Secure Systems and Malware

computer science

Description

Module 3 Discussion - Secure Systems and Malware In November of last year, Sony Pictures Entertainment was hacked. Confidential data was released including personal information about Sony Pictures Entertainment employees and their families, internal emails, salary information, and unreleased Sony films. Hackers who identified themselves as the ‘Guardians of Peace’ demanded that Sony cancel the release of ‘The Interview’, a comedy about a plot to assassinate the North Korean leader, Kim Jong-un. The ‘Guardians of Peace’ claim to have taken more than 100 terabytes of data from Sony. United States intelligence officials, based on their analysis, alleged that the attack was sponsored by North Korea. A White House spokesman had this to say in December: http://www.abc.net.au/news/2014-12-19/sony-hacking-a-serious-national-security-matter-says-white-house/5977852 Discuss: Based on the allegations, what is an appropriate response and why? What is the role moving forward for governments of the world in responding to hacking and/or accusations that they are involved in hacking? Hints: You may wish to examine different news articles about this in addition to the link provided. You may wish to consider Sony’s response in addition to that of the United States government. You are being asked for your opinion, but the best answers will contain a solid rationale and/or additional facts with appropriate citations and references, often from sources outside the core course readings. Please post your original post (as a reply to this post - BLUE button) by Sunday, February 8, 11:59 PM. This is marked for content, participation and presentation. Please respond to your peers (as a reply to their posts - GRAY button) by Sunday, February 15, 11:59 PM. The first response is marked for content, participation and presentation. Subsequent posts are marked for participation only. Limit the number of posts to approximately 5, and the size of your posts to approximately 500 words.


Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.