Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 1)Threats to information systems are categorized to be intentional and unintentional. (note: your answer cannot have the Sony attack as an example) Find two

Problem 1)Threats to information systems are categorized to be intentional and unintentional. (note: your answer cannot have the Sony attack as an example)

Find two examples using the web of intentional threats where an IS or more has been exposed. Discuss each example in detail and indicate

why the threat was intentional

what was the harm done

what were the means of recovery for the loss/ damage

what changes were implemented to make security more protective

Find two examples using the web of unintentional threats where an IS or more has been exposed. Discuss each example in detail and indicate

why the threat was intentional

what was the harm done

what were the means of recovery for the loss/ damage

what changes were implemented to make security more protective

Problem 2) Investigate the Sony PlayStation Network hack that occurred in April 2011.

What type of attack was it?

Was the success of the attack due to technology problems at Sony, management problems at Sony, or a combination of both? Provide specific examples to support your answer.

Which Sony controls failed?

Could the hack have been prevented? If so, how?

Discuss Sonys response to the hack.

Describe the damages that Sony incurred from the hack.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions