SlideShare a Scribd company logo
The Tech section in Forbes magazine reported that the "criminals won" in the Sony pictures
breach. An anonymous threat posted on an obscure site warned that people who watch the to-
bereleased movie The Interview would be "doomed" to a "bitter fate" and recalled the tragic events
of September 11. The threat said that the movie inappropriately made light of North Korean
officials. As a result of the threat, five large theater chains in the United States and Canada
canceled plans to include the film on their screens. Ultimately, Sony had no choice but to cancel
the theater release of the film for reasons that are both economic and legal. The former was due to
a lack of revenue given the small number of remaining theaters that might go ahead and run the
film. The latter was driven by what would happen if an attack was carried out. A Steve Carell
project that featured North Korea was also canceled. The Guardian reported that a group named
the Guardians of Peace retaliated against Sony. They hacked into Sony's systems and stole over
100 terabytes of files, including unreleased movies, social security numbers for thousands of Sony
employees, and internal e-mails, some of which revealed embarrassing conversations between
Sony employees. The hackers began distributing the files in various locations online, making them
free for the taking. The officials of that government denied any involvement in the hack but said
that it might have been a "righteous deed" of those who support the government. North Korean
officials demanded some changes to the movie, including taming down a death scene of its leader.
Sony initially refused but then decided to go ahead and edit the scene. The movie eventually
opened without incident on a limited basis in some cinemas on Christmas Day and then was made
available via online rental. According to the Mirror in the United Kingdom, neither the Department
of Homeland Security nor the FBI could find evidence that the violence was a credible threat, but
the FBI believed NorthAccording to the Mirror in the United Kingdom, neither the Department of
Homeland Security nor the FBI could find evidence that the violence was a credible threat, but the
FBI believed North Korea was behind the hacking. In turn, North Korea claimed that the U.S.
government was responsible for creation of the movie. Discussion Questions 1. Setting aside the
political issues between North Korea and the United States, is there a reasonable way to respond
to an anonymous threat found on the Internet somewhere? What elements would you require
before canceling the film if you were CEO of Sony? If you were CEO of a chain of theaters? 2.
What cybersecurity controls would you recommend Sony use to provide better security for
unreleased digital films and e-mails? Be sure to include technology as well as organizational
controls. 3. If you were a hacker, what approach would you have used to break into Sony's
system? What do you think the most important SETA elements would be to prevent future
cyberattacks against Sony or other media firms?

More Related Content

Similar to The Tech section in Forbes magazine reported that the crimi.pdf

iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
Kapil Khandelwal (KK)
 
AnonymousWeek 5 Discussion SONY PicturesCOLLAPSEOverall R.docx
AnonymousWeek 5 Discussion SONY PicturesCOLLAPSEOverall R.docxAnonymousWeek 5 Discussion SONY PicturesCOLLAPSEOverall R.docx
AnonymousWeek 5 Discussion SONY PicturesCOLLAPSEOverall R.docx
SHIVA101531
 
According to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docxAccording to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docx
nettletondevon
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
Nick Bilogorskiy
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
Kirti Ahirrao
 
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
amcointernationaljam
 
Country United StatesOnce you have selected your country you wi.docx
Country United StatesOnce you have selected your country you wi.docxCountry United StatesOnce you have selected your country you wi.docx
Country United StatesOnce you have selected your country you wi.docx
melvinjrobinson2199
 
Piracy Essay
Piracy EssayPiracy Essay
Business Strategic management relating to law
Business Strategic management relating to lawBusiness Strategic management relating to law
Business Strategic management relating to law
Bhavna Nirban
 
Marketing in district 9
Marketing in district 9Marketing in district 9
Marketing in district 9Alex Sheldon
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 
Case Study Sony Shoots the MessengerIn the old days of employe.docx
Case Study Sony Shoots the MessengerIn the old days of employe.docxCase Study Sony Shoots the MessengerIn the old days of employe.docx
Case Study Sony Shoots the MessengerIn the old days of employe.docx
wendolynhalbert
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
fasttrackcomputersol
 
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
 (Sony) Risk assignment final high profile security breach of Sony’s Playstat... (Sony) Risk assignment final high profile security breach of Sony’s Playstat...
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
James Dellinger
 
APT & Data Breach - Lesson Learned
APT & Data Breach - Lesson LearnedAPT & Data Breach - Lesson Learned
APT & Data Breach - Lesson Learned
Ade Ismail Isnan
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
Natalie Acevedo
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
Natalie Acevedo
 

Similar to The Tech section in Forbes magazine reported that the crimi.pdf (20)

iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
 
AnonymousWeek 5 Discussion SONY PicturesCOLLAPSEOverall R.docx
AnonymousWeek 5 Discussion SONY PicturesCOLLAPSEOverall R.docxAnonymousWeek 5 Discussion SONY PicturesCOLLAPSEOverall R.docx
AnonymousWeek 5 Discussion SONY PicturesCOLLAPSEOverall R.docx
 
PR3 - Producer & Audience
PR3 - Producer & AudiencePR3 - Producer & Audience
PR3 - Producer & Audience
 
According to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docxAccording to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docx
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 
Country United StatesOnce you have selected your country you wi.docx
Country United StatesOnce you have selected your country you wi.docxCountry United StatesOnce you have selected your country you wi.docx
Country United StatesOnce you have selected your country you wi.docx
 
Piracy Resarch
Piracy ResarchPiracy Resarch
Piracy Resarch
 
Piracy Essay
Piracy EssayPiracy Essay
Piracy Essay
 
Business Strategic management relating to law
Business Strategic management relating to lawBusiness Strategic management relating to law
Business Strategic management relating to law
 
Marketing in district 9
Marketing in district 9Marketing in district 9
Marketing in district 9
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
Essay 1
Essay 1Essay 1
Essay 1
 
Case Study Sony Shoots the MessengerIn the old days of employe.docx
Case Study Sony Shoots the MessengerIn the old days of employe.docxCase Study Sony Shoots the MessengerIn the old days of employe.docx
Case Study Sony Shoots the MessengerIn the old days of employe.docx
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
 (Sony) Risk assignment final high profile security breach of Sony’s Playstat... (Sony) Risk assignment final high profile security breach of Sony’s Playstat...
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
 
APT & Data Breach - Lesson Learned
APT & Data Breach - Lesson LearnedAPT & Data Breach - Lesson Learned
APT & Data Breach - Lesson Learned
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
 

More from abyssiniaimpex1

Determine whether the following problem involves a permutati.pdf
Determine whether the following problem involves a permutati.pdfDetermine whether the following problem involves a permutati.pdf
Determine whether the following problem involves a permutati.pdf
abyssiniaimpex1
 
3 Results from the National Health and Nutrition Examinatio.pdf
3 Results from the National Health and Nutrition Examinatio.pdf3 Results from the National Health and Nutrition Examinatio.pdf
3 Results from the National Health and Nutrition Examinatio.pdf
abyssiniaimpex1
 
6 Diversity still plays a role of a tack on in the study .pdf
6 Diversity still plays a role of a tack on in the study .pdf6 Diversity still plays a role of a tack on in the study .pdf
6 Diversity still plays a role of a tack on in the study .pdf
abyssiniaimpex1
 
14 You and your friends race to the gym after school and w.pdf
14 You and your friends race to the gym after school and w.pdf14 You and your friends race to the gym after school and w.pdf
14 You and your friends race to the gym after school and w.pdf
abyssiniaimpex1
 
Why the code is not running I didnt get any main function .pdf
Why the code is not running I didnt get any main function .pdfWhy the code is not running I didnt get any main function .pdf
Why the code is not running I didnt get any main function .pdf
abyssiniaimpex1
 
Uno de los miembros del comit Joanne Hader est exasperad.pdf
Uno de los miembros del comit Joanne Hader est exasperad.pdfUno de los miembros del comit Joanne Hader est exasperad.pdf
Uno de los miembros del comit Joanne Hader est exasperad.pdf
abyssiniaimpex1
 
Using the following national income accounting data compute.pdf
Using the following national income accounting data compute.pdfUsing the following national income accounting data compute.pdf
Using the following national income accounting data compute.pdf
abyssiniaimpex1
 
Which list all that apply of the common justifications of .pdf
Which list all that apply of the common justifications of .pdfWhich list all that apply of the common justifications of .pdf
Which list all that apply of the common justifications of .pdf
abyssiniaimpex1
 
QUESTION 1 Second mouth A Eumetazoans Molting animals .pdf
QUESTION 1  Second mouth A Eumetazoans Molting animals .pdfQUESTION 1  Second mouth A Eumetazoans Molting animals .pdf
QUESTION 1 Second mouth A Eumetazoans Molting animals .pdf
abyssiniaimpex1
 
Problem 4 20 pts Given the following function and main pr.pdf
Problem 4 20 pts Given the following function and main pr.pdfProblem 4 20 pts Given the following function and main pr.pdf
Problem 4 20 pts Given the following function and main pr.pdf
abyssiniaimpex1
 
Problems on P functions Find the value of each Integral 1 0.pdf
Problems on P functions Find the value of each Integral 1 0.pdfProblems on P functions Find the value of each Integral 1 0.pdf
Problems on P functions Find the value of each Integral 1 0.pdf
abyssiniaimpex1
 
Need help finding pvalue with Statskey graph Thank you The.pdf
Need help finding pvalue with Statskey graph Thank you The.pdfNeed help finding pvalue with Statskey graph Thank you The.pdf
Need help finding pvalue with Statskey graph Thank you The.pdf
abyssiniaimpex1
 
1 Was it a wise move by Netflix to move from a distribution.pdf
1 Was it a wise move by Netflix to move from a distribution.pdf1 Was it a wise move by Netflix to move from a distribution.pdf
1 Was it a wise move by Netflix to move from a distribution.pdf
abyssiniaimpex1
 
Homework 1 Generate vehicle plate numbers Assume a New Yor.pdf
Homework 1  Generate vehicle plate numbers Assume a New Yor.pdfHomework 1  Generate vehicle plate numbers Assume a New Yor.pdf
Homework 1 Generate vehicle plate numbers Assume a New Yor.pdf
abyssiniaimpex1
 
How to Turn a Group of Strangers Into a Team In the age of v.pdf
How to Turn a Group of Strangers Into a Team In the age of v.pdfHow to Turn a Group of Strangers Into a Team In the age of v.pdf
How to Turn a Group of Strangers Into a Team In the age of v.pdf
abyssiniaimpex1
 
I am trying to implement an ArrayStack but only can get 4 te.pdf
I am trying to implement an ArrayStack but only can get 4 te.pdfI am trying to implement an ArrayStack but only can get 4 te.pdf
I am trying to implement an ArrayStack but only can get 4 te.pdf
abyssiniaimpex1
 
Hello Please help me with the following questions in order .pdf
Hello Please help me with the following questions in order .pdfHello Please help me with the following questions in order .pdf
Hello Please help me with the following questions in order .pdf
abyssiniaimpex1
 
Conceptual Leadership Questionnaire Pg 2022 Take Question.pdf
Conceptual Leadership Questionnaire Pg 2022 Take Question.pdfConceptual Leadership Questionnaire Pg 2022 Take Question.pdf
Conceptual Leadership Questionnaire Pg 2022 Take Question.pdf
abyssiniaimpex1
 
El peligro de una sola historia Quiero resaltar que uno de .pdf
El peligro de una sola historia  Quiero resaltar que uno de .pdfEl peligro de una sola historia  Quiero resaltar que uno de .pdf
El peligro de una sola historia Quiero resaltar que uno de .pdf
abyssiniaimpex1
 
El 1 de enero de 2020 Lennon Industries tena acciones en c.pdf
El 1 de enero de 2020 Lennon Industries tena acciones en c.pdfEl 1 de enero de 2020 Lennon Industries tena acciones en c.pdf
El 1 de enero de 2020 Lennon Industries tena acciones en c.pdf
abyssiniaimpex1
 

More from abyssiniaimpex1 (20)

Determine whether the following problem involves a permutati.pdf
Determine whether the following problem involves a permutati.pdfDetermine whether the following problem involves a permutati.pdf
Determine whether the following problem involves a permutati.pdf
 
3 Results from the National Health and Nutrition Examinatio.pdf
3 Results from the National Health and Nutrition Examinatio.pdf3 Results from the National Health and Nutrition Examinatio.pdf
3 Results from the National Health and Nutrition Examinatio.pdf
 
6 Diversity still plays a role of a tack on in the study .pdf
6 Diversity still plays a role of a tack on in the study .pdf6 Diversity still plays a role of a tack on in the study .pdf
6 Diversity still plays a role of a tack on in the study .pdf
 
14 You and your friends race to the gym after school and w.pdf
14 You and your friends race to the gym after school and w.pdf14 You and your friends race to the gym after school and w.pdf
14 You and your friends race to the gym after school and w.pdf
 
Why the code is not running I didnt get any main function .pdf
Why the code is not running I didnt get any main function .pdfWhy the code is not running I didnt get any main function .pdf
Why the code is not running I didnt get any main function .pdf
 
Uno de los miembros del comit Joanne Hader est exasperad.pdf
Uno de los miembros del comit Joanne Hader est exasperad.pdfUno de los miembros del comit Joanne Hader est exasperad.pdf
Uno de los miembros del comit Joanne Hader est exasperad.pdf
 
Using the following national income accounting data compute.pdf
Using the following national income accounting data compute.pdfUsing the following national income accounting data compute.pdf
Using the following national income accounting data compute.pdf
 
Which list all that apply of the common justifications of .pdf
Which list all that apply of the common justifications of .pdfWhich list all that apply of the common justifications of .pdf
Which list all that apply of the common justifications of .pdf
 
QUESTION 1 Second mouth A Eumetazoans Molting animals .pdf
QUESTION 1  Second mouth A Eumetazoans Molting animals .pdfQUESTION 1  Second mouth A Eumetazoans Molting animals .pdf
QUESTION 1 Second mouth A Eumetazoans Molting animals .pdf
 
Problem 4 20 pts Given the following function and main pr.pdf
Problem 4 20 pts Given the following function and main pr.pdfProblem 4 20 pts Given the following function and main pr.pdf
Problem 4 20 pts Given the following function and main pr.pdf
 
Problems on P functions Find the value of each Integral 1 0.pdf
Problems on P functions Find the value of each Integral 1 0.pdfProblems on P functions Find the value of each Integral 1 0.pdf
Problems on P functions Find the value of each Integral 1 0.pdf
 
Need help finding pvalue with Statskey graph Thank you The.pdf
Need help finding pvalue with Statskey graph Thank you The.pdfNeed help finding pvalue with Statskey graph Thank you The.pdf
Need help finding pvalue with Statskey graph Thank you The.pdf
 
1 Was it a wise move by Netflix to move from a distribution.pdf
1 Was it a wise move by Netflix to move from a distribution.pdf1 Was it a wise move by Netflix to move from a distribution.pdf
1 Was it a wise move by Netflix to move from a distribution.pdf
 
Homework 1 Generate vehicle plate numbers Assume a New Yor.pdf
Homework 1  Generate vehicle plate numbers Assume a New Yor.pdfHomework 1  Generate vehicle plate numbers Assume a New Yor.pdf
Homework 1 Generate vehicle plate numbers Assume a New Yor.pdf
 
