The breach itself remains mysterious and there are not any definitive theories that have approached a complete breakdown of how this breach occurred. Ngak (2013) proposed that "A hacking group going by the name of the Syrian Electric Army has claimed that they are responsible for the breaches. Typically, the hackers spread political messages and misinformation."
No real concrete data has been gathered about this group and has not been confirmed as well. Either way, he blames Twitter and its password systems for many of these hacking problems. He continued "Twitter's lack of two-step authentication. Verified accounts -- those belonging to famous people or organizations to which Twitter adds a check mark because of the volume of parody accounts -- are particularly in need of this. As we saw from Tuesday's event, just one tweet can affect global financial markets."
Most importantly, the question remains how did this happen? The AP's Twitter account represents the breach point of this operation and all investigations must begin at that point. Specifically, passwords can be cracked by many different methods and the need for a back up authorization barrier seems that it may have prevented this security breach.
Bloomberg (2013)...
CIO in Effective Information Technology Strategic Planning through Corporate Governance Corporate Governance Corporate governance can be defined as the governing structure which allows a board of directors to ensure transparency, quality, accountability and fairness within a firm and in their relationships with their stakeholders (Monks & Minow, 2011). The corporate governance structure constitutes of: Direct and indirect engagements between a firm and its various stakeholders. Measures for integrating the often incompatible interests of stakeholders. Measures taken
Sony Security Breaches It is a summary of the most important elements of your paper. All numbers in the abstract, except those beginning a sentence, should be typed as digits rather than words. To count the number of words in this paragraph, select the paragraph, and on the Tools menu click Word Count. Sony Corporation has had a series of very public security breaches in the past few years. Despite a long
Aer Lingus, 2012a () No security breach has even been recorded on the Aer Lingus website so the website can be thought to be tightly secure and that all the necessary steps have been taken to ensure that the personal information of their customers is kept safe. Methods for ensuring greater security for customers One of the ways which the company can ensure that they continue maintaining this record of security and
organizations can do to protect client data comprehensively and how they do this. It will also examine the most common forms of data customers generate, and take a look at some of the contemporary hardware and software that organizations protecting and handling data in the cloud use presently. Common Types of Customer Data Data Identity: The individual is at the core of any database, so gaining an insight into how a person
The vision Oracle has is one of unifying all of their enterprise applications into their Fusion architecture and creating a single unifying Service oriented Architecture (SOA) was first announced in 2006 (Krill, 13). Since that time Oracle has continually strived to create an SOA in Fusion that would appeal to its corporate customers. The proposed Fusion SOA platform has been designed to be robust and scalable enough to encompass enterprise-level
Employee Privacy Torts History of Employee Privacy Changing Trends of Employee Privacy Impact of Innovative Technology on Employee Privacy Role of Social Media towards Employee Privacy Impact of Changing Community/Society on Employee Privacy Adaptation to the new Environment pertaining to Employee Privacy Employee Monitoring and Surveillance Laws and Employer Policies for Text Messaging and Social Media Electronic Communication Privacy Act Monitoring of Employee Conversations over Telephone & Email Recommendations for creating Effective Policies Future Implications of Employee Privacy As years have passed and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now