Preview

The examination of Sony

Powerful Essays
Open Document
Open Document
1636 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The examination of Sony
The examination of Sony: performance, cyber-attack, and social responsibility
Nowadays, we are living in the growing society which is supporting by the stem - Science, Technology, Engineering, or Math, as in most things these days (Bloomberg 2013).
One of the Japanese multinational conglomerate “Sony Corporation”, according to their history “Sony” that is a small group of young people and the unlimited innovative ideas with their passion and energy (Sony History). It also be called “Head of Electronic” (Dina, Lo. 2005), most of various high quality innovative technology products are manufactured by “Sony”.
The old good days has gone. Some new technology firm, such as Apple or Samsung, which produce electronic device and revolutionized of running business and the entertainment sector. This essay will discuss how Sony implement the strategy to improve Sony’s performance and what Sony’s suffer after the cyber-attack by hackers and What it harm to their users and customers.

The case against Sony
Internet has become more and more important to our society. Wi-Fi also allow people going online everywhere and it is useful and helpful. Thousand and thousand data is transmitted through the internet, most important information and data are saved in computer. It is definitely, nobody can make sure the information and data in computer are saved safely and don't be stole.
In the mid-April of 2011, Sony had to shut down their Playstation Network, which people can purchase the games and connect with other game (TIME. Stephen, Gandel. 2011) and. One of the world’s largest technology companies could not even defense against the “Hackers” by stealing their customers information and data. Sony’s online service had been breached by hackers, lots of confidential customer data were leaked out (The economist, Tokyo. 2011).
The theft of data about 100 million users’ credit-card numbers were hacked. Hackers access the users around the world account information (TIME.



References: Bloomberg. 2013. TCS ' go IT Program Introduces Students in Midland, MI to the Excitement of STEM (Science, Technology, Engineering, Math) Fields. 12 Aug Dina, Lo Sony History. 2013. http://www.sony.com.hk/aboutsony/html/eng/profile/history.html. Accessed 3 Oct The economist, Tokyo The economist, Tokyo. 2005. “Special Report: An iconic, but deeply troubled, Japanese firm is putting its future in the hands of a foreigner” Mar 12. The economist, Tokyo. 2005. “Leaders: Sony 's new boss must demonstrate that content and electronics really can work together” Mar 12 TIME TIME. Doug, Aamoth. 2011 “New Sony Hack Claims Over a Million User Passwords.” 2 Jun BBC News BBC News. 2011. Hackers warn NHS over security. 9 Jun. BBC News. Matt, Danzico. 2011. Sony offers successor to PSP and hacking apology. 7 Jun BBC News TIME.  Jerry Brito. 2011. Who ARE These People? Sony Hack Reveals ‘Seinfeld’ as Most Popular Password. 8 Jun. TIME. Bill, Saporito. 2011. Hack Attack. 23 Jun TIME Kreyg. 2011. Bad News: Sony Has No Idea If Hackers Have Your Personal Info. Accessed Oct 2, http://www.hotbloodedgaming.com/2011/04/25/bad-news-sony-has-no-idea-if-hackers-have-your-personal-info/ Jason, Schreier Mustaza Mustafa. 2011. Sony: Bigger bad news. Accessed Oct 2, http://evanhugh.com/2011/05/25/sony-bigger-bad-news/ GamesRadarTylerWilde

You May Also Find These Documents Helpful

  • Good Essays

    Hint: Google "sony playstation 3 + security violations." Once you understand the problems about the Sony product, select products and use the Security Target to describe how it can reduce risk.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Good Essays

