StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Hacking of Sony Playstation - Term Paper Example

Cite this document
Summary
This term paper "The Hacking of Sony Playstation" is about a security infringement on PlayStation Network causing a temporary halt of service to users. The clienteles could not download or play any games online. Sony’s video and music streaming feature was affected. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
The Hacking of Sony Playstation
Read Text Preview

Extract of sample "The Hacking of Sony Playstation"

number Executive Summary On April 19, Sony detected a security infringement in its PSN (PlayStation Network)causing a temporary halt of service to users. The clienteles could not download or play any games online. The Sony’s video and music streaming feature was affected. The hackers had revealed a fault within the encryption structure, procuring the public key required to operate whichever software on the machineries. This infringement was significant one, with 78 million customers put at danger of sham activity through credit cards. The personal details that the hackers took if traded on via online black-markets rendered a likely value of ?100 million. The hit upon the Sony PlayStation System was aided by the absence of a unsystematic digit in the set of rules employed by the system security therein. This eventually permitted the clandestine key employed for the fortification of digitized content on the network to be located. Sony made a critical mistake. The safety systems in position inside the Sony correspondingly left a lot to be anticipated. The establishment failed to safeguard the systems via firewalls. Use of web applications that were archaic made Sony sites appealing victims for hacking pursuit. Outmoded Apache versions for the Web server were operational besides no patches had been applied on the PlayStation system. Lack of a firewall operating on the PlayStation system servers could have prompted ease of hackers to break into Sony’s system. The other reason as to why the breach took place was that there existed problems at the board level inside Sony Corporation. There was structural intricacy and a deficiency of ample backing for safekeeping. It is unknown, precisely what safety precautions Sony had in position prior to the infringement. Nonetheless, structural complacency correspondingly played a role during the PlayStation System hits. Security involves more than ample encryption and software; all features of the corporation require engagement; processes, technology and people (ZDNet Website). Introduction Hackers are hitting gaming technologies in addition to the state-of-the-art mobile technologies to implant viruses and embezzle personal information. Nevertheless, traditional computer websites and networks are typically so well secured such that even the best advanced hacker habitually has to devote hours attempting to get a pathway in past the safety measures. A greatly easier victim is the comparatively latest technologies for instance; gaming devices for example, the Sony PlayStation, tablet PCs, and mobile phones. These machineries do not possess identical level of defense as the ordinary PC networks applying protected networks and firewalls. Sony necessitates little overview as one of the globe leading digital showbiz brands, along with a huge collection of hypermedia content. A significant emphasis for Sony is its division of gaming, Sony Computer Showbiz, a key video game establishment focusing in a multiplicity of parts in the industry of video game. The PSN (PlayStation Network) is a wired multiplayer gaming digital channel delivery service and to utilize the service, customers must create accounts. The recent concerns with the PlayStation System, in which thousands of accounts were broken into, is an indication that hackers are attempting, and succeeding in hacking and stealing personal information from hundreds of paying clients. The security was so lapse such that the single way Sony could avoid the glitch from reoccurring eventually was to shut down the gaming system for a number of weeks. As indicated on June 6, 2011 by New York Times, Sony would possibly take ages to repair their safety issues for the servers, website and database in the Sony substructure. In contrast to Microsoft, a corporation, which has had ages in the manner of improving safety, Sony is very overdue concerning safety of their fundamental services. Analysis Sony was taken on in several of areas, together with their website, gaming and network platform. The hackers had resolved that Sony due to the type of its lapse safety, and certainly they appealed that the purpose was to ascertain that Sony’s structures were definitely breakable. They circulated names, personal information and customer account particulars of persons entering competitions stipulated by Sony.A number of security glitches were pinpointed simply by keying specific searches within Google. The investigation taken on by Bumgarner John of the US-CCU (Unites States Cyber-Consequences Unit), a self-governing research foundation, spotted numerous ambiguities in several pages in Sony websites that could broke into. Sony’s Java security support was simply accessible on numerous website pages. This provided admittance to fundamental utilities of the website together with information. Normally this is inaccessible on a protected website server. An additional aspect was the easy accessibility Sony’s identity management structure that is indexed by Google. The evidence gathered from these gaps could be utilized to enter databases, servers and other high significant security resources. It appears that in Sony’s case the hackers could effectively gain access to whichever technology they desired inside the Sony system. It is indicated that the defense levels and system of a corporation like Sony, encompassing a number of million accounts ought to (ideally) be equivalent to an establishment like the Homeland Security websites and servers this according to ZDNet Website. Precisely, the list of concerns encompassed the following: a) Ease of accessibility to Sony’s management console. b) Sony’s network spots for example, Sony Electronics, Sony Corporation of America, Sony Pictures and dated websites like Sony Santa together with personal details were all within reach. c) Worker information was obtainable through an entree point within the identity management structure. d) The Information that was accessible on information technology managers that could be utilized to unveil phishing hits on the websites and servers. e) Concealed files could be logged on that contained elements like links to password-secured applications. f) Servers that contained information concerning Sony clients linking their details to Facebook were also accessible. 