Breach, 2010). The question now arises is that what are the reasons that forced Goatse Firm from hacking into AT&T’s website? Goatse Security officials shared the email addresses and network ID’s to Gawker Media, LLC, after they informed AT&T and the vulnerability was closed (IPad Security Breach, 2010). Some expressed little concern over the security breach stating that it was “only email addresses” and not personal or financial information. The FBI doesn’t concur. AT&T responded quickly and has worked to mitigate the damage (FBI Investigating iPad Breach, 2010). Goatse’s Firm Objectives The following objectives might help us explain the possible factors that lead to the hacking of the AT&T’s website (Elinor, 2010). • The Goatse Security tricked the AT&T site into disclosing the e-mail addresses by sending HTTP (Hyper text transport protocol) requests that included SIM card serial numbers for iPads. This was because it contained serial numbers called ICC-IDs (Integrated circuit card identifiers) that are generated sequentially which helped the researchers to track down 1000’s of ids. • According to the AT&T spokesman the attack would allow the hacker to take some control of the iPad and......

Words: 1158 - Pages: 5

Free Essay

Ipad Security Breach

...on the AT&T site that returned a customer email if a valid serial number for the iPAD sim card was entered. (Arrington, 2010, para. 2). An invalid number returned nothing, a valid number returned a customer email address. Goatse created a script and quickly downloaded 114,000 customer emails. It was then turned over to Gawker, after, they say, AT&T was notified and the vulnerability was closed (Arrington, 2010, para. 2). Gawker published some of the data with the emails removed. Stated Goatse: “All data was gathered from a public web server with no password, accessible by anyone on the Internet. There was no breach, intrusion, or penetration, by any means of the word. ”(Arrington, 2010, para. 2). AT&T is characterizing the incident as “unauthorized computer “hackers” maliciously exploited a function designed to make your iPad log-in process faster by pre-populating an AT&T authentication page with the email address you used to register your iPad for 3G service (Arrington, 2010, para. 3). ”We don’t see much hacking here, and we don’t see anything really malicious (Arrington, 2010, para. 3). AT&T was effectively publishing the information on the open Internet, and if there’s an FBI investigation, it should be focused on them, not Goatse. The fact is that Goatse was performing a public service by discovering and publishing the vulnerability – they made the Internet slightly safer by doing so. I agree completely with their blog post responding to the AT&T letter.......

Words: 1778 - Pages: 8

Premium Essay

Ipad's Security Breach

...Breach The Business Enterprise- BUS 508 May 28, 2011                 IPAD’S SECURITY BREACH Abstract Across the globe AT&T is known as the world’s leading integrated companies-applying innovative technologies to discover, develop and complete construction of the first transcontinental broadband-communications network. This paper will investigate and discuss some of the major issues involving Apple’s security breach. First determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. We will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. Secondly discuss if it is important for organizations like Gawker Media to be socially responsible; determine what factors CEOs should consider when responding to a security breach. Lastly, create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue       IPAD’S SECURITY BREACH Determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. According to Bosker (2010), recently, private information of iPad owners have been exposed through a security breach that has brought major embarrassment to Apple Company. Because of the......

Words: 1991 - Pages: 8

Premium Essay

Jet Copies Case Problem

...“IPad’s” Security Breach BUS 508: Contemporary Business August 16, 2011 Strayer University Dr. Robert L. Kight Assignment 4: iPad’s Security Breach This document will attempt to discuss hacking into a Web site. Is it ever justifiable? The document will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. The document will discuss whether it is important for organizations like Gawker Media to be socially responsible. It will determine factors CEOs should consider when responding to a security breach. Finally, it will create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue and state the rationale. Apply your theory to a real-world case in which someone hacked into a system, including the name of the company and details. As I attempt to discuss this assignment, I could not avoid thinking about the age-old opinion that Apple products were unique, and that they were protected against criminal encroachments. As such, Apple became one of the hottest technological innovations in the industry. Today, like most other such technology, Apple is becoming increasingly vulnerable to intrusion. It is becoming a medium for posing threats to an entire corporate network as well as devices for official and unofficial use. My answer to this question is twofold. In other words qualification of any kind for such conduct must be......

Words: 1981 - Pages: 8

Free Essay

I Am New Member.

...Chapter 3 Information Systems, Organizations, and Strategy 103 I N T E R A C T I V E S E S S I O N : T E C H N O LO GY IS THE IPAD A DISRUPTIVE TECHNOLOGY? Tablet computers have come and gone several times before, but the iPad looks like it will be different. It has a gorgeous 10-inch color display, a persistent WiFi Internet connection, potential use of high-speed cellular networks, functionality from over 250,000 applications available on Apple’s App Store, and the ability to deliver video, music, text, social networking applications, and video games. Its entry-level price is just $499. The challenge for Apple is to convince potential users that they need a new, expensive gadget with the functionality that the iPad provides. This is the same challenge faced by the iPhone when it was first announced. As it turned out, the iPhone was a smashing success that decimated the sales of traditional cell phones throughout the world. Will the iPad do likewise as a disruptive technology for the media and content industries? It looks like it is on its way. The iPad has some appeal to mobile business users, but most experts believe it will not supplant laptops or netbooks. It is in the publishing and media industries where its disruptive impact will first be felt. The iPad and similar devices (including the Kindle Reader) will force many existing media businesses to change their business models significantly. These companies may need to stop investing in......

Words: 1476 - Pages: 6

Free Essay

Managerial Economic

...Penjualan Ipad x1 = NewsAd x2 = Promotion x3 = Brochure x4 = OnlineAd x5 = Expo b) df = 35 – 5 – 1 = 29 α=5% t=1.699 * NewsAd t-stat = 3.645686 (lebih besar dari t-table) Sehingga NewsAd berpengaruh secara signifikan terhadap Sales * Promotion t-stat = -2.491603 (lebih besar dari t-table) Sehingga Promotion berpengaruh secara signifikan terhadap Sales * Brochure t-stat = -0.455902 (lebih kecil dari t-table) Sehingga Brochure tidak berpengaruh secara signifikan terhadap Sales * OnlineAd t-stat = 1.666754 (lebih kecil dari t-table) Sehingga OnlineAd tidak berpengaruh secara signifikan terhadap Sales * Expo t-stat = -0.783799 (lebih kecil dari t-table) Sehingga Expo tidak berpengaruh secara signifikan terhadap Sales c) α=5% (2 tail) df = n –k = 35 – 5 = 30 t-tabel = 2.042 t-hitung NewsAd = 3.645686 v Promotion = -2.491603 v Brochure = -0.455902 x OnlineAd = -1.666754 x Expo = -.0783799 x * Jadi media yang signifikan menaikkan penjualan IPAD adalah NewsAd dan Promotion karena keduanya memiliki t-hitung > t-tabel d) α=5% df numerator = 5 df denominator = 35 f-tabel = 2.53 f-hitung = 7.834760 f-hitung > f-tabel 7.834760 > 2.53 => signifikan * Jadi NewsAd, Promotion, Brochure, OnlineAd dan Expo secara bersama-sama memberikan pengaruh yang signifikan terhadap penjualan IPAD. e) Model regresi ini mengalami multikolinearitas, karena dari hasil uji t-tabel ada......

Words: 300 - Pages: 2

Premium Essay

Annotated Bibliography

...Classroom Angel Aguilar RESEARCH WRITING WRTG 291 Annotated bibliography Gentile, M. (2012). The Importance of Managing iPads in the Classroom. Education Digest: Essential Readings Condensed for Quick Review, V78(N3), P.11-13. This article discusses a rising trend in the implementation of mobile devices into the education system. Ipad and tablets have worked their way into districts and IT managers have tackled the task of viewing the different vulnerabilities to the existing infrastructure concerning security and load management. Most devices come preexisting manufacture security features, but these features are usually deactivated from the manufacture in order to provide an open source concept. IT and district administrators look at the overview performance of the Ipad and mobile devices and to ensure optimal performance not only in hardware and software. Mobile devices cannot jeopardize the Current school privacy and security policies as each student will be allowed to access and manage their own user account. Cost of each device would have to be considered by district administrators, as each device would have a wide range of in price. Even Teacher will be tasked to apply current curriculum in class via apps, emails, and peer-to-peer configurations. In essence, this article overviews the importance of added safety features each Ipad will need and increasing flexibility teacher will have with their students. Higgins, J. (2013, August 8). BYOT: Bring your......

Words: 1849 - Pages: 8

Free Essay

Week 1 Papaer

...sets iPad 3 launch event for March 7 Computerworld - As expected, Apple today issued invitations to the media for an event next Wednesday, March 7, where it's expected to launch the next iPad. Invitations were received by bloggers and reporters, including those with the IDG News Service, which is operated by IDG, the parent company of Computerworld. The news confirmed earlier speculation that Apple would debut the newest iPad -- which most have labeled iPad 3 -- in early March, which later settled on March 7, the same day of the week Apple used to launch the original tablet in 2010 and last year's iPad 2. "We have something you really have to see. And touch," read the invitation, which continues Apple's tradition of keeping its invitation text cryptic. The background shows part of an iPad screen, with a finger poised over the Calendar app, which is set to March 7. If the background is a photograph of the iPad 3 and not digitally manipulated, it hints that the tablet will not sport a physical home button, as have earlier iPads. Some bloggers argued that the photo also showed a higher-resolution, or so-called "Retina," display. Apple will host the launch event at the Yerba Buena Center for the Arts in San Francisco, a regular venue for the company's press-only announcements and where former CEO Steve Jobs introduced the iPad 2 on March 2, 2011. This will be the first time that Jobs, who died last October after a long battle with pancreatic cancer, will not host an iPad......

Words: 640 - Pages: 3

Premium Essay

4ps Tagline

...Apple iPad 4 p`s Today, Apple unveiled its new product, the iPad. The much publicized rumor about a tablet created by Apple is now a reality. Tablet pc's have been around for a long time, but what makes the iPad different from the other market offerings? What strategy does Apple have in place in order to make this a runaway hit like its iPhone and iPod product lines? We'll use the marketing mix(4 P's) to see how Apple strategized its goal to make the iPad a bestseller. Marketing Mix is the set of controllable,tactical marketing tools that the firm blends to produce the response it wants in the target market. Price, product, place and promotion are the 4 P's or components that make up a marketing mix. Product The iPad is a tablet device that has several features. It looks like a bigger iPhone or iPod Touch and possess a led touch screen interface. Its dimensions are 9.56 in x 7.47 in. It is also very thin and has a battery life of ten hours. This product has the ability to surf the internet, listen and purchase music, watch videos, view photos, read e-mail, read and purchase e-books and execute multiple applications. In fact, the multiple applications available for the iPhone will be fully compatible with the iPad! There will be different versions of the iPad at launch with different hard drive capacities and 3g capability. There will be a 16 gb, 32 gb, and 64 gb variants. Also all iPads will have wi-fi and are wireless-n capable. The iPad will also feature the latest......

Words: 779 - Pages: 4

Premium Essay

Additional Materials

...General Information about the iPad The iPad is a line of tablet computers designed and marketed by Apple Inc., primarily as a platform for audio-visual media including books, periodicals, movies, music, games, apps and web content. Its size and weight fall between those of contemporary smartphones and laptop computers. The iPad runs on iOS, the same operating system used on Apple's iPod Touch and iPhone, and can run its own applications as well as iPhone applications. Without modification, the iPad will only run programs approved by Apple and distributed via the Apple App Store (with the exception of programs that run inside the iPad's web browser). Like iPhone and iPod Touch, the iPad is controlled by a multitouch display—a departure from most previous tablet computers, which used a pressure-triggered stylus—as well as a virtual onscreen keyboard in lieu of a physical keyboard. History: Apple released the first iPad in April 2010, selling 300,000 units on the first day[22] and selling 3 million in 80 days.[23] During 2010, Apple sold 14.8 million iPads worldwide,[7][8][9] representing 75% of tablet PC sales at the end of 2010.[24] By the release of the iPad 2 in March 2011, more than 15 million iPads had been sold[25]—selling more than all other tablet PCs combined since the iPad's release.[26] In 2011, it took approximately 73% of the tablet computing market share in the United States.[27] During the fourth quarter of 2011, Apple sold 15.4 million iPads. Before......

Words: 5257 - Pages: 22

Premium Essay

Ipad Porter Five Force

...General Information about the iPad The iPad is a line of tablet computers designed and marketed by Apple Inc., primarily as a platform for audio-visual media including books, periodicals, movies, music, games, apps and web content. Its size and weight fall between those of contemporary smartphones and laptop computers. The iPad runs on iOS, the same operating system used on Apple's iPod Touch and iPhone, and can run its own applications as well as iPhone applications. Without modification, the iPad will only run programs approved by Apple and distributed via the Apple App Store (with the exception of programs that run inside the iPad's web browser). Like iPhone and iPod Touch, the iPad is controlled by a multitouch display—a departure from most previous tablet computers, which used a pressure-triggered stylus—as well as a virtual onscreen keyboard in lieu of a physical keyboard. History: Apple released the first iPad in April 2010, selling 300,000 units on the first day[22] and selling 3 million in 80 days.[23] During 2010, Apple sold 14.8 million iPads worldwide,[7][8][9] representing 75% of tablet PC sales at the end of 2010.[24] By the release of the iPad 2 in March 2011, more than 15 million iPads had been sold[25]—selling more than all other tablet PCs combined since the iPad's release.[26] In 2011, it took approximately 73% of the tablet computing market share in the United States.[27] During the fourth quarter of 2011, Apple sold 15.4 million iPads. Before......

Words: 5257 - Pages: 22

Free Essay

In the News

...In the News Apple has revealed a new promotional material that lets its users have the ability to switch between major mobile carriers for their data plans. Apple will now ship out in their new iPad Air 2 and iPad Mini 3 a built-in sim card that allows users to purchase wireless service on the spot. Previous ipads have always had the ability to let you hop between carriers just by swapping out the sim card; however, Apple has simplified this process further with one sim card that lets you hop onto whichever carriers is listed on their iOS. These carriers include AT&T, Sprint, and T-Mobile in the U.S., and EE in the U.K. Apple does plan to expand the list of global carriers in the future. Why does this matter? Well I think this really takes the carriers out of the retail loop and makes it easier for Apple users to be able to switch seamlessly between the three major U.S. carriers for on the go data plans. It makes the carriers a lot closer to the interchangeable pipes that they’re afraid of seeing because it effectively lessens the powers of the mobile carriers since they rely on their control of the retail sales and service channels to prevent customers from switchovers and to be able to upsell additional products. Interestingly enough, Verizon has opted out of this new Apple sim so far, which shows the disproportionate strength of Verizon in our market as compared to the other three carriers. Verizon thinks that they have enough market power to tell Apple what to......

Words: 386 - Pages: 2

Premium Essay

How Are Ipad Useful for Students?

...How are iPad useful for students? Name: Institution: Course: Tutor: Date: How are iPad useful for students? The first document I will use to get background information for my research paper is entitled “iPads on Practicum: Perspective of a Student-Teacher.” This source is relevant since it examines how modern technologies such as iPad can be used as educational tools in classrooms (Elbert, et al., 2013). It present important background information from research projects on how students and teachers can use iPads during lessons. The document has covered similar information that am using and it has used simple grammar. It is also update, having been published in 2013. The second document I intend to use is entitled “The iPad in education: uses, benefits, and challenges.” The document is relevant since it has demonstrated that introduction of iPads in schools will have positive impact on education. A survey has been done on how modern technologies have been adopted in schools over the years (Karsenti & Fievez, 2013). It has actually surveyed 302 teachers and 6,057 students and it was published in simple and understandable English. It presents materials that are relevant to my research and was published in 2013. References: Elbert, J., Code, J., & Irvine, V. (2013). iPads on Practicum: Perspective of a Student-Teacher. The Arbutus Review. 4(1) 1-18 Karsenti, T., & Fievez, A. (2013). The iPad in education: uses, benefits, and challenges – A survey of......

Words: 252 - Pages: 2

Free Essay

Biggest Challenges Today Are to Control the Network Security

...software to prevent extended downtime. The saved information will let the company's employees continue to work while the IT department deals the damaged media. Hacking Into a Website Some being able to hack into a person’s web site is never going to be justifiable. A hacker is someone who illegally gets a hold to personal and private information in a computer system. This person then tampers with the information and start to cause problems. AT&T was a victim of someone hacking into their computer system and stealing the email addresses that Ipad buyers use when they were updating their information or activating there devices. There was a group called Goats Securite that uses different hacking ideas to get into AT&T website.   A total of 110,000 email addresses where obtained during this illegal entry into the website. During this attack on AT&T new technology that was only out for a month, they quickly shut the product down and website to deal with the problem that occurred. The problem was handled very quickly, AT&T was notified on Monday that there system was hacked into and peoples information was taken and compromised, the very next day the problem was fixed and their where no additional stories of any other compromising of accounts. The conclusion of this matter is there was lots of private information that was compromised by someone who entered into the website illegally. There were a total of 100,000 plus customers emails that contained information......

Words: 399 - Pages: 2

Premium Essay

Use of Ipads in Healthcare

...Can the Use of iPads Change Healthcare? Critical care nursing has always been associated with advanced technology (Savel & Munro, 2011). We have gone from the hard drive cardiac monitors to touchscreen remote monitors. Medicine is now seeing advances into the technological world of mobile-hand held devices. Healthcare systems are researching and purchasing the tablet PC, i.e. Apple iPad. Our facility recently purchased several iPads to use the application Face time as a video translator for our American Sign Language clientele. The childlife department also has an iPad to use with our pediatric population for visual distraction during invasive procedure. The purpose of this paper is to explore the structure of data to information, knowledge and wisdom used in nursing informatics regarding the use of iPads in the healthcare arena and its advantages to patients, healthcare professionals and facilities. Data There is a variety of databases available for researching an array of topics. Walden University provides a plethora of resources (Walden University, 2012). When looking at the question to research for this assignment, I started with the database, CINAHL, and used keywords: iPad use and nursing. The original search did not come with useful articles. The search was narrowed to iPad and patient, providing two pages of articles. The next database used and provided more useful articles was Google Scholar. The keywords used were iPad use in healthcare, iPad use and......

Words: 420 - Pages: 2