Essays.club - Get Free Essays and Term Papers
Search

Network and Internet Security - Sony Hack

Autor:   •  December 3, 2017  •  1,149 Words (5 Pages)  •  598 Views

Page 1 of 5

...

In best portraying precisely what framework hypothesis is, it can be characterized as a perplexing system of occasions, relations, results, responses, advances, procedures and individuals cooperating in hence inconspicuous and capricious ways. In contemplating the conduct and result of the connection procedure could help the administration at Sony Corporation in better comprehension the authoritative frameworks and the way of its working; Whereas the administration of any order inside of an association could be improved by drawing nearer it from a point of view of framework considering, its usage will unquestionably help in overseeing security dangers at Sony Corporation.

The positive angles which this framework is ready to bring look good for the advantages in IT security at this partnership. The predictable sensational disappointments of Sony Corporation in viably tending to security issues which it has encountered lately owes part of the way to their inadequacy at characterizing what security is and to present it in a way that is both legitimate and pertinent to all partners.

Utilizing the methodology of framework intuition to the administration of data security will help the data security administration at Sony Corporation in tending to confused and element situations which will thus come about into valuable impact on joint effort inside of an association, adjust to operation alteration, route of key flightiness and resilience on the impact of outer issues. (Sony Corporation and the Management of Hacker Attacks, n.d.)

Summary and findings

The attack that was launched on Sony Play Station Network was Distributed denial-of-service (DDoS) attack. A hacker uses a DDoS attack to make a computer resource (i.e. website, application, e-mail, voicemail, network) stop responding to legitimate users. The malicious hacker does this by commanding a fleet of remotely-controlled computers to send a flood of network traffic to the target. The target becomes so busy dealing with the attacker’s requests that it doesn’t have time to respond to legitimate user’s requests. That can cause the target system to stop responding, resulting in long delays and outages.

Sony's security approach was outdated as Sony used an outdated version of the Apache Web server software. Credit card data was encrypted, but Sony admitted that other user information was not encrypted at the time of the intrusion. PlayStation Network (PSN) and their paid-for music-streaming service, Qriocity, had been hacked

The attack could have been prevented if the company had used more up-to-date protective software and kept an eye on its security glitches, 24.7million Sony Only Entertainment records would have not gotten leaked. Sony’s responded to the hack by releasing the PlayStation 3 firmware version 3.61 as a security patch. The firmware required users to change their password upon signing in. At the time the firmware was released, the network was still offline.

References

An Introduction to the Business Model for Information Security . (n.d.). Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/An-Introduction-to-the-Business-Model-for-Information-Security.aspx

Bertalanffy, L. (1976). “General System Theory: Foundations, Development, Applications”.

Gupta, M. (n.d.). Business Model for Information Security: Security right the first time. Retrieved from http://searchcompliance.techtarget.com/tip/Business-Model-for-Information-Security-Security-right-the-first-time

Lee, A. (2013). “Why Does Sony Keep Getting Hacked?” .

Sony Corporation and the Management of Hacker Attacks. (n.d.). Retrieved from http://www.rushtermpapers.com/sony-corporation-and-the-management-of-hacker-attacks/

...

Download:   txt (7.8 Kb)   pdf (76.3 Kb)   docx (11.8 Kb)  
Continue for 4 more pages »
Only available on Essays.club