Assignment 5

.docx

School

Louisiana State University, Shreveport *

*We aren’t endorsed by this school

Course

703

Subject

Business

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by DukeChinchilla4255

Report
Assignment 5 Louisiana State University, Shreveport MBA703 February 18, 2024
As read about in Information Systems: A Manager’s Guide to Harnessing Technology there are many steps a company can take to prevent cyber-attacks from occurring. Some of the critical controls that could have been employed to prevent this attack include controlled use of credentials, malware defenses, monitoring, audit logs, data encryption/protection and having an incident response plan/team (Sanchez,2016). Organizations who adopt these critical controls are less likely to be attacked and are more capable of preventing and responding to future attacks. The 2014 hack on Sony was not the company’s first attack either. While it was not as large the company suffered a massive breach to their online network and at the time it was the largest breach of personal data in history (Sanchez,2016). After this breach, it was released that Sony did not encrypt its data and did not have proper security measures in place. It was also revealed that the company did not use up to date applications or employ firewalls to protect information at all. Sony released that it was going to rectify these issues and the company was going to implement new security and procedures to prevent this from happening in the future (Sanchez,2016). The company should have learned from their initial attack in 2011 and had stated that they were going to introduce monitoring and malware defenses. If even a few critical controls were implemented, then the company would have been notified of the 2014 breach and would have been able to respond accordingly even with it being “a very sophisticated cyberattack” (Sanchez,2016). Sony obviously did not adequately handle their technology when it came to being breached. After the attack in 2014, the company made a list of changes they said they would make (The Sony Pictures Entertainment Hack Case Assignment). A few of these included securing their firewall, data encryption/ protection and two step authentications. As long as these things as well as the other systems they stated are put in place the company should be in a lot better of a spot to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help