Question: Problem 1)Threats to information systems are categorized to be intentional and unintentional. (note: your answer cannot have the Sony attack as an example) Find two

Problem 1)Threats to information systems are categorized to be intentional and unintentional. (note: your answer cannot have the Sony attack as an example)

Find two examples using the web of intentional threats where an IS or more has been exposed. Discuss each example in detail and indicate

why the threat was intentional

what was the harm done

what were the means of recovery for the loss/ damage

what changes were implemented to make security more protective

Find two examples using the web of unintentional threats where an IS or more has been exposed. Discuss each example in detail and indicate

why the threat was intentional

what was the harm done

what were the means of recovery for the loss/ damage

what changes were implemented to make security more protective

Problem 2) Investigate the Sony PlayStation Network hack that occurred in April 2011.

What type of attack was it?

Was the success of the attack due to technology problems at Sony, management problems at Sony, or a combination of both? Provide specific examples to support your answer.

Which Sony controls failed?

Could the hack have been prevented? If so, how?

Discuss Sonys response to the hack.

Describe the damages that Sony incurred from the hack.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!