S6 Discussion (#14): Sonys Response to North Koreas Cyberattack (from Chptr 9, pgs. 436-437 Session 6, Discussion #14 is focused upon Chapter 9, Cybercrime and Information System Security , and the Sony’ Cyberattack case on pages 436-437. Cyber attacks are a rapidly growing security and privacy threat as cloud based systems and all forms of online activity grows among organizations and individuals. What would you recommend in preventing or at least minimizing these threats? Per the start of the case, Sony was facing serious network threats from North Korea, and needed an effective, immediate response. “On November 24, 2014, employees of Sony Pictures Entertainment booted up their computers to find an image of a skull along with a message from a group calling itself the Guardians of Peace. The message read: Weve already warned you and this is just the beginning. Weve obtained all your internal data including your secrets and top secrets [which will be released] if you dont obey us. Please analyze the case and prepare your response to the 3 Critical Thinking Questions on page 437. S6, Discussion Forum 15: Chpts 9 (Sony cyberattack case) and 10 (Discussion Qs 5 and 6 No unread replies.No replies. Hello MIS Students, For this Session 6 Forum, we will be discussing your analysis of the Sony case study from Ch. 9, Cybercrime and Information System Security. We might expect that highly successful, technology-oriented companies would be well-equipped to block cyberattacks. But, as recent history has shown, no organization or individual is automatically safe. What should be done to improve our situation? Please base your discussion on Chptr 9, Pgs. 436-437, Case 2, Sonys Response to North Koreas Cyberattack. Prepare your assessment of the 3 Critical Thinking Questions also listed here. Do you think that Sonys response to the attack was appropriate? Why or why not? What might Sony and the U.S. government done differently to discourage future such attacks on other U.S. organizations? Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks? (Stair, 20170306) Stair, R., Reynolds, G. (20170306). Fundamentals of Information Systems, 9th Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781337515634 Always check citation for accuracy before use. S6: IEA Forum #6: Cyber-Attacks and the 2020 U.S. Elections The United States is facing growing threats from a growing variety of large and small organizations and governments. For this IEA Discussion Forum, consider each of us to be members of the SAME TEAM given the job of reducing the threat of cyber attacks. Suggestions need to be morally and ethically proper, and legally accountable. Please be as objective and non-political as possible in advising governmental and/or private organization managers on general strategies to combat the threats of cyber attacks on the upcoming national elections. Maintain a professional perspective in your discussion and respect the views of one another. Respond as a cyber security consultant in reducing risks of effective attacks. Suggested discussion points: What types of cyber attacks might be experienced? From whom are we most at risk, and WHY? Individuals, governments, non-governmental entities (NGAs) ??? What would motivate these attacks? What can be done to minimize attempts? If attacked, what can be done to identify them early in limiting their impact? If the attacks are somewhat successful, what can be done to reduce the damage to our country?
