Preview

United Airlines Security

Satisfactory Essays
Open Document
Open Document
367 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
United Airlines Security
One of the Unites State’s biggest airlines, United Airlines, has rewarded two hackers who spotted major security hols in its website. The airline has given the two hackers one million free flight miles each.
The airline operated a “bug bounty” scheme that rewards hackers for privately disclosing security flaws instead of sharing them on the internet. They have awarded the maximum reward of one million free flight miles, which is equal to over a dozen trips to these two hackers.
Security experts say that this scheme is a big step towards better online security. This program of rewrding hackers for disclosing problems in the correct way makes the internet safer for everyone.
BUG BOUNTIES ARE VERYCOMMON TO TECH COMPANIES
Programs like these
…show more content…
Major companies such as Google, Facebook and Yahoo have been offering cash incentives to hackers that report bugs for quite some time.
THE HACKERS CANNOT DISCLOSE THE BUG THEY FOUND
In return for their free flight miles, the hackers are required to not disclose the nature of the security holes that they found. United Airlines made a statement saying that they believe the program will help boost security and allow them to continue to provide quality services.
MUCH CRITICISM TOWARDS BUG BOUNTIES
Many critics of bug bounties believe that they discourage companies from hiring an actual professional security staff, because it is much cheaper to offer cash and incentives to hackers. Officials at United Airlines said that it isnt always about the hackers looking for an issue, but they can come at any time. They also said that the bug bounties are a part of the efforts for an overall approach to security. Supporters of bug bounties say that they also benefit those smaller companies that cannot afford to give out cash, but free services and products. Supporters also say that this encourages positive behavior and shows young hackers that they can positively benefit form doing what’s

You May Also Find These Documents Helpful

  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”.…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    In the few months that followed 9/11 attacks, UA will be faced with economic issues like the decrease in passengers willing to fly and the rising cost of fuel that the economy faced. Maynard (2005) reported that they sprung into action by applying for loan but lost the bid for federal loan package (Para.6). This led to a strategic decision in 2002 to file for chapter 11 of bankruptcy of which a merger and acquisition will be the get-out ticket. At the time of its bankruptcy, the airline…

    • 1821 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    HMP1 000305944 Task 1 2

    • 4618 Words
    • 12 Pages

    Before David Neeleman’s non-compete agreement with Southwest Airlines expired, he envisioned the concept of starting a low-fare airline that would combine common sense, innovation, and technology and bring the humanity back into air travel (Gittel & O’Reilly, 2001). In 1998, JetBlue was born. In order for David to fulfill his goal of a “do-it-right” kind of airline, he needed to recruit superior industry veterans who were willing to start from scratch and place an emphasis on employees and customers. Each of these individuals, from the President, General Counsel, CFO, and the HR director, wanted to create an airline that was fun, had integrity, was safe, and cared for their employees, plus had a passion to get it right (Gittel & O’Reilly, 2001).…

    • 4618 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Fast bug and security fixes: Open source software usually has many people combing its source code, who rapidly fix problems as they are discovered.(3)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    While the effects of one of these attacks is realized at a much higher price for larger businesses, smaller companies are actually targeted more often because of their lack of security infrastructures and data monitoring systems. In fact Horton claims that more than 90% of data breaches affect small businesses. (Horton, 2014) These startling numbers leave many small business owners wondering what they can do to reduce the risk associated with cyber-attacks.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    as well as the ethical dilemmas inherent in hiring a hacker as a security consultant.…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Study Guide

    • 2229 Words
    • 8 Pages

    2. Open source SW vulenrabilities can take months to fix because most people working on it are volunteers.…

    • 2229 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Sampling Techniques

    • 5470 Words
    • 22 Pages

    In an effort to determine customer satisfaction, United Airlines randomly selects 50 flights during a certain week and surveys all passengers on the flights.…

    • 5470 Words
    • 22 Pages
    Good Essays
  • Satisfactory Essays

    In 1971 an airline company named Southwest Airlines was born. The company stated with very little money but had some fame. Some of the advancement that made Southwest Airlines popular is their lower fares, the frequency of flight availability and on time arrivals, and an outstanding safety record. Southwest was always thinking innovation some years back southwest was thinking of the future and ways to keep their airlines in the forefront in the airlines industry the airlines purchased jet fuel at a lower price for future use, this was smart innovative and creative thinking on their behalf. “Tickets less travel, use of the internet, booking & tracking trips through the website are the other innovative policies that ease the business operation of the company” (Brainmass, 2008 pg. 1).…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    Accessing data within an organization on a regular basis is much easier with the help of an insider, and security firms are reporting an increase in the number of data breach incidents that can be linked to an insider who has been coerced by the hackers into co-operating.…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The sting or “running the wire” is a great tool on the grifter’s belt because it allows them to pull of major scams with ease. Sometimes though the sting is ran opposite of the traditional patterns, when this happens the reverse sting is created. Now most of us when we hear the term computer hacker imagine a picture of an anti-social, introverted nerd who is obsessed with computers. Mitnick tells us in this book that images is actually false and the actual…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Hacks of this nature do not just have an affect on the targets. Customers also bear some of the burden. Not all of the impacts will be clearly defined or immediately obvious. While credit card companies may reimburse a customer for their stolen money, they do not have the ability to pay for the time the customer spends trying to get their money back, the confidence lost in the security practices of corporations, and most importantly, the emotional impact of dealing with the…

    • 724 Words
    • 3 Pages
    Good Essays