Preview

Analysis and Criticism of the Sony PlayStation Network Shutdown

Powerful Essays
Open Document
Open Document
4371 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis and Criticism of the Sony PlayStation Network Shutdown
Since the early 1970 's, video games have increased in popularity to become a multi-billion dollar business today (Goldman, 2010). On May 16, 2005, the Japanese electronics maker Sony launched the PlayStation 3. This was the third home video game console produced by the company, and looked to capitalize on the immense popularity of the previous version. With the advent of high speed internet, online video gaming has become an increasingly important part of the industry. As such, Sony has included access for all users to the PlayStation Network platform on their consoles. This network allows users to play games with each other, purchase games, and more, all via the Internet. Unfortunately, in late April of 2011, the PlayStation Network suffered an attack on its services from hackers outside the company. The series of events that followed this attack, outlined the security flaws of Sony 's network, their questionable management of the situation, and the reaction of its customers.

The first day of the attack on Sony 's networks occurred on April 16, 2011. However, this first attack was not on the PlayStation Network, but on the company 's personal computer (PC) gaming service. Hackers broke into this network and were able to retrieve the personal details of approximately 25 million users. The next day, a similar attack occurred on the PlayStation Network itself, where hackers broke in and stole the personal details of 77 million users. These personal details included user names, passwords, birth dates, credit card information, and more. Despite the large amount of data accessed in the attack, Sony was not able to detect the breach of security until April 19. The next day, the network was shut down, and all PlayStation 3 users were unable to access any of the online features of their consoles. Sony told its customers that it was aware of the problem (C. Williams, 2011; M. Williams, 2011).

On April 21, the company responded to users once again



References: Albanesius, C. (2013/01/24). Sony fined £250,000 over PlayStation Network hack. PC Magazine. Retrieved from http://www.pcmag.com/article2/0,2817,2414637,00.asp Edwards, C. & Yasu, M. (2011/05/07). Sony offers network users free identity-theft service after hacker attack. Bloomberg. Retrieved from http://www.bloomberg.com/news/2011-05-06/sony-offers-network-users-free-identity-theft-service-after-hacker-attack.html Goldman, T. (2010.08.27). Videogame industry worth over $100 billion worldwide. The Escapist. Retrieved from http://www.escapistmagazine.com/forums/read/7.228443-Videogame-Industry-Worth-Over-100-Billion-Worldwide Olivarez-Giles, N. (2011/05/06). Sony CEO apologizes for PlayStation Network hack, announces ID-theft insurance. Los Angeles Times. Retrieved from http://latimesblogs.latimes.com/technology/2011/05/sony-ceo-stringer-apologizes-for-playstation-network-hack-outage-announces-1-million-identity-theft-.html PlayStation Network outage. (2013.02.15). In Wikipedia, The Free Encyclopedia. Retrieved 15:26, 2013/02/17, http://en.wikipedia.org/w/index.php?title=PlayStation_Network_outage &oldid=539180133 Spinello, R. A. (1997). Ethics and information management. Casae Studies in Information and Computer Ethics, 2(9). Upper Saddle River, NJ: Prentice Hall. Willams, C. (2011.05.05). PlayStation hack: Timeline of huge security breach. The Telegraph. Retrieved from http://www.telegraph.co.uk/technology/sony/8495072/Playstation-hack-timeline-of-huge-security-breach.html Williams M. (2011.05.01). PlayStation Network hack timeline. PC World. Retrieved from http://www.pcworld.com/article/226802/playstation_network_hack_timeline.html Seybold P. (2011/05/02). PlayStation Network security update [Web log]. Retrieved from http://blog.us.playstation.com/2011/05/02/playstation-network-security-update//

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Final Exam

    • 902 Words
    • 4 Pages

    Let re-learn some stuff and earn some points back. These are questions missed by most of you on the exam.…

    • 902 Words
    • 4 Pages
    Good Essays
  • Good Essays

    On April 17, 2011 PlayStation Network (PSN) was breached by an unauthorized source. Sony believed that the source exposed personal and password information – and possibly credit cards – of an estimated 77 million people. This is considered one of tech’s history’s worst security failures (Cooney, 2011). Due to this breach, Sony has broken many laws. The most critical laws that Sony “allegedly” broke were California SB 1386, California Law 1798.81.5, and California Law 1798.29.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sony says credit card data of PlayStation users may have been stolen in an ... It says it has hired an outside security ...…

    • 394 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Kerr, D. (2012, August 7). Amazon addresses security exploit after journalist hack. Retrieved from http://news.cnet.com/8301-1009_3-57488759-83/amazon-addresses-security-exploit-after-journalist-hack/…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Best Essays

    Nortel Case Report

    • 3865 Words
    • 16 Pages

    3Austin, Ian, “Ex-Nortel Executives’ Fraud Trial to Begin.” The New York Times. January 15th, 2012.…

    • 3865 Words
    • 16 Pages
    Best Essays
  • Good Essays

    On April 27, 2011 more than 70 million customers of Sony’s PlayStation Network and Qriocity music service received a disturbing email saying that everything the company knew about them including where they live, when they were born, their logins and passwords, and possibly more information had been hacked into. From a statement made by Sony, “If you have provided your credit card data through PlayStation Network or Qriocity out of an abundance of caution we are advising you that your credit card number (excluding security code) and expiration date may have been obtained.” (http://www.nytimes.com/2011/04/28/arts/video-games/sony-playstation-security-flaw-tests-consumer-trust.html). Imagine the shock and awe of users when they received this notification. This security breach is one of many that Americans fear on a daily basis.…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Chewy 123 Case Study

    • 371 Words
    • 2 Pages

    He'd been working with a subgroup of the loose-knit hacking movement "Anonymous" to disrupt the networks of Sony Pictures,…

    • 371 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The data breach resulted from Target’s failure to segregate systems handling payment card data from the rest of its network (Bertrand, 2014). The attackers gained access to the company’s network with a username and password stolen from Fazio Mechanical Services who provided refrigeration and HVAC systems for them. With just that information alone, the attackers were able to upload malware programs on Target’s Point of Sale (POS) systems.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The breach happened to be a very experienced gentleman that hacked into the servers of T-Mobile to access some U.S confidential emails and files, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities.…

    • 241 Words
    • 1 Page
    Good Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    This crime is an example of a failure of authentication, not network break-in. ChoicePoints’s firewalls and other safeguards were not overcome or harmed. To avoid such problems in the future, the likely action that should be taken by the similar companies is to applying more authentication methods. For example by using a unique user name and determines that the person is legitimate through the input of a correct password. The other authentication mechanisms to prove the legitimate identity are user-selected passwords, system-generated passwords, passphrases, question-and-answer passwords, tokens, and various biometric characteristics and such methods entail verification of users through matching fingerprints, facial features, irises, or voices.…

    • 401 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Slavery began in America when the first African slaves were brought to Virginia in the 16th century. Slavery assisted in the formation, growth, and development of the United States both the north and the south. It had a huge impact on the growth of an emerging nation, increasing economic growth, urbanization, and industrialization of the United States. During the first half of the 19th century, criticism and defenses of slavery evolved, but many slave owners disagreed that slaves should be freed and given the same rights of white men. The disagreements about whether slaves should be considered equal to white men created more conflict between the North and South in the 19th century, causing the Civil war to be an irrepressible conflict.…

    • 858 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Data Breach Research Paper

    • 4412 Words
    • 18 Pages

    Numerous data breaches and computer intrusions have been disclosed by the nation’s largest data brokers, retailers, educational institutions, government agencies, health care entities, financial institutions, and Internet businesses. A data breach may occur when there is a loss or theft of, or other unauthorized access to, data containing sensitive personal information that results in the potential compromise of the confidentiality or integrity of data. Sensitive personal information generally includes an individual’s name, address, or telephone number, in conjunction with the individual’s Social Security number, driver’s license number, account number, credit or debit card number, or a personal identification number or password. Breach notification laws enacted by many states require the disclosure of security breaches involving sensitive personal information (Stevens, 2008).…

    • 4412 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    A majority of American adults (70%) with an internet connection had played a game in the last six months and 60 million American purchased a video game in the last year.…

    • 1561 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    It in Video Game Industry

    • 1852 Words
    • 8 Pages

    "Video Game Industry 2010: Reinventing the Games Business." Game Industry News, Interviews and Videos | Game Theory. http://gametheoryonline.com/2010/07/28/video-games-industry-gaming-business/ (accessed October 10, 2011).…

    • 1852 Words
    • 8 Pages
    Better Essays

Related Topics