Free Essay

The Sony Hack

In:

Submitted By joanahadd
Words 1751
Pages 8
Media Ethics - Assignment n°3
JOANA hADDAD

MEADIA ETHICS
_
RESCUE ME

SPRING 2015

The new school

Joana Haddad

Media Ethics - Assignment n°3

I . Situation

Rescue Me is a drama that centers on the inner working of Engine 62, a New York City firehouse, and the personal and emotional battles of its members in a post-9/11 world. The TV show is mostly centered around Tommy Gavin, a veteran firefighter whose life is in turmoil as he copes with stresses and fears of his job as well as the separation from his wife Janet. Tommy is lost, just like all other firefighters.
In the June 20th, 2006 episode titled Sparks, Tommy Gavin was at a breaking point. The character was involved in a controversial storyline: Tommy flies into an angry rage, throws Janet down on the couch, rips her shirt off, lifts her skirt up, and basically ‘rapes’ her. However, the way the scene unfolded on screen, it was almost as if Janet enjoyed Tommy forcing himself on her. Janet never said the words “No” or “Stop”, she did physically try to get Tommy off of her when he first attacked her. But moments later she gave in, and seemed to approve what was going on. At the end of the scene, Tommy stood up, apologized for ripping her shirt, and left Janet’s house with a smirk on his face – he seemed quite pleased with himself.

Television reviewers, bloggers, and fans complained about the scene. There was a debate about whether Tommy had raped Janet or not. Janet's reaction and Tommy's expression caused as much reaction as the assault itself, with critics saying that it made rape look unimportant, unrealistic, and that Tommy's actions were condoned. It obviously shocked some of the viewers. Is this scene appropriate for a cable TV network ?
What are the implications of Janet’s reaction ?

The new school

Joana Haddad

Media Ethics - Assignment n°3

II. VALUES

1. T h e A r t i s t i c v a l u e

According to the Oxford Dictionary, Art is “the expression or application of human creative skill and imagination, typically in a visual form such as painting or sculpture, producing works to be appreciated primarily for their beauty or emotional power”. Art, at its simplest, is a form of communication. It means whatever it is intended to mean by the artist herself, and this meaning is shaped by the materials, techniques, and forms of the art, as well as the ideas and feelings it creates. Art can also simply refer to the developed and efficient use of a language to convey meaning with immediacy and or depth. Art is an act of expressing feelings, thoughts, and observations. Painting is an art form as much as a movie or a TV show. And art is aimed to express something. From a personal point of view, I consider that the act of creating is already an expression of art.
The TV show Rescue Me and more particularly the episode Spark, gather together writers, directors, actors, costume designers among others, to create something aimed to tell a story. They have created something, and as a matter of fact, it is fair to consider it as a piece of art. I agree on the fact that Rescue Me is a very hard and devastating TV show; Heroes are antiheroes, sex is violent, alcohol is omnipresent, people maintain weird relationships and some of the characters are destroyed.
Rescue Me shows something real and I believe that the artistic value is very important in this case. It implies a true freedom creatively speaking.

2. F r e e d o m o f s p e e c h

The Supreme Court has interpreted the First Amendment's protection of artistic expression very broadly. It extends not only to books, theatrical works and paintings, but also to posters, television, music videos and comic books -- whatever the human creative impulse produces.

The new school

Joana Haddad

Media Ethics - Assignment n°3
The fundamental principle come into play whenever a court must decide a case involving freedom of expression. The « content neutrality » cannot limit the government’s expression just because any listener, or even the majority of a community, is offended by its content. In the context of art and entertainment, this means tolerating some works that we might find offensive, insulting, outrageous, or just plain bad.

3. W o m e n ’ s r i g h t a n d r e s p e c t
But it doesn’t mean that the rape is something acceptable. When we talk about real life, not art, a lot of important values affects at different levels; Women’s dignity and respect are essential values in the Spark episode. Tommy treats Janet as a piece of meat, and he has no right to forces him into her. We live in a society where women are trying to become as valuable as men, as strong as them. Gender’s equality won’t happen if networks show that kind of example.

III. ETHICAL PRINCIPLE

Aristotle regards the ethical virtues (justice, courage, temperance and so on) as complex rational, emotional and social skills. What we need, in order to live well, is a proper appreciation of the way in which such goods as friendship, pleasure, virtue, honor and wealth fit together as a whole. At the first sight, showing a rape scene and transmit to the viewers bad values, may seem unethical. But virtue is a mean state between extremes of excess and deficiency. Aristotle describes this mean state as an “intermediate relative to us”. The point for the media, and especially for the broadcast market, is to find a gap between the freedom of speech, which is fundamental to a democratic society, and issues of morality. The ethical issue is how far the cable TV network should risk shocking its viewers’s sensitivities ? in order to correctly report the TV show and more generally art itself ? They have to respect viewers, but they also need to express themselves.
According to Aristotle, incontinent agents suffer from a sort of weakness of the will that prevents them from carrying out actions in conformity with what they had reasoned. Somehow, the overwhelming prospect of some great pleasure seems to obscure one's perception of what is truly good. But this difficulty,

The new school

Joana Haddad

Media Ethics - Assignment n°3

Aristotle held, need not to be fatal to the achievement of virtue. Today’s media main role is to entertain, to inform and to educate, but more than 60% of the TV’s content is violent. Sex is everywhere, alcohol and fierceness also. Cable networks are usually specialized: Music, sports, pornography, we can find any network we want, but they strictly spread their trained content. Concerning Rescue Me, the TV show was broadcast at
10 pm, which is a good gap between Sparks’s violence and the type of audience you can have at thats time.
Moreover, each viewer have the choice to watch the TV show or not.
Spark was not the first episode of the first season, viewers knew what they were looking for. To access a well being, viewers have the possibility to decide, whether they are willing to watch the show or not. They are responsible for their own choices. If the moral values of the TV show does not comply to their beliefs, they can opt to switch the channel. This is the freedom of action. I believe that the FX network has found a good compromise. The choice they made seem to be fair and reasonable.

IV. LOYALTIES

1.

Duty of The story

One of the most important elements in a story is characterization: making the characters seem vivid, real, alive. To be real and interesting, they need to have conflicts, dilemmas, opportunities, they have to make choices. They need to have a sexuality, a mentality, but more importantly, they need to be like us. Rescue Me just like any good movie has very strong characters. Most of them are alcoholics and have big attitudes, but they are also fragile and vulnerable. Rescue Me presents dark heroes. It is raw and sometimes ugly, but there is a truthfulness to the storylines. Each character has its own personality, and that is why the show is very appreciated. It tackles the daily drama of the life-and-death situations associated with being a firefighter, which means a hero, while exploring the ways the men use dark humor to protect their true emotions.

The new school

Joana Haddad

Media Ethics - Assignment n°3

Men have attitude, they are complex and they live intricate situations. The purpose of showing the « rape » scene was not to show sex on TV, but a way for Tommy Gavin to reclaim his power and boost his ego: this kind of scenes are essential to understand the complexity of the character. It tells a lot about Tommy, Janet, and their relationship.
I don’t think that Tommy’s rape is ethical, on the contrary, but I believe that the episode is; it is a reflection of real life. Tommy is a broken character, unpredictable and very lonely. He acts just like he is: violently. V . JUGEMENT

After the show aired, TV message boards all over the internet blew up with chatter about what went down. Many viewers were outraged at what they had just seen. The co-creator Peter Tolan sent a message via
TWoP to explain the original intent of the scene. He wrote:

“I’ll admit this is extremely dicey stuff. The idea of any woman ‘enjoying’ being raped is repellent, and caused all of us (and the network) a great deal of concern. But again, these are seriously damaged people who are unable to express their emotions — and so expression through brutality has become expected.”

Images and discussions of sex in society existed centuries before the dawn of television. The works of Marquis de Sade of France in the 1700’s describe sexuality as something violent and cruel. I remember studying a very chocking scene at the Sorbonne, but his work is historically considered as a master piece of the french literature. Rape and sexual violence have been a part of every war ever fought, from the ancient
Sumerians to our present day. To omit them from a narrative centered is fundamentally false and dishonest, and would have undermined one of the themes of the arts: that the true horrors of human history derive from ourselves and our lives.

Similar Documents

Premium Essay

Sony Data Breach

...Sony Pictures Data Breach Review In this paper I am going to be talking about all aspects of the data breach Sony Pictures experienced starting in early November 2014. As you would expect a data breach is a very serious issue especially for big corporations such as Sony. This data breach all started on November 24th, 2014 when Sony realized they were becoming a victim of a high profile studio wide cyberattack. A cyberattack is when a company has unauthorized people or computers accessing protected files and information. For a big corporation like Sony you can imagine this caused a big uproar and got the public’s attention. The cyberattack was traced back to a group that called itself #GOP or the Guardians of Peace. This group of hackers is supposedly from North Korea which does not makes this situation any better. There were a number of things Sony was worried about be accessed, such as unreleased movies, employee information, customer information, and other sensitive material. The first step of this hacking process involved GOP illegally acquiring a valid digital certificate from Sony. After gaining access to the company from this certificate, GOP was then able to release a malicious software called Destover, which sneaks into the systems and takes over, giving access to the data. After that Sony’s next move was to immediately blacklist that copy of the digital certificate, so if it were to be used again it would be flagged as malware and not allowed passed the other security...

Words: 3014 - Pages: 13

Premium Essay

Security in the News

...“BlackPOS” (a.k.a. “Kaptoxa”), a malware strain designed to siphon data from cards when they are swiped at infected point-of-sale systems running Microsoft Windows. Attack 1 Reference(s) Constantin, L. (2013). Krebs on Security. Retrieved from http://krebsonsecurity.com/2014/09/home-depot-hit-by-same-malware-as-target/ Attack 2 Title: The Sony Pictures hack, explained Type of Attack Description: hackers implanted Wiper on Sony's computer infrastructure, a malware software program designed to erase data from the servers. That malware uses Microsoft Windows’ own management and network file sharing features to propagate, shut down network services, and reboot computers Attack Description: It was an attack by North korea in response to the movie “The Interview” a comedy about a plot to assassinate North Korean leader. The attackers stole huge swaths of confidential documents from the Hollywood studio and posted them online in the following weeks Attack 2 Reference(s) Peterson, A. (2014). The Sony Pictures hack, explained. Retrieved from http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/ Attack 3 Title: Evernote Pounded By Aggressive Cyber Attack Type of Attack Description:...

Words: 884 - Pages: 4

Premium Essay

Internet Technology, Marketing and Secuirty

...convenience several problems with internet security occur on a daily basis. “Individuals, Businesses, and government agencies are all vulnerable to computer crime. Computer hackers-unauthorized users-sometimes work alone and sometimes in groups. Sometimes hackers break into computer systems just to show that they can do it; other times they have more sinister motives.” (Boone 509) In April 2011 Sony, a leading manufacturer of audio, video, communication and information technology products, experienced a security breach that effected seventy seven million Sony users. Throughout the years Sony has experienced several hacking incidents. One of Sony incidents was when George Hot, also known as GeoHot, cracked security on the Play Station 3 and then gained access to pirated games. Sony pursued legal action against Hotz, which then led to another hacker joining Hotz against Sony. The hacker “Anonymous”, which had previously hacked Gawker, Amazon, MasterCard, and computer security firm HBGary, released the following threatening statement on its site: “Congratulations, Sony” You have now received the undivided attention of Anonymous. Your recent legal action again our fellow hackers, Geo Hot and Graf Chokolo, have not only alarmed us, it has been deemed wholly unforgivable. “You have abused the judicial system in an attempt to censor information on how your products work. You have victimized your own customers merely for possessing and sharing information, and continue...

Words: 1353 - Pages: 6

Premium Essay

Playstation Network

..................4 Relation to DB communications……..........................................................................................4 Features…………………………………………….....................................................................5 The Dashboard……….…………………………………………………....................................6 How it works……………………………………………………………………….………….6-7 Online Gaming……………………………………………………………………..……………7 The PlayStation Store………………………………………………………………….……...7-8 Sony is Hacked…………………………………………..……………………….……………8-9 The Return of PSN……………………………………..………….…………………...……9-10 Conclusion……………………………………………………………………………….……...10 Bibliography…………………………………………………………………………..…..…11-12 Executive Summary The PlayStation is the foundation of the PlayStation Network. So, this process basically started its reality transition in 1994. The PlayStation Network operates similarly to the definition of what database communications is. There are many features that make the gaming console itself, as well as the network, attractive. Sony collaborates with many other companies to make this product more versatile. The dashboard is similar to the Xbox Live’s in a sense that if gives the user total control but in its own unique way. The way the PlayStation Network actually works is not complicated. It is in fact very similar to a computer. The...

Words: 2191 - Pages: 9

Premium Essay

Business Fraud (Sony Corp.)

...Sony Corp. Systems and Information Breach A Review of Business Fraud   Abstract This paper explores the Sony Corp hacking case committed in April 2011, with the use of five published articles that support a review of business fraud against the company. The paper will include the following requirements: 1. A summary of a case study and include how the fraud was perpetrates, the characteristics of the perpetrators who committed the fraud, the role the auditors had in the case, and the direct and indirect effects the incident had on the organization’s stakeholders (customers, vendors, employees, executive committee, and board of directors) 2. Suggestions and rationalizations concerning the fraud classifications and that the case can be categorized into (based on the data processing model) will be presented 3. Suggestions regarding the types of controls that may have been in place at the time of the violation 4. Recommendations of two (2) types of controls that could be implemented to prevent fraud in the future and additional steps management can take to mitigate losses. 5. Judgment concerning the punishment of the crime (was it appropriate, too lenient, or too harsh) and whether the punishment would serve as a deterrent to similar acts in the future. The assignment will take the Sony Corp. systems fraud case and attempt to evaluate the different approaches and techniques that are used to commit, detect, and prevent computer fraud. Control and security concepts...

