Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
Check Instructions
Style:
APA
Subject:
IT & Computer Science
Type:
Case Study
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 18.23
Topic:

Case Study (Security Target) IT & Computer Science Case Study

Case Study Instructions:

You are assigned to the CIO's Office for the Sony Corporation. You have been assigned to a special task force to respond to the incidents in 2011 involving Sony Playstation 3 and the incident in 2014. Some of the accusations include:
Sony hasn’t yet recovered from the PlayStation Network outage, but it has already been hit ... It alleges breach of warranty, negligent data security violation
Related video Mobile apps accused of privacy violations
Compliance violations via email increase ... A week after shutting down its PlayStation Network (PSN), Sony has ... an issue highlighted recently by security
Sony says credit card data of PlayStation users may have been stolen in an ... It says it has hired an outside security ...
Additionally, Sony admitted to having suffered a major cybersecurity breach in 2014; hackers not only erased data from its systems, but also stole, and released to the public, pre-release movies, people’s private information, and sensitive documents
Your assignment is to recommend specific commercial products that have been tested and complies with the common criteria. Students need to include various product categories (e.g., VPN, Firewall, Wireless LAN, Biometrics, Access Control, etc.). Using the two sites that contain evaluated products (https://www(dot)commoncriteriaportal(dot)org or https://niap-ccevs(dot)org/cc-scheme/) identify commercial products and use the Security Targets to describe the security functionality it provides, and state how these products reduce the potential risks identified by the media. Select the number of security products that address Sony's vulnerabilities and reduce risk.
Hint: Google "sony playstation 3 + security violations." Once you understand the problems about the Sony product, select a product, and use the Security Target to describe how it can reduce risk.

Case Study Sample Content Preview:

Security Target
Student’s Name
Institutional Affiliation

Security Target
Sony Corporation is highly vulnerable to cyber-attacks. In particular, hackers spend more time searching for system loopholes, which they use to bypass security protocols. In 2011, they accessed data of about 77 million individuals from the PlayStation Network. Some of the information they obtained include passwords, security questions, usernames, email addresses, birthdates, and login details. Gamers using Sony PlayStation were locked out of the system for seven days. In 2014, the same company was hacked by the “Guardians of Peace,” which is a group of cyber attackers from North Korea. These hackers stole more information and leaked some of it on social media. Cybercriminals demanded that Sony Corporation should cancel the launch of a comedy, “The Interview,” which showed two Americans assassinating Kim Jong Un, the North Korean supreme leader. As the new chief information officer (CIO) of Sony Corporation, these incidents reveal that the company needs to improve its systems. The paper focuses on the Security Targets of McAfee Data Loss Prevention (DLP) 11.1 and CloudMask Engine v2.0 to determine how they can be used to reduce Sony’s security vulnerabilities.
The first and most significant product that Sony PlayStation needs to implement to prevent security vulnerabilities in the McAfee DLP 11.1 with an ePolicy Orchestrator 5.10. The developer of this product is Primasec Limited, and it was launched on 8th May 2019 (McAfee, 2019). Specifically, Sony Corporation requires software that monitors the behavior of PlayStation users so that it can identify whether everyone who accesses the system is the real user or not. Besides, not all people with the correct authentication and authorization details have the right to access the PlayStation. The following is the Security Target of the McAfee DLP 11.1:
SectionTitleDescription1IntroductionMcAfee DLP monitors data in physical devices, network protocols, or applications. Indeed, it identifies and safeguards data within a particular network. McAfee DLP offers a proper understanding of data on a specific network, its confidentiality or sensitivity, and how it is accessed and shared. Moreover, it contains DLP Device Controller, ePolicy Orchestrator 5.10.0, DLP monitor, and DLP discover. McAfee DLP requires a computer with a free disk space of 20 GB, 8 GB RAM, and a processor with a speed of 2.66 GHz and above (McAfee, 2019). 2Conformance ClaimsMcAfee DLP 11.1 protects all data within a particular system. Sony Corporation will no longer keep worrying about whether their PlayStations will be accessed after implementing this product.3Definition of the Security ProblemThe primary problem that Sony Corporation has is unauthorized access to its PlayStations by cyber attackers. 4Security ObjectivesMcAfee DLP 11.1 monitors all users who log in to a specific system. As such, it identifies and locks out those with suspicious behaviors and notify security experts.5Definition of Extended ComponentsAdditionally, this product can be used for data encryption so that hackers can find it useless even if they access it.6Security RequirementsMcAfee DLP 11....
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to scientific essays:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!