Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please help me to asnwer this question using the below case study, using theory, framework, legislation, model and also to Draw real life examples to

Please help me to asnwer this question using the below case study, using theory, framework, legislation, model and also to Draw real life examples to theory and case at hand, What public good was done by the actions of dedicated security professionals in this case?
In 2015, just in time for the holiday season, Mattel released its WiFi-enabled Hello Barbie doll, which allowed the dolls microphone to record conversations with a child and send it via Wi-Fi to third parties for audio language processing, allowing the doll to then offer the child an appropriate natural language response. Because the conversations were stored in the cloud, parents were also able to monitor the childs conversations with the doll; parents can even share the audio clips of their childrens conversations online on the website of ToyTalk, the maker of the third-party software.
The toy raised a broad range of ethical issues, including the appropriateness of allowing parents to spy on their children during imaginative play. Also, as one legal scholar noted, In Mattels demo, Barbie asks many questions that would elicit a great deal of information about a child, her interests, and her family. This information could be of great value to advertisers and be used to market unfairly to children.10 However, security flaws were also prominent ethical concerns.
Security researchers quickly recognized significant security weaknesses in the doll that could be exploited by hackers for malicious purposes. One independent security researcher claimed that he was able to hack the device in such a way that he could access the user account information, stored audio files, and microphone for the doll, and potentially spoof ToyTalks third party website server to assume control of the dolls speech.
Somerset Recon, an organization devoted to security analysis and reverse engineering, eventually found 14 vulnerabilities in the system, including allowance for weak passwords, no protections against brute force password attacks (allowed unlimited password guesses), and exposure to URL redirect and phishing efforts. There was also the potential for malicious Javascript to be stored on ToyTalks third party website, allowing persistent backdoor access to a ToyTalk user account.11 Somerset Recon acknowledged that some efforts to provide adequate security had been made by ToyTalk, but also noted that there appeared to have been little to no pre- production security analysis and that the company appeared to be using their bug bounty program as a low-cost alternative to an independent security audit that could have identified the vulnerabilities before the product was released, and before real-world users were exposed to a post-market race between security researchers and malicious hackers to find the systems flaws.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Online Systems For Physicians And Medical Professionals How To Use And Access Databases

Authors: Harley Bjelland

1st Edition

1878487442, 9781878487445

More Books

Students also viewed these Databases questions

Question

305 mg of C6H12O6 in 55.2 mL of solution whats the molarity

Answered: 1 week ago