StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Sony: The World's largest Data Breach - Case Study Example

Cite this document
Summary
The paper throws light on the Sony security breach on its online video game network as one of the cases, where companies fail to maintain the required security against such hacking threats, breaching client’s security as happened in one of the largest security breaches involving Sony Corp. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Sony: The Worlds largest Data Breach
Read Text Preview

Extract of sample "Sony: The World's largest Data Breach"

Sony: The World’s largest Data Breach? The internet has become vulnerable due to presence of many hackers ready to pounce on anycontrol and security breach in systems, to make a fortune. Though the internet is a strange world that has not been perfectly maneuvered, firms have tried to incorporate different security systems though sophisticated hackers still get access to such systems. However, in some cases, lack of proper security mechanism and controls are to blame for such hacking of sites. The Sony security breach on its online video game network may be considered as one of the cases, where companies fail to maintain the required security against such hacking threats, breaching client’s security as happened in one of the largest security breaches involving Sony Corp. 1. One of the possible security weaknesses and control measures as Sony affirmed was negligence in security details when developing the software that supports and runs such a network. According to Laudon and Laudon (229) the use of fixed internet devices that have permanent connections to internet eases identification by hackers. Therefore, though Sony Company understood this, they could have compromised security of the software as they hurriedly moved to design new products to ensure market leadership. Such blunders could have exposed codes with errors making it vulnerable to hackers. Moreover hackers could have accessed the network through an administrator’s PC, who possesses the rights to access sensitive and classified information regarding Sony and its customers. Hackers were also suspected to have created false alerts using credit card through about three credit card bureaus in the U.S, which the company recommended for further investigation. The company also could be in a case where current or previous workers could have been involved in the security breach as they understood the company’s system and codes; they were better placed to have configured the entire system resulting in such a massive security breach. Sony had numerous exploitable weaknesses which made the attackers to have an easy access to such a large number of accounts. The company lacked in intrusion and firewall system measures, which offer in depth security against such threats. 2. As Verizon (2) explains, where data leaves the organization, the company has no oversight over the data making it hard to control data threats. Therefore, people could have been involved in that there were business relationships with third parties with whom data was shared. Man error could have led such data to be lost or was deliberately manipulated through a fraudulent activity. Technology could have resulted in installation errors, programming errors, or an individual making unauthorized changes, which compromised such security (Laudon and Laudon 229). The fact that such games are permanently hooked to the internet as explained means hackers would have an easier time targeting them. The organization in its haste to develop new technologies as fast as possible, or improve the existing ones as well as in mass production was ignorant in ensuring quality control through strict auditing of all security system to avoid such security breaches. The security breach could also have been from one of the employees with access to such classified information who negligently used an open mail with no security encryption, or deliberately comprised the security of the system by leaving their stations unattended and open, where a third party could have taken the opportunity to leak valuable information for a considerable benefit. Since the breach was conducted by an external threat in the name of “anonymous” (Rashid, 1), this confirmed the proposition that the internet is extensively wide, and extensive advancement in hackers implies no security measure is perfect enough to prevent such breaches; though the company has to ensure the necessary maximum security conditions are met. 3. The security breach had costly implications to Sony as a company and to its customers at large. The fact that more than 101 million user accounts were stolen implies that personal information of all the users were accessed (Rashid, 1). Baker and Finkle (2011) explain though it is not clear how the hackers would use the information of customers. There were genuine concerns that such information may lead to vulnerability of the customers to further losses in credit cards, and unfair use of the information in impersonation. Moreover, most under age children had registered with their parent’s names; this information puts such people at grate risks though it might not be clear how they would use such information. On the other hand, the company suffered heavy losses due to this security breach. Sony generated more than $500 million in annual revenues from this service (Baker and Finkle, 2011). This implies that the hackers could have raked in considerable amount of cash from the company as the breach had gone unreported for number of days (about three days). However, the company was not concerned with the money lost, but with compromised information to their customers. Moreover, the service users were switched off and could not play for about seven days, which was unfair and a negative corporate image to Sony. The company also damaged its corporate image for not reporting the breach to authorities, and to its customers for several days, which was criticized. Hackers could have used such confidential information to the determination of the users. 4. One way that such system security could be insured against any hacking is advanced encryption standards (Baker and Finkle, 2011). The company may implement data encryption that exceeds the available market standards to ensure their systems are secured. The company has also to tighten its internal security measures by ensuring those responsible for handling confidential information of such customers observe the highest ethics possible, and ensuring to be persons of credible standing with enough security mechanism implement in the working stations to prevent any third party for accessing. As the company acknowledged, there could have been errors in installing system, its design or negligence of workers making the codes available to hackers. Though the company has to rush in producing more technologically advanced products, there has to be quality controls to ensure that already produced services and products meet the highest standards of security and have been properly coded and encrypted. Laudon and Laudon (232) observe that some networks such as WI- Fi networks may be intercepted easily by use of sniffer programs that obtain the addresses to access resources of a certain network without authorization. The company has to take appropriate measures to ensure such spying programs do not penetrate their systems. All data breaches are initiated with an event later resulting to data loss. Entities causing such incidences are known as threat agents. Actions of such hackers are in most cases malicious, intentional and are carried out for a variety of motives. The fact that the internet is too wide, and the sophistication hackers have makes it difficult to prevent such security breaches, with more and more companies falling prey to such threats. In order to insure against such threats, there is need for utmost care and diligence in software and system developments and installations, as well as observing the highest level of security standards to protect the company and customers to cases similar to Sony security breach, where millions of accounts were hacked making millions of people vulnerable as their confidential information was obtained. Work Cited Baker B. Liana and Finkle Jim. Sony PlayStation Suffers Massive Data breach, The Reuters, 26th April. 2011. http://www.reuters.com/article/2011/04/26/us-sony-stoldendata idUSTRE73P6WB20110426 Accessed 8th Dec. 2012. Laudon, Kenneth and Laudon Jane. Essential of Management Information Systems 10 Edition Book, London: Prentice Hall, 2012  Rashid, F., IT Security & Network Security News & Reviews: 10 Biggest data breaches of 2011 so far May 25, 2011 http://www.eweek.com/c/a/Security/10- Biggest-Data-Breaches-of-2011-So Far-175567/ Accessed 8th Dec. 2012. Verizon. 2012 Data breach Investigations Report Data Breach Investigations Report. 2012 Retrieved from http://www.verizonbusiness.com/resources/reports/rp_data-breachinvestigations report-2012_en_xg.pdf. Accessed 8th Dec. 2012. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Sony: The World's largest Data Breach Case Study”, n.d.)
Retrieved de https://studentshare.org/information-technology/1464335-sony-the-worldyies-largest-data-breach
(Sony: The World'S Largest Data Breach Case Study)
https://studentshare.org/information-technology/1464335-sony-the-worldyies-largest-data-breach.
“Sony: The World'S Largest Data Breach Case Study”, n.d. https://studentshare.org/information-technology/1464335-sony-the-worldyies-largest-data-breach.
  • Cited: 0 times

CHECK THESE SAMPLES OF Sony: The World's largest Data Breach

Samsung as One of the World's Most Popular Consumer Electronics Companies

According to the Financial times, Samsung Group was the world's largest technological company in terms of revenue between 2009 and 2012 (Jung-a and Oliver, 2012).... This means that it is one of the world's largest and most lucrative sectors of business.... Business Analysis of Samsung Electronics Name of Course Your Name Your University Introduction Samsung is one of the world's most popular consumer electronics companies....
17 Pages (4250 words) Research Paper

Apple as the Largest Technology Company

HOW HAVE APPLE'S MARKETING ACTIVITIES ALLOWED IT TO BECOME the world's largest TECHNOLOGY COMPANY?... 30 Technological Environment ………………………………… 31 Green Environment ………………………………………… 31 Marketing-mix analysis of Apple Inc ……………………………… 33 Technology and Innovation of Apple Inc ………………………… 33 Ratio Analysis of Apple's financial data…………………………....
39 Pages (9750 words) Dissertation

Sustainable Supply Chains

Sustainability is defined as the ability to survive or sustain.... Sustainable or green supply chain management can be roughly defined as the management of all activities right from the purchase from suppliers to taking back the disposed product from the customers with a special focus on improving the social and environmental impacts of those activities (New Zealand Council for Sustainable Development)....
4 Pages (1000 words) Research Paper

Sony Integrated Marketing Communications

sony is one of the electronic brands which have been known by people all around the world.... hellip; sony based in US is one of the right arms of sony in Japan. The sony Corporation had its foundations laid down in year of 1946.... sony is known all around the world for the best quality of audiovisual brand of the electronics, which have gained popularity all around the world in a great manner (Viagas, 2006, p....
11 Pages (2750 words) Case Study

What Drives Chinese to Buy Luxury Goods in the 21st Century

Chinese mainland consumers are shopping at Hong Kong, London and Paris and becoming more brand conscious, becoming shrewder in their… According to (Vickers & Renand, 2003), China is amongst the top three largest markets especially for luxury goods within the global economy....
11 Pages (2750 words) Essay

Entrepreneurship in the Global Environment

Ratan highly participated in the creation of Tata Nano, the world's least costly passenger car.... Their ideas on socio-economic and political causes extend across a wide realm of the society.... Ratan Tata is a son of the long deceased Nobel Tata.... A distant relative,… Tata's parents, Sonoo and Naval separated when the later entrepreneur was 10 years old and the brother was seven years old....
12 Pages (3000 words) Assignment

Information Systems Portfolio Project - ExxonMobil

Being the largest publicly trading international gas and oil company, it utilizes innovation and technology to meet the world's ever-growing demand for energy.... Producing 3% and 2% of the world's oil and energy respectively, ExxonMobil like other oil companies are struggling to find new sources of oil....
11 Pages (2750 words) Case Study

Is China Buying the World

One is the high-income countries highly enriched which is the host of the world's largest multinational firms versus fast-developing China.... This is the largest step taken by chi9na to secure and ensure China in the matter of oil.... This essay explores China's economy, that is becoming one of the strongest economies of the world....
7 Pages (1750 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us