Reply article swastikas and hacked twitter accounts

Assignment Help Software Engineering
Reference no: EM131441250

Reply this article in 200 words with references.

Swastikas and Hacked Twitter Accounts On 15 March 2017, many users including some which are considered high in profile discovered tweets were made from their accounts by an unauthorized hacker. According to Onyanga-Omara, J. (2017, March 15), the tweets included a swasticka and hashtags such as "#Nazialmanya".

The majority of the posts made by the attacker were actually written in Turkish while attacking accounts such as UNICEF USA, Floyd Mayweather's promotional account, and BBC North America. This type of attack clearly disrupts Confidentiality, Integrity, and Availability also known as the CIA triad. As per our text by Kim D. and Solomon M. G. (2014), Confidentiality deals with the guarding of a user's information and their privacy. If the hacker made it past their credentials then they had access to their profiles most likely containing more private information.

Integrity is side of the triangle that ensures data or information remains unchanged or unaltered. Integrity was lost from the moment the attacker gained entry into the accounts and made their first tweet. The last leg of the triangle is Availability, we know at least one account was unaccessible for an unspecified period of time as account owner tweeted they "Temporarily lost control" this again was according to Onyanga-Omara, J (2017, March 15).

Thinking more critically the vulnerability; which is an area susceptible to attacks; Kim D. and Solomon M. G. (2014) , was not within twitters main servers but in Twitter Counter's third part application. Twitter Counter is an organization based out of Amsterdam which provides analytic and statistics for over 200 million Twitter accounts. Looking over Twitter Counter's Terms of Service page it appears they have covered all of their bases and within it have removed themselves from being liable to any damages caused by the hack. Under the General Conditions section there are thirteen unique conditions listed, number eleven clearly states TWC (Twitter Counter) shall not be liable. Twitter Counter (2008 - 2017)

My biblical example comes from the book of Exodus, Chapter 23 verse 1. "Thou shalt not raise false report: put not thine hand with the wicked to be an unrighteous witness." The attackers who broke into the Twitter accounts and made fictitious post under their names, raised a false report with the intent on causing harm or embarrassment. Christians are called to love thy neighbors, while the swasticka could e viewed as a symbol of hatred.

References:

Kim D. and Solomon M. G. (2014), Fundamentals of Information Systems Security (2nd), (pp. 11- 13). Burlington, MA: Jones & Bartlett Learning Onyanga-Omara, J (2017, March 15). If you woke up and saw swastikas on Twitter, here's why. Retrieved from: Http://www.usatoday.com/story/news/world/2017/03/15/cyber-attack-targets-major-twitter-accounts/99199366/

Twitter Counter, (2008-1017) Retrieved from: https://twittercounter.com/terms-of-service.pdf

Verified Expert

This document is prepared in the MS word is about the hacking. Security Researchers a/k/a Hackers both new and experienced can get better while hacking for fun and profit in the HackerOne Community. The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed.

Reference no: EM131441250

Questions Cloud

Control be effective in the company current environment : Dell is a major player in the computer industry. As internal controls systems play an important role in Dell’s success, its single-minded obsession with control came at the cost of innovation and customer service and its market and financial position..
What was wrong with the organization culture : What was wrong with the organization's culture? Identify some of the cultural forms (levers) that must be contended with? What needs to be done to change the culture?
Explore any two pertinent threats to organizations : "Focusing on a neoliberal worldview and exploring relevant literature, critically explore any two pertinent threats to organizations at the present time and suggest how organizations could effectively address these threats"
Organisations for example getting to grips : Reflect on how your chosen organisation has responded effectively to strategic challenges which are present in the global environment. 500 words with references.
Reply article swastikas and hacked twitter accounts : Reply this article in 200 words with references. Swastikas and Hacked Twitter Accounts On 15 March 2017, many users including some which are considered high in profile discovered tweets were made from their accounts by an unauthorized hacker
What are some of the ethical issues facing ardmore prison : Imagine you are the author of a nonfiction book. Describe how the three types of operational control will ensure that your book is successful? What are some of the ethical issues facing Ardmore prison and the way Warden Duffy runs it? Also, what are ..
How the evidence logically supports or fails to conclusion : Analyze the evidence by explaining how the evidence logically supports or fails to support the argument's conclusion, and critically evaluate the argument for any reasoning errors, accurately align the argument with the selected topic.
Trek bicycle began by manufacturing high-quality : Trek Bicycle began by manufacturing high-quality, prestige bicycles that required the best materials and component parts. Trek expanded from road racing and mountain bikes to produce a wide range of bikes such as tandem and children's bikes while con..
Subject-human resource management : A&B Public Ltd Company is well known for its welfare activities and employee orientated schemes in manufacturing industry for more than ten decades.

Reviews

inf1441250

4/6/2017 4:47:23 AM

ExpertsMind.com, I am really enjoying working my own papers, but had to change my original topic and had minimal time for completion due to my job. Your team has never failed me. Thank you very much.

Write a Review

 

Software Engineering Questions & Answers

  Discuss the role of obsolete programming languages

Discuss the role of obsolete programming languages, operating systems, and the arcane details of configuring and operating older hardware platforms.

  Determine how to implement the project based on the

assume that you are approaching the implementation and deployment phases of the online course management system that

  Requirements engineering and object-oriented analysis

Decide on a sample intersection. Extend the above list of requirements to refine the information given above and ensure that the requirements are complete, clear, precise, consistent, and unambiguous.

  Tracing speakers for a national conference

You are working on a database that will track speakers for a national conference. The data entry person entered information in the Speakers table incorrectly. He entered the first half of a new record cor¬rectly, but then jumped to a different rec..

  Draw uml diagram for classes quiz and question

Consider a quiz grading system that grades student responses to quizzes. Draw a UML diagram for classes Quiz, Question, EssayQuestion, MultipleChoiceQuestion, Student, and Submission.

  How to write better code and reduce logic errors in design

Debugging a program is an important skill to learn for software developers. It can teach a developer how to write better code and reduce logic errors in the design.

  Suggest an architecture for a system

Suggest an architecture for a system that is used to sell and distribute music on the internet. What architectural patterns are the basis for this architecture?

  Differentiate between latency and jitter

Describe in details about the Systems Development Life Cycle Costs Differentiate between latency and Jitter The Protocol for Message Standards is divided into three important parts. Briefly describe each one

  Compare and contrast three basic approaches to training

Compare and contrast three basic approaches to training. What is the role of the operations group in the systems development life cycle (SDLC)

  Discuss fault tolerance approaches that systems managers use

Windows server software works seamlessly with most hardware vendors that offer fault tolerant systems. Discuss fault tolerance approaches that systems managers use to assure continuity of operations.

  Creating a pseudocode

Suppose you are the manager of a company and have list of workers with the number of days they were absent from work.

  Similarities and differences between a systems flowchart

What is the difference between a context diagram, a logical DFD, and a physical DFD?- What is a systems flowchart?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd