SlideShare a Scribd company logo
1 of 3
Download to read offline
On April 19, 2011, system administrators at Sony's On April 22, Sony informed the FBI of the
potential online gaming service PlayStation Network (PSN), with massive data leakage. On April
26, Sony notified the 40 over 77 million users, began to notice suspicious activity states that have
legislation requiring corporations to on some of its 130 servers spread across the globe and
announce their data breaches (there is no similar federal 50 software programs. The PlayStation
Network is used law at this time), and made a public announcement that by Sony game machine
owners to play against one hackers had stolen some personal information from all another, chat
online, and watch video streamed over the 77 million users, and possibly credit card information
internet. The largest single data breach in Internet from 12 million users. Sony did not know
exactly what On April 20, Sony engineers discovered that some The hackers corrupted Sony's
servers, causing them to history was taking place. data had likely been transferred from its
servers to mysteriously reboot. The rogue program deleted all log outside computers. The nature
of the data transferred files to hide its operation. Once inside Sony's servers, the was not yet
known but it could have included credit card rogue software transferred personal and credit card
and personal information of PlayStation customers. information on millions of PlayStation
users, On May 2. Because of the uncertainty of the data loss, Sony shut. Sony shut down a
second service, Sony Online down its entire global PlayStation network when it real-
Entertainment, a San Diego-based subsidiary that makes ized it no longer controlled the personal
information multiplayer games for personal computers. Sony believed contained on these
servers.
The tocal Secy data frracb now sumben oner too of secutaly, whatener it wis, ther believe in wai
Aacker. Acoording to Song, hackers kel a lees file are kecion. Anorg moev is the thame of an
leierset collactive of hackites and wigilandes whose mocto is "We was Google' haman teiources
department. had attacked MasterCatd and ceher onchuary serven in the Purdon Whionity Ccoter
for Baducation and retaliation for curtina their financiel irlationihipi with Wesearch in
Iaformation Assurance and Secuiricy Widibeaks a Web site drvoted to releationg secret Amer-
(CE.R1AS). Gild the problem at Soay was that ele ican poverment filek. PlaySiation Netwek was
asing an oldcr verviot of Socy and cehers believe the hacktr atrack. which Apache Web server
loftware, which has well knoon follownd wecks of a denial-of iervice atiack on the same lecurity
iswes. In astition. Sony's Wob site had uet) Soey servers. was netaliation by Anogymoer for
Sony's poor fifen all pectection. He said the pecblemi wit civil seit a paint Gicoge flote, ooe of
the world's beit fepotied on an open foriam months before the incidetik x. known hackers. Holte
cracked the iFhnoe operationg US. Secret Servise agcet told the comminise thail the system in
2000, and in 2010 eriched the Sogy PhaySta- vat majority of artacks on databases were pok
hilhly tion client operitite syatem and laser polkithed the defricult. Morcover, once hackers ane
oa the inulk. procedaires oe his Wcb site Anocymoas deeied that as cribcal perional information
and credis informithob an? ati oeginization it stole crodit cands, but the Mateneent is wasally not
eocrypted. If such iaformation weic uaclear aboot whether its members as individuals partic-
rencrypeed, hickers would not be able to read the data ipoced in the attack, Anooymous claims
Soay is timply . The reason most perional data are not cocry pted in ? trying to cisctedit
Anogymoci invead of admitting its . Iarge-kcale private databoses is cont, and to a lesict Soayy
Bourd Chairmat apologized to its asers and operatioo like Sowy's could cavily require a doublis
af criaks in the United States Congrews for the security _ compoting capocity at Soey. This
modid significauty rat breakdown. Nicvertheles, governmentx around the aceld into profits for an
Interoct-based caterprise like Simen reacied hantily to che lapie ia security at Sooy. The US. s.
simply bectuse IT is anch a buge part of its comel House Commitice on Commerce,
Manufacturing and strocture. been trinuferted and for fatling to inform cuntomen _ for the later
attack oa Sony Pictures. Rather than immodiacly rather that waiting a weck befcee soing
ansouncing new porwerfal methods of hacking atick, ber public. In a letier to Somy. Board
Chairman Karoo Hinai, group claimed Sony's lax security allonch it to peilorm mation the
hackers stole and acsurabes that ho credit hole that cnabled it to access whatever information is
abd data siere swiped. Represcatetive Edward J. Markey wanted. D.Macs) suid, "Hackern and
thieves shoeldrit be Sony notified its customers of the data breach ho laying "Grand Theft Auto"
with millions of abdresies. posting a press felease cen its blog. It did not e-phail
free ganses and privacy protection ("AllCleat As data berathes rie in sigeificance and frequeacy.
ip Fhak') offered by a private security fitm ar Socyy' . Ahe Obuina adminiseration and Congress
are proponing retlac iscality. This offer is distributed to uakr e-mail breacbes within specific time
frames, and obts itandands avousce-he policy against potential losses, bot does halp. for dita
secerily, The Duta Accoentakiliny and Trast Act matriduals monitor the use of their perronal
information of 2011 beiog coetileted by Coegrts requirrs firma bo werioe, and by May 31, the
company bad restored Curtenily, 46 ataten have sach lepialatioe. In the past. swike to the United
Sates, Earope, and Ava except for many organirationt falled to report data hreacher for lapan So
far, wo law enforcement agency has reported Iear of hamming their brand images. li is unelear if
the Aecording to Frank Kenney, vice presilfent of ghobal brosectoce. wacarity at Ipwitch, a
company specialiring in transferring files securely oaliae, the fact that dotens of Soey Web sites
and servers had been breacbed are a sure signs of a company-wide problem. Any type of
emironthent can be breached, but Sony har to devise a plan that not only protects its
infrastructure but alio coevinces customers that their credit cand and personal iaformation are
safe. Sony's "brand is at atake," he aid. Socy's security problerns could take years to fix The
Sony data breach follows a string of rocent breaches that are lasger and byoader in wope than
ever before. The Privacy Rigbts Clearinghocse kecps a database of knowa data breaches. Prior to
the Sony debacle, the largeat data breach in 2011 occured at Eprilon, the world's larpest
permisiton-bared e-mail Case Study Questions marketing services company with more than
2,500 corporate customers, including many major banks and 1. List and describe the secsirity
and coutrol weaknessel at Sony that are discussed in this cise. 2. What people, onganizational,
and techaology factoes messages a year for tis clienth. In April 2011. Epaloe anessages a year
flor bas tecucity breach in which millions of anaounced a security breach in whista milions of e-
fail addresses were transferred to okitside servers. One revulf of this breach was miliont of
phishing Comsils ro ctutorhers and the potrntial for the loss of financial assets-

More Related Content

Similar to On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf

Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Gradytomo006
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1Sohail Gohir
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxjoshua2345678
 
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal Jaskaran Narula
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfanupamele
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hackingbluecoatss
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 

Similar to On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf (20)

Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdf
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hacking
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
June NOW 2014
June NOW 2014June NOW 2014
June NOW 2014
 
Data breach
Data breachData breach
Data breach
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 

More from amcointernationaljam

On April 19, 2021, Millipede Machinery sold a tractor to Thomas Hartw.pdf
 On April 19, 2021, Millipede Machinery sold a tractor to Thomas Hartw.pdf On April 19, 2021, Millipede Machinery sold a tractor to Thomas Hartw.pdf
On April 19, 2021, Millipede Machinery sold a tractor to Thomas Hartw.pdfamcointernationaljam
 
On 10 January 20X2, Grey Dog Limited signed a contract to suppl.pdf
 On 10 January 20X2, Grey Dog Limited signed a contract to suppl.pdf On 10 January 20X2, Grey Dog Limited signed a contract to suppl.pdf
On 10 January 20X2, Grey Dog Limited signed a contract to suppl.pdfamcointernationaljam
 
Olease report on all requested information below and submit to the Sc.pdf
 Olease report on all requested information below and submit to the Sc.pdf Olease report on all requested information below and submit to the Sc.pdf
Olease report on all requested information below and submit to the Sc.pdfamcointernationaljam
 
On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdf
 On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdf On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdf
On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdfamcointernationaljam
 
oints] Given X has the following distribution with parameters and . .pdf
 oints] Given X has the following distribution with parameters  and . .pdf oints] Given X has the following distribution with parameters  and . .pdf
oints] Given X has the following distribution with parameters and . .pdfamcointernationaljam
 
office Green Employee Training Communication Plan- In Course 3 - P.pdf
 office Green Employee Training Communication Plan- In Course 3 - P.pdf office Green Employee Training Communication Plan- In Course 3 - P.pdf
office Green Employee Training Communication Plan- In Course 3 - P.pdfamcointernationaljam
 
Oick the icon to view the rating valoes table. Click the icon to vinw.pdf
 Oick the icon to view the rating valoes table. Click the icon to vinw.pdf Oick the icon to view the rating valoes table. Click the icon to vinw.pdf
Oick the icon to view the rating valoes table. Click the icon to vinw.pdfamcointernationaljam
 
On a nationwide test taken by high school students, the mean score wa.pdf
 On a nationwide test taken by high school students, the mean score wa.pdf On a nationwide test taken by high school students, the mean score wa.pdf
On a nationwide test taken by high school students, the mean score wa.pdfamcointernationaljam
 
Of the conditions and disorders that the United States recommends all.pdf
 Of the conditions and disorders that the United States recommends all.pdf Of the conditions and disorders that the United States recommends all.pdf
Of the conditions and disorders that the United States recommends all.pdfamcointernationaljam
 
Nicholas Copernicus introduced to astronomy a new model of the heaven.pdf
 Nicholas Copernicus introduced to astronomy a new model of the heaven.pdf Nicholas Copernicus introduced to astronomy a new model of the heaven.pdf
Nicholas Copernicus introduced to astronomy a new model of the heaven.pdfamcointernationaljam
 
Next TWO questions are related to the following sample data ane, a s.pdf
 Next TWO questions are related to the following sample data ane, a s.pdf Next TWO questions are related to the following sample data ane, a s.pdf
Next TWO questions are related to the following sample data ane, a s.pdfamcointernationaljam
 
Naturally occurring boron consists of 2 isotopes the 10�B (atomic mas.pdf
 Naturally occurring boron consists of 2 isotopes the 10�B (atomic mas.pdf Naturally occurring boron consists of 2 isotopes the 10�B (atomic mas.pdf
Naturally occurring boron consists of 2 isotopes the 10�B (atomic mas.pdfamcointernationaljam
 
New research on the tree of life has suggested a shift from the class.pdf
 New research on the tree of life has suggested a shift from the class.pdf New research on the tree of life has suggested a shift from the class.pdf
New research on the tree of life has suggested a shift from the class.pdfamcointernationaljam
 
Next TW0 questions are related to the following sample data lane, a .pdf
 Next TW0 questions are related to the following sample data lane, a .pdf Next TW0 questions are related to the following sample data lane, a .pdf
Next TW0 questions are related to the following sample data lane, a .pdfamcointernationaljam
 
Nematodes lack which trait that is present in almost all bilaterians.pdf
 Nematodes lack which trait that is present in almost all bilaterians.pdf Nematodes lack which trait that is present in almost all bilaterians.pdf
Nematodes lack which trait that is present in almost all bilaterians.pdfamcointernationaljam
 
Net income was $206,500 for the year. Throughout the year the company.pdf
 Net income was $206,500 for the year. Throughout the year the company.pdf Net income was $206,500 for the year. Throughout the year the company.pdf
Net income was $206,500 for the year. Throughout the year the company.pdfamcointernationaljam
 
Natural Climate Change - Be able to explain differences between weath.pdf
 Natural Climate Change - Be able to explain differences between weath.pdf Natural Climate Change - Be able to explain differences between weath.pdf
Natural Climate Change - Be able to explain differences between weath.pdfamcointernationaljam
 
Nanial ano 28 ic cinclo and hac the followinn inromo and ovnoncoc in .pdf
 Nanial ano 28 ic cinclo and hac the followinn inromo and ovnoncoc in .pdf Nanial ano 28 ic cinclo and hac the followinn inromo and ovnoncoc in .pdf
Nanial ano 28 ic cinclo and hac the followinn inromo and ovnoncoc in .pdfamcointernationaljam
 
Need help with all parts (4) X is a normal variable with expectati.pdf
 Need help with all parts  (4) X is a normal variable with expectati.pdf Need help with all parts  (4) X is a normal variable with expectati.pdf
Need help with all parts (4) X is a normal variable with expectati.pdfamcointernationaljam
 
Nash Inc s EPS is $7.27 and its dividend payout ratio is 0.7 . If th.pdf
 Nash Inc s EPS is $7.27 and its dividend payout ratio is 0.7 . If th.pdf Nash Inc s EPS is $7.27 and its dividend payout ratio is 0.7 . If th.pdf
Nash Inc s EPS is $7.27 and its dividend payout ratio is 0.7 . If th.pdfamcointernationaljam
 

More from amcointernationaljam (20)

On April 19, 2021, Millipede Machinery sold a tractor to Thomas Hartw.pdf
 On April 19, 2021, Millipede Machinery sold a tractor to Thomas Hartw.pdf On April 19, 2021, Millipede Machinery sold a tractor to Thomas Hartw.pdf
On April 19, 2021, Millipede Machinery sold a tractor to Thomas Hartw.pdf
 
On 10 January 20X2, Grey Dog Limited signed a contract to suppl.pdf
 On 10 January 20X2, Grey Dog Limited signed a contract to suppl.pdf On 10 January 20X2, Grey Dog Limited signed a contract to suppl.pdf
On 10 January 20X2, Grey Dog Limited signed a contract to suppl.pdf
 
Olease report on all requested information below and submit to the Sc.pdf
 Olease report on all requested information below and submit to the Sc.pdf Olease report on all requested information below and submit to the Sc.pdf
Olease report on all requested information below and submit to the Sc.pdf
 
On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdf
 On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdf On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdf
On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdf
 
oints] Given X has the following distribution with parameters and . .pdf
 oints] Given X has the following distribution with parameters  and . .pdf oints] Given X has the following distribution with parameters  and . .pdf
oints] Given X has the following distribution with parameters and . .pdf
 
office Green Employee Training Communication Plan- In Course 3 - P.pdf
 office Green Employee Training Communication Plan- In Course 3 - P.pdf office Green Employee Training Communication Plan- In Course 3 - P.pdf
office Green Employee Training Communication Plan- In Course 3 - P.pdf
 
Oick the icon to view the rating valoes table. Click the icon to vinw.pdf
 Oick the icon to view the rating valoes table. Click the icon to vinw.pdf Oick the icon to view the rating valoes table. Click the icon to vinw.pdf
Oick the icon to view the rating valoes table. Click the icon to vinw.pdf
 
On a nationwide test taken by high school students, the mean score wa.pdf
 On a nationwide test taken by high school students, the mean score wa.pdf On a nationwide test taken by high school students, the mean score wa.pdf
On a nationwide test taken by high school students, the mean score wa.pdf
 
Of the conditions and disorders that the United States recommends all.pdf
 Of the conditions and disorders that the United States recommends all.pdf Of the conditions and disorders that the United States recommends all.pdf
Of the conditions and disorders that the United States recommends all.pdf
 
Nicholas Copernicus introduced to astronomy a new model of the heaven.pdf
 Nicholas Copernicus introduced to astronomy a new model of the heaven.pdf Nicholas Copernicus introduced to astronomy a new model of the heaven.pdf
Nicholas Copernicus introduced to astronomy a new model of the heaven.pdf
 
Next TWO questions are related to the following sample data ane, a s.pdf
 Next TWO questions are related to the following sample data ane, a s.pdf Next TWO questions are related to the following sample data ane, a s.pdf
Next TWO questions are related to the following sample data ane, a s.pdf
 
Naturally occurring boron consists of 2 isotopes the 10�B (atomic mas.pdf
 Naturally occurring boron consists of 2 isotopes the 10�B (atomic mas.pdf Naturally occurring boron consists of 2 isotopes the 10�B (atomic mas.pdf
Naturally occurring boron consists of 2 isotopes the 10�B (atomic mas.pdf
 
New research on the tree of life has suggested a shift from the class.pdf
 New research on the tree of life has suggested a shift from the class.pdf New research on the tree of life has suggested a shift from the class.pdf
New research on the tree of life has suggested a shift from the class.pdf
 
Next TW0 questions are related to the following sample data lane, a .pdf
 Next TW0 questions are related to the following sample data lane, a .pdf Next TW0 questions are related to the following sample data lane, a .pdf
Next TW0 questions are related to the following sample data lane, a .pdf
 