    On April 17, 2011 PlayStation Network (PSN) was breached by an unauthorized source. Sony believed that the source exposed personal and password information – and possibly credit cards – of an estimated 77 million people. This is considered one of tech’s history’s worst security failures (Cooney, 2011). Due to this breach, Sony has broken many laws. The most critical laws that Sony “allegedly” broke were California SB 1386, California Law 1798.81.5, and California Law 1798.29.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The article was considerably valid as was demonstrated by credible news programs and other articles. The importance of keeping patches and antivirus signatures up to date, to help prevent these types of attacks was discussed in detail. Users selecting strong passwords was also discussed, and revealed as a key component in the ability to compromise these accounts. This article was valuable and affected a lot of people. It is clear that there are prevention methods that can be used, to secure your…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In April 2011, hackers obtained person information from over 100 million PlayStation Network users and Sony Online Entertainment users including credit, debit, and bank account information. This breach cost Sony and credit card issuers up to a total of $2 billion dollars (Laudon, 2013). During the time of the breach, security and control were not top priority. According to this case study Sony was using an older version of Apache Web Server software that was known for its security issues and compromised the security of Sony’s firewall, allowing hacker easy access. As for control, Sony obviously did not have appropriate policies or organizational procedures…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    McGregor, J. P. How the TJX Breach May Change Security Awareness. (2007, April 11). Retrieved October 9, 2007, from…

    • 302 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 252 Words
    • 2 Pages

    In agreement to the FTC, “hackers” could access anyone’s personal information at ease, change protected passwords without security questions, look at chats sent back and forth to a friend, and “send tweets” while using another person’s Twitter (Sangani, par. 21). According to Sangani, these so-called specialists accessed this information between January and May of 2009. Specialists had achieved information from over 45 different accounts in January, says Twitter, and approximately 10 in April of 2009. Luckily, it was only “for short periods of time.” (Sangani, par. 22).…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Security Breach Examples

    • 321 Words
    • 2 Pages

    One good example of breach is the TJX data theft that happened sometime in mid-2005 and on subsequent dates from mid-May 2006 to mid-January 2007. The TJX data theft is considered as the largest case of intrusion of data to occur to date. According to the article, the data stolen by hackers were at least 45 million credit and debit cards numbers from its IT systems. More personal information was also stolen from more customers such as driver’s license, military identification and state identification numbers. The article also mentioned that…

    • 321 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Data Breach

    • 2467 Words
    • 10 Pages

     Don’t underestimate the tenacity of your adversaries, especially espionage- driven attackers, or the power of the intelligence and tools at your disposal (2013 Data Breach Investigations Report, 2013).…

    • 2467 Words
    • 10 Pages
    Best Essays
  • Best Essays

    Turner, M. 2011. Documents Show ‘A Culture’ of Illegal Phone-Hacking At The New of the…

    • 2601 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Thus, it should not be surprising that in 2006 more than 50 Million Americans have had personal information compromised due to unforeseen security breaches such as these (Bigelow, 2006). Personal and organizational data must be safeguarded from unwanted intruders, hackers and thieves.…

    • 338 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Facebook Case Study

    • 2579 Words
    • 11 Pages

    Lee, Dave. 2013. "The Comment Group: The hackers hunting clues about you." BBC News, February 12.…

    • 2579 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Password Pattern Analysis

    • 1509 Words
    • 7 Pages

    "On 21st, Dec, 2011, Account information for more than 6 millions registered users of online community Chinese Software Developer Network (CSDN.net) has reportedly been leaked online. Industry sources today added that account information has also been leaked for 8 millions and 20 millions users, respectively, of the 7k7k and 178.com gaming websites. CSDN has confirmed the news, saying the leaked information is from a 2009 backup of the site 's database, although the exact cause for the leak has yet to be determined. Online sources say that the leaks were deliberate and users of Chinese SNS sites Renren and Kaixin001, the Tianya online community and matchmaking sites Jiayuan.com and Baihe.com will be the next targets (these website are just involved in rumors now, no password package from them are leaked) "[1]. (on 25th, Dec, 2011, the data from Tianya online community having already being leaked and I have downloaded the package also ensure that username-password are effective most --from author)…

    • 1509 Words
    • 7 Pages
    Powerful Essays