SlideShare a Scribd company logo
1 of 3
Download to read offline
Case Study 2 On November 24, 2014, Sony Pictures Entertainment found out it had been hacked.
The hackers were able to penetrate Sony systems and networks and take over 100 terabytes of
company information, including trade secrets, email, and personnel records. Several Sony Twitter
accounts were also taken over. The hackers then installed on Sonys computers a piece of
malware called Wiper, which erased data from the companys servers and PCs. Investigators
concluded that the hackers spent more than two months, from mid-September to mid-November
2014, mapping Sonys computer systems, identifying critical files, and planning how to destroy
computers and servers. The malware made many Sony employees computers inoperable and full
recovery difficult or impossible, slowing down company operations. Sony shut down its internal
computer network to prevent the data-wiping software from causing further damage, forcing many
employees to use paper and pen. Systems from which the company generates revenue, including
those involved with marketing and distributing films and TV shows, were the first to be restored.
The hackers, who called themselves the Guardians of Peace, released some of the stolen
information to the public and threatened to release more. That information included very
confidential and poten tially embarrassing tidbits about Sony staff; partners; Hollywood stars,
including Sylvester Stallone, director Judd Apatow, and Australian actress Rebel Wilson; and
President Obama. Confidential personal informa tion about employees such as names; addresses;
47,000 Social Security numbers; and financial details was also stolen. The personal data, along
with contracts and other sensitive Sony documents, were posted on file-sharing networks such as
Bit Torrent. The hackers also posted five Sony films to online file-sharing sites, including Brad Pitts
Fury and a remake of the musical Annie. These films had not yet been released, so the hackers
were essentially giving them away free before Sony could bring them to market. Sony quickly
organized internal staff to deal with this problem and contacted the FBI and the private security
firm FireEye to find ways to protect employees whose personal data had been exposed by the
hack, repair the damaged computers, and hunt down the hackers. The attack may have been
motivated in part by Sonys plans to release a film called The Interview about two bumbling TV
reporters trying to assassinate North Korean leader Kim Jong-un. North Korean officials had
previously expressed objections to the film at the United Nations. A December 16, 2014, message
from the Guardians of Peace threatened terrorist actions at theaters showing the film. Sony pulled
the film from theatrical release the next day, and a number of U.S. theater chains announced they
would not screen the film. U.S. government officials stated on December 17 that they believed the
North Korean government was involved with the Sony hack, pointing to North Korean hackers
previous use of similar malicious hacking tools. There were similarities in specific lines of software
code, encryption algorithms, data deletion methods, and compromised networks. The attack code
was written on machines set with Korean characters as the default during Korean peninsula
working hours, and the types of remote servers used in the Sony hack have been linked to those
used by other breaches attributed to North Korea. The FBI found several IP addresses associated
with the mal ware that originated within North Korea. Because the North Korean government
controls all Internet access in that country, the government is thought to have played some role in
the attack. North Koreas news agency KCNA denied that countrys involvement. Nevertheless, the
United States stepped up its economic sanctions against North Korea. U.S. Secretary of
Homeland Security Jeh Johnson released a statement asserting that the cyberattack against Sony
wasnt just an attack on the company; it was also an attack on freedom of expression and the way
of life in the United States. Many saw the threats to Sony over The Interview as endangering free
speech. Several Hollywood filmmakers and actors, including Ben Stiller, Rob Lowe, Jimmy
Kimmel, and Judd Apatow, voiced their opposition to Sonys decision to pull the film. Peter Singer,
a cybersecurity strategist at the New America Foundation, warned that Sonys action set a disturb
ing precedent because it signaled to attackers that they can get all they want and even more.
President Barack Obama called Sonys decision to cancel release of The Interview a mistake and
urged the entertainment industry not to succumb to self-censorship. Cybersecurity experts and
members of the press, including Kurt Stammberger from cybersecurity firm Norsk, Kim Zetter from
Wired magazine, CloudFlare researcher Marc Rogers, and former hacker Hector Xavier
Monsegur, believe North Korea lacks the infrastructure to handle downloads of 100 terabytes of
data, and such actions would have had to go on for months or years without anyone noticing.
Stammberger told the FBI that the hack was probably an inside job, initiated by six disgruntled
former Sony employees who had the knowledge and motive to access secure parts of Sony
servers. Others have suggested that an outside group mimicking North Korean hackers was
responsible. Sony had suffered a massive data breach before. In April 2011 hackers were able to
obtain personal information, including credit, debit, and bank account numbers, from over 100
million PlayStation Network users and Sony Online Entertainment users. It was one of the largest
single data breaches in Internet history. To prevent that from happening again, Sony beefed up its
security, paying more attention to encryption and outdated software ver sions. Nevertheless, the
company was hacked again, and this attack is believed to be worseperhaps the worst attack to
date in corporate history. This time, it appears that the hackers exploited a previously undisclosed
zero-day vulnerability in Sony computer systems that gave them unfettered access to its networks.
These flaws are usually the result of errors made during the writing of the software, giving an
attacker wider access to an organizations systems and providing a platform for staging larger-
scale intrusions. Often the vulnerabilities remain unknown to the organization that created the
software. Details have not yet emerged about exactly which piece of software or system was
compromised. The New York Times reported that spear phishing attacks involving malicious code
were inserted in Sony email attachments in September. Spear phishing email messages appear to
come from someone known to the recipient, such as friend or fellow employee. If an unknowing
recipient clicks a link in the email, malicious code can be inserted in a computer system.
Apparently, Sony was experiencing spear phishing attacks in early September, but those attacks
did not look unusual. In retrospect, investigators realized that hackers had stolen the credentials of
a Sony systems administrator, which allowed them to move freely inside Sonys systems. That type
of attack has been used before to exploit zero-day vulnerabilities. Spear phishing can be difficult to
detect and prevent by using only firewalls. Uses have to be vigilant and sensitive to signs that
email is not authentic. Some experts also believe the hackers may also have employed a SQL
injection attack, in which the attacker executes unauthorized SQL commands by taking advantage
of insecure code on a system connected to the Internet. SQL injection attacks are used to steal
information from a database from which the data would normally not be available or to gain access
to an organizations computer systems. SQL injection attacks can be thwarted by encrypting data,
and Sony may have neglected to do this for key pieces of data. Doug Stone, president of film
newsletter Box Office Analyst, believes that Sony lost $120 million in U.S. and foreign box office
revenue from not releasing The Interview as well as tens of millions already spent on marketing.
Sales of this film to DVD, streaming video services, and some theaters in the future will not make
up for this. Sony will also lose revenue from the five films yet to be released that hackers
downloaded to online file-sharing services. According to a Carnegie Mellon University 2011 report,
such leaks can cost companies up to 19 percent of the revenue they would have otherwise
generated just on box office sales. Four former employees have sued Sony for not protecting their
private information from hackers. The lawsuits seek class-action status on behalf of the nearly
50,000 Sony Pictures employees whose Social Security numbers and other private data were
exposed. Legal experts expect more cases to be filed over the data breach in the future. Sony has
set aside $15 million to deal with ongoing damages from the attack; this may not be enough.
Difficult to estimate are the losses Sony will experience from its damaged brand image and
reluctance of actors and others in the film industry to work with Sony again. The company has
tightened information system security again, using redundant solutions to prevent similar data loss
or hacks in the future, but will this be enough? According to Kevin Mandia, who heads the
Mandiant security firm hired to investigate the breach, the 2014 attack was one for which neither
Sony nor other companies could have been fully prepared. Mandia believes the software used in
the attack against Sony was undetectable by industry standard antivirus software. In addition, the
scope of the attack was unlike anything he had ever seen because the hackers sought both to
destroy information and release it to the public. The Sony hack exposed many details about the
inner workings of a large and famous company salaries, health care records, office call lists of
employees in a prominent industry. Security experts could recall no other breach when so much
data on a high-profile company was made public in one data dump. Some also believe the Sony
hack is a harbinger of things to come for all companies. This type of attack would not have been
possible a few years ago. The likelihood of serious breaches is rising, the damage breaches can
cause is going up, and companies will need to spend more money and time on information
systems security to keep the hackers from pulling ahead.
Case Study Questions
1. List and describe the security and control weaknesses at Sony that are discussed in this case.
2. What people, organization, and technology factors contributed to this problem? How much was
management responsible?
3. What was the business impact of Sony hack? Explain your answer.
4. Is there a solution to this problem? Explain your answer.
5. Explain proactive and reactive cybersecurity.
6. Explain to a Guyanese business (business does not have to be named) what you have learnt
from this case study and why proactive cybersecurity measure establishment is more safe than
reactive measures

More Related Content

Similar to Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf

Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case StudyDylan Holbrook
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecRaghunath G
 
Sony pictures crippled by gop hackers, 2014 cs ala
Sony pictures crippled by gop hackers, 2014 cs alaSony pictures crippled by gop hackers, 2014 cs ala
Sony pictures crippled by gop hackers, 2014 cs alavaibhav tailor
 
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
 (Sony) Risk assignment final high profile security breach of Sony’s Playstat... (Sony) Risk assignment final high profile security breach of Sony’s Playstat...
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...James Dellinger
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdffasttrackcomputersol
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioNatalie Acevedo
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie Acevedo
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 

Similar to Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf (20)

Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Sony pictures crippled by gop hackers, 2014 cs ala
Sony pictures crippled by gop hackers, 2014 cs alaSony pictures crippled by gop hackers, 2014 cs ala
Sony pictures crippled by gop hackers, 2014 cs ala
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
 (Sony) Risk assignment final high profile security breach of Sony’s Playstat... (Sony) Risk assignment final high profile security breach of Sony’s Playstat...
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Hacker !
Hacker !Hacker !
Hacker !
 
Hackers
HackersHackers
Hackers
 
Hackers 22
Hackers 22Hackers 22
Hackers 22
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
 
Hacker !
Hacker !Hacker !
Hacker !
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 

More from accuraprintengineers

Which sequence of reactions is correct for betaoxidation of.pdf
Which sequence of reactions is correct for betaoxidation of.pdfWhich sequence of reactions is correct for betaoxidation of.pdf
Which sequence of reactions is correct for betaoxidation of.pdfaccuraprintengineers
 
Thirty years ago Clarkin was a small aity about 70000 res.pdf
Thirty years ago Clarkin was a small aity about 70000 res.pdfThirty years ago Clarkin was a small aity about 70000 res.pdf
Thirty years ago Clarkin was a small aity about 70000 res.pdfaccuraprintengineers
 
Usted es la enfermera que trabaja en una clnica ambulatoria.pdf
Usted es la enfermera que trabaja en una clnica ambulatoria.pdfUsted es la enfermera que trabaja en una clnica ambulatoria.pdf
Usted es la enfermera que trabaja en una clnica ambulatoria.pdfaccuraprintengineers
 
inc i Cick the leon lo view the information oo Just for.pdf
inc i Cick the leon lo view the information oo Just for.pdfinc i Cick the leon lo view the information oo Just for.pdf
inc i Cick the leon lo view the information oo Just for.pdfaccuraprintengineers
 
Venture capital firms a supply more than just money to smal.pdf
Venture capital firms a supply more than just money to smal.pdfVenture capital firms a supply more than just money to smal.pdf
Venture capital firms a supply more than just money to smal.pdfaccuraprintengineers
 
Thomson Co produces and distributes semiconductors for use .pdf
Thomson Co produces and distributes semiconductors for use .pdfThomson Co produces and distributes semiconductors for use .pdf
Thomson Co produces and distributes semiconductors for use .pdfaccuraprintengineers
 
rnek olay hemen takip eden sorular yantlayn Lam Research.pdf
rnek olay hemen takip eden sorular yantlayn  Lam Research.pdfrnek olay hemen takip eden sorular yantlayn  Lam Research.pdf
rnek olay hemen takip eden sorular yantlayn Lam Research.pdfaccuraprintengineers
 
Punto y apoyo en un prrafo En una conversacin podras de.pdf
Punto y apoyo en un prrafo  En una conversacin podras de.pdfPunto y apoyo en un prrafo  En una conversacin podras de.pdf
Punto y apoyo en un prrafo En una conversacin podras de.pdfaccuraprintengineers
 
Part II Proofs 40 pt 3 10 pt Let G be the contextfr.pdf
Part II Proofs 40 pt 3 10 pt Let G be the contextfr.pdfPart II Proofs 40 pt 3 10 pt Let G be the contextfr.pdf
Part II Proofs 40 pt 3 10 pt Let G be the contextfr.pdfaccuraprintengineers
 
nc Beinci Banka risk arlklar parantez iinde olmak zer.pdf
nc Beinci Banka risk arlklar parantez iinde olmak zer.pdfnc Beinci Banka risk arlklar parantez iinde olmak zer.pdf
nc Beinci Banka risk arlklar parantez iinde olmak zer.pdfaccuraprintengineers
 
John and Sheila Baldinucci citizens of the United States a.pdf
John and Sheila Baldinucci citizens of the United States a.pdfJohn and Sheila Baldinucci citizens of the United States a.pdf
John and Sheila Baldinucci citizens of the United States a.pdfaccuraprintengineers
 
Cuando Jerrold requiere que el personal de recursos humanos .pdf
Cuando Jerrold requiere que el personal de recursos humanos .pdfCuando Jerrold requiere que el personal de recursos humanos .pdf
Cuando Jerrold requiere que el personal de recursos humanos .pdfaccuraprintengineers
 
Ingresos netos de LLC y estado de patrimonio de los miembros.pdf
Ingresos netos de LLC y estado de patrimonio de los miembros.pdfIngresos netos de LLC y estado de patrimonio de los miembros.pdf
Ingresos netos de LLC y estado de patrimonio de los miembros.pdfaccuraprintengineers
 
For 11 years Janet saved 900 at the beginning of every mon.pdf
For 11 years Janet saved 900 at the beginning of every mon.pdfFor 11 years Janet saved 900 at the beginning of every mon.pdf
For 11 years Janet saved 900 at the beginning of every mon.pdfaccuraprintengineers
 
A random variable X is uniformly distributed between 2 and 9.pdf
A random variable X is uniformly distributed between 2 and 9.pdfA random variable X is uniformly distributed between 2 and 9.pdf
A random variable X is uniformly distributed between 2 and 9.pdfaccuraprintengineers
 
20Y1 Mar 1 Issued the bonds for cash at their face amount .pdf
20Y1 Mar 1 Issued the bonds for cash at their face amount .pdf20Y1 Mar 1 Issued the bonds for cash at their face amount .pdf
20Y1 Mar 1 Issued the bonds for cash at their face amount .pdfaccuraprintengineers
 
Eres directora de una escuela primaria Uno de tus mejores m.pdf
Eres directora de una escuela primaria Uno de tus mejores m.pdfEres directora de una escuela primaria Uno de tus mejores m.pdf
Eres directora de una escuela primaria Uno de tus mejores m.pdfaccuraprintengineers
 
Define a function named SwapValues that takes four integers .pdf
Define a function named SwapValues that takes four integers .pdfDefine a function named SwapValues that takes four integers .pdf
Define a function named SwapValues that takes four integers .pdfaccuraprintengineers
 
391 Screen individuals prior to authorizing access to orga.pdf
391 Screen individuals prior to authorizing access to orga.pdf391 Screen individuals prior to authorizing access to orga.pdf
391 Screen individuals prior to authorizing access to orga.pdfaccuraprintengineers
 
Consider a random sample from a normal distribution with XiN.pdf
Consider a random sample from a normal distribution with XiN.pdfConsider a random sample from a normal distribution with XiN.pdf
Consider a random sample from a normal distribution with XiN.pdfaccuraprintengineers
 

More from accuraprintengineers (20)

Which sequence of reactions is correct for betaoxidation of.pdf
Which sequence of reactions is correct for betaoxidation of.pdfWhich sequence of reactions is correct for betaoxidation of.pdf
Which sequence of reactions is correct for betaoxidation of.pdf
 
Thirty years ago Clarkin was a small aity about 70000 res.pdf
Thirty years ago Clarkin was a small aity about 70000 res.pdfThirty years ago Clarkin was a small aity about 70000 res.pdf
Thirty years ago Clarkin was a small aity about 70000 res.pdf
 
Usted es la enfermera que trabaja en una clnica ambulatoria.pdf
Usted es la enfermera que trabaja en una clnica ambulatoria.pdfUsted es la enfermera que trabaja en una clnica ambulatoria.pdf
Usted es la enfermera que trabaja en una clnica ambulatoria.pdf
 
inc i Cick the leon lo view the information oo Just for.pdf
inc i Cick the leon lo view the information oo Just for.pdfinc i Cick the leon lo view the information oo Just for.pdf
inc i Cick the leon lo view the information oo Just for.pdf
 