1) The Riverbed Technology managing security appliance bore a user-id already taken over, reachable to anyone via any of the servers within Sony’s system. Sony’s immediate response The reaction from Sony to the PlayStation System hit was remote from standard. It took up to 26th April, a week later, for the corporation to acknowledge that personal detail had in actual fact been taken and the likelihood that credit card details had been stolen too. It took up to the eleventh day for Sony managers to make an apology with Sony’s CEO Howard Stringer remaining silent throughout this time. The absence of transparency, clear communication and way forward to their clienteles following the security infringement was tremendously poor. On 6th May Stringer finally apologized. The corporation offered to provide free credit to their PlayStation network clienteles for a year while observing for ID theft. The corporation applied new safety measures. Sony conferred with security specialists to set up security to fortify the defenses to sojourn unapproved activity and safeguard the personal details of their clienteles. The new defense systems set up encompassed software checking, penetration and susceptibility testing. Augmented firewalls and encryption were also set up. Symantec functioned with Sony to advance this safekeeping and reposition the system to another information center. The company also recognized the need for improved management. Importance of breach analysis Sony's seeming trouble in reckoning the degree of the harm from the invasion into its PlayStation System, while infuriating persons affected by it, is therefore not too astonishing, provided the bag of quirks that hackers utilize to obscure their tracks. Altogether too often, businesses do not possess the forensic apparatuses or ample log information to be adept to piece together what could have ensued and to define the true latitude of a breach. At times, companies take weeks or even months to obtain a precise picture, and even more so longer for an infringed body to entirely clean off its networks. Sony had presented no purpose why it delayed for more than six days to notify clients that their account details such as the name, birth date, address, online ID, purchase history and perhaps credit card information, had been compromised. Sony management said zilch regarding why it took so long to reinstate the system. In all, a confounding 77 million client records, counting those of numerous minors, were supposedly exposed, rendering it one of the biggest data infringements ever. It is likely that public relations reservations, a ruling enforcement appeal or both provoked Sony’s earlier silence as stated by New York Times article “Security Problems”. It is correspondingly conceivable that the corporation did not possess the data it required to establish the true latitude of the glitch, security analysts and IT managers said. This is because habitually the security gears that corporations deploy are focused toward preventing and discouraging data breaches. Most corporations have not concentrated on tools that would generate a grand record if they are hacked or infringed. While corporations possibly investigate log information in their firewalls and extra security tools, it is very hard to form a trail with no more data. Many corporations keep and supervise logs from defense tools [for instance] antivirus, firewall, and intrusion detection. Nevertheless, they neglect to build and gather application logs, especially from convention applications, with the same consistency. Convention applications, essentially Web applications, are a massive target for malevolent attackers. However, because corporations do not frequently collect and preserve these logs, numerous infringements are not spotted and the harm cannot be enumerated. An additional problem, chiefly in large corporations, is that outmoded log data regularly is overwritten with new logs and by the time, an invasion is detected it is too late to do anything about it according to ZDNet website. However, it is comparatively economical for corporations to store numerous years' worth of unrefined log data if they need to, yet many do not. Consequently, log data that could have exposed critical data linked to an infringement could be overwritten by new data upon a period of an instance. If the company is lucky, it can reach to a spot where it discovers some portion of data that it might use to place the puzzle together, and occasionally it is hard to find it. Besides log data, corporations similarly need to develop the right host- and system-based forensic gears to be adept in sifting through and relate log in data to work out what could have happened. Sony Implications It seems that Sony's safety infrastructure, blended with a hacking unit's aim on displaying how adept they are of infringing into networks, is a formula for catastrophe. Certainly, there is no server that is resistant to attack, nevertheless, for so several holes to emerge in a defense system encompassing zillions of subscribers ought to imply grave consequences. Sony will should examine and fix their safety systems beginning from the base up, and for each server, database and website, they hold in their corporation. It is a huge responsibility however; it is an experience learnt the challenging way not solely for Sony as well as for other corporations who hold the same type of lapse security in position according to ZDNet website. The hardest task for Sony was convincing clienteles their details were now secure from hits. In an attempt to remedy the condition and stipulate a more tough structure, Sony employed the utilization of several third-party safety and security establishments along with conferring with with the Federal Bureau of Investigation to avert further incidences of these types of infringement attacks. The hacking hits were receded up by hundreds of dollars in contributions to maintain their hits on Sony and its initiatives. It is possible that opposing establishments were in upon the act. Conversely, that does appear improbable, since it would be a grave violation of competition law. Sony is overdue in applying modern safety devices in their IT substructure in the concluding exploration. It will doubtless take Sony ages to repair the situation. Conversely, what might take much longer is attaining the faith of paying clienteles again according to Image credit: ZDNet website. Lessons Learnt The world and in particular companies have been taught to protect their data and Sony’s breakings are a proof to this. The market is drenched with diverse techniques of attacks resulting to noteworthy exploits, which have had an extensive impact. Around the last few years, the world has witnessed several data infringements from Anonymous and LulSec, and additionally the world has witnessed some chief global establishments experience colossal data-loss instances, like Citigroup and Sony this according to Imagecredit: ZDNet website.  Sony PlayStation System infringement conveys a flawless tornado of laidback safety measures, outmoded and indiscreet software and, solely indicated, just not focusing on the warning signs. It is imperative that companies absorb from the general problem that endorsed it to occur. Security Innovation had examined the Sony PlayStation 3 console, not many years ago, and it was apparent that the inventors' expertise reclined with embedded structures, not with structures intended for the internet. Performance application was outstanding, yet the safety behindhand was not essentially equal to the similar standards. The Sony PlayStation System had moved from a sealed, entrenched structures provider to an internet and web amenities content provider. The fundamental error in this tactic is that once it made the transfer, the crew was not appropriately informed on the variances between creating applications for a sealed system and generating platforms for an online structure. Sony servers operated on outmoded software forms with recognized susceptibilities, comprising a service to encode information communication, nevertheless one that permits unauthorized entry. The hackers recognized that Sony was operating software, which was laden with susceptibilities. Adding to the setback was the lack of detecting how the hit had stretched, and into what modes the gaming appliances were exposed this is according to Huffington website. If corporations do not possess this information, they cannot initiate to lessen threats and avert occurrences. The gating feature in this appraisal is that Sony needed to contemplate a dissimilar security prototype to support the move from an entrenched to a web-built business prototype. Recommendations It is a normal response to want to enhance more safety following an ill-use or an infringement. It is a responsive measurement, which is intended to fulfill some instant needs. Nevertheless, stoppage is not stemmed from fixing a fresh firewall to defend an old-fashioned server. Corporations must prod deeper into the challenge and comprehend that in the software appliance level is place the information is most susceptible, as the Sony infringement clearly demonstrates. Here are several best procedures that all establishments need to ponder: Educate all technical workforces on the codes, both advanced and fundamental, on protected software application creation, on a continuing basis. Apply operative systems of assessment – recognizing breaches within software development lifespan, comprehend where susceptibilities exist and engage the accurate remediation. Have the appropriate mix of persons, technology and process. Once more, it is not indispensable to have each safety solution on the world, but personnel need to stick to to best practices within their defined functions Certify that all designers have certain sort of reference handbook where they are able to leverage information, which will aid them ultimately to write safe code. By all approximations, many people expected the Sony infringement to cost the corporation more than $1.6 billion. The typical cost per information lost, conferring to a current Ponemon survey, was $215 per record, a $78 increase from $137 per information in 2005. Sony essentially escaped with a minor impact than predicted, bearing in mind that their PSN infringement cost them only $171 million this was according to eWeek mobile post. That is to say, if the utmost recent statistics are accurate.Sony is utmost probably more apprehensive on how these infringements will influence its repute as well as its general business that is precisely why safety ought to be top of attention for every company whose returns is grounded on web based business. The IT security workforce within an establishment must be observed beginning at the top-down as a return retaining group must be reinforced in their endeavors. The figure below shows the number of records lost and the cost that Sony incurred by 2011 Number of records lost in 2011 Cost of Infringement/ Record In USD Total cost of Infringement in USD 795,349 215 171,000,000 References eWeek, Sony PlayStation Network Returns to Service, Security Problems Remain: http://mobile.eweek.com/c/a/Security/Sony-PlayStation-Network-Returns-to-Service-Security-Problems-Remain-653147/ Huffington Post: LulzSec Hackers Claim ANOTHER Sony Hack, Post Alleged Source Code Online, http://www.huffingtonpost.com/2011/06/06/lulzsec-hackers-sony-bmg-network-maps_n_872187.html ZDNet: LulzSec hackers hit more Sony sites and leak data, http://www.zdnet.co.uk/news/security-threats/2011/06/07/lulzsec-hackers-hit-more-sony-sites-and-leak-data-40093008/ New York Times: Sony’s Security Problems Could Take Years to Fix, http://bits.blogs.nytimes.com/2011/06/06/sonys-security-problems-could-take-years-to-fix/ Image Credit: ZDNet, http://www.zdnet.co.uk/news/security-threats/2011/06/07/lulzsec-hackers-hit-more-sony-sites-and-leak-data-40093008/ Works Cited Bowden, Mark. (1999). Black Hawk Down:  A Story of Modern War.  Atlantic Monthly Press Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Topic is a case study of the hacking of Sony Playstation that occurred Term Paper”, n.d.)
Topic is a case study of the hacking of Sony Playstation that occurred Term Paper. Retrieved from https://studentshare.org/e-commerce/1402369-topic-is-a-case-study-of-the-hacking-of-sony
(Topic Is a Case Study of the Hacking of Sony Playstation That Occurred Term Paper)
Topic Is a Case Study of the Hacking of Sony Playstation That Occurred Term Paper. https://studentshare.org/e-commerce/1402369-topic-is-a-case-study-of-the-hacking-of-sony.
“Topic Is a Case Study of the Hacking of Sony Playstation That Occurred Term Paper”, n.d. https://studentshare.org/e-commerce/1402369-topic-is-a-case-study-of-the-hacking-of-sony.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Hacking of Sony Playstation

Creating Added Value for the Customer

PlayStation 2 is the part of sony playstation series and is a sixth generation video game console launched in the year 2000.... PlayStation 2 is the part of sony playstation series and is a sixth generation video game console launched in the year 2000.... Competition Data/Info sony playstation has two direct competitors- Nintendo and Microsoft.... Your Brand Info/Data Sony Computer Entertainment America (SCEA) was founded in the year 1994 as a division of sony Computer Entertainment Inc....
11 Pages (2750 words) Essay

Sony PlayStation Data Breach

The aim of this essay "sony playstation Data Breach" is to examine the corporate management framework at Sony in relation to its marketing strategy.... This laxity on the part of sony cost the company millions in terms of business and information.... The recent breach into Sony's playstation data vault left many top notch companies surprised and intimidated.... It was only in retrospect that sony decided to create the post of Chief Information Security Officer....
1 Pages (250 words) Essay

Marketing Communications in Sony PS3 Review

This case study "Marketing Communications in Sony PS3 Review" is about a product overview of the playstation 3 trademarked playstation®3 but more commonly known as PS3 is the third video game console of the playstation brand from Sony Computer Entertainment....
13 Pages (3250 words) Case Study

Sony versus Hotz court case and decision

The PlayStation 3 is one of sony's key products.... The PlayStation 3 is one of sony's key products.... her hand, is a hacker of American descent, famous for the unlocking of the iPhone and the playstation 3, contrary to the manufacturers intent (Grazzini, 2011). ... eorge Hotz announced his plans to hack Sony's playstation 3.... George Francis Hotz, on the other hand, is a hacker of American descent, famous for the unlocking of the iPhone and the playstation 3, contrary to the manufacturers intent (Grazzini, 2011)....
1 Pages (250 words) Article

Computer Crimes -Sonys PlayStation Network

Considering the adverse effects of hacking on online-based businesses, this paper will zero in on discussing the hacking of sony's PSN.... This study "Computer Crimes -Sony's PlayStation Network" discusses how Sony Corporation handled the hacking issue including identifying the breach, system downtime, compensation to the users, action taken against the hacker.... One of the historical computer crimes targeted Sony's playstation Network.... playstation Network (PSN) is an internet-based multiplayer gaming console provided by Sony Corporation....
1 Pages (250 words) Case Study

How Sony PlayStation Network Was Targeted

Sony had to do the page down as temporarily because attackers exploited the URL of sony's website (The Sydney Morning Herald, 2011).... Other victims of attackers concerning the Sony were as the “Sony BMG Greece”, “Sony BMG Japan”, “So-Net ISP in Japan, and servers of sony in Thailand.... Hackers gained the unauthorized access of customers' data by accessing the Sony's playstation Network servers.... million sony.... On April 19, sony detected strange activity on the network system, and noticed the unauthorized access of the company's servers on next day....
3 Pages (750 words) Essay

Sony Playstation Security Breach

This essay "sony playstation Security Breach" talks about Sony's data center in San Diego, CA was hacked into on April 19, 2011.... Since the attackers had exploited Sony's website via its URL, they were thus forced to disable the page temporarily because attackers exploited the URL of sony's website (The Sydney Morning Herald, 2011).... These attacks were carried out on; Sony BMG Greece, Sony BMG Japan, So-Net ISP in Japan, and servers of sony in Thailand (McMillan, 2011)....
8 Pages (2000 words) Essay

Sony Reels from Multiple Hacker Attacks

The hackers were involved in The Hacking of Sony Playstation networks which contained private and personal information of their customers.... The hackers were involved in The Hacking of Sony Playstation networks which contained private and personal information of their customers.... The paper 'Sony Reels from Multiple Hacker Attacks' focuses on the attack of several hackers on the network of the PlayStation business of sony and how these deviant behaviors of the hackers negatively impacted the company....
2 Pages (500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us