Comparison Of Cyber-Attack On Sony Case Study: War With North Korea

Improved Essays
Abstract
This case study examines the correlations between the cyber-attack on Sony and the release of the movie ‘The Interview,’ and the reaction of the American public. After the recent cyber-attacks on Sony, cyber warfare is becoming more recognizable as the new form of global terrorism. The problems of this case study involve the outrage of North Korea, the freedom of the American people, and the damage done to Sony as a business directly and indirectly. This case study begins to explain how cyber warfare represents a dangerous weapon that has the potential to alter the way the world conducts war.

Sony Case Study: A Cyber War with North Korea
Sony Computer System Hacking

On November 22, 2014, Sony computer systems were hacked as well as a number of other areas such as gaming systems, customer accounts, and Sony websites. From this cyber-attack, many private and humiliating emails from Sony employees were leaked, alongside personal information of celebrities and private photos and account information of Sony’s customers (“North Korea Berates,” 2014). Although these cyber-attacks were just recently discovered, they have been occurring since the spring of this year.
…show more content…
Cyber warfare may very well be the upcoming new version of conventional warfare. Before this year, a cyber-attack was not something companies would look forward to, but it was also not something that countries would threaten war over. But today, cyber-attacks cause much more damage and are more detrimental to a company than before. Sony is proof that not only are companies affected by cyber-attacks, but now our entire nation can be affected. If technology continues to advance in this way, and cyber-attacks become more common, then it could be possible for a cyber-attack to take down an entire country with the press of a button and without a single bullet being

Related Documents

  • Improved Essays

    The issues relating to the discerning use of technology has continually caused the attitude and perceptions to the social and ethical considerations of the use of technology. Stereotypically shown in the movie Die Hard 4.0, the unethical use of technology (Hacking/cracking) and other techniques was frequently used to achieve and set the tone of the movie. Unethically used by the main antagonist of the film “Thomas Gabriel” Used these techniques to create a “fire sale” which is broken down into 3 stages. To take out the transport networks, then utilities such as electricity and the water grid. Finally, to infiltrate secure financial records to gain a monetary boost to the attacker from the so called “fire sale” This example demonstrates how…

    • 208 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Case Study John Brennan

    • 423 Words
    • 2 Pages

    1. Introduction Last year on October 12, Director of Central Intelligence of America (CIA) John Brennan’s American On-Line (AOL) e-mail account was hacked by a probable high school student. News of the incident was first reported by the New York Post after the teenager established communication with the newspaper the week before. Data breach activity took place against Brennan by the teenager who was social engineering to take control of Brennan’s AOL e-mail account. The hacker wasn’t working alone there were two other people helped him on the breach.…

    • 423 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I agree that the comparison of the cybersecurity to the healthcare system is a great analogy, although not perfect. Professor provided examples where a cybersecurity breach and healthcare system are similar and could be treated in a similar way to stop or prevent a different outbreak. Even though most cyber-attacks are minor, there will time when all the information gathered from those small attacks that could be formulated into recipe of a major attack. Also, you pointed out that it is important to realize that it is impossible to prevent all and any cyberattacks, and that they evolve at a fast rate.…

    • 157 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    9/11 Turning Point

    • 298 Words
    • 2 Pages

    September 11, 2001, was a terrible tragedy by any measure, but it was not a historical turning point. It herald a new era of international relations in which terrorists with a global agenda prevailed, or in which such spectacular terrorist attacks became commonplace. On the contrary, 9/11 has not replicated. Despite the attention devoted to the “Global War on Terrorism,” the most important developments of the last ten years have been the introduction and spread of innovative information technologies, globalization, the wars in Iraq and Afghanistan, and the political disruptions in the Middle East.…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    "In this day of age, we have dedicated large portions of our lives to the internet and staying connected. This allows a wide variety of knowledge and entertainment to be brought into every home. However, the vast amount of resources available online can possibly be a bad thing. Countless organizations of crime and terrorism roam the online world with a sense of anonymity and the resources to mass spread their ideologies across the world. This has led to the creation of governmental organizations such as the National Security Agency (NSA) that hold the main goal of trying to prevent terrorist and crime organizations from carrying out evil and violent attacks on the people of the United States and the world.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Sony Rhetorical Analysis

    • 1844 Words
    • 8 Pages

    Sony says that there exists evidence that the world is crying out to labor beneath its firm but benevolent heel. You know, it can lie as much as it wants, but it can't change the facts. If it could, it'd sincerely prevent anyone from hearing that some of you are probably wondering, “Why doesn't it reveal the truth about itself?” The answer I shall provide is broad, plain, and even more than sufficient. You see, there are plenty of examples, of which I will spare the reader, of Sony's attempts to gum up what were once great ideas.…

    • 1844 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Cyber attackers have come from in the country and outside of the country, and these other countries need to know that we aren’t going to accept it. In the debate, Clinton said, “the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information.” (Washington Post)…

    • 1185 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Organizations will be left scrambling to throw bodies at problems. Those “bodies” won’t fare well, security will become even more insecure in corporate networks, and organizations will become revolving cyberdoors. Anyone daring to use the word “cyber” in any resume or social capacity will become pariahs. Corporate America and beyond, you created this mayhem. There is plenty of bodies able, capable, and willing of solving problems with regards to security, but you have become so blindly by shiny marketing…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    The aforementioned Stuxnet worm that delayed Iran’s nuclear capabilities by two years is used to support this claim. The author also supports this claim by claiming a cyber attack could potentially cripple an economy. Simply deleting data from banking systems could result in economic crisis. Harris cites an instance where the military planned to attack Iraq’s banking system prior to the 2003 invasion, however the military called off this plan because they feared the attack may accidentally spread to France’s banking system. This shows the nature of digital warfare is similar to that of physical warfare; an attack can have accidental effects on unintended targets.…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Due to the ambiguity of this issue and the problems that its creates actually in the international arena, such as the case, of 2016, United Estate’s election, where several agencies attributed to Russia’ government the cyber attack of democratic data’s bases, to sabotage its…

    • 1419 Words
    • 6 Pages
    Superior Essays