What were the motivations of the attackers

Assignment Help Basic Computer Science
Reference no: EM133140045

In 2014, Sony Pictures Entertainment had planned to release the movie The Interview, a satire about a plot to assassinate the president of North Korea, Kim Jong-un. In the weeks before the release of the movie, Sony experienced several cyberattacks believed to be the work of hackers from North Korea working for the government. The movie had received low reviews prior to the cyberattacks, but the publicity that surrounded the cyberattacks led to an increased interest in the movie. After the cyberattacks, President Obama, for the first time, publicly attributed the attacks to the North Korean government as an act of retaliation against Sony and raised the issue of foreign obstruction of the First Amendment rights in the United States. It raised the question of whether the government has a responsibility to protect corporate networks and constitutional rights of citizens against attacks by other nation-states.

The hackers, who called themselves Guardians of Peace (GOP), released documents from the Sony computer network over several weeks. These documents included financial documents, health documents of employees, internal emails, and private information about actors. They demanded that Sony halt the release of the movie. The GOP also threatened movie theaters that intended to show the movie with violent attacks.

On December 17, Sony announced that the movie premiere was suspended. Two days later, the FBI announced that North Korea was behind the attack, and on January 2, 2015, President Obama signed an executive order for new sanctions against several North Korean organizations. Obama also criticized Sony for having suspended the release of the movie.

Case Questions

What were the motivations of the attackers? '

What were the impacts of the cyberterrorist attack?

Why do you think President Obama stated that Sony's response to canceling the premier was a mistake?

What steps should be taken so that all businesses and the U.S. government can work together to prevent cyberattacks?

Reference no: EM133140045

Questions Cloud

Implications from three industry trends : ow do you define big data? What are the implications from the three industry trends (Three V's), presented in the textbook, by the Gardner Group?
How practicing your technology skill : You‘re discovering how practicing your technology skill can keep you at the top of your game. On a scale of 1 to 10 (10 being the best)
Research professional health care associations : Research professional health care associations, such as HIMSS and AHIMA, that address ethical standards.
Electronic health records and personal health records : How are Electronic Health Records (EHR) and Personal Health Records (PHR) similar? How are they different? What are the benefits and challenges of each?
What were the motivations of the attackers : What were the impacts of the cyberterrorist attack? What were the motivations of the attackers? '
Development of event-driven program : Other than changes to the planning stage, how is the development of an event-driven program different from that of a procedural program?
Medicare and medicaid services to promote interoperability : What are some new systems in place by the Centers for Medicare and Medicaid Services (CMS) to promote interoperability?
Do certain types of innovation activities : Do certain types of innovation activities make it more likely for large firms to outperform small firms and vice versa?
Operational challenges faced by the startups : Describe and contrast the operational challenges faced by the following startups: (a) consumer Web services startup, (b) iPhone application company,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare two objects for equality

An equals function is used to compare two objects for equality. Is the following hashCode function poorly written? yes or no and why.

  Project management and software development

Conduct a preliminary evaluation of internal IT processes, focusing primarily on project management and software development.

  Prompts the user for a hexadecimal digit

Write a MIPS program that prompts the user for a hexadecimal digit and then displays the decimal equivalent multiplied by 2. For example, the program displays 10 for hex '5', 20 for 'A', etc. If the user enters an invalid value, the program should di..

  What compression ratios are you able to achieve

What compression ratios are you able to achieve? See if you can generate data files for which you can achieve 5:1 or 10:1 compression ratios.

  What will be worst case overhead among the largest address

Design the best page table configuration so that we will have to bear least overhead. What will be the worst case overhead among the largest address?

  Neo-noir film-color play part in film

How does color play a part in the film you watched for this week? Identify at least three places that color stood out in the film.

  How is hardware different from software

what is a Web application? What are some features of a Web 2.0 site and how is hardware different from software?

  Program efficiency dramatically

Which actions when done in an ISR may potentially reduce program efficiency dramatically?

  Expression in a regular expression validator

Describe a situation in which you would use your own regular expression in a regular expression validator.

  What performance measures would you recommend

What performance measures would you recommend that use so that they can monitor progress and performance?

  Find out the organizational behavior

Colin Powell is a retired four star general and was Commander of the United States Army Forces Command.  He also served as Secretary of State under George W. Bush and was his National Security Advisor.  Listen to Powell talk about Leadership in th..

  Difference between customer relationship management

What is the difference between customer relationship management, supplier relationship management, and employee relationship management? Give a specific example of each one.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd