Twitter Breach As Technology and Case Study

Total Length: 734 words ( 2 double-spaced pages)

Total Sources: 3

Page 1 of 2



The breach itself remains mysterious and there are not any definitive theories that have approached a complete breakdown of how this breach occurred. Ngak (2013) proposed that "A hacking group going by the name of the Syrian Electric Army has claimed that they are responsible for the breaches. Typically, the hackers spread political messages and misinformation."

No real concrete data has been gathered about this group and has not been confirmed as well. Either way, he blames Twitter and its password systems for many of these hacking problems. He continued "Twitter's lack of two-step authentication. Verified accounts -- those belonging to famous people or organizations to which Twitter adds a check mark because of the volume of parody accounts -- are particularly in need of this. As we saw from Tuesday's event, just one tweet can affect global financial markets."

Most importantly, the question remains how did this happen? The AP's Twitter account represents the breach point of this operation and all investigations must begin at that point.
Specifically, passwords can be cracked by many different methods and the need for a back up authorization barrier seems that it may have prevented this security breach.

Bloomberg (2013) highlighted some of the ways in which two-factor authentication could play a key role in allowing this to happen. The article wrote "Paul Colford, a spokesman for the AP, said the hacking incident was preceded by a "phishing" attempt on the AP's corporate email network. Employees had been sent emails with malicious links or attachments that, once clicked, would give an attacker a foothold." In other words, someone internally from the AP was infiltrated through a spam or phishing technique that allowed the hackers to gain the Twitter password.

Data Flow Diagram.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Twitter Breach As Technology And" (2013, June 07) Retrieved May 14, 2024, from
https://www.aceyourpaper.com/essays/twitter-breach-technology-98826

Latest MLA Format (8th edition)

Copy Reference
"Twitter Breach As Technology And" 07 June 2013. Web.14 May. 2024. <
https://www.aceyourpaper.com/essays/twitter-breach-technology-98826>

Latest Chicago Format (16th edition)

Copy Reference
"Twitter Breach As Technology And", 07 June 2013, Accessed.14 May. 2024,
https://www.aceyourpaper.com/essays/twitter-breach-technology-98826