Wednesday, February 26, 2020

IPad's Security Breach Assignment Example | Topics and Well Written Essays - 1250 words

IPad's Security Breach - Assignment Example We immediately took the sites offline to assess how this had happened and what had been accessed, then took further measures to increase the security of these and all of our websites, before allowing the sites to go live again" News | SQUARE ENIX MEMBERS (n.d.) However, servers that were preserving archives correlated to e-commerce transactions and credit cards were not interconnected to the website. Moreover, candidates have uploaded their resumes to ‘Square Enix’ for job considerations were also pilfered. Hackers can now trade and sell information present in the resumes, as educational background, home address and contact numbers, interest, hobbies, references etc. are exposed. Conversely, organization denied the fact that only one email address was leaked during the hack. Moreover, organization also stated that the website was equipped with latest and most updated web security architecture. An employee from an organization justified this fact as â€Å"We take the sec urity of our websites extremely seriously and employ strict measures, which we test regularly, to guard against this sort of incident† Square Enix admits to Deus Ex website hacks. (n.d.). The statement given by the concerned personnel of an organization was not credible as the security breach clearly demonstrated loopholes in their security architecture. One more incident related to website hacking took place in which some particular areas of the website were breached. The name of the website was daily Telegraph. It was hacked by Romanian hackers. Moreover, the areas that were hacked includes pages named as ‘Short Breaks’ and ‘Wine and Dine’ respectively. There are still no answers for the hacking incident that was conducted by these hackers. The methodology and technology that was used to attack the site was not found. A researcher named as Chris Boyd illustrated description of the pages that were hacked. The contents of the page were â€Å"sick of seeing garbage like this †¦ calling us Romanians gypsies† (Daily telegraph website hacked by aggrieved Romanians, n.d.). The survey concluded and justified the real world factors related to website hacking, as it has its own place in the field of hacking. In order to protect websites from vulnerabilities and threats, security measures are required. Moreover, websites providing e-commerce services are even more vulnerable and require most updated security controls in place. 1 Ethics Statement Hacking is a process that is implemented to explore a security imperfection that has not been reported earlier. Mostly, information security specialists take hacking as a concept of stealing and destroying data or any incident related to criminal activities. However, hacking exemplifies skills of an individual to exhibit his knowledge on the network domain, as well as on the application domain. Research and development in terms of information security is evaluated due to hacking and s ecurity loop holes (Introduction to computer ethics n.d.). One view of hacking is to be acquiescent, as a good cause is to strengthen the security architecture. However, the second view of hacking has the capacity to facilitate individuals to steal highly confidential information from servers located in organization as well as stealing funds by credit cards and bank account, therefore, giving a major business loss to an organization. Hacking ethics are important

Monday, February 10, 2020

CASE STUDY - AMAZON Example | Topics and Well Written Essays - 1250 words - 1

- AMAZON - Case Study Example The featured organization remained engaged in selling DVDs, CDs, VHS cassettes and a lot of electronics before it can actually became capable of developing and commercializing Kindle Fire tablet. The introduction of Kindle acted like a lucky charm for the retailer and things initiated to look improved ever since the product was launched in the year of 2011 whereas, its predecessor Kindle e-book Reader was launched in 2007. The improved version of the formerly mentioned product was released in 2012 (History & Timeline, 2014). The company produces products by outsourcing their manufacturing to countries that can produce them cheaply. The apparels are made in Sri Lanka and Bangladesh. The technological products are either made in China or US. The products are distributed through chain of warehouses, fulfillment centers and third party distributors (Kucera, 2014). Jeff Bezos had incorporated Amazon.com as an organization in July 1994 and the website was made available for customer use in 1995 after intensive tests and beta version releases. However, the concept worked and worked great indeed. The initial name of the company was Cadabra and it was replaced with Amazon after getting inspired with the title of Amazon River which is one of the most spacious water masses located on the face of the Earth. The Amazons is a term that was used to refer to great nation of female warriors known to exist in the traditional Greek mythology. Amazon managed to vend its subsidiary websites to England, America, France, Canada, Italy, Germany, Spain, Australia, Brazil, Japan, China, India and last but not the least Mexico. In 2011, the company was in plans to launch its websites in Poland, Netherlands and Sweden. Jeff Bezos did not engage in internet business in the period of early development of the industry but he made up for his misgivings in this regard an d introduced Amazon in 1994. Amazon as a