SlideShare una empresa de Scribd logo
1 de 4
Data Security Problems
iPad Users’ Personal  Data Leaked About 114,000 iPad users had their personal information stolen by a AT&T’s network flaw. The breach lead to the exposure of iPad users  e-mail addresses. Some of the people who got their information stolen were high class businessmen , Politicians and US military officials.  The hackers go by the name of Goatse Security. They obtained the iPad users information by getting numbers that are used to identify a subscriber on AT&T’s network. These numbers are known as ICC IDS, which stands for integrated circuit card identifier.
Causes and Effects I think that this problem occurred when a wireless connection was left unprotected and was able to be hacked and the ICC IDS’s stolen for the connection. The victims were all of the iPad users who had their e-mails addresses stolen. The organisation involved was the 3G network provider, AT&T. The perpetrator was the hackers who go by the name of Goatse Security.
Personal Info Personal information needs to be protected so that people don't get information stolen . If they got information stolen it would mean that they could lose money if bank info was stolen or people could hack into their e-mail and send thing to the wrong sorts of people.

Más contenido relacionado

La actualidad más candente

Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaAvinash Sinha
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Salim Hosen
 
Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesMike Ryan
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Lessons learned for internet of things
Lessons learned for internet of thingsLessons learned for internet of things
Lessons learned for internet of thingsTegar Imansyah
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoTPaul Madsen
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
New proximity based experiences by ios/android devices
New proximity based experiences by ios/android devicesNew proximity based experiences by ios/android devices
New proximity based experiences by ios/android devicesEri Han
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against themNick Allott
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E CommerceEamonnORagh
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business InsecuritiesPing Identity
 
Encryption-Decryption of Email
Encryption-Decryption of EmailEncryption-Decryption of Email
Encryption-Decryption of EmailShashank Singhal
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 

La actualidad más candente (20)

Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
Security provisions
Security provisions Security provisions
Security provisions
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)
 
Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for Businesses
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Lessons learned for internet of things
Lessons learned for internet of thingsLessons learned for internet of things
Lessons learned for internet of things
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoT
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
New proximity based experiences by ios/android devices
New proximity based experiences by ios/android devicesNew proximity based experiences by ios/android devices
New proximity based experiences by ios/android devices
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
Encryption-Decryption of Email
Encryption-Decryption of EmailEncryption-Decryption of Email
Encryption-Decryption of Email
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Presentation1
Presentation1Presentation1
Presentation1
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 

Destacado

Boletín XLVII diciembre 2014
Boletín XLVII diciembre 2014Boletín XLVII diciembre 2014
Boletín XLVII diciembre 2014Nueva Canarias-BC
 
reciclado del aluminio
reciclado del aluminioreciclado del aluminio
reciclado del aluminioalexguva
 
bibliotecas infantiles
bibliotecas infantilesbibliotecas infantiles
bibliotecas infantilesrosiveronica
 
Presentación Taller Educativo Reciclado Aluminio
Presentación Taller Educativo Reciclado AluminioPresentación Taller Educativo Reciclado Aluminio
Presentación Taller Educativo Reciclado AluminioBudibu
 
aluminio
 aluminio aluminio
aluminiomamen
 

Destacado (9)

Boletín XLVII diciembre 2014
Boletín XLVII diciembre 2014Boletín XLVII diciembre 2014
Boletín XLVII diciembre 2014
 
reciclado del aluminio
reciclado del aluminioreciclado del aluminio
reciclado del aluminio
 
Aluminio david bueno
Aluminio david buenoAluminio david bueno
Aluminio david bueno
 
bibliotecas infantiles
bibliotecas infantilesbibliotecas infantiles
bibliotecas infantiles
 
Presentación Taller Educativo Reciclado Aluminio
Presentación Taller Educativo Reciclado AluminioPresentación Taller Educativo Reciclado Aluminio
Presentación Taller Educativo Reciclado Aluminio
 
Monografia aluminio
Monografia aluminioMonografia aluminio
Monografia aluminio
 
aluminio
 aluminio aluminio
aluminio
 
Reciclaje de Aluminio
Reciclaje de AluminioReciclaje de Aluminio
Reciclaje de Aluminio
 
Reciclaje del Aluminio
Reciclaje del AluminioReciclaje del Aluminio
Reciclaje del Aluminio
 

Similar a Data security problems

Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1Sohail Gohir
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSysfore Technologies
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslecscottdp3
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Chad Lawler
 
Online Identity Theft
Online Identity TheftOnline Identity Theft
Online Identity TheftDanielle Jobe
 
Microsoft 365 security in the cloud
Microsoft 365 security in the cloudMicrosoft 365 security in the cloud
Microsoft 365 security in the cloudNovaQuantum
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hackingbluecoatss
 
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...BodeGeorge
 
Worst security data breaches till 2015 - SecPod
Worst security data breaches till 2015 - SecPodWorst security data breaches till 2015 - SecPod
Worst security data breaches till 2015 - SecPodSecPod Technologies
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 

Similar a Data security problems (20)

Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
Data breach
Data breachData breach
Data breach
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslec
 
Data Theft.pdf
Data Theft.pdfData Theft.pdf
Data Theft.pdf
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
Online Identity Theft
Online Identity TheftOnline Identity Theft
Online Identity Theft
 
Microsoft 365 security in the cloud
Microsoft 365 security in the cloudMicrosoft 365 security in the cloud
Microsoft 365 security in the cloud
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hacking
 
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
 
Worst security data breaches till 2015 - SecPod
Worst security data breaches till 2015 - SecPodWorst security data breaches till 2015 - SecPod
Worst security data breaches till 2015 - SecPod
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 

Data security problems

  • 2. iPad Users’ Personal Data Leaked About 114,000 iPad users had their personal information stolen by a AT&T’s network flaw. The breach lead to the exposure of iPad users e-mail addresses. Some of the people who got their information stolen were high class businessmen , Politicians and US military officials. The hackers go by the name of Goatse Security. They obtained the iPad users information by getting numbers that are used to identify a subscriber on AT&T’s network. These numbers are known as ICC IDS, which stands for integrated circuit card identifier.
  • 3. Causes and Effects I think that this problem occurred when a wireless connection was left unprotected and was able to be hacked and the ICC IDS’s stolen for the connection. The victims were all of the iPad users who had their e-mails addresses stolen. The organisation involved was the 3G network provider, AT&T. The perpetrator was the hackers who go by the name of Goatse Security.
  • 4. Personal Info Personal information needs to be protected so that people don't get information stolen . If they got information stolen it would mean that they could lose money if bank info was stolen or people could hack into their e-mail and send thing to the wrong sorts of people.