Free Essay

Sony Reels from Multiple Hacker Attacks

In:

Submitted By medcarelrv
Words 738
Pages 3
Introduction The case that is discussed in this paper is Sony Reels from Multiple Hacker Attacks. The paper will touch different points regarding this case. One of the interest points refers to the Sony PSN debacle and the costs of the incident. Another interest point refers to gaming and virtual services over the Internet, such as WOW, SL, and Sony PSN. The paper also focuses on catching hackers and sentencing them (whether or not they should be). Another point of the paper is to discuss whether or not it is good for companies not to admit when there is a data breach within their system. The last point of discussion refers to a personal example of identity theft.
Sony Reels from Multiple Hacker Attacks According to International Business (2011), the last time that Sony's Playstation Network has been attacked was in May 2011 because multiple users have reported complaints to the company. There has been more than $1,200 stole from the accounts of the users. This may not be a large sum of money, but it is something. Anyway, security experts consider that this company is sill vulnerable to cyber attacks from all over the world. Sony PSN has been hacked several times during its history. There are gaming and virtual services over the Internet like the World of Warcraft, Second Life, and Sony's PSN. Each of these services are paid and the companies store credit information online. In order to be protected and to protect the information of their consumers, these companies need to primarily increase the level of security of their services by eliminating all possible vulnerabilities that malicious users may exploit in order to gain access to the data. Secondly, these companies need to inform and train their users for good practices with their accounts and for data protection. It is reasonable to think that such companies will have and have measures to stop the best hackers in the world because if they do not do such thing, they will most likely lose their customers and face massive lawsuits. There are many cases in history when hackers have been caught and then transformed into good guys. Some of them have been sent to jail due to the severity of their actions. However, when hackers commit cyber-crimes they are seen as the other delinquents as well. They are no different. However, in their mastery of computer, they have skill, and this skill can be used not only for bad purposes, but also for good purposes. So, when appropriate, hackers would represent a tool in counter-fighting terrorism and various cyber-crimes. They can even be used to catch other hackers as well. Moving from one to other, most companies do not want to publicly announce data breaches in their systems. They do this in order to protect their reputations as companies and the level of confidence that users may have regarding their online environment. There is a lot to be gained from such actions; and one of the most important gains is represented by the customers. It may not be ethical to do so; however, it is at the edge of legality for companies to do so. The last point in this paper refers to personal identity theft stories. Personally, I have not been the subject of such actions so far. Hopefully, this would not happen in the future either. This does not mean that my email is not flooded with spam every now and then. The only way of not being subject to such scam and phising emails is not to use an email address, which cannot be the case. I personally check my credit card report every few days, just to make sure that nothing unusual happens.
Conclusion
The subject of this paper related to cyber attacks and online crimes. It referred to Sony PSN and the fact that it has been hacked several times. It then talked about gaming and online services which store credit card and personal information and the ways to be protected from data breach in this case. Another discussion was regarding hackers who are being caught and companies which do not make public when they are the subjects of data breach. The last aspect discussed in the paper is about personal experiences regarding identity theft and online protection against it.

Reference
International Business, T. (2011). Sony PSN Hacked again, 100,000 Yen Stolen. International Business Times.

Similar Documents

Free Essay

A Pattern-Oriented Approach to Fair Use

...William & Mary Law Review Volume 45 | Issue 4 Article 5 A Pattern-Oriented Approach to Fair Use Michael J. Madison Repository Citation Michael J. Madison, A Pattern-Oriented Approach to Fair Use, 45 Wm. & Mary L. Rev. 1525 (2004), http://scholarship.law.wm.edu/wmlr/vol45/iss4/5 Copyright c 2004 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. http://scholarship.law.wm.edu/wmlr A PATTERN-ORIENTED APPROACH TO FAIR USE MICHAEL J. MADISON* ABSTRACT More than 150 years into development of the doctrineof "fairuse" in American copyright law, there is no end to legislative,judicial, and academic efforts to rationalizethe doctrine. Its codification in the 1976 CopyrightAct appearsto have contributedto its fragmentation, rather than to its coherence. As did much of copyright law, fair use originated as a judicially unacknowledged effort via the law to validate certain favored practicesand patterns.In the main, it has continued to be applied as such, though too often courts mask their implicit validation of these patterns in the now-conventional "caseby-case" application of the statutoryfair use "factors"to the defendant's use of the copyrighted work in question. A more explicit acknowledgment of the role of these patterns in fair use analysis would be consistent with fair use, copyright policy, and tradition. Importantly, such an acknowledgment would help to bridge the often difficult conceptual gap between fair use...

Words: 74799 - Pages: 300

Premium Essay

Geiziji

...FROM THE AUTHOR OF THE BESTSELLING BIOGRAPHIES OF BENJAMIN FRANKLIN AND ALBERT EINSTEIN, THIS IS THE EXCLUSIVE BIOGRAPHY OF STEVE JOBS. Based on more than forty interviews with Jobs conducted over two years—as well as interviews with more than a hundred family members, friends, adversaries, competitors, and colleagues—Walter Isaacson has written a riveting story of the roller-coaster life and searingly intense personality of a creative entrepreneur whose passion for perfection and ferocious drive revolutionized six industries: personal computers, animated movies, music, phones, tablet computing, and digital publishing. At a time when America is seeking ways to sustain its innovative edge, Jobs stands as the ultimate icon of inventiveness and applied imagination. He knew that the best way to create value in the twenty-first century was to connect creativity with technology. He built a company where leaps of the imagination were combined with remarkable feats of engineering. Although Jobs cooperated with this book, he asked for no control over what was written nor even the right to read it before it was published. He put nothing offlimits. He encouraged the people he knew to speak honestly. And Jobs speaks candidly, sometimes brutally so, about the people he worked with and competed against. His friends, foes, and colleagues provide an unvarnished view of the passions, perfectionism, obsessions, artistry, devilry, and compulsion for control that shaped his approach to business and...

Words: 233886 - Pages: 936

Premium Essay

Management Information Systems

...Course Technology’s Management Information Systems Instructor and Student Resources Introduction to IS/MIS Principles of Information Systems, Eighth Edition • Stair, Reynolds Fundamentals of Information Systems, Fourth Edition • Stair, Reynolds Management Information Systems, Sixth Edition • Oz Information Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and...

Words: 223685 - Pages: 895

Free Essay

Steve Jobs Biography

...Titre de l’édition originale STEVE JOBS : A BIOGRAPHY publiée par Simon & Schuster, Inc. Maquette de couverture : Bleu T Photo de couverture : Albert Watson © 2011 by Walter Isaacson Tous droits réservés. © 2011, éditions Jean-Claude Lattès pour la traduction française. Première édition novembre 2011. ISBN : 978-2-7096-3882-1 « Seuls ceux qui sont assez fous pour penser qu’ils peuvent changer le monde y parviennent. » Publicité Apple « Think Different », 1997 Table des matières Les personnages Introduction : La genèse de ce livre 1- L’enfance : abandonné puis choisi 2- Un couple improbable : les deux Steve 3- Tout lâcher : harmonie, ouverture, détachement… 4- Atari et l’Inde : du zen et de l’art de concevoir des jeux 5- L’Apple I : allumage, démarrage, connexion 6- L’Apple II : l’aube d’une ère nouvelle 7- Chrisann et Lisa : celui qui a abandonné… 8- Xerox et Lisa : les interfaces graphiques 9- Passer en Bourse : vers la gloire et la fortune… 10- Le Mac est né : vous vouliez une révolution 11- Le champ de distorsion de la réalité : imposer ses propres règles du jeu 12- Le design : les vrais artistes simplifient 13- Fabriquer le Mac : le voyage est la récompense 14- Entrée en scène de Sculley : le défi Pepsi 15- Le lancement : changer le monde 16- Gates et Jobs : quand deux orbites se croisent 17- Icare : à monter trop haut… 18- NeXT : Prométhée délivré 19- Pixar : quand la technologie rencontre l’art 20- Un homme comme les autres...

Words: 233799 - Pages: 936

Premium Essay

世界是平的

...Thirteen: 11/9 Versus 9/11 / 441 Acknowledgments I 471 Index I 475 Kq p K :::::How the World Became Flat ::::: ONE While I Was Sleeping Your Highnesses, as Catholic Christians, and princes who love and promote the holy Christian faith, and are enemies of the doctrine of Mahomet, and of all idolatry and heresy, determined to send me, Christopher Columbus, to the above-mentioned countries of India, to see the said princes, people, and territories, and to learn their disposition and the proper method of converting them to our holy faith; and furthermore directed that I should not proceed by land to the East, as is customary, but by a Westerly route, in which direction we have hitherto no certain evidence that anyone has gone. - Entry from the journal of Christopher Columbus on his voyage of 1492 No one ever gave me directions like this on a golf course before: "Aim at either Microsoft or IBM." I was standing on...

Words: 170179 - Pages: 681

Premium Essay

Business Research Method

...authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ@WILEY.COM. To order books please call 1(800)-225-5945. ISBN 0-471-20366-1 ISBN 0-471-38448-8 (WIE) Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 To Sudha Pennathur & Edward Messerly With Love ABOUT THE AUTHOR Uma Sekaran is Professor Emerita of Management, Southern Illinois University at Carbondale (SIUC), Illinois. Sekaran obtained her MBA degree from the University of Connecticut at Storrs, and...

Words: 136265 - Pages: 546

Free Essay

Test2

...62118 0/nm 1/n1 2/nm 3/nm 4/nm 5/nm 6/nm 7/nm 8/nm 9/nm 1990s 0th/pt 1st/p 1th/tc 2nd/p 2th/tc 3rd/p 3th/tc 4th/pt 5th/pt 6th/pt 7th/pt 8th/pt 9th/pt 0s/pt a A AA AAA Aachen/M aardvark/SM Aaren/M Aarhus/M Aarika/M Aaron/M AB aback abacus/SM abaft Abagael/M Abagail/M abalone/SM abandoner/M abandon/LGDRS abandonment/SM abase/LGDSR abasement/S abaser/M abashed/UY abashment/MS abash/SDLG abate/DSRLG abated/U abatement/MS abater/M abattoir/SM Abba/M Abbe/M abbé/S abbess/SM Abbey/M abbey/MS Abbie/M Abbi/M Abbot/M abbot/MS Abbott/M abbr abbrev abbreviated/UA abbreviates/A abbreviate/XDSNG abbreviating/A abbreviation/M Abbye/M Abby/M ABC/M Abdel/M abdicate/NGDSX abdication/M abdomen/SM abdominal/YS abduct/DGS abduction/SM abductor/SM Abdul/M ab/DY abeam Abelard/M Abel/M Abelson/M Abe/M Aberdeen/M Abernathy/M aberrant/YS aberrational aberration/SM abet/S abetted abetting abettor/SM Abeu/M abeyance/MS abeyant Abey/M abhorred abhorrence/MS abhorrent/Y abhorrer/M abhorring abhor/S abidance/MS abide/JGSR abider/M abiding/Y Abidjan/M Abie/M Abigael/M Abigail/M Abigale/M Abilene/M ability/IMES abjection/MS abjectness/SM abject/SGPDY abjuration/SM abjuratory abjurer/M abjure/ZGSRD ablate/VGNSDX ablation/M ablative/SY ablaze abler/E ables/E ablest able/U abloom ablution/MS Ab/M ABM/S abnegate/NGSDX abnegation/M Abner/M abnormality/SM abnormal/SY aboard ...

Words: 113589 - Pages: 455