Question: Writing assignment # 1 With today being dominated by digital interconnection, the importance of extensive network security cannot be stressed enough. Protecting data and network
Writing assignment #
With today being dominated by digital interconnection, the importance of extensive network security cannot be stressed enough. Protecting data and network infrastructures becomes an organization's top priority as it navigates the complexities of the global digital landscape. The organization chosen for this writing assignment is Sony Corporation. This writing assignment is meant to give a comprehensive evaluation of the network security of Sony Corporation.
Sony Corporation is a major Japanese manufacturer of consumer electronic products, including film, music, games, and financial services. We will follow the National Institute of Standards and Technology NIST Cybersecurity framework to conduct the evaluation framework because of its holistic approach.
Organization's Profile:
Sony Corporation's two main headquarters are located in New York, NY US and Tokyo, Japan. Sony follows several different types of organizational structures. It primarily focuses on functional and businesstype groups. Sony also includes geographic elements that can be found in matrix organizations. A matrix organization is a corporation where each division is led by and has its executive. The current CEO of Sony is Kenichiro Yoshida, who has been the CEO since April
Sonys primary industry is consumer electronics, which includes the following: electronics, entertainment, gaming, and financial services. Their purpose is to Fill the world with emotion through the power of creativity and technology. As of now, Sony carries the largest console market share, holding over While in the music department they come second with over market share. It is predicted that Sony will continue to hold its stance as first and second within the music and electronic industries.
Relevant Elements of Data and Network Infrastructure:
Evaluation Framework:
Threats and Vulnerabilities:
Identify potential threats and vulnerabilities to the organization's network security. Consider factors such as malware, insider threats, phishing, and external attacks.
Risk Assessment:
Conduct a risk assessment to evaluate the likelihood and impact of identified threats. Assess the potential damage to the organization's data and network infrastructure.
Compliance:
Evaluate the organization's compliance with industry regulations and standards related to network security.
Security Policies and Procedures:
Examine the organization's security policies and procedures. Assess whether they are comprehensive, uptodate, and effectively communicated to employees.
Incident Response Plan:
Evaluate the organization's incident response plan. Check if there are protocols to detect, respond to and recover from security incidents.
Security Awareness Training:
Assess the level of security awareness training provided to employees. Welltrained staff is often a critical defense against various cyber threats.
Network Architecture:
Analyze the organization's network architecture. Consider factors like segmentation, access controls, and encryption methods in place.
Selection of Evaluation Framework:
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
