Preview

IT/205 Case Essay: Hackers Acquire Personal Information

Satisfactory Essays
Open Document
Open Document
328 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT/205 Case Essay: Hackers Acquire Personal Information
Sony Online Entertainment
IT/205

In April 2011, hackers obtained person information from over 100 million PlayStation Network users and Sony Online Entertainment users including credit, debit, and bank account information. This breach cost Sony and credit card issuers up to a total of $2 billion dollars (Laudon, 2013). During the time of the breach, security and control were not top priority. According to this case study Sony was using an older version of Apache Web Server software that was known for its security issues and compromised the security of Sony’s firewall, allowing hacker easy access. As for control, Sony obviously did not have appropriate policies or organizational procedures

You May Also Find These Documents Helpful

  • Good Essays

    Sony says credit card data of PlayStation users may have been stolen in an ... It says it has hired an outside security ...…

    • 394 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    On April 17, 2011 PlayStation Network (PSN) was breached by an unauthorized source. Sony believed that the source exposed personal and password information – and possibly credit cards – of an estimated 77 million people. This is considered one of tech’s history’s worst security failures (Cooney, 2011). Due to this breach, Sony has broken many laws. The most critical laws that Sony “allegedly” broke were California SB 1386, California Law 1798.81.5, and California Law 1798.29.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Organizations must ensure the security and control of systems and transactions with clients and vendors. What security breaches may cause harm to an organization or its clients? Why is it important to ensure a proper level of security? What tools are available to prevent breaches?…

    • 369 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Munchausen syndrome by proxy, MSBP, is a covert form of child abuse in which a parent or guardian, usually the mother, systematically fabricates or induces illness in her child. It proves a difficult syndrome to diagnose because the caretakers of these children are masters of deception. They thrive on deceiving medical and mental health professionals and revel in the attention received (Quisenberry).…

    • 842 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ipremier

    • 422 Words
    • 2 Pages

    On January 21, 2001, iPremier Web servers were brought to a stand still. A denial-of-service (DoS) attack had occurred. A DoS attack is easily accomplished by the use of script kiddies and hacker websites. Luckily for iPremier, this was only a denial-of service attack and could have been a lot worse. iPremier’s customers pay for their purchases with credit cards, and they keep a data base containing all credit card information on their customers. The credit card database is advantageous because it allows iPremier an effective niche in the e-commerce market. However, it leaves them vulnerable to an attack by hackers. If a hacker had obtained total access to their system customer credit card numbers could have been in jeopardy.…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When it comes to protecting and saving lives of the American people, private invasion used in order to locate and capture potential terrorist should be unlimited. The 911 attack has provided active proof to the American peoples of the damage that terrorist groups can impose on our society. Therefore, invading the privacy of individuals may prevent future terrorist attacks.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    On January 12, 2007, iPremier Web servers were brought to a standstill. A denial-of-service (DoS) attack had occurred. Hackers launched the attack on iPremier. Luckily for iPremier, this was only a denial-of service attack, possibly launched by a script-kiddie, or even a competitor trying to disrupt service. The attack could have been a lot worse. iPremier’s customers pay for their purchases with credit cards, and they keep a data base containing all credit card information on their customers. The credit card database is. However, it leaves them vulnerable to an attack by hackers. If a hacker had obtained total access to their system customer credit card…

    • 1542 Words
    • 7 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays