Sony hack case study. Awareness lessons from the Sony hack 2019-05-21

Sony hack case study Rating: 7,6/10 480 reviews

Lessons of the Sony PlayStation hack

sony hack case study

A week later, the studio was working furiously against a deadline to alter the theatrically released teaser trailer so that it would not include the shot depicting the Kims. But it's not an act of war. The success of the hack could inspire copycats, and this type of damage could spread on its own hype. This week it has become the stuff of both national security and mass market consumption, as its buddy-comedy-cum-espionage-thriller The Interview in response to physical threats the Guardians of Peace made against moviegoers. The problem is, if you don't release the movie, you can't make lemonade out of lemons. On the contrary, the government reacted much differently towards Sony during this time.

Next

Sony's 7 Breach Response Mistakes

sony hack case study

This subjected Sony to investigations conducted by several authorities. Jennifer Holt and Alisa Perren New York: Wiley-Blackwell, 2009 , 192. A group that calls itself Guardians of Peace, or G. The hackers four unreleased to file-sharing networks. Chris Clarke, co-founder and managing director of Epoch Public Relations thinks the crisis was extraordinary for Sony. But others say the hack may have been the work of a small group that included at least one former studio employee see:. When the teaser needed to be disavowed, a replacement with a computer-altered shot was prepared immediately.

Next

The Sony hack: how it happened, who is responsible, and what we've learned

sony hack case study

In this preliminary account, I explore both the routine and the crisis-period operations of a high-level work culture. On the other, it was worrisome enough that on June 17, Lynton and Belgrad discussed possible implications for the parent company. As a major player in the attempt to secure the profitability of the global flow of information, Sony inevitably would have important interactions with national and international institutions with complementary and competing interests. Bennett spoke with Ambassador Robert King, Special Envoy for North Korean Human Rights Issues, about the threats. This is beyond the wildest dreams of these attackers. In December, Sony abandoned the theatrical release of The Interview, only to face public condemnation from President Obama on December 19.

Next

Sony Hack: Business Continuity Lessons

sony hack case study

As executives behave, so will the employees beneath them. A look of horror as the fire approaches is probably what we need. Failure to Spot the Breach. What has happened to Sony already does not meet the definition. But, do you think it was? Jewell, Peter Lev, and Thomas Schatz have reconstructed the histories of the classical Hollywood studios by relying on trade accounts, memoirs, interviews, and memoranda, occasionally benefitting from documents that were later withdrawn from circulation Jewell especially. Instead, searches are done mainly by string, but searching that way for particular authors, dates, email suffixes, and the like inevitably exposes any researcher to materials that would not, under ordinary archival practices, be available. But, a lot of terrorism analysts have talked about how they shut down the entire city of Boston, which was the wrong message.

Next

Awareness lessons from the Sony hack

sony hack case study

A huge amount of data has been released already, and much of it hasn't been carefully analyzed. However, as an awareness practitioner, actually demonstrates many awareness-related failings that need to be addressed. Where do we go from here? A previously unknown group of hackers calling themselves the Guardians of Peace have become the subject of hundreds of articles splayed across every conceivable media digestion surface in the United States. Within the contemporary studio, decisions and their data are willy-nilly archiving themselves all over the organizational chart, ready to be exfiltrated. A charitable reading would be that they were joking about precisely the sorts of stupid things other, actually racist people would say, but in the context of racially charged exchanges about Kevin Hart, it becomes clear that the corporate solidarity that the exchanges perform is not simply the effect of the discourse but the alibi for the illicit expression. For example, making regular backups can allow a company to recover in the event that hackers delete important data. By choosing I Accept, you consent to our use of cookies and other tracking technologies.

Next

Security lessons from the PlayStation Network breach

sony hack case study

The government should help defend this company and prevent hacks, but in terms of exacting punishment on North Korea, what's it going to do? The next day November 25 GoP placed five movies on torrent sites. Make sure that all levels of your company are aware of good security procedures. The article describes how phishing messages targeted Apple account passwords. The Rudin-Pascal emails are not included in the Wikileaks archive. McClure noted that using even the basic encryption tools native to Windows may have prevented a good deal of the damage.

Next

Sony Hack: Business Continuity Lessons

sony hack case study

In response, the insurer requested the court to rule that it is not required to defend or indemnify Sony for any data breach claims, as third-party hacking incidents are not covered by its insurance policy. You All Do Realize Every Parody. The attackers stole a huge number of confidential documents, which are now being downloaded primarily by journalists from file-sharing networks. And if an administrator reuses passwords between his personal and corporate administrative accounts, there are likely other accounts that are similarly vulnerable. In a , the Supreme Court ruled that a radio station couldn't be held responsible for broadcasting the contents of newsworthy audio recordings — even if the recordings were originally made in violation of wiretapping laws. Companies like Sony tend to under-invest in locking down their networks because it seems like a needless expense until disaster strikes. We pulled a movie from 18,000 theaters.

Next

The Sony Hack: Data and Decision in the Contemporary Studio

sony hack case study

It was also entirely misguided. Pascal had been fired, but Lynton survived. In the past, the perpetrators of major attacks have often been apprehended. However close Pascal and Rudin appear in their racial joking, she is willing to blame him when it suits her purposes. A happy and unconcerned looking Hirai talked for over three minutes about how Sony now has top-of-the-line industry securities in place. The hackers identified that Sony was running software that was loaded with vulnerabilities. The ethics of relying on stolen documents are also considered.

Next

Reaction to the Sony Hack Is 'Beyond the Realm of Stupid'

sony hack case study

Even for researchers who are willing to make use of the Sony materials, the Wikileaks version poses additional problems. North Korea is furious at Sony for producing a movie depicting the assassination of North Korean leader Kim Jong Un. This is why awareness programs need to be as comprehensive as possible. Read on to learn how the hacks happened, who might be responsible, and what we've learned as a result. Strategy as Practice: An Activity-Based Approach.

Next

Sony's 7 Breach Response Mistakes

sony hack case study

Most companies focus on likely disaster scenarios in crafting their business continuity plans, Inscoe says. The now infamous Sony hack was the culmination of a variety of technical and non-technical vulnerabilities. We then brought in outside experts to help us learn how the intrusion occurred and to conduct an investigation to determine the nature and scope of the incident. It is mind-boggling to me, particularly when you compare it to real things that have actually happened. Assuming the hack was the work of the North Koreans, none of the edits made a bit of difference. Personal details from approximately 77 million accounts were stolen and prevented users of Playstation consoles from using the online service; one of the largest data security breaches in history Chung, 2011.

Next