Verified Document

Twitter Breach As Technology And Case Study

The breach itself remains mysterious and there are not any definitive theories that have approached a complete breakdown of how this breach occurred. Ngak (2013) proposed that "A hacking group going by the name of the Syrian Electric Army has claimed that they are responsible for the breaches. Typically, the hackers spread political messages and misinformation."

No real concrete data has been gathered about this group and has not been confirmed as well. Either way, he blames Twitter and its password systems for many of these hacking problems. He continued "Twitter's lack of two-step authentication. Verified accounts -- those belonging to famous people or organizations to which Twitter adds a check mark because of the volume of parody accounts -- are particularly in need of this. As we saw from Tuesday's event, just one tweet can affect global financial markets."

Most importantly, the question remains how did this happen? The AP's Twitter account represents the breach point of this operation and all investigations must begin at that point. Specifically, passwords can be cracked by many different methods and the need for a back up authorization barrier seems that it may have prevented this security breach.

Bloomberg (2013)...

The article wrote "Paul Colford, a spokesman for the AP, said the hacking incident was preceded by a "phishing" attempt on the AP's corporate email network. Employees had been sent emails with malicious links or attachments that, once clicked, would give an attacker a foothold." In other words, someone internally from the AP was infiltrated through a spam or phishing technique that allowed the hackers to gain the Twitter password.
Data Flow Diagram

References

Greenfield, R. (2013). Look What the Hacked AP Tweet About White House Bombs Did to the Market. Atlantic Wire, 23, Apr 2013. Retrieved from http://www.theatlanticwire.com/technology/2013/04/hacked-ap-tweet-white-house-bombs-stock-market/64492/

BloombergNews (2013).How did AP's Twitter Account get Hacked? Bloomberg News, 24 April 2013. Retrieved from http://www.tampabay.com/news/nation/how-did-aps-twitter-account-get-hacked/2117089

Ngak, C. (2013). Security pro-on Twitter hacks: No patch for human error. CBS News 24 Apr 2013. Retrieved from http://www.cbsnews.com/8301-205_162-57581160/security-pro-on-twitter-hacks-no-patch-for-human-error/

Sources used in this document:
References

Greenfield, R. (2013). Look What the Hacked AP Tweet About White House Bombs Did to the Market. Atlantic Wire, 23, Apr 2013. Retrieved from http://www.theatlanticwire.com/technology/2013/04/hacked-ap-tweet-white-house-bombs-stock-market/64492/

BloombergNews (2013).How did AP's Twitter Account get Hacked? Bloomberg News, 24 April 2013. Retrieved from http://www.tampabay.com/news/nation/how-did-aps-twitter-account-get-hacked/2117089

Ngak, C. (2013). Security pro-on Twitter hacks: No patch for human error. CBS News 24 Apr 2013. Retrieved from http://www.cbsnews.com/8301-205_162-57581160/security-pro-on-twitter-hacks-no-patch-for-human-error/
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology Strategic Planning Through Corporate Governance
Words: 3239 Length: 10 Document Type: Term Paper

CIO in Effective Information Technology Strategic Planning through Corporate Governance Corporate Governance Corporate governance can be defined as the governing structure which allows a board of directors to ensure transparency, quality, accountability and fairness within a firm and in their relationships with their stakeholders (Monks & Minow, 2011). The corporate governance structure constitutes of: Direct and indirect engagements between a firm and its various stakeholders. Measures for integrating the often incompatible interests of stakeholders. Measures taken

Internet Technology, Marketing, and Security
Words: 1677 Length: 5 Document Type: Essay

Aer Lingus, 2012a () No security breach has even been recorded on the Aer Lingus website so the website can be thought to be tightly secure and that all the necessary steps have been taken to ensure that the personal information of their customers is kept safe. Methods for ensuring greater security for customers One of the ways which the company can ensure that they continue maintaining this record of security and

How Businesses Can Use Cloud Computing Technology
Words: 3405 Length: 8 Document Type: Term Paper

organizations can do to protect client data comprehensively and how they do this. It will also examine the most common forms of data customers generate, and take a look at some of the contemporary hardware and software that organizations protecting and handling data in the cloud use presently. Common Types of Customer Data Data Identity: The individual is at the core of any database, so gaining an insight into how a person

About My Own Social Media Marketing Campaign Plan
Words: 2849 Length: 10 Document Type: Marketing Plan

Social Media Marketing Importance of Social Media Marketing Social Media Marketing is now considered as one of the most important function of any business. Large companies and programs focus on improving their function of marketing on social sites and blogs like Face book, Twitter, Pinterest and so on. Since, there are examples of many big and small businesses that made huge benefits via social media marketing. Coca-Cola has about 35,000,000 fans and

Employee Privacy Torts
Words: 8246 Length: 25 Document Type: Research Paper

Employee Privacy Torts History of Employee Privacy Changing Trends of Employee Privacy Impact of Innovative Technology on Employee Privacy Role of Social Media towards Employee Privacy Impact of Changing Community/Society on Employee Privacy Adaptation to the new Environment pertaining to Employee Privacy Employee Monitoring and Surveillance Laws and Employer Policies for Text Messaging and Social Media Electronic Communication Privacy Act Monitoring of Employee Conversations over Telephone & Email Recommendations for creating Effective Policies Future Implications of Employee Privacy As years have passed and

How Cyber Criminals Hack into Businesses
Words: 1662 Length: 6 Document Type: Essay

. Discuss two ways technology has changed human behavior in the past 20 years. Use specific examples.Technology has impacted human behavior in a litany of ways. First, it has contributed to increased productivity and efficiencies for both businesses and customers. Technology has also allowed the company to grow at a much more rapid pace through innovations. Microsoft and Google are common exampled of how technology has changed human behavior. Routine

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now