Free Essay

Sony Play Station Security Breach

In:

Submitted By lolo12
Words 584
Pages 3
Sony Play Station Security Breach

It is almost impossible to find the top reasons why most security breaches happen on a secure network compromising hundreds to thousands of users’ personal information. To protect a network and thoroughly secure confidential information, one has to examine the top vulnerabilities and think outside of the normal box to protect it. When a security breach happens, there is usually a pretty simple reason why it has happened. I will discuss one of the highly publicized security breaches to happen in years, the Sony PlayStation Network & Qriocity music and video service, what caused the breach and how this could have been prevented.
On April 27, 2011 more than 70 million customers of Sony’s PlayStation Network and Qriocity music service received a disturbing email saying that everything the company knew about them including where they live, when they were born, their logins and passwords, and possibly more information had been hacked into.
On May 2, 1011, a week later, a second security breach occurred on a different Sony network. The Sony Online Entertainment Networks was targeted and compromised 24.6 million users. Of that number, 12.3 million had their credit card information stolen.
Lastly 2,500 user’s names and addresses were leaked from the electronics division of Sony creating a third incident. A total of three security breaches in three weeks amounted in over 100 million users having their personal information stolen makes customers’ faith in Sony grow to an all time low.
There are many issues that could have led to Sony’s breach in security which include:
• Deploying the right security products – IT security today has a wide range of technologies that are aimed specifically at lowering risks and threats.
• Coping with business growth and expansion – While companies are acquiring others at a rapid rate of speed to drive growth for businesses, these companies are letting their information management systems lag behind in growth.
• The nature of the breaches – Sony is still having ongoing investigations into why their security breach happened, application-layer attacks attributed to the first two breaches. This makes one wonder if Sony took the appropriate measures when structuring their security defenses against such attacks.
Safeguarding personal information has become more difficult than ever before with so many services on the internet that require you to enter your personal information for many reasons. Americans cannot trust companies to safeguard their information anymore because hackers prey on people and companies with weak security infrastructures. Hackers are skilled at breaking computer programs and gaining unauthorized access to the data with fraudulent intentions.
It is very unfortunate this happened to Sony because they have lost a lot of credibility with their users. The sheer magnitude of 70 million users scrambling to change their passwords, close those credit card accounts, 93,000 user accounts were taken down because their passwords and credit card information had been stolen.
Even though there are still ongoing investigations into the details surrounding the three Sony security breaches, it has been very hard to pinpoint the exact source and reasons why the breaches happened. This has marred the public’s opinion of Sony as a company. Their reputation has been scarred and it will take a lot for customer’s opinion of this electronics giant to turn around. The repercussions from this are widespread for Sony’s customers. They are now subjected to identity theft, credit card fraud, and years down the road they are looking at phishing attacks because their email addresses have been compromised.

Similar Documents

Premium Essay

Security Breach

...Running Head: SECURITY BREACH Security Breach faced by Sony Corporation Introduction In the global marketplace, to attract the customers and provide relevant information to the customers, internet is used by most of firms as a promotional tool. In this, web-sites, social networking sites, etc. are used by the firms to communicate with the customers. Although, many security tools and techniques are used by the firms to secure the data of firm and customers, yet, some security breaches are also faced by the firms due to technical advancement. For this paper, Sony Corp. is selected that has faced security breach. Sony Corporation is a multinational firm that operates its business in global market and belongs to Japan and produces electronic products for the customers (Sony Corp. Info, 2011). There will be discussion about products information, contact information, internet marketing strategies, privacy policy of the firm, etc. Evaluation of Website Sony Corporation provides whole relevant information on the website of the firm about its products, services, etc (Sony Corp. Info, 2011). Areas that are evaluated for the firm are as follow: Product information: Sony Corporation has developed its website effectively that attracts the customers to purchase products. The firm provides all relevant information about the products on its website. Additionally, the firm also has made a list of its products that includes various categories of products...

Words: 1807 - Pages: 8

Premium Essay

Internet Technology, Marketing and Secuirty

...Internet Technology, Marketing and Secuirty The information technology era now has more companies than ever that sale, market, and advertises on the internet. With this convenience several problems with internet security occur on a daily basis. “Individuals, Businesses, and government agencies are all vulnerable to computer crime. Computer hackers-unauthorized users-sometimes work alone and sometimes in groups. Sometimes hackers break into computer systems just to show that they can do it; other times they have more sinister motives.” (Boone 509) In April 2011 Sony, a leading manufacturer of audio, video, communication and information technology products, experienced a security breach that effected seventy seven million Sony users. Throughout the years Sony has experienced several hacking incidents. One of Sony incidents was when George Hot, also known as GeoHot, cracked security on the Play Station 3 and then gained access to pirated games. Sony pursued legal action against Hotz, which then led to another hacker joining Hotz against Sony. The hacker “Anonymous”, which had previously hacked Gawker, Amazon, MasterCard, and computer security firm HBGary, released the following threatening statement on its site: “Congratulations, Sony” You have now received the undivided attention of Anonymous. Your recent legal action again our fellow hackers, Geo Hot and Graf Chokolo, have not only alarmed us, it has been deemed wholly unforgivable. “You have abused the judicial...

Words: 1353 - Pages: 6

Free Essay

Security for Web Applications

...STATE UNIVERSITY SEP4, 2015 Cyber Attack: The attempt of breaching the security layers of an organization or a system by disrupting the network and there by accessing, stealing, modifying or destroying the valuable data and using the data for fraudulent purposes, causing a loss to the organization is called a Cyber Attack Origin: The idea of cyber attacks began at the earlier development of World Wide Web (www) in this stage there was not much harm to the organization but as there was advancement in technology the number of hackers increased day by day and also the effectiveness of the hacking technology has increased a lot which results a severe damage to the organization In more recent times many organizations like manufacturing companies, IT companies, banks and health care providers have been prone to the cyber theft and they lost huge volume of information which incurred huge losses to the companies. Some of the examples include the attack on Target, Primera Blue Cross, E-Bay, JP Morgan Chase bank Sony PSN and many other. These attacks have happened because of poor security measures and the loopholes in the system by which hackers gained access and made the companies to compromise a huge volume of information. Cyber Attack on Primera Blue Cross: Primera blue cross is one of the leading insurance company in Washington .It has undergone a cyber attack on May 5th and the breach was not known till Jan 29th. The organization said that a large volume...

Words: 1000 - Pages: 4

Free Essay

Pest Analysis

...Different factors affecting sony company: “Analyse of the  external environment could be assist by acronym PEST, which is standing for political, economical, sociocultural, and technological factors. It is  also known as environmental scanning. PEST is useful tool to monitor and evaluate forces and factors affecting the company in long term” J Morrison (2002). Political/legal environmental: It is roles and regulation, which has been imposed by a stable government on the business. On the other hand, these changes may expected from the government in the future by business. Political factors of Sony can be changed at any time, which could affect business of the Sony at time of change. As well as instability in political situation of country will affect the business Reduction in recession and credit crunch could cause Sony to speed up its trade; meanwhile same situation could happen for the competitors of Sony, which may affect Sony negatively. Therefore, Sony needs to be very careful to its innovation and idea generation. Sony is globalized company so that changing in international law or trade restriction could affect the way in which Sony works, and Sony needs to follow the rules and regulations, that are imposed by the government. The terms legal always cannot come with term political because most of the time, by change in the politics of a country the legal terms and condition for business environment may remain the same. So that it could be named exceptionally, separate...

Words: 1886 - Pages: 8

Premium Essay

Sony Challenge

...Sony PS4 – 100 Summer Day Challenge Executive Summary 3 Introduction 4 Project Aim 5 Project Objectives 5 Market Analysis 6 SWOT Analysis 10 Practical Point of View 11 Financial Projection 13 Conclusion 14 References 15 Appendices 16-18 Executive Summary The PlayStation is and has been a dominating force in the area of gaming consoles ever since its debut in 1995. Sony has created the ultimate entertainment magic box for young people, and the number of people who own a PlayStation 4 is close to 20 million as of January 2015, just over a year since its release. Our project focuses on one certain aspect: the health of people aged 13-21 who owns a PS4. Our proposal is that we include a Sony SWR10 fitness smart band in the PS4 box, launch a marketing campaign before Christmas and on Boxing Day in Australia the console plus smart band will go on sale together with a game from EA games. Then we introduce the 100-summer days challenge. This is the core of our project, we will offer rewards to people who use their smart band in healthy activities, and based on walking distances or calories burnt that will be recorded in the smart band, and after implementing the software to synchronize this data to the PS4, users will be able to claim their rewards on the rewards website that Sony has. We are giving gamers the incentive and encouragement to get out there and live a healthy lifestyle...

Words: 5437 - Pages: 22

Free Essay

Evaluating the Security of Computer Networks

...Evaluating the Security of Computer Networks Security in Systems Architecture and Applications SE579 2 Table of Contents Evaluating the Security of Computer Networks I. Vulnerabilities A. Design Flaws B. Poor Security Management C. Incorrect Implementation II. Firewalls A. Packet Filtering B. Circuit Level Gateway Proxy Server C. Application Gateway III. Antivirus A. Scans IV. Intrusion Detection Systems V. Disadvantages VI. Conclusion 3 One of the major computing challenges in today’s economy is the lack of adequate security over the information computer networks, and internet applications in which business, government, and economy depend on. Businesses have become more dependent on information. The gathering, organizing, managing, finding, and analyzing of information are crucial to businesses. Computer viruses created by hackers cost businesses $55 billion in 2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while Google lost $500,000 due to hacking in 2005.(Coyne) 2003 Single instances of hacking may cost as much as $600,000 to $7m a day for...

Words: 2281 - Pages: 10

Premium Essay

Cloud Computhing

...Cloud Computing Service for all most everything | Submitted To:Dr. Richard EganSubmitted By:Team 2 | Table of Contents Cloud computing 2 Introduction 2 Definition of Cloud Computing 3 Services Models of cloud computing 4 Software as a Service (SaaS): 4 Platform as a Service (PaaS): 5 Infrastructure as a Service (IaaS): 5 Deployment Model of cloud computing 5 Public Cloud: 5 Private Cloud: 6 Community Cloud: 6 Hybrid Cloud: 6 Challenges of cloud computing 7 Benefits 7 Implementation Plan 9 How Does Data Stay Safe in the Cloud? 9 Are your applications ready to run on cloud? 9 Will you able to receive customer support for the service? 10 Client considerations for Best Practices during Implementation and Deployment 10 Implementation Strategy 10 Cloud architecture: 10 Market Analysis 11 Important Questions to be address by management 11 Implementation Cycle 12 References (Author, Year) 14 Cloud computing Introduction Whenever technology changed or company move to new business plan, it costs them and many of these companies cannot afford in current economic environment. And most of the time all the investments are not useful at the same time. They wish to “pay for what they use” services and use their efforts and money in main business to add value to it. So these challenges and expectations cause the born of cloud computing.Cloud Computing provides a simple, economicaland efficient way to access servers, storage, databases and a broad set of application...

Words: 3580 - Pages: 15

Premium Essay

Information Technology

...technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland Security Department during fiscal year 2008, triple the number from two years earlier. The National Aeronautics...

Words: 25389 - Pages: 102

Premium Essay

Term Paper on Computing Fundamental

...INTRODUCTION A. Origin of the report: This report on “Features, Advantages, Disadvantages and Price of Desktop Computer, Laptop Computer, Palmtop Computer, PDA and Mobile Phone” is submitted to Tahmina Khanam, course teacher of the course MGT 308 “Computing Fundamental” on July 02, 2009. The information of the report has been conducted under the direction of Lecturer Tahmina Khanam. B. Purposes: To find out the different features of different types of computer and latest technology and their advantages, disadvantages and prices. C. Scope of the study The frontier of the report is that it only discusses about desktop computer, laptop computer, palmtop computer, PDA and mobile phone. We have known a lot of things through the internet. D. The Limitations of the study The report has some limitations. The websites did not provide clear information about a lot of topics. Everything in there is very complicated. E. Methodology There are two types of method by which we have collected all the data and information. The first method is that we went to computer sales centre to know about the computers features and prices. The second is that we searched the internet for further information. The data and other analysis those have been done in this report are on the basis of the course “MGT-308 – Computing Fundamental”. F. Report Preview We discuss one by one the types of the computer. And we also include features, advantages, disadvantages and price with...

Words: 8668 - Pages: 35

Premium Essay

Future of Technology

...THE FUTURE OF TECHNOLOGY OTHER ECONOMIST BOOKS Guide to Analysing Companies Guide to Business Modelling Guide to Business Planning Guide to Economic Indicators Guide to the European Union Guide to Financial Markets Guide to Management Ideas Numbers Guide Style Guide Dictionary of Business Dictionary of Economics International Dictionary of Finance Brands and Branding Business Consulting Business Ethics Business Strategy China’s Stockmarket Globalisation Headhunters and How to Use Them Successful Mergers Wall Street Essential Director Essential Economics Essential Finance Essential Internet Essential Investment Essential Negotiation Pocket World in Figures THE FUTURE OF TECHNOLOGY THE ECONOMIST IN ASSOCIATION WITH PROFILE BOOKS LTD Published by Profile Books Ltd 3a Exmouth House, Pine Street, London ec1r 0jh Copyright © The Economist Newspaper Ltd 2005 All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of both the copyright owner and the publisher of this book. The greatest care has been taken in compiling this book. However, no responsibility can be accepted by the publishers or compilers for the accuracy of the information presented. Where opinion is expressed it is that of the author and does not necessarily...

Words: 128899 - Pages: 516

Premium Essay

Business Management

...Fiscal Year 2011 Annual Financial Report And Shareholder Letter January 2012 Dear Shareholders, Fiscal 2011 was a year of great accomplishment for The Walt Disney Company, marked by creativity and innovation across our businesses globally, record financial results and numerous important steps to position the Company for the future. While 2011 brought us so much to cheer about, it was also marked by profound loss, with the passing of Steve Jobs. Steve’s incredible stewardship of Pixar, and his decision to sell Pixar to Disney in 2006, brought Steve into the Disney family, as a board member, a shareholder, a mentor, and a friend, and we were so lucky for all that he represented and all that he contributed. Disney, ESPN, ABC, Pixar, and Marvel are an amazing collection of brands that grow stronger every day as new platforms and new markets provide enormous new opportunities for high quality content and experiences. To that end, we are fortunate to have a talented group of employees who are committed day in and day out to building our brands around the world. Since becoming President and CEO in 2005, I have focused on three strategic priorities: creating high-quality family content, making experiences more memorable and accessible through innovative technology, and growing internationally. In fiscal 2011, net income attributable to Disney was a record $4.8 billion, an increase of 21% over last year, and revenue was a record $40.9 billion, up 7% from last year. Diluted earnings...

Words: 60491 - Pages: 242

Premium Essay

Lauder Global Insights

...The Lauder GLobaL business insiGhT reporT 2014 rebalancing the Global economy Lauder-Report-2014.indd 1 12/18/13 12:07 PM Introduction The Lauder GLobaL business insiGhT reporT 2014 rebalancing the Global economy In this special report, students from the Joseph H. Lauder Institute of Management & International Studies examine current trends and recent developments shaping today’s global marketplace. The articles cover a wide variety of topics ranging from technology, innovation and brand building to infrastructure, entrepreneurship and social impact. A section on consumer markets looks at the popularity of e-cigarettes in France and elsewhere, efforts by Japanese firms to expand their businesses into Asia, new trends in French gastronomy, changes in Japan’s traditional food-consumption habits, and how a sector of the Chinese population is spreading, and spending, its newfound wealth. The report offers an analysis linking market-driven strategies with social impact in Peru and Colombia, as well as an article describing South Carolina’s embrace of innovative research. Other articles look at the Russian government’s attempt to reboot the city of Skolkovo as an innovation hub, the mixed success of innovation efforts in China, and the growing threat of cybercrime to businesses across the world. The challenges of infrastructure and planning are addressed in analyses of transportation in areas of Latin America, deficiencies in Brazil’s infrastructure, and real estate’s...

Words: 56733 - Pages: 227

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Premium Essay

Member

...Matthew Southerland, and James Mulvenon Research Report Prepared on Behalf of the U.S.-China Economic and Security Review Commission September 5, 2013 Revised March 22, 2014 After the publication of this report on September 5, 2013, Microsoft brought to the authors’ attention new information about its partnership with Chinese company 21Vianet. The original version of the report inaccurately characterized certain aspects of the Microsoft-21Vianet partnership. A revised discussion of this partnership is provided on pages 32-34. The authors would like to thank Microsoft for their assistance in clarifying the details of 21Vianet’s Windows Azure service. Disclaimer: This research report was prepared at the request of the Commission to support its deliberations. Posting of the Report to the Commission's website is intended to promote greater public understanding of the issues addressed by the Commission in its ongoing assessment of U.S.-China economic relations and their implications for U.S. security, as mandated by Public Law 106-398 and Public Law 108-7. However, it does not necessarily imply an endorsement by the Commission or any individual Commissioner of the views or conclusions expressed in this commissioned research report. i About Defense Group Incorporated Defense Group Inc. (DGI) performs work in the national interest, advancing public safety and national security through innovative research, analysis and applied technology. The DGI enterprise conducts research and...

Words: 25160 - Pages: 101

Premium Essay

Report

...INTERNSHIP REPORT I On “Standards and Effects of Employee Satisfaction At Axiata Limited” A NTERNSHIP xiata INTERNSHIP REPORT ON “Standards and effects of Employee Satisfaction At Axiata Limited” SUBMITTED TO: Ms. Syeda Shaharbanu Shahbazi Senior Lecturer BRAC Business School BRAC University SUBMITTED BY: Sabrina Nasser Lya BRAC Business School ID: 06204008 BRAC University Date of Submission: December 07, 2010 Date: Decemember 07 2010 Ms. Syeda Shaharbanu Shahbazi Senior Lecturer BRAC Business School BRAC University Subject: Submission of Internship Report Dear Madam, I am hereby submitting my Internship Report, which is a part of the BBA Program curriculum. It is great achievement to work under your active supervision. This report is based on, “Standards And Effects of Employee Satisfcation At Robi Axiata Limited”. I have got the opportunity to work in Robi Axiata Limited in “Implementation Department” under Technology Division for twelve weeks, under the supervision of Mr. Mahmud Hasan Faruquee, Manager SPI, Technical Division. This project gave me both academic and practical exposures. First of all I learned about the organizational culture of a prominent Telecommunication organization of the country. Secondly, the project gave me the opportunity to develop a network with the corporate environment. I shall be highly obliged if you are kind enough to receive this report and provide your valuable judgment. It would be my immense pleasure if you find...

Words: 19536 - Pages: 79