Free Essay

External Intrusion of the Playstation Network

In:

Submitted By cocop1
Words 794
Pages 4
External Intrusion of the PlayStation Network
Lecola Pierce
Strayer University
Professor Curtis Bunch
Feb 6, 2015
External Intrusion of the PlayStation Network
Sony has had recently troubles with hackers intruding into their system and threating all Sony users with the capability of stealing all users’ information, but there was a case on April 20, 2011 that had all Sony employees in shock. One of Sony’s bestselling products, the PlayStation, was taken offline after their company discovered there was an intrusion in the PlayStation Network. For those who are not familiar with the PlayStation Network this is where most of the PlayStation business is done. In the PlayStation Network customers are all registered into this network and most have sensitive information uploaded onto the network including payment information. Hacking this interface would allow access to all users’ personal information which is considered to be a serious problem since one out of four homes either have a PlayStation 3 or PlayStation 4, which all must be registered onto the system before activation. The hackers were able to gain access to three separate gaming systems including PlayStation, Oriocity, and Sony online gaming. Before Sony was able to shut down their systems approximately over a million credit card numbers were reported stolen.
It’s not certain exactly when the hackers gained access to the Sony Network but Sony first announced the system had been hacked on April 22, saying an external intrusion had taken place on its systems between April 17 and 19 (Pepitone, 2011). Sony didn’t officially shut down their systems until April 20, two days before they officially reported the news to the media. It wasn’t until April 27 when Sony reported that the hackers actually gained access to personal information that was on the Sony network including credit card information of several of the users. This eventually put 77 million customers who used Sony at risk of their personal information being stolen, since Sony didn’t have any idea of how much information the hackers actually gained. On May 2, Sony discovered another one of their systems had been hacked which couldn’t come off as good news to the corporation who were already trying to recover from the first attack. Sony Online Entertainment took its Web services offline after revealing that hackers also gained access to its databases of subscriber information (Quinn & Arthur, 2011). It seemed as if every network had been hacked of Sony which only left them to shut down all systems until the intrusion could be further investigated and dealt with. Once this was discovered it was reported approximately 25 million accounts may have been stolen, but they did offer a sigh of relief for few since only personal information was taken not financial details. The hackers were only able to obtain the financial information from an international outdated database.
Sony discussed with the public the reason of delay for releasing the information on the systems being hacked. One Sony official stated there was a delay in the announcement to better gather information and perform an investigation of what actually happened before spreading fear to the customers of the possibilities. Another official stated that Sony wanted to try to find the source of the intruders before given information to the public due to fear of the hackers finding out that Sony was aware of the activities that were going on. When Sony realized their system was under attack they should have investigated possible vulnerabilities of the system to figure out exactly how the hackers could have intruded the system before shutting the whole network down. They also could have took the risk of setting a trap for the hackers in order to attempt to back track the source of the intrusion to attempt to catch the people who were responsible for the attack. I believe the Sony forensics teams could have provided a quicker analysis of the situation and the damage control but I believe they felt it was an inside job. This is the only thing that would explain for all of their systems to be hacked at the same. I feel as if they felt the same way which explains why it took so long for them to release to the public that the systems were hacked. If a system is hacked the corporation is to notify everyone that is potentially involved 24 hours of the discovered attack. References

Pepitone, J. (2011, May 10). Massive hack blows crater in Sony brand. Retrieved February 4, 2015, from CNN Money: http://money.cnn.com/2011/05/10/technology/sony_hack_fallout/
Quinn, B., & Arthur, C. (2011, April 26). PlayStation Network hackers access data of 77 million users. Retrieved February 4, 2015, from The Guardian: http://www.theguardian.com/technology/2011/apr/26/playstation-network-hackers-data

Similar Documents

Premium Essay

Cis 417 Week 5 Case Study 2

...com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered. 2. Indicate what explanation Sony officials gave for the length of time that had passed from the start of the attack to when the general public was made aware of the details. 3. Analyze and explain what you believe the correct forensic investigative action would have been once the attack was uncovered. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 WK 5 Case Study 2 – External Intrusion of the PlayStation Network in order to ace their studies. CIS 417 WEEK 5 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources. Write a two to...

Words: 580 - Pages: 3

Premium Essay

Cis 417 Complete Class All Assignments and Case Studies

...SUPPORT@ACTIVITYMODE.COM CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES CIS 417 WK 2 Assignment 1 - Computer Forensic Overview, CIS 417 WK 3 Case Study 1 - BTK, CIS 417 WK 4 Assignment 2 - Forensic Lab Design, CIS 417 WK 5 Case Study 2 - External Intrusion of the PlayStation Network, CIS 417 WK 6 Assignment 3 - Securing the Scene, CIS 417 WK 7 Case Study 3 - Casey Anthony Trial, CIS 417 WK 8 Assignment 4 - Data-Hiding Techniques, CIS 417 WK 10 Term Paper - Investigating Data Theft, Click Here to Buy this; http://www.activitymode.com/product/cis-417-complete-class-all-assignments-and-case-studies Activity modeaims to provide quality study notes and tutorials to the students of CIS 417 Complete Class all assignment in order to ace their studies. CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES To purchase this, Click here http://www.activitymode.com/product/cis-417-complete-class-all-assignments-and-case-studies/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES CIS 417 WK 2 Assignment 1 - Computer Forensic Overview, CIS 417 WK 3 Case Study 1 - BTK, CIS 417 WK 4 Assignment 2 - Forensic Lab Design, CIS 417 WK 5 Case Study 2 - External Intrusion of the PlayStation Network, CIS 417 WK 6 Assignment 3 - Securing the Scene, CIS 417 WK 7 Case Study 3 - Casey Anthony Trial, CIS 417 WK 8 Assignment 4 - Data-Hiding Techniques, CIS 417 WK 10 Term Paper - Investigating Data Theft, Click Here to Buy this; http://www...

Words: 490 - Pages: 2

Premium Essay

Playstation Network

.......................................................4 Features…………………………………………….....................................................................5 The Dashboard……….…………………………………………………....................................6 How it works……………………………………………………………………….………….6-7 Online Gaming……………………………………………………………………..……………7 The PlayStation Store………………………………………………………………….……...7-8 Sony is Hacked…………………………………………..……………………….……………8-9 The Return of PSN……………………………………..………….…………………...……9-10 Conclusion……………………………………………………………………………….……...10 Bibliography…………………………………………………………………………..…..…11-12 Executive Summary The PlayStation is the foundation of the PlayStation Network. So, this process basically started its reality transition in 1994. The PlayStation Network operates similarly to the definition of what database communications is. There are many features that make the gaming console itself, as well as the network, attractive. Sony collaborates with many other companies to make this product more versatile. The dashboard is similar to the Xbox Live’s in a sense that if gives the user total control but in its own unique way. The way the PlayStation Network actually works is not complicated. It is in fact very similar to a computer. The...

Words: 2191 - Pages: 9

Free Essay

Paul

...COMPUTER CRIMES A Case Study submitted in partial fulfilment of the requirements for the completion of the course in CIS401M: IT ETHICS AND LEADERSHIP Term 3, Academic Year 2014-2015 by LORETO V. SIBAYAN PAUL MATTHEW G. AVILA Master of Science in Information Technology College of Computer Studies April 2014 TABLE OF CONTENTS ABSTRACT 5 CHAPTER 1 1.0 INTRODUCTION 6 CHAPTER 2 2.0 OVERVIEW OF LITERATURE 8 2.1 CYBERCRIME 9 2.2 THEORIES OF CRIME 2.2.1 CRIMINOLOGICAL THEORIES 10 2.2.2 PSYCHOLOGICAL THEORIES 12 2.3 TYPES OF CRIME 14 2.3 CAUSES CYBERCRIME 19 2.4 CYBERCRIME PREVENTION 22 CHAPTER 3 3.0 ANALYSIS CYBERCRIME CASES 26 SUMMARY OF CYBERCRIME CASES 38 CONCLUSION AND RECOMMENDATION 43 REFERENCES 44 ABSTRACT The 21st century has brought about certain influences in the lives of everyone including the way we do business transactions, the way we gain education and the way we communicate; these influences are mostly revolutionized through the use of modern day technology and though these technologies have been proven to be beneficial to the entire society, it also carries with it aspects that can be worrying for everyone. Certain professionals in the said field use their expertise to illegally develop ways on how to take advantage of others with of course the use of technology hence cybercrime...

Words: 7997 - Pages: 32

Premium Essay

The Importance Of Computer Security

...Executive Summary Computers and networks are involved in virtually all activities today. They are used to communicate, to create intellectual property, to store data, to perform business transactions and much more. Networks afford users the opportunity to continuously use computers through wireless connectivity across many different platforms. Any computer connected to a network can be used for many purposes. Just because a computer is located in the workplace does not mean that the computer is used only for work. The pervasive nature of computers and networks means that they are increasingly connected to incidents and crimes, which can be accidental and/or malicious (Mandia et al, 2003). Fig 1. (Schneiderman, 2014) http://www.net-security.org/secworld.php?id=17119...

Words: 1729 - Pages: 7

Premium Essay

Cyber Security

...2011 Ethical Hacking & Penetration Testing ACC 626: IT Research Paper Emily Chow 20241123 July 1, 2011 I. Introduction Due to the increasing vulnerability to hacking in today’s changing security environment, the protection of an organization’s information security system has become a business imperative . With the access to the Internet by anyone, anywhere and anytime, the Internet’s “ubiquitous presence and global accessibility” can become an organization’s weakness because its security controls can become more easily compromised by internal and external threats. Hence, the purpose of the research paper is to strengthen the awareness of ethical hacking in the Chartered Accountants (CA) profession, also known as penetration testing, by evaluating the effectiveness and efficiency of the information security system. 2 1 II. What is Ethical Hacking/Penetration Testing? Ethical hacking and penetration testing is a preventative measure which consists of a chain of legitimate tools that identify and exploit a company’s security weaknesses . It uses the same or similar techniques of malicious hackers to attack key vulnerabilities in the company’s security system, which then can be mitigated and closed. In other words, penetration testing can be described as not “tapping the door” , but “breaking through the door” . These tests reveal how easy an organization’s security controls can be penetrated, and to obtain access to its confidential and sensitive information asset by hackers...

Words: 11999 - Pages: 48

Premium Essay

Network Security and Ethical Hacking

...Network Security & Ethical Hacking ------------------------------------------------- ------------------------------------------------- Neal Patrick and his friends did not realise they were doing anything unethical, in fact: when asked by Congress “At what point he questioned the ethics of his actions” – he answered “Once the FBI knocked upon my door.” “I have found that inadequate network security is usually caused by a failure to implement security policies and make use of the security tools that are readily available. It’s vital that companies complete professional risk assessments and develop comprehensive security plans and infrastructures that are publicly supported by upper management” Network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network) as the two go hand in hand. It is possible to not only have an attack from the Internet but also internally. The moment any form of computer device becomes network capable or dependent of some form of network function, there is a given need for protection to safeguard the flow of information to and from the said device on a given network whether public or private and/or from a trusted to non-trusted source. The problem with locking down a network tightly is the administrative overhead it creates. The more secure the network becomes the greater the need is for someone or a team to administrate this. Eventually you would reach a point where it becomes impossible for the end-user...

Words: 5261 - Pages: 22

Premium Essay

Accounting Data

...[pic] Analysis of financial statement 525 Semester 2 2013 Individual Assignment Student Name: Lihan Ye Student Number: 16030886 Part 1 History of Patties foods Patties Foods, whose former name is Patties Bakery, now is the largest pie supplier in Australia. It was founded by the Rijs Family who are the immigrants from Holland in 1966. Today’s Patties Foods is based in Bairnsdale, own 7 famous brands, including Patties, Patties Gluten Free, Four’N twenty, Nanna’s, Herbert Adams, Creative Gormet and Chefs Pride. Patties’ major activities Patties is a brand for party foods. They are small pies and children love them. The Patties Gluten Free brand is designed for people who has dietary requirement or people follow the Gluten Free diet. Patties Gluten Free guarantee its product being high quality and nutritive. Four’N Twenty is a very famous brand in Australia, for their meat pies, pasties and sausage rolls. Nanna’s is also a brand for fruit pies. And for Herbert Adams, it is a brand for its beef pies, pasties and rolls. Creative Gourment is a brand for frozen fruit, berries and desserts. Chefs Pride, it contain a lot of categories, such as IQF fruit, Fruit Coulis, French Crepes and Chocolate Dessert Cups. They are delicate. All in all, the majority of Patties’ product is packaged freezing food, which is available from Coles and Woolworths Supermarket nationally, Internet security is a catch-all term for a very broad issue covering security for...

Words: 2911 - Pages: 12

Premium Essay

Case Study on Confidentiality

...INDIVIDUAL ASSIGNMENT 1 By Suman Lectured by Prof. Siva ID No. 012014111647 Jeong Chun Phuoc BUSINESS LAW DLW 5013 A BUSINESS ETHICS CASE STUDY OF : FROM A CLIENT CONFIDENTIALITY PERSPECTIVE 1 BUSINESS LAW DLW 5013 Contents Executive Summary ................................................................................................................................ 3 Company Overview ............................................................................................................................ 3 Introduction ............................................................................................................................................. 4 Problem Statement in Censere ................................................................................................................ 5 Findings .................................................................................................................................................. 6 Data Storage .................................................................................................................................... 7 Level of Responsibility by Data User ............................................................................................. 7 Limitation........................................................................................................................................ 8 Recommendation .............................................................

Words: 5727 - Pages: 23

Premium Essay

Cloud Systems or It Organisations

...Secure Data Sharing in the Cloud Danan Thilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo 1 Introduction Cloud systems [1, 2] can be used to enable data sharing capabilities and this can provide an abundant of benefits to the user. There is currently a push for IT organisations to increase their data sharing efforts. According to a survey by InformationWeek [3], nearly all organisations shared their data somehow with 74 % sharing their data with customers and 64 % sharing with suppliers. A fourth of the surveyed organisations consider data sharing a top priority. The benefits organisations can gain from data sharing is higher productivity. With multiple users from different organisations contributing to data in the Cloud, the time and cost will be much less compared to having to manually exchange data and hence creating a clutter of redundant and possibly out-of-date documents. With social networking services such as Facebook, the benefits of sharing data are numerous [4] such as the ability to share photos, videos, information and events, creates a sense of enhanced enjoyment in one’s life and can enrich the lives of some people as they are amazed at how many people are interested in their life and well-being. For students and group-related projects, there has been a major importance for group collaborative tools [5]. Google Docs provides data sharing capabilities as groups of students or teams working on a project can share documents and can collaborate...

Words: 13400 - Pages: 54

Premium Essay

Test Paper

...awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical and security topics and holds several certifications, including CompTIA A+, Network+, Security+, and CASP; (ISC)2 SSCP and CISSP; Microsoft MCSE and MCITP, and ITIL Foundations. In response to repeated requests, Darril created the http://gcgapremium.com/ site where he provides study materials for several certification exams, including the Security+ exam. Darril regularly posts blog...

Words: 125224 - Pages: 501

Premium Essay

Theories of Marketing

...Theories of Marketing Week 1 – lecture 1 History of marketing 1. Production : supplying markets 2. Selling: convince people that what the organization happen to have is what they need. 3. marketing : let’s ask people what they want and then produce it. What can I make that will serve my customers better? It needs to be something relevant, innovative or unique MKG definition it’s all about sales and market share : it doesn’t say anything about relationship NOW : how can I create value so I will be able to sale more, it’s the only way to survive. To stay alive you need to have a lot of capabilities and tools to survive What is marketing? Marketing includes more than just needs, it’s concerned with providing the right product to the right person at the right moment. That way it creates value. This way it also incorporates innovation. Functions & processes/activities are the things we do to deliver customer value. These can be strategic and tactical. History of marketing thought - philosophy *  Production orientation, huge production lines trying to find bigger markets. Its all about efficient distribution. Demand is huge, supply was very small, they didn’t care about colour for example. Marketing was all about getting your product efficiently to the consumer. Marketing is a very contextual science, how do we deal with circumstances, and how do we become successful in these circumstances. *  Selling orientation, extra activities...

Words: 11416 - Pages: 46

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742

Premium Essay

Future of Technology

...THE FUTURE OF TECHNOLOGY OTHER ECONOMIST BOOKS Guide to Analysing Companies Guide to Business Modelling Guide to Business Planning Guide to Economic Indicators Guide to the European Union Guide to Financial Markets Guide to Management Ideas Numbers Guide Style Guide Dictionary of Business Dictionary of Economics International Dictionary of Finance Brands and Branding Business Consulting Business Ethics Business Strategy China’s Stockmarket Globalisation Headhunters and How to Use Them Successful Mergers Wall Street Essential Director Essential Economics Essential Finance Essential Internet Essential Investment Essential Negotiation Pocket World in Figures THE FUTURE OF TECHNOLOGY THE ECONOMIST IN ASSOCIATION WITH PROFILE BOOKS LTD Published by Profile Books Ltd 3a Exmouth House, Pine Street, London ec1r 0jh Copyright © The Economist Newspaper Ltd 2005 All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of both the copyright owner and the publisher of this book. The greatest care has been taken in compiling this book. However, no responsibility can be accepted by the publishers or compilers for the accuracy of the information presented. Where opinion is expressed it is that of the author and does not necessarily...

Words: 128899 - Pages: 516

Premium Essay

Real-Time Fraud Detection

...Para os meus pais, porque "o valor das coisas não está no tempo que elas duram, mas na intensidade com que acontecem. Por isso existem momentos inesquecíveis, coisas inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time...

Words: 56858 - Pages: 228