Venture capital firms a supply more than just money to smal.pdf
Venture capital firms a supply more than just money to smal.pdfVenture capital firms a supply more than just money to smal.pdf
Venture capital firms a supply more than just money to smal.pdf
 
Thomson Co produces and distributes semiconductors for use .pdf
Thomson Co produces and distributes semiconductors for use .pdfThomson Co produces and distributes semiconductors for use .pdf
Thomson Co produces and distributes semiconductors for use .pdf
 
rnek olay hemen takip eden sorular yantlayn Lam Research.pdf
rnek olay hemen takip eden sorular yantlayn  Lam Research.pdfrnek olay hemen takip eden sorular yantlayn  Lam Research.pdf
rnek olay hemen takip eden sorular yantlayn Lam Research.pdf
 
Punto y apoyo en un prrafo En una conversacin podras de.pdf
Punto y apoyo en un prrafo  En una conversacin podras de.pdfPunto y apoyo en un prrafo  En una conversacin podras de.pdf
Punto y apoyo en un prrafo En una conversacin podras de.pdf
 
Part II Proofs 40 pt 3 10 pt Let G be the contextfr.pdf
Part II Proofs 40 pt 3 10 pt Let G be the contextfr.pdfPart II Proofs 40 pt 3 10 pt Let G be the contextfr.pdf
Part II Proofs 40 pt 3 10 pt Let G be the contextfr.pdf
 
nc Beinci Banka risk arlklar parantez iinde olmak zer.pdf
nc Beinci Banka risk arlklar parantez iinde olmak zer.pdfnc Beinci Banka risk arlklar parantez iinde olmak zer.pdf
nc Beinci Banka risk arlklar parantez iinde olmak zer.pdf
 
John and Sheila Baldinucci citizens of the United States a.pdf
John and Sheila Baldinucci citizens of the United States a.pdfJohn and Sheila Baldinucci citizens of the United States a.pdf
John and Sheila Baldinucci citizens of the United States a.pdf
 
Cuando Jerrold requiere que el personal de recursos humanos .pdf
Cuando Jerrold requiere que el personal de recursos humanos .pdfCuando Jerrold requiere que el personal de recursos humanos .pdf
Cuando Jerrold requiere que el personal de recursos humanos .pdf
 
Ingresos netos de LLC y estado de patrimonio de los miembros.pdf
Ingresos netos de LLC y estado de patrimonio de los miembros.pdfIngresos netos de LLC y estado de patrimonio de los miembros.pdf
Ingresos netos de LLC y estado de patrimonio de los miembros.pdf
 
For 11 years Janet saved 900 at the beginning of every mon.pdf
For 11 years Janet saved 900 at the beginning of every mon.pdfFor 11 years Janet saved 900 at the beginning of every mon.pdf
For 11 years Janet saved 900 at the beginning of every mon.pdf
 
A random variable X is uniformly distributed between 2 and 9.pdf
A random variable X is uniformly distributed between 2 and 9.pdfA random variable X is uniformly distributed between 2 and 9.pdf
A random variable X is uniformly distributed between 2 and 9.pdf
 
20Y1 Mar 1 Issued the bonds for cash at their face amount .pdf
20Y1 Mar 1 Issued the bonds for cash at their face amount .pdf20Y1 Mar 1 Issued the bonds for cash at their face amount .pdf
20Y1 Mar 1 Issued the bonds for cash at their face amount .pdf
 
Eres directora de una escuela primaria Uno de tus mejores m.pdf
Eres directora de una escuela primaria Uno de tus mejores m.pdfEres directora de una escuela primaria Uno de tus mejores m.pdf
Eres directora de una escuela primaria Uno de tus mejores m.pdf
 
Define a function named SwapValues that takes four integers .pdf
Define a function named SwapValues that takes four integers .pdfDefine a function named SwapValues that takes four integers .pdf
Define a function named SwapValues that takes four integers .pdf
 
391 Screen individuals prior to authorizing access to orga.pdf
391 Screen individuals prior to authorizing access to orga.pdf391 Screen individuals prior to authorizing access to orga.pdf
391 Screen individuals prior to authorizing access to orga.pdf
 
Consider a random sample from a normal distribution with XiN.pdf
Consider a random sample from a normal distribution with XiN.pdfConsider a random sample from a normal distribution with XiN.pdf
Consider a random sample from a normal distribution with XiN.pdf
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf

  • 1. Case Study 2 On November 24, 2014, Sony Pictures Entertainment found out it had been hacked. The hackers were able to penetrate Sony systems and networks and take over 100 terabytes of company information, including trade secrets, email, and personnel records. Several Sony Twitter accounts were also taken over. The hackers then installed on Sonys computers a piece of malware called Wiper, which erased data from the companys servers and PCs. Investigators concluded that the hackers spent more than two months, from mid-September to mid-November 2014, mapping Sonys computer systems, identifying critical files, and planning how to destroy computers and servers. The malware made many Sony employees computers inoperable and full recovery difficult or impossible, slowing down company operations. Sony shut down its internal computer network to prevent the data-wiping software from causing further damage, forcing many employees to use paper and pen. Systems from which the company generates revenue, including those involved with marketing and distributing films and TV shows, were the first to be restored. The hackers, who called themselves the Guardians of Peace, released some of the stolen information to the public and threatened to release more. That information included very confidential and poten tially embarrassing tidbits about Sony staff; partners; Hollywood stars, including Sylvester Stallone, director Judd Apatow, and Australian actress Rebel Wilson; and President Obama. Confidential personal informa tion about employees such as names; addresses; 47,000 Social Security numbers; and financial details was also stolen. The personal data, along with contracts and other sensitive Sony documents, were posted on file-sharing networks such as Bit Torrent. The hackers also posted five Sony films to online file-sharing sites, including Brad Pitts Fury and a remake of the musical Annie. These films had not yet been released, so the hackers were essentially giving them away free before Sony could bring them to market. Sony quickly organized internal staff to deal with this problem and contacted the FBI and the private security firm FireEye to find ways to protect employees whose personal data had been exposed by the hack, repair the damaged computers, and hunt down the hackers. The attack may have been motivated in part by Sonys plans to release a film called The Interview about two bumbling TV reporters trying to assassinate North Korean leader Kim Jong-un. North Korean officials had previously expressed objections to the film at the United Nations. A December 16, 2014, message from the Guardians of Peace threatened terrorist actions at theaters showing the film. Sony pulled the film from theatrical release the next day, and a number of U.S. theater chains announced they would not screen the film. U.S. government officials stated on December 17 that they believed the North Korean government was involved with the Sony hack, pointing to North Korean hackers previous use of similar malicious hacking tools. There were similarities in specific lines of software code, encryption algorithms, data deletion methods, and compromised networks. The attack code was written on machines set with Korean characters as the default during Korean peninsula working hours, and the types of remote servers used in the Sony hack have been linked to those used by other breaches attributed to North Korea. The FBI found several IP addresses associated with the mal ware that originated within North Korea. Because the North Korean government controls all Internet access in that country, the government is thought to have played some role in the attack. North Koreas news agency KCNA denied that countrys involvement. Nevertheless, the United States stepped up its economic sanctions against North Korea. U.S. Secretary of Homeland Security Jeh Johnson released a statement asserting that the cyberattack against Sony
  • 2. wasnt just an attack on the company; it was also an attack on freedom of expression and the way of life in the United States. Many saw the threats to Sony over The Interview as endangering free speech. Several Hollywood filmmakers and actors, including Ben Stiller, Rob Lowe, Jimmy Kimmel, and Judd Apatow, voiced their opposition to Sonys decision to pull the film. Peter Singer, a cybersecurity strategist at the New America Foundation, warned that Sonys action set a disturb ing precedent because it signaled to attackers that they can get all they want and even more. President Barack Obama called Sonys decision to cancel release of The Interview a mistake and urged the entertainment industry not to succumb to self-censorship. Cybersecurity experts and members of the press, including Kurt Stammberger from cybersecurity firm Norsk, Kim Zetter from Wired magazine, CloudFlare researcher Marc Rogers, and former hacker Hector Xavier Monsegur, believe North Korea lacks the infrastructure to handle downloads of 100 terabytes of data, and such actions would have had to go on for months or years without anyone noticing. Stammberger told the FBI that the hack was probably an inside job, initiated by six disgruntled former Sony employees who had the knowledge and motive to access secure parts of Sony servers. Others have suggested that an outside group mimicking North Korean hackers was responsible. Sony had suffered a massive data breach before. In April 2011 hackers were able to obtain personal information, including credit, debit, and bank account numbers, from over 100 million PlayStation Network users and Sony Online Entertainment users. It was one of the largest single data breaches in Internet history. To prevent that from happening again, Sony beefed up its security, paying more attention to encryption and outdated software ver sions. Nevertheless, the company was hacked again, and this attack is believed to be worseperhaps the worst attack to date in corporate history. This time, it appears that the hackers exploited a previously undisclosed zero-day vulnerability in Sony computer systems that gave them unfettered access to its networks. These flaws are usually the result of errors made during the writing of the software, giving an attacker wider access to an organizations systems and providing a platform for staging larger- scale intrusions. Often the vulnerabilities remain unknown to the organization that created the software. Details have not yet emerged about exactly which piece of software or system was compromised. The New York Times reported that spear phishing attacks involving malicious code were inserted in Sony email attachments in September. Spear phishing email messages appear to come from someone known to the recipient, such as friend or fellow employee. If an unknowing recipient clicks a link in the email, malicious code can be inserted in a computer system. Apparently, Sony was experiencing spear phishing attacks in early September, but those attacks did not look unusual. In retrospect, investigators realized that hackers had stolen the credentials of a Sony systems administrator, which allowed them to move freely inside Sonys systems. That type of attack has been used before to exploit zero-day vulnerabilities. Spear phishing can be difficult to detect and prevent by using only firewalls. Uses have to be vigilant and sensitive to signs that email is not authentic. Some experts also believe the hackers may also have employed a SQL injection attack, in which the attacker executes unauthorized SQL commands by taking advantage of insecure code on a system connected to the Internet. SQL injection attacks are used to steal information from a database from which the data would normally not be available or to gain access to an organizations computer systems. SQL injection attacks can be thwarted by encrypting data, and Sony may have neglected to do this for key pieces of data. Doug Stone, president of film
  • 3. newsletter Box Office Analyst, believes that Sony lost $120 million in U.S. and foreign box office revenue from not releasing The Interview as well as tens of millions already spent on marketing. Sales of this film to DVD, streaming video services, and some theaters in the future will not make up for this. Sony will also lose revenue from the five films yet to be released that hackers downloaded to online file-sharing services. According to a Carnegie Mellon University 2011 report, such leaks can cost companies up to 19 percent of the revenue they would have otherwise generated just on box office sales. Four former employees have sued Sony for not protecting their private information from hackers. The lawsuits seek class-action status on behalf of the nearly 50,000 Sony Pictures employees whose Social Security numbers and other private data were exposed. Legal experts expect more cases to be filed over the data breach in the future. Sony has set aside $15 million to deal with ongoing damages from the attack; this may not be enough. Difficult to estimate are the losses Sony will experience from its damaged brand image and reluctance of actors and others in the film industry to work with Sony again. The company has tightened information system security again, using redundant solutions to prevent similar data loss or hacks in the future, but will this be enough? According to Kevin Mandia, who heads the Mandiant security firm hired to investigate the breach, the 2014 attack was one for which neither Sony nor other companies could have been fully prepared. Mandia believes the software used in the attack against Sony was undetectable by industry standard antivirus software. In addition, the scope of the attack was unlike anything he had ever seen because the hackers sought both to destroy information and release it to the public. The Sony hack exposed many details about the inner workings of a large and famous company salaries, health care records, office call lists of employees in a prominent industry. Security experts could recall no other breach when so much data on a high-profile company was made public in one data dump. Some also believe the Sony hack is a harbinger of things to come for all companies. This type of attack would not have been possible a few years ago. The likelihood of serious breaches is rising, the damage breaches can cause is going up, and companies will need to spend more money and time on information systems security to keep the hackers from pulling ahead. Case Study Questions 1. List and describe the security and control weaknesses at Sony that are discussed in this case. 2. What people, organization, and technology factors contributed to this problem? How much was management responsible? 3. What was the business impact of Sony hack? Explain your answer. 4. Is there a solution to this problem? Explain your answer. 5. Explain proactive and reactive cybersecurity. 6. Explain to a Guyanese business (business does not have to be named) what you have learnt from this case study and why proactive cybersecurity measure establishment is more safe than reactive measures