Nematodes lack which trait that is present in almost all bilaterians.pdf
 Nematodes lack which trait that is present in almost all bilaterians.pdf Nematodes lack which trait that is present in almost all bilaterians.pdf
Nematodes lack which trait that is present in almost all bilaterians.pdf
 
Net income was $206,500 for the year. Throughout the year the company.pdf
 Net income was $206,500 for the year. Throughout the year the company.pdf Net income was $206,500 for the year. Throughout the year the company.pdf
Net income was $206,500 for the year. Throughout the year the company.pdf
 
Natural Climate Change - Be able to explain differences between weath.pdf
 Natural Climate Change - Be able to explain differences between weath.pdf Natural Climate Change - Be able to explain differences between weath.pdf
Natural Climate Change - Be able to explain differences between weath.pdf
 
Nanial ano 28 ic cinclo and hac the followinn inromo and ovnoncoc in .pdf
 Nanial ano 28 ic cinclo and hac the followinn inromo and ovnoncoc in .pdf Nanial ano 28 ic cinclo and hac the followinn inromo and ovnoncoc in .pdf
Nanial ano 28 ic cinclo and hac the followinn inromo and ovnoncoc in .pdf
 
Need help with all parts (4) X is a normal variable with expectati.pdf
 Need help with all parts  (4) X is a normal variable with expectati.pdf Need help with all parts  (4) X is a normal variable with expectati.pdf
Need help with all parts (4) X is a normal variable with expectati.pdf
 
Nash Inc s EPS is $7.27 and its dividend payout ratio is 0.7 . If th.pdf
 Nash Inc s EPS is $7.27 and its dividend payout ratio is 0.7 . If th.pdf Nash Inc s EPS is $7.27 and its dividend payout ratio is 0.7 . If th.pdf
Nash Inc s EPS is $7.27 and its dividend payout ratio is 0.7 . If th.pdf
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf

  • 1. On April 19, 2011, system administrators at Sony's On April 22, Sony informed the FBI of the potential online gaming service PlayStation Network (PSN), with massive data leakage. On April 26, Sony notified the 40 over 77 million users, began to notice suspicious activity states that have legislation requiring corporations to on some of its 130 servers spread across the globe and announce their data breaches (there is no similar federal 50 software programs. The PlayStation Network is used law at this time), and made a public announcement that by Sony game machine owners to play against one hackers had stolen some personal information from all another, chat online, and watch video streamed over the 77 million users, and possibly credit card information internet. The largest single data breach in Internet from 12 million users. Sony did not know exactly what On April 20, Sony engineers discovered that some The hackers corrupted Sony's servers, causing them to history was taking place. data had likely been transferred from its servers to mysteriously reboot. The rogue program deleted all log outside computers. The nature of the data transferred files to hide its operation. Once inside Sony's servers, the was not yet known but it could have included credit card rogue software transferred personal and credit card and personal information of PlayStation customers. information on millions of PlayStation users, On May 2. Because of the uncertainty of the data loss, Sony shut. Sony shut down a second service, Sony Online down its entire global PlayStation network when it real- Entertainment, a San Diego-based subsidiary that makes ized it no longer controlled the personal information multiplayer games for personal computers. Sony believed contained on these servers. The tocal Secy data frracb now sumben oner too of secutaly, whatener it wis, ther believe in wai Aacker. Acoording to Song, hackers kel a lees file are kecion. Anorg moev is the thame of an leierset collactive of hackites and wigilandes whose mocto is "We was Google' haman teiources department. had attacked MasterCatd and ceher onchuary serven in the Purdon Whionity Ccoter for Baducation and retaliation for curtina their financiel irlationihipi with Wesearch in Iaformation Assurance and Secuiricy Widibeaks a Web site drvoted to releationg secret Amer- (CE.R1AS). Gild the problem at Soay was that ele ican poverment filek. PlaySiation Netwek was asing an oldcr verviot of Socy and cehers believe the hacktr atrack. which Apache Web server loftware, which has well knoon follownd wecks of a denial-of iervice atiack on the same lecurity iswes. In astition. Sony's Wob site had uet) Soey servers. was netaliation by Anogymoer for Sony's poor fifen all pectection. He said the pecblemi wit civil seit a paint Gicoge flote, ooe of the world's beit fepotied on an open foriam months before the incidetik x. known hackers. Holte cracked the iFhnoe operationg US. Secret Servise agcet told the comminise thail the system in 2000, and in 2010 eriched the Sogy PhaySta- vat majority of artacks on databases were pok hilhly tion client operitite syatem and laser polkithed the defricult. Morcover, once hackers ane
  • 2. oa the inulk. procedaires oe his Wcb site Anocymoas deeied that as cribcal perional information and credis informithob an? ati oeginization it stole crodit cands, but the Mateneent is wasally not eocrypted. If such iaformation weic uaclear aboot whether its members as individuals partic- rencrypeed, hickers would not be able to read the data ipoced in the attack, Anooymous claims Soay is timply . The reason most perional data are not cocry pted in ? trying to cisctedit Anogymoci invead of admitting its . Iarge-kcale private databoses is cont, and to a lesict Soayy Bourd Chairmat apologized to its asers and operatioo like Sowy's could cavily require a doublis af criaks in the United States Congrews for the security _ compoting capocity at Soey. This modid significauty rat breakdown. Nicvertheles, governmentx around the aceld into profits for an Interoct-based caterprise like Simen reacied hantily to che lapie ia security at Sooy. The US. s. simply bectuse IT is anch a buge part of its comel House Commitice on Commerce, Manufacturing and strocture. been trinuferted and for fatling to inform cuntomen _ for the later attack oa Sony Pictures. Rather than immodiacly rather that waiting a weck befcee soing ansouncing new porwerfal methods of hacking atick, ber public. In a letier to Somy. Board Chairman Karoo Hinai, group claimed Sony's lax security allonch it to peilorm mation the hackers stole and acsurabes that ho credit hole that cnabled it to access whatever information is abd data siere swiped. Represcatetive Edward J. Markey wanted. D.Macs) suid, "Hackern and thieves shoeldrit be Sony notified its customers of the data breach ho laying "Grand Theft Auto" with millions of abdresies. posting a press felease cen its blog. It did not e-phail free ganses and privacy protection ("AllCleat As data berathes rie in sigeificance and frequeacy. ip Fhak') offered by a private security fitm ar Socyy' . Ahe Obuina adminiseration and Congress are proponing retlac iscality. This offer is distributed to uakr e-mail breacbes within specific time frames, and obts itandands avousce-he policy against potential losses, bot does halp. for dita secerily, The Duta Accoentakiliny and Trast Act matriduals monitor the use of their perronal information of 2011 beiog coetileted by Coegrts requirrs firma bo werioe, and by May 31, the company bad restored Curtenily, 46 ataten have sach lepialatioe. In the past. swike to the United Sates, Earope, and Ava except for many organirationt falled to report data hreacher for lapan So far, wo law enforcement agency has reported Iear of hamming their brand images. li is unelear if the Aecording to Frank Kenney, vice presilfent of ghobal brosectoce. wacarity at Ipwitch, a company specialiring in transferring files securely oaliae, the fact that dotens of Soey Web sites and servers had been breacbed are a sure signs of a company-wide problem. Any type of emironthent can be breached, but Sony har to devise a plan that not only protects its infrastructure but alio coevinces customers that their credit cand and personal iaformation are safe. Sony's "brand is at atake," he aid. Socy's security problerns could take years to fix The Sony data breach follows a string of rocent breaches that are lasger and byoader in wope than
  • 3. ever before. The Privacy Rigbts Clearinghocse kecps a database of knowa data breaches. Prior to the Sony debacle, the largeat data breach in 2011 occured at Eprilon, the world's larpest permisiton-bared e-mail Case Study Questions marketing services company with more than 2,500 corporate customers, including many major banks and 1. List and describe the secsirity and coutrol weaknessel at Sony that are discussed in this cise. 2. What people, onganizational, and techaology factoes messages a year for tis clienth. In April 2011. Epaloe anessages a year flor bas tecucity breach in which millions of anaounced a security breach in whista milions of e- fail addresses were transferred to okitside servers. One revulf of this breach was miliont of phishing Comsils ro ctutorhers and the potrntial for the loss of financial assets-