StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Sony Reels from Multiple Hacker Attacks - Case Study Example

Cite this document
Summary
The paper “Sony Reels from Multiple Hacker Attacks” focuses on the attack of several hackers on the network of the PlayStation business of Sony and how these deviant behaviors of the hackers negatively impacted the company. The case focuses on the huge amount of monetary loss…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Sony Reels from Multiple Hacker Attacks
Read Text Preview

Extract of sample "Sony Reels from Multiple Hacker Attacks"

Sony Reels from Multiple Hacker AttacksOverviewThe case titled “Sony Reels from Multiple Hacker Attacks” focuses on the attack of several hackers on the network of the PlayStation business of Sony and how these deviant behaviors of the hackers negatively impacted the company (Haag, 2013). The case focuses on the huge amount of monetary loss that was experienced by Sony and the loss of Goodwill. Other than loss of goodwill and monetary losses, the organization even lost several of its important customers and there is a possibility that the company may even face law suits filed against them.

The case reports that the organization suffered a loss of 10 customers due to this issue. The hackers were involved in the hacking of Sony PlayStation networks which contained private and personal information of their customers. The use of this information is quite beneficial for the hackers as they can use this information to commit further crime by impersonating as one of the clients of Sony. This act of stealing an individual’s private and personal information and then impersonating them is referred to as the criminal act of identity theft (Easttom, 2011).

But there is lack of customers who have reported that their identities have been stolen due to the Sony debacle. This writing will focus on several questions related to the case. The writing focuses on the issue of losses that Sony has already realized and Sony might be facing in the coming years. These losses are both monetary and non-monetary in nature. These losses include the monetary loss of $171 million that Sony expects to lose as a result of the series of hacking activities that have been carried out against them.

These losses even include the loss of market share in the market of online gaming and other online transactions (Conn, 2002). These losses even include the effort and money that Sony will have to invest in order to get back on track. The writing even focuses on Sony Company’s responsibility towards the safeguarding of the information of its prestigious clients and the measures that Sony could have taken in order to protect the customers and the actions it will have to implement in future to save their business from hackers.

Sony could have taken various measures in order to protect its customers these measures includes the hiring of White Hat Hackers who are hackers employed for the purpose of securing computer systems from the vulnerability of hacking (Wilhelm, 2013). The writing further focuses on measures that need to be taken in order to deter professional hackers from indulging in future criminal activities. Various actions can be taken by the criminal justice system in order to deal with the hacker population and one of these solutions is to penalize them severely by sentencing them to jail.

The rating focuses on the activities of the public relations wing of Sony and how they could have been instrumental in saving the image of the company. The public relations section of the company should have initiated their practices right away and should have informed the public about the hacking activity that has been conducted against them (Bahadur, 2012).ReferencesBahadur, G., Inasi, J., Carvalho, A., Powell, J., & Valencia, C. (2012). Securing the clicks. New York: McGraw-Hill.Conn, K. (2002).

The Internet and the law. Alexandria, Va.: Association for Supervision and Curriculum Development.Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, Mass.: Course Technology PTR/Cengage Learning.Haag, S., & Cummings, M. (2013). Management information systems for the information age. New York, NY: McGraw-Hill Irwin.Wilhelm, T., & Neely, M. (2013). Professional penetration testing. Waltham, Mass.: Syngress.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Sony Reels from Multiple Hacker Attacks Case Study”, n.d.)
Sony Reels from Multiple Hacker Attacks Case Study. Retrieved from https://studentshare.org/information-technology/1665025-case-study-essay
(Sony Reels from Multiple Hacker Attacks Case Study)
Sony Reels from Multiple Hacker Attacks Case Study. https://studentshare.org/information-technology/1665025-case-study-essay.
“Sony Reels from Multiple Hacker Attacks Case Study”, n.d. https://studentshare.org/information-technology/1665025-case-study-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Sony Reels from Multiple Hacker Attacks

Detection of Attacks Executed by Multiple Users

Detection of attacks executed by multiple users [Name] [Date] The problem of network attacks detection is of crucial importance nowadays.... hellip; To prevent, foresee and detect mass attacks is one of the primary tasks of the modern programmers.... Online interaction attacks should be prevented and suppressed once they are detected.... These challenges and problems in the computer and the Internet world are intensified by the existence of mass-attacks of users....
3 Pages (750 words) Dissertation

Sony Attacked y Cyber Criminals

Cyber crimes, which are the attacks in companies or government websites, which compromises the data in those websites for personal fulfillment of hackers or profits, have been rising day by day and they have caused huge losses to organizations that have experienced them.... In the recent past attacks have been launched to websites that belong to US, Israel and Uganda governments and in organizations like MasterCard, Visa PayPal and Sony among others.... It will also dwell on the process that the hackers used in order to gain access to the Sony website and how the attack was handled by Sony, in addition the various ways I which to avoid such incidents from happening again will be discussed....
6 Pages (1500 words) Term Paper

Stem Cell Research: What It All Means

It is this process which scientists feel has great potential in providing a future cure for ailments such as multiple Sclerosis and Parkinson's Disease to name a few.... Also the verbal battle it has caused to ensue between entities ranging from a scientific lab to the White House, and going all the way to Rome and the Vatican.... According to the official resource for the National Institute of Health, stem cells and their importance are described as: "Stem cells have two important characteristics that distinguish them from other types of cells....
10 Pages (2500 words) Essay

Multicultural Policies and Social Segregation

hese policies might include the recognition of multiple citizenships.... It receives a lot of support from those countries that are culturally diverse, with a lot of different cultural groups making up the society, as opposed to one cultural group.... The paper "Multicultural Policies and Social Segregation" evaluates multiculturalism through the lens of social segregation since multicultural policies have been accused of segregating the society into different and separate cultural groups, and these acts as a hindrance to social cohesion....
7 Pages (1750 words) Term Paper

How Sony PlayStation Network Was Targeted

A series of attacks on the Sony's online entertainment services on the PSN and Online Entertainment services were carried by the attackers in the same period.... Hackers gained the unauthorized access of customers' data by accessing the sony's PlayStation Network servers.... million sony… On April 19, sony detected strange activity on the network system, and noticed the unauthorized access of the company's servers on next day....
3 Pages (750 words) Essay

Sony Playstation Security Breach

Users were later on required to change their usernames and passwords as an additional way of curbing further attacks.... A series of attacks on Sony's Online Entertainment services and the PSN was later on executed during the same period.... These attacks were carried out on; Sony BMG Greece, Sony BMG Japan, So-Net ISP in Japan, and servers of Sony in Thailand (McMillan, 2011).... This essay "sony Playstation Security Breach" talks about sony's data center in San Diego, CA was hacked into on April 19, 2011....
8 Pages (2000 words) Essay

Computer Attacks and Their Counter Measures

The paper "Computer attacks and Their Counter Measures" describes that to be able to mitigate the issues presented by the hacking of a wireless network, it would be necessary to use all the accessible tools in the router.... Some of these attacks are passive, in that there is the monitoring of the information, while others can be termed as active implying that the data within the system is manipulated with the intent to destroy or corrupt the network or data itself....
6 Pages (1500 words) Essay

"Sony Pictures hacked by Russian blackhats, it now emerges

A company require prevention to defend against attacks on low focus and make the aimed Sony pictures attack The eventual events leading to Sony Pictures attack is a controversial issue that raises a few questions with relation to the security of the data and information available in each firm.... A company require prevention to defend against attacks on low focus and make the aimed attack difficult.... 2015, Sony Pictures hacked by Russian blackhats, it now emerges, Retrieved from http://securityaffairs....
1 Pages (250 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us