How to Turn a Group of Strangers Into a Team In the age of v.pdf
How to Turn a Group of Strangers Into a Team In the age of v.pdfHow to Turn a Group of Strangers Into a Team In the age of v.pdf
How to Turn a Group of Strangers Into a Team In the age of v.pdf
 
I am trying to implement an ArrayStack but only can get 4 te.pdf
I am trying to implement an ArrayStack but only can get 4 te.pdfI am trying to implement an ArrayStack but only can get 4 te.pdf
I am trying to implement an ArrayStack but only can get 4 te.pdf
 
Hello Please help me with the following questions in order .pdf
Hello Please help me with the following questions in order .pdfHello Please help me with the following questions in order .pdf
Hello Please help me with the following questions in order .pdf
 
Conceptual Leadership Questionnaire Pg 2022 Take Question.pdf
Conceptual Leadership Questionnaire Pg 2022 Take Question.pdfConceptual Leadership Questionnaire Pg 2022 Take Question.pdf
Conceptual Leadership Questionnaire Pg 2022 Take Question.pdf
 
El peligro de una sola historia Quiero resaltar que uno de .pdf
El peligro de una sola historia  Quiero resaltar que uno de .pdfEl peligro de una sola historia  Quiero resaltar que uno de .pdf
El peligro de una sola historia Quiero resaltar que uno de .pdf
 
El 1 de enero de 2020 Lennon Industries tena acciones en c.pdf
El 1 de enero de 2020 Lennon Industries tena acciones en c.pdfEl 1 de enero de 2020 Lennon Industries tena acciones en c.pdf
El 1 de enero de 2020 Lennon Industries tena acciones en c.pdf
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

The Tech section in Forbes magazine reported that the crimi.pdf

  • 1. The Tech section in Forbes magazine reported that the "criminals won" in the Sony pictures breach. An anonymous threat posted on an obscure site warned that people who watch the to- bereleased movie The Interview would be "doomed" to a "bitter fate" and recalled the tragic events of September 11. The threat said that the movie inappropriately made light of North Korean officials. As a result of the threat, five large theater chains in the United States and Canada canceled plans to include the film on their screens. Ultimately, Sony had no choice but to cancel the theater release of the film for reasons that are both economic and legal. The former was due to a lack of revenue given the small number of remaining theaters that might go ahead and run the film. The latter was driven by what would happen if an attack was carried out. A Steve Carell project that featured North Korea was also canceled. The Guardian reported that a group named the Guardians of Peace retaliated against Sony. They hacked into Sony's systems and stole over 100 terabytes of files, including unreleased movies, social security numbers for thousands of Sony employees, and internal e-mails, some of which revealed embarrassing conversations between Sony employees. The hackers began distributing the files in various locations online, making them free for the taking. The officials of that government denied any involvement in the hack but said that it might have been a "righteous deed" of those who support the government. North Korean officials demanded some changes to the movie, including taming down a death scene of its leader. Sony initially refused but then decided to go ahead and edit the scene. The movie eventually opened without incident on a limited basis in some cinemas on Christmas Day and then was made available via online rental. According to the Mirror in the United Kingdom, neither the Department of Homeland Security nor the FBI could find evidence that the violence was a credible threat, but the FBI believed NorthAccording to the Mirror in the United Kingdom, neither the Department of Homeland Security nor the FBI could find evidence that the violence was a credible threat, but the FBI believed North Korea was behind the hacking. In turn, North Korea claimed that the U.S. government was responsible for creation of the movie. Discussion Questions 1. Setting aside the political issues between North Korea and the United States, is there a reasonable way to respond to an anonymous threat found on the Internet somewhere? What elements would you require before canceling the film if you were CEO of Sony? If you were CEO of a chain of theaters? 2. What cybersecurity controls would you recommend Sony use to provide better security for unreleased digital films and e-mails? Be sure to include technology as well as organizational controls. 3. If you were a hacker, what approach would you have used to break into Sony's system? What do you think the most important SETA elements would be to prevent future cyberattacks against Sony or other media firms?