Preview

Sony PSN Data Leakage

Best Essays
Open Document
Open Document
1598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sony PSN Data Leakage
Running Head: PLAYSTATION NETWORK DATA LEAKAGE 1

PlayStation Network Data Leakage:
One of the Largest Data Security Breaches in History
Heng Sue Chin
2012551219
The University of Hong Kong

Author Note,
This paper was prepared for CCST9029 Cyberspace Crime: Technology and Ethics, taught by Dr. K.P. Chow, tutored by Ms. Vivien Chan.
PLAYSTATION NETWORK DATA LEAKAGE 2
Abstract
PlayStation Network, known as PSN, is a free online platform for users to play and buy online games, interact with friends and family and surf the net provided by Sony Computer Entertainment, Inc. On 19th April 2011, PSN was struck by hacker and this resulted in an outage of PSN. It was believed that approximately 77 million users’ personal information was stolen by hacker. This case is highlighted because it vividly depicts the issue of data leakage and its effect to the users. I will firstly discuss how PSN works and how it was hacked under technical analysis. Next, I will touch on some legal issues which Sony violated in certain countries and some analysis on different countries’ lawsuit against Sony. Lastly, I will analyze the ethical issues pertaining to this case.

PLAYSTATION NETWORK DATA LEAKAGE 3
PlayStation Network Data Leakage:
One of the Largest Data Security Breaches in History
PSN is a unified online gaming service provided by Sony Computer Entertainment to be used with its video game consoles. In the early stage, Sony did not provide any unified online service for its users. There was no support for network features and no interoperability between games. Then, PSN was created and it served as a free online platform for users to play and buy online games; interact with friends and family from all around the world; and surf the internet. On 19th April 2011, users of PlayStation found out that PSN services were down. What caused this outage? Sony claimed that the outage was due to an “external



References: Agnello A. J. (2012, October 23). Lawsuit Against Sony Over The Great PlayStation Network Hack of 2011 Arthur, C., Stuart, K. (2011, April 27). PlayStation Network users fear identity theft after major data leak Payment Card Industry Security Standards Council. (2009). Introduction and PCI Data Security Standard Overview

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    On April 17, 2011 PlayStation Network (PSN) was breached by an unauthorized source. Sony believed that the source exposed personal and password information – and possibly credit cards – of an estimated 77 million people. This is considered one of tech’s history’s worst security failures (Cooney, 2011). Due to this breach, Sony has broken many laws. The most critical laws that Sony “allegedly” broke were California SB 1386, California Law 1798.81.5, and California Law 1798.29.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Compliance violations via email increase ... A week after shutting down its PlayStation Network (PSN), Sony has ... an issue highlighted recently by security…

    • 394 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. The increase in cybercrime has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercrime is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like free TVs, or you have won $1,000.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Data Breach Research Paper

    • 4412 Words
    • 18 Pages

    Numerous data breaches and computer intrusions have been disclosed by the nation’s largest data brokers, retailers, educational institutions, government agencies, health care entities, financial institutions, and Internet businesses. A data breach may occur when there is a loss or theft of, or other unauthorized access to, data containing sensitive personal information that results in the potential compromise of the confidentiality or integrity of data. Sensitive personal information generally includes an individual’s name, address, or telephone number, in conjunction with the individual’s Social Security number, driver’s license number, account number, credit or debit card number, or a personal identification number or password. Breach notification laws enacted by many states require the disclosure of security breaches involving sensitive personal information (Stevens, 2008).…

    • 4412 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    5. Goessl, L. (2012). Op-Ed: Nissan recently hacked, corporate hacking a growing issue. Available: http://digitaljournal.com/article/323723. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Good Essays

    competes virtually in its own market, pursuing the casual gamer. Microsoft and Sony lose money on sales of their…

    • 1411 Words
    • 6 Pages
    Good Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    This report about the five most significant security breaches of the past six months ago.…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Gaming Consoles Compared

    • 688 Words
    • 3 Pages

    “The console wars continue to rage on. Ever since the PlayStation 3 arrived on the market to challenge the Xbox 360 in 2006, gamers have argued about the merits of each system.” (Schedeen 2006). I, having owned both systems, am going to compare and contrast some key features found in these two major consoles. This comparison is based on the most recent versions of both consoles – the 'Slim ' variations of both the Xbox 360 and the PlayStation 3, disregarding previous feature sets (Schedeen 2006).…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Malaquitas234

    • 485 Words
    • 2 Pages

    26/10/2012 – Course Introduction. 8/22. 2. Industry Analysis. (Case: Sony PlayStation 3: Game Over?) (Case: Home Video Games: Generation Seven). 8/27 ...…

    • 485 Words
    • 2 Pages
    Satisfactory Essays