Words: 1487 - Pages: 6

Free Essay

Living in the Age of Cyber Attacks and Cyber Warfare

...Living in the Age of Cyber Attacks and Cyber Warfare UMUC   If you asked the average person on the street about cybersecurity and cyber warfare, they would probably say they don’t know much about it other than the fact that it involves computers. In fact, for anyone outside of the cybersecurity industry, the closest thing to cyber warfare that they may have experienced was their viewing of the movie War Games, or the fourth installment of the Die Hard series, Live Free or Die Hard. While those movies had a profound impact on the lives of the characters in the script, the audience probably thought it was merely fiction, not fully based on fact. In Live Free or Die Hard, John McClain (played by the indefatigable Bruce Willis) is attempting to stop a domestic cyber-terrorist who is acting out on a vendetta against the United States. The cyber-terrorist is successful in launching an online attack to overload and destroy a power grid that left much of America’s East Coast in darkness. When I first saw this movie, I was curious if an attack like that was really possible; however, most people around me just labeled the movie as “Hollywood’s overactive imagination”. With cyber attacks literally having the ability to affect lives in a nanosecond, it is vital that everyone understand what cyber attacks entail, the impact of these cyber attacks on a domestic and international scale, and knowing what to expect in the future while living in a world dominated by virtual experiences...

Words: 2352 - Pages: 10

Premium Essay

Internet Technology, Marketing and Security

...vulnerable to security breaches in an attempt to steal the information contained in these databases. One major corporation that suffered a security breach recently was Sony Corporation, which had two database security breaches in 2011. Sony Corporation was founded in May of 1946 and is headquartered in Tokyo, Japan with a U.S. Division called Sony Corporation of America. They have approximately 168,000 employees worldwide. Their major product lines are audio, video, televisions, information and communications, semiconductors, and electronic components. In 2010 global consolidated sales and operating revenue were $7,181,300 billion Yen or approximately $89.8 million US dollars (Sony Corporation, 2012). Sony Corporation has two websites, www.sony.com for the U.S. business lines and www.sony.net for the global corporate site. Each website is very similar in its offerings. Product information is available with detailed specs, and there are options to purchase some products online or links to purchase from a Sony store or retailer. Customization of the VAIO computer line can be done on the website giving the consumer the option to build their computer with more options than would normally be available in retail stores, although stock models can be purchased (Sony Corporation, 2012). Contact can be made with Sony through various means on their website depending on what you need. Technical support requests...

Words: 1790 - Pages: 8

Free Essay

External Intrusion of the Playstation Network

...Intrusion of the PlayStation Network Sony has had recently troubles with hackers intruding into their system and threating all Sony users with the capability of stealing all users’ information, but there was a case on April 20, 2011 that had all Sony employees in shock. One of Sony’s bestselling products, the PlayStation, was taken offline after their company discovered there was an intrusion in the PlayStation Network. For those who are not familiar with the PlayStation Network this is where most of the PlayStation business is done. In the PlayStation Network customers are all registered into this network and most have sensitive information uploaded onto the network including payment information. Hacking this interface would allow access to all users’ personal information which is considered to be a serious problem since one out of four homes either have a PlayStation 3 or PlayStation 4, which all must be registered onto the system before activation. The hackers were able to gain access to three separate gaming systems including PlayStation, Oriocity, and Sony online gaming. Before Sony was able to shut down their systems approximately over a million credit card numbers were reported stolen. It’s not certain exactly when the hackers gained access to the Sony Network but Sony first announced the system had been hacked on April 22, saying an external intrusion had taken place on its systems between April 17 and 19 (Pepitone, 2011). Sony didn’t officially shut down their systems...

Words: 794 - Pages: 4

Premium Essay

Curr

...Current Event: “Lizard Squad Hack Sony Playstation and Xbox An online hacking group named “Lizard Squad” issued and carried out attacks on Christmas against the video game giants, Playstation and Xbox. They accomplished this feat by using a tactic call “DDoS.” MCcormack and Spillett (2014) