Reply article swastikas and hacked twitter accounts

Assignment Help Software Engineering
Reference no: EM131441250

Reply this article in 200 words with references.

Swastikas and Hacked Twitter Accounts On 15 March 2017, many users including some which are considered high in profile discovered tweets were made from their accounts by an unauthorized hacker. According to Onyanga-Omara, J. (2017, March 15), the tweets included a swasticka and hashtags such as "#Nazialmanya".

The majority of the posts made by the attacker were actually written in Turkish while attacking accounts such as UNICEF USA, Floyd Mayweather's promotional account, and BBC North America. This type of attack clearly disrupts Confidentiality, Integrity, and Availability also known as the CIA triad. As per our text by Kim D. and Solomon M. G. (2014), Confidentiality deals with the guarding of a user's information and their privacy. If the hacker made it past their credentials then they had access to their profiles most likely containing more private information.

Integrity is side of the triangle that ensures data or information remains unchanged or unaltered. Integrity was lost from the moment the attacker gained entry into the accounts and made their first tweet. The last leg of the triangle is Availability, we know at least one account was unaccessible for an unspecified period of time as account owner tweeted they "Temporarily lost control" this again was according to Onyanga-Omara, J (2017, March 15).

Thinking more critically the vulnerability; which is an area susceptible to attacks; Kim D. and Solomon M. G. (2014) , was not within twitters main servers but in Twitter Counter's third part application. Twitter Counter is an organization based out of Amsterdam which provides analytic and statistics for over 200 million Twitter accounts. Looking over Twitter Counter's Terms of Service page it appears they have covered all of their bases and within it have removed themselves from being liable to any damages caused by the hack. Under the General Conditions section there are thirteen unique conditions listed, number eleven clearly states TWC (Twitter Counter) shall not be liable. Twitter Counter (2008 - 2017)

My biblical example comes from the book of Exodus, Chapter 23 verse 1. "Thou shalt not raise false report: put not thine hand with the wicked to be an unrighteous witness." The attackers who broke into the Twitter accounts and made fictitious post under their names, raised a false report with the intent on causing harm or embarrassment. Christians are called to love thy neighbors, while the swasticka could e viewed as a symbol of hatred.

References:

Kim D. and Solomon M. G. (2014), Fundamentals of Information Systems Security (2nd), (pp. 11- 13). Burlington, MA: Jones & Bartlett Learning Onyanga-Omara, J (2017, March 15). If you woke up and saw swastikas on Twitter, here's why. Retrieved from: Http://www.usatoday.com/story/news/world/2017/03/15/cyber-attack-targets-major-twitter-accounts/99199366/

Twitter Counter, (2008-1017) Retrieved from: https://twittercounter.com/terms-of-service.pdf

Verified Expert

This document is prepared in the MS word is about the hacking. Security Researchers a/k/a Hackers both new and experienced can get better while hacking for fun and profit in the HackerOne Community. The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed.

Reference no: EM131441250

Questions Cloud

Control be effective in the company current environment : Dell is a major player in the computer industry. As internal controls systems play an important role in Dell’s success, its single-minded obsession with control came at the cost of innovation and customer service and its market and financial position..
What was wrong with the organization culture : What was wrong with the organization's culture? Identify some of the cultural forms (levers) that must be contended with? What needs to be done to change the culture?
Explore any two pertinent threats to organizations : "Focusing on a neoliberal worldview and exploring relevant literature, critically explore any two pertinent threats to organizations at the present time and suggest how organizations could effectively address these threats"
Organisations for example getting to grips : Reflect on how your chosen organisation has responded effectively to strategic challenges which are present in the global environment. 500 words with references.
Reply article swastikas and hacked twitter accounts : Reply this article in 200 words with references. Swastikas and Hacked Twitter Accounts On 15 March 2017, many users including some which are considered high in profile discovered tweets were made from their accounts by an unauthorized hacker
What are some of the ethical issues facing ardmore prison : Imagine you are the author of a nonfiction book. Describe how the three types of operational control will ensure that your book is successful? What are some of the ethical issues facing Ardmore prison and the way Warden Duffy runs it? Also, what are ..
How the evidence logically supports or fails to conclusion : Analyze the evidence by explaining how the evidence logically supports or fails to support the argument's conclusion, and critically evaluate the argument for any reasoning errors, accurately align the argument with the selected topic.
Trek bicycle began by manufacturing high-quality : Trek Bicycle began by manufacturing high-quality, prestige bicycles that required the best materials and component parts. Trek expanded from road racing and mountain bikes to produce a wide range of bikes such as tandem and children's bikes while con..
Subject-human resource management : A&B Public Ltd Company is well known for its welfare activities and employee orientated schemes in manufacturing industry for more than ten decades.

Reviews

inf1441250

4/6/2017 4:47:23 AM

ExpertsMind.com, I am really enjoying working my own papers, but had to change my original topic and had minimal time for completion due to my job. Your team has never failed me. Thank you very much.

Write a Review

Software Engineering Questions & Answers

  Develop a system architecture model

A customer can cancel the course by cancel method. Once customer purchase the course then account class maintain the customer no, course no, name of the course and customer.

  Diversity of approaches to software construction

Analyze each reason listed above as a reason for a diversity of approaches to software construction and modeling, and give your opinion on whether or not each reason is valid.

  Project communications planning

Determine what aspects of your assignment communications planning would you adapt for large-scale transnational IT projects in which the project teams.

  Design a floating point calculator and draw a uml class

question 1narrativethe examiner of the course offering must set up the assignment before markers can begin marking

  Write different entities or objects for engineering firm

List the different entities or objects, logical processes, data flows and data stores that are involved, starting from the time you submitted your time sheet.

  Software engineering belongs to computer science

Which of these is incorrect ? a) Software engineering belongs to Computer science. b) Software engineering is a part of more general form of System Engineering.

  Creating well documented object oriented application

Construct an efficient, well-documented object oriented application to manage all of job offers that an upcoming graduate is getting.

  Produce project plan for the prototype development process

Produce a complete requirements specification document for the proposed application. Your specification should include a discussion on your reasons for selecting such system.

  How to parse n size depth node in java

How to parse n size depth node in java and create output in same tree format?

  Create risk management policy to addresse security breaches

Oorganization which permitted unauthorized individual access to valuable data. Your job is to create risk management policy that addresses the two security breaches and how to mitigate these risks.

  Define the term software architecture

Define the term software architecture A service is a software component of distinctive functional meaning that typically encapsulates a high-level business concept, and is usually made up of three parts. Describe the three sub-components that m..

  A explain what is software measurement explain its

a explain what is software measurement? explain its importance? explain how the software measurement affects the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd