Preview

Sony Play Station Security Breach

Good Essays
Open Document
Open Document
584 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sony Play Station Security Breach
Sony Play Station Security Breach

It is almost impossible to find the top reasons why most security breaches happen on a secure network compromising hundreds to thousands of users’ personal information. To protect a network and thoroughly secure confidential information, one has to examine the top vulnerabilities and think outside of the normal box to protect it. When a security breach happens, there is usually a pretty simple reason why it has happened. I will discuss one of the highly publicized security breaches to happen in years, the Sony PlayStation Network & Qriocity music and video service, what caused the breach and how this could have been prevented.
On April 27, 2011 more than 70 million customers of Sony’s PlayStation Network and Qriocity music service received a disturbing email saying that everything the company knew about them including where they live, when they were born, their logins and passwords, and possibly more information had been hacked into.
On May 2, 1011, a week later, a second security breach occurred on a different Sony network. The Sony Online Entertainment Networks was targeted and compromised 24.6 million users. Of that number, 12.3 million had their credit card information stolen.
Lastly 2,500 user’s names and addresses were leaked from the electronics division of Sony creating a third incident. A total of three security breaches in three weeks amounted in over 100 million users having their personal information stolen makes customers’ faith in Sony grow to an all time low.
There are many issues that could have led to Sony’s breach in security which include:
• Deploying the right security products – IT security today has a wide range of technologies that are aimed specifically at lowering risks and threats.
• Coping with business growth and expansion – While companies are acquiring others at a rapid rate of speed to drive growth for businesses, these companies are letting their information management systems lag

You May Also Find These Documents Helpful

  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * ChoicePoint customers had their identity’s compromised and ultimately stolen * The compromise of their identity means that they criminals could use their names and info for other purposes * ChoicePoint was effected by the Class-action lawsuit as a result * Were being investigated by the U.S Senate…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    On April 17, 2011 PlayStation Network (PSN) was breached by an unauthorized source. Sony believed that the source exposed personal and password information – and possibly credit cards – of an estimated 77 million people. This is considered one of tech’s history’s worst security failures (Cooney, 2011). Due to this breach, Sony has broken many laws. The most critical laws that Sony “allegedly” broke were California SB 1386, California Law 1798.81.5, and California Law 1798.29.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The breach happened to be a very experienced gentleman that hacked into the servers of T-Mobile to access some U.S confidential emails and files, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities.…

    • 241 Words
    • 1 Page
    Good Essays
  • Good Essays

    Tjx It Security Breach

    • 1174 Words
    • 5 Pages

    In January of 2007 the parent company of TJMaxx and Marshalls known as TJX reported an IT security breach. The intrusion involved the portion of its network that handles credit card, debit card, check, and merchandise return functions. Facts slowly began to emerge that roughly 94 million customers’ credit card numbers were stolen from TJMaxx and Marshalls throughout 2006. It was believed that hackers sat in the parking lots and infiltrated TJX using their wireless network.…

    • 1174 Words
    • 5 Pages
    Good Essays
  • Good Essays

    On April 27, 2011 more than 70 million customers of Sony’s PlayStation Network and Qriocity music service received a disturbing email saying that everything the company knew about them including where they live, when they were born, their logins and passwords, and possibly more information had been hacked into. From a statement made by Sony, “If you have provided your credit card data through PlayStation Network or Qriocity out of an abundance of caution we are advising you that your credit card number (excluding security code) and expiration date may have been obtained.” (http://www.nytimes.com/2011/04/28/arts/video-games/sony-playstation-security-flaw-tests-consumer-trust.html). Imagine the shock and awe of users when they received this notification. This security breach is one of many that Americans fear on a daily basis.…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Security is the main concern for all enterprises and organizations. They have to monitor and manage all elements within the organization. Security breaches can cause harm to any organization by taking confidential information and giving that information to an outside source. The context of personal information is displayed by dates of birth, social security, names, and other ways to confirm him or her identity. A breach of security can bring pain to the pockets of any organization and injure one’s assets. This paper will explain the impacts a security breach can have on an organization, mainly within the Urology Medical office at the Henry Ford Health Systems hospital in Detroit, Michigan and will recommend strategies that will assist in avoiding future incidents.…

    • 1028 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The information exposed in this hack is a treasure trove for potential identity thieves. It would…

    • 537 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics refers to what comes off as right or wrong to an individual’s conscience .The internet age has brought about new ethical issues, not only for an individual but for the society as well as it has eased anonymous manipulation and distribution of information, creating new and easier paths for committing crimes like piracy, identity theft, infringement of an individual’s privacy etc. In this paper we will be analyzing the Choice-point case and the ‘Sony data breach ‘case from an ethical point of view. (Laudon &Laudon, 2010, p.128)…

    • 2180 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved December 19, 2014, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year. Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen.…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Now I would like to move on to some stastistics. According to the internet crime complaint center also know as the IC3 a partnership with the federal beauro of investigation, the national white collar crime center and the bearo of justice assistance. The percentage of people hacked within the last year has increased 22 from last year.…

    • 521 Words
    • 3 Pages
    Good Essays