Preview

Soney Security Violations Case Study

Good Essays
Open Document
Open Document
394 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Soney Security Violations Case Study
You are assigned to the CIO's Office for the Sony Corporation. You have been assigned to a special task force to respond to recent media publications about the security violations involving the Sony Playstation 3. Some of the accusations include:

Sony hasn’t yet recovered from the PlayStation Network outage, but it has already been hit ... It alleges breach of warranty, negligent data security violation

Related video Mobile apps accused of privacy violations

Compliance violations via email increase ... A week after shutting down its PlayStation Network (PSN), Sony has ... an issue highlighted recently by security

Sony says credit card data of PlayStation users may have been stolen in an ... It says it has hired an outside security ...
…show more content…
Product lines include VPN, Firewall, Wireless LAN, Biometrics, and Access Control. Using the two sites that contain evaluated products (www.commoncriteriaportal.org or http://www.niap-ccevs.org/cc-scheme/) identify the products that will provide Sony with the optimal solution and use the Security Targets to describe the security functionality it provides, and state how this product reduces the potential risks identified in the media.

Hint: Google "sony playstation 3 + security violations." Once you understand the problems about the Sony product, select products and use the Security Target to describe how it can reduce risk.

The written assignment will be completed and submitted as an individual; however, you can work together to discuss how these commercial products reduce risk.

Additional guidance:

Products that have an EAL rating of 1 adds 1% to the overall IT budget. Your goal is to select the best products and minimize cost.
Products that have an EAL rating of 2 adds 2% to the overall IT budget. Your goal is to select the best products and minimize

You May Also Find These Documents Helpful

  • Better Essays

    This IT security report will go over the top security IT threats, security considerations, security policies, and awareness training. The security report will help the design team protect the new system from the threats that have been identified during the design phase of the new system. At the end of this report there will be provisions suggested that will help Kudler Fine Foods internal staff to help validate security measures once the new program is up and running so they can keep the system safe from hackers, attacks or any…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 4

    • 555 Words
    • 3 Pages

    Use the CPI to calculate the estimate at completion (EAC) for this project. Is the project performing better or worse than…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Also, the company agreed to a settlement in the amount of $10 million through a class action lawsuit. Payments were disbursed into an escrow account to each victim. In addition, they created a new position of chief information security officer, responsible for overseeing and protecting all customer…

    • 264 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Rookie Chief Iso

    • 3874 Words
    • 16 Pages

    The CISO is the executive responsible for the organization's entire security posture, both physical and digital. CISOs also frequently own or participate closely in related areas such as business continuity planning, loss prevention and fraud prevention, and privacy.…

    • 3874 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    I have also contacted the media to ensure that this incident gets the coverage it deserves. In cracking this site, I have sent specially crafted requests to the server with my browser ID spoofed to that of an iPad. Please know that while this was not instrumental in this wondrous crack, it WAS poetic in many ways. I also gave Goatsec the same warning that they gave AT&T... none at all, to patch their gaping hole. User Accounts have been deleted, and passwords changed," the note said. (Mills,…

    • 1694 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Pr Final Project

    • 1427 Words
    • 6 Pages

    * Tel-Net also needs to explain why after thousands of complaints they didn’t realize the problem until five days after the cable was damaged.…

    • 1427 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    choice point case study

    • 539 Words
    • 3 Pages

    Notify ChoicePoint that it could get back to those customers whose data has been hacked. Had to say this before…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This marketing plan is looking at Sony’s Playstation 3 (PS3). This powerful system is the cutting edge of gaming entertainment. The PS3 has been out for a little under a decade, and in that time, it has proved to be a hardcore gamers’ dream to have one. Sony got into the console gaming market in late 1994. The concept for the original Playstation was actually brought up in a joint partnership with Sony and Nintendo in the late 1980s; however, when the time came to announce their new hardware, Nintendo re-read over their earlier contract and found the agreement to no longer be agreeable. As a result, Sony took all the research they had done and began work on the Sony Playstation.…

    • 1992 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Computer Security Breach

    • 870 Words
    • 4 Pages

    Bad things can happen at any place and any time when talking about computer security incidents. Not everything goes perfectly fine when a computer system is involved. It could be something as simple as a bad cable or it could be as horrible as a hacker trying to steal all of your information. Either way, it probably isn’t going to end well.…

    • 870 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    sony rootkit

    • 2342 Words
    • 10 Pages

    This fact pattern is regarding the misbehavior of Sony and its brand of music cds. In an effort to combat piracy, Sony hired a company to design a copy-protection system called XCP. This software was imbedded onto Sony’s cds and this software was designed to prevent unauthorized replication. If you tried to play a protected disk in your computer, you first had to agree to install a Sony music player to listen to it. Yet, this software used malware tactics, it took over the computer and it exposed it to potential system compromise and failure.…

    • 2342 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Xbox 360 vs. Ps3 Song

    • 316 Words
    • 2 Pages

    You And I In A Little Toy Shop(0.05) Buy A Bunch Of Games And a New Xbox Play Until The Break Of Dawn Now Suddenly Something wrong Microsoft Just Stick To Software…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    erp cost

    • 476 Words
    • 3 Pages

    Statement of Purpose: The objective of this assignment is simple to evaluate the cost occurred in ERP packages for e.g. Cost in design…

    • 476 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Bradley, P., Thomas, J., Gooley, T. and Cooke, J.A. (1999), “Average ERP installation said to be a…

    • 8337 Words
    • 40 Pages
    Powerful Essays