bus 508 4th ass

bus 508 4th ass - Assignment #4 IPads Security Breach...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Assignment #4 IPad’s Security Breach Presented by Rami C. Dirani To Dr. Maggie Seizer Strayer University Arlington, VA May 31 st , 2011 HACKING:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
iPad’s Security Breach 2 1. Determine if hacking into a Web site is ever justifiable, applying your theory to a real world case in which someone hacked into a system, including the name of the company and detail. Hacking into a website is and never will be justifiable. In determining this, I did consider a couple of school of thoughts one in particular being the fact in Christianity, taking what does no belong to me is never permissible, come rain or sunshine. That said, in an incidence such as in cross-site request forgery as in the recent attacks on the social network Twitter, potentially private information is consequently made available to these hackers. 2. Create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

bus 508 4th ass - Assignment #4 IPads Security Breach...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online