Reply article swastikas and hacked twitter accounts

Assignment Help Software Engineering
Reference no: EM131441250

Reply this article in 200 words with references.

Swastikas and Hacked Twitter Accounts On 15 March 2017, many users including some which are considered high in profile discovered tweets were made from their accounts by an unauthorized hacker. According to Onyanga-Omara, J. (2017, March 15), the tweets included a swasticka and hashtags such as "#Nazialmanya".

The majority of the posts made by the attacker were actually written in Turkish while attacking accounts such as UNICEF USA, Floyd Mayweather's promotional account, and BBC North America. This type of attack clearly disrupts Confidentiality, Integrity, and Availability also known as the CIA triad. As per our text by Kim D. and Solomon M. G. (2014), Confidentiality deals with the guarding of a user's information and their privacy. If the hacker made it past their credentials then they had access to their profiles most likely containing more private information.

Integrity is side of the triangle that ensures data or information remains unchanged or unaltered. Integrity was lost from the moment the attacker gained entry into the accounts and made their first tweet. The last leg of the triangle is Availability, we know at least one account was unaccessible for an unspecified period of time as account owner tweeted they "Temporarily lost control" this again was according to Onyanga-Omara, J (2017, March 15).

Thinking more critically the vulnerability; which is an area susceptible to attacks; Kim D. and Solomon M. G. (2014) , was not within twitters main servers but in Twitter Counter's third part application. Twitter Counter is an organization based out of Amsterdam which provides analytic and statistics for over 200 million Twitter accounts. Looking over Twitter Counter's Terms of Service page it appears they have covered all of their bases and within it have removed themselves from being liable to any damages caused by the hack. Under the General Conditions section there are thirteen unique conditions listed, number eleven clearly states TWC (Twitter Counter) shall not be liable. Twitter Counter (2008 - 2017)

My biblical example comes from the book of Exodus, Chapter 23 verse 1. "Thou shalt not raise false report: put not thine hand with the wicked to be an unrighteous witness." The attackers who broke into the Twitter accounts and made fictitious post under their names, raised a false report with the intent on causing harm or embarrassment. Christians are called to love thy neighbors, while the swasticka could e viewed as a symbol of hatred.

References:

Kim D. and Solomon M. G. (2014), Fundamentals of Information Systems Security (2nd), (pp. 11- 13). Burlington, MA: Jones & Bartlett Learning Onyanga-Omara, J (2017, March 15). If you woke up and saw swastikas on Twitter, here's why. Retrieved from: Http://www.usatoday.com/story/news/world/2017/03/15/cyber-attack-targets-major-twitter-accounts/99199366/

Twitter Counter, (2008-1017) Retrieved from: https://twittercounter.com/terms-of-service.pdf

Verified Expert

This document is prepared in the MS word is about the hacking. Security Researchers a/k/a Hackers both new and experienced can get better while hacking for fun and profit in the HackerOne Community. The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed.

Reference no: EM131441250

Questions Cloud

Control be effective in the company current environment : Dell is a major player in the computer industry. As internal controls systems play an important role in Dell’s success, its single-minded obsession with control came at the cost of innovation and customer service and its market and financial position..
What was wrong with the organization culture : What was wrong with the organization's culture? Identify some of the cultural forms (levers) that must be contended with? What needs to be done to change the culture?
Explore any two pertinent threats to organizations : "Focusing on a neoliberal worldview and exploring relevant literature, critically explore any two pertinent threats to organizations at the present time and suggest how organizations could effectively address these threats"
Organisations for example getting to grips : Reflect on how your chosen organisation has responded effectively to strategic challenges which are present in the global environment. 500 words with references.
Reply article swastikas and hacked twitter accounts : Reply this article in 200 words with references. Swastikas and Hacked Twitter Accounts On 15 March 2017, many users including some which are considered high in profile discovered tweets were made from their accounts by an unauthorized hacker
What are some of the ethical issues facing ardmore prison : Imagine you are the author of a nonfiction book. Describe how the three types of operational control will ensure that your book is successful? What are some of the ethical issues facing Ardmore prison and the way Warden Duffy runs it? Also, what are ..
How the evidence logically supports or fails to conclusion : Analyze the evidence by explaining how the evidence logically supports or fails to support the argument's conclusion, and critically evaluate the argument for any reasoning errors, accurately align the argument with the selected topic.
Trek bicycle began by manufacturing high-quality : Trek Bicycle began by manufacturing high-quality, prestige bicycles that required the best materials and component parts. Trek expanded from road racing and mountain bikes to produce a wide range of bikes such as tandem and children's bikes while con..
Subject-human resource management : A&B Public Ltd Company is well known for its welfare activities and employee orientated schemes in manufacturing industry for more than ten decades.

Reviews

inf1441250

4/6/2017 4:47:23 AM

ExpertsMind.com, I am really enjoying working my own papers, but had to change my original topic and had minimal time for completion due to my job. Your team has never failed me. Thank you very much.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd