Reference no: EM131441250
Reply this article in 200 words with references.
Swastikas and Hacked Twitter Accounts On 15 March 2017, many users including some which are considered high in profile discovered tweets were made from their accounts by an unauthorized hacker. According to Onyanga-Omara, J. (2017, March 15), the tweets included a swasticka and hashtags such as "#Nazialmanya".
The majority of the posts made by the attacker were actually written in Turkish while attacking accounts such as UNICEF USA, Floyd Mayweather's promotional account, and BBC North America. This type of attack clearly disrupts Confidentiality, Integrity, and Availability also known as the CIA triad. As per our text by Kim D. and Solomon M. G. (2014), Confidentiality deals with the guarding of a user's information and their privacy. If the hacker made it past their credentials then they had access to their profiles most likely containing more private information.
Integrity is side of the triangle that ensures data or information remains unchanged or unaltered. Integrity was lost from the moment the attacker gained entry into the accounts and made their first tweet. The last leg of the triangle is Availability, we know at least one account was unaccessible for an unspecified period of time as account owner tweeted they "Temporarily lost control" this again was according to Onyanga-Omara, J (2017, March 15).
Thinking more critically the vulnerability; which is an area susceptible to attacks; Kim D. and Solomon M. G. (2014) , was not within twitters main servers but in Twitter Counter's third part application. Twitter Counter is an organization based out of Amsterdam which provides analytic and statistics for over 200 million Twitter accounts. Looking over Twitter Counter's Terms of Service page it appears they have covered all of their bases and within it have removed themselves from being liable to any damages caused by the hack. Under the General Conditions section there are thirteen unique conditions listed, number eleven clearly states TWC (Twitter Counter) shall not be liable. Twitter Counter (2008 - 2017)
My biblical example comes from the book of Exodus, Chapter 23 verse 1. "Thou shalt not raise false report: put not thine hand with the wicked to be an unrighteous witness." The attackers who broke into the Twitter accounts and made fictitious post under their names, raised a false report with the intent on causing harm or embarrassment. Christians are called to love thy neighbors, while the swasticka could e viewed as a symbol of hatred.
References:
Kim D. and Solomon M. G. (2014), Fundamentals of Information Systems Security (2nd), (pp. 11- 13). Burlington, MA: Jones & Bartlett Learning Onyanga-Omara, J (2017, March 15). If you woke up and saw swastikas on Twitter, here's why. Retrieved from: Http://www.usatoday.com/story/news/world/2017/03/15/cyber-attack-targets-major-twitter-accounts/99199366/
Twitter Counter, (2008-1017) Retrieved from: https://twittercounter.com/terms-of-service.pdf
Control be effective in the company current environment
: Dell is a major player in the computer industry. As internal controls systems play an important role in Dell’s success, its single-minded obsession with control came at the cost of innovation and customer service and its market and financial position..
|
What was wrong with the organization culture
: What was wrong with the organization's culture? Identify some of the cultural forms (levers) that must be contended with? What needs to be done to change the culture?
|
Explore any two pertinent threats to organizations
: "Focusing on a neoliberal worldview and exploring relevant literature, critically explore any two pertinent threats to organizations at the present time and suggest how organizations could effectively address these threats"
|
Organisations for example getting to grips
: Reflect on how your chosen organisation has responded effectively to strategic challenges which are present in the global environment. 500 words with references.
|
Reply article swastikas and hacked twitter accounts
: Reply this article in 200 words with references. Swastikas and Hacked Twitter Accounts On 15 March 2017, many users including some which are considered high in profile discovered tweets were made from their accounts by an unauthorized hacker
|
What are some of the ethical issues facing ardmore prison
: Imagine you are the author of a nonfiction book. Describe how the three types of operational control will ensure that your book is successful? What are some of the ethical issues facing Ardmore prison and the way Warden Duffy runs it? Also, what are ..
|
How the evidence logically supports or fails to conclusion
: Analyze the evidence by explaining how the evidence logically supports or fails to support the argument's conclusion, and critically evaluate the argument for any reasoning errors, accurately align the argument with the selected topic.
|
Trek bicycle began by manufacturing high-quality
: Trek Bicycle began by manufacturing high-quality, prestige bicycles that required the best materials and component parts. Trek expanded from road racing and mountain bikes to produce a wide range of bikes such as tandem and children's bikes while con..
|
Subject-human resource management
: A&B Public Ltd Company is well known for its welfare activities and employee orientated schemes in manufacturing industry for more than ten decades.
|