Identify the threat sony faced in the 2014 hack

Assignment Help Computer Network Security
Reference no: EM132401116

Sony Pictures Entertainment hack

Introduction

The 2014 cyberattack on Sony Pictures Entertainment (SPE) sent shockwaves through US national securityand foreign policy,US and international media, as well as private enterprises globally. It was the first destructive cyberattack conducted against the US and the first time the US attributed a cyberattack to a foreign government.3 Eventually attributed to North Korea over SPE's planned release of "The Interview," a comedy featuring a plot to assassinate North Korea's leader Kim Jong-un, the SPE attack's political and economic consequences serve as a powerful example of cyberattacks' crippling potential.

The Sony case study provides a foundation for which to base your ongoing project on, however you are encouraged to conduct further research to engage with the nuances of the case and to enforce your reasoning.

By considering SONY case study, answer the following questions:

- Identify the threat Sony faced in the 2014 hack, and explain their motives. Explain whether or not you think the aspects of Sony's sector made it vulnerable to the threat you have identified.

- Offer an explanation of the methods of attack the threat actor employed to breach its cybersecurity, and justify your reasoning.

- Describe a scenario of what method of attack at least one other type of threat actor could use in the future, and why.

- What types of critical systems, networks, and data would you expect constitute Sony's information infrastructure?

- Which of these critical assets do you think are the most essential to the organization's ability to accomplish its mission? Explain why.

- Do you think that the 2014 attack against Sony primarily targeted systems, networks, data, or a combination of all three?

Please note that your answers to the Sony case study will be assessed according to the sound reasoning you have provided for your interpretation of the organization's critical assets.

Reference no: EM132401116

Questions Cloud

Do you think the domestic market is protected : Do you think the domestic market is protected when tariffs are used seeing as the tax a country has to pay can be passed
Producers from the implementation-levy of a tariff : Is there more or less welfare loss to consumers versus producers from the implementation/levy of a tariff?
Define limitations of current system of advance directives : What are the limitations of the current system of Advance Directives? (i.e., why are patients still being subjected to the futility of hospital care even.
NU 560 - Research Methods and Evidence-Based Practice : NU 560 - Research Methods and Evidence-Based Practice Assignment, Homework Help - Herzing University, USA. Introduction to Evidence Practice problem Paper
Identify the threat sony faced in the 2014 hack : Describe a scenario of what method of attack at least one other type of threat actor could use in the future, and why - Sonys information infrastructure
What is the current benchmark for the organization : What is the current benchmark for the organization? What is the numeric score for the underperformance? How might the benchmark underperformance be affecting.
What do you think might be some pitfalls of budgeting : Budgets are developed months before the end of the current year and are best guess estimates of future performance. What do you think might be some pitfalls.
Explain the public health essentials and core functions : Why is having a strong understanding in the public health essentials and public health core functions a critical factor in the implementation of community.
Briefly discuss the agency relationship : Briefly discuss the agency relationship. How does this relationship benefit the agent? The athlete? Based on the agency relationship, discuss the types

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd