Assignment 5

docx

School

Louisiana State University, Shreveport *

*We aren’t endorsed by this school

Course

703

Subject

Business

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by DukeChinchilla4255

Report
Assignment 5 Louisiana State University, Shreveport MBA703 February 18, 2024
As read about in Information Systems: A Manager’s Guide to Harnessing Technology there are many steps a company can take to prevent cyber-attacks from occurring. Some of the critical controls that could have been employed to prevent this attack include controlled use of credentials, malware defenses, monitoring, audit logs, data encryption/protection and having an incident response plan/team (Sanchez,2016). Organizations who adopt these critical controls are less likely to be attacked and are more capable of preventing and responding to future attacks. The 2014 hack on Sony was not the company’s first attack either. While it was not as large the company suffered a massive breach to their online network and at the time it was the largest breach of personal data in history (Sanchez,2016). After this breach, it was released that Sony did not encrypt its data and did not have proper security measures in place. It was also revealed that the company did not use up to date applications or employ firewalls to protect information at all. Sony released that it was going to rectify these issues and the company was going to implement new security and procedures to prevent this from happening in the future (Sanchez,2016). The company should have learned from their initial attack in 2011 and had stated that they were going to introduce monitoring and malware defenses. If even a few critical controls were implemented, then the company would have been notified of the 2014 breach and would have been able to respond accordingly even with it being “a very sophisticated cyberattack” (Sanchez,2016). Sony obviously did not adequately handle their technology when it came to being breached. After the attack in 2014, the company made a list of changes they said they would make (The Sony Pictures Entertainment Hack Case Assignment). A few of these included securing their firewall, data encryption/ protection and two step authentications. As long as these things as well as the other systems they stated are put in place the company should be in a lot better of a spot to
prevent an attack from happening again. While the company stated these controls were to be put in place there is no way of knowing if the company fully followed through as they didn’t after the 2011 attack. Once the attack occurred the US Government did step in to investigate. The government only defends critical infrastructure which does not include companies such as Sony (Schmitt, 2014). While the government shouldn’t be responsible for all companies, they should put an emphasis on protecting the information of Americans at all US companies. While this responsibility ultimately falls to the companies there should be established guidelines set by the government to hold companies accountable and audits to ensure that is the case (Schmitt, 2014). The US Government stepping in after an attack is a complicated topic. The current international laws in place only allow a government to respond forcefully when there is proof that the attack came from another government and was an “armed attack” with “use of force” (Schmitt, 2014). While the government stepping in to respond to an attack is one way to support companies, it can also support just by giving them the tools they need to respond to them accordingly themselves. The number of cyber attacks continue to increase in America. A lot of which happen to private companies (DeSimone & Horton, 2016). Just because a company is private, does not make it any less important to protect Americans information. Therefore, the US Government really needs to put together a cohesive policy on how all companies, private and public, can legally respond to such attacks (Schmitt, 2014) . In addition, the government needs to support American companies by allowing all companies the tools needed to address these issues.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References Case Assignment: The Sony Pictures Entertainment Hack DeSimone, A.& Horton, N. (2016). Sony’s Nightmare Before Christmas, The 2014 North Korean Cyber Attack on Sony And Lessons for the US Government Actions in Cyberspace. Retrieved from: https://apps.dtic.mil/sti/pdfs/AD1046744.pdf Information Systems: A Manager’s Guide to Harnessing Technology. (2010). Sanchez, G. (2016). Case Study: Critical Controls that Sony Should Have Implemented. Retrieved from: https://sansorg.egnyte.com/dl/xZ10arL86x Schmitt, M. (2014). International Law and Cyber Attacks: Sony v. North Korea. Retireced from: https://www.justsecurity.org/18460/international-humanitarian-law-cyber-attacks-sony-v- north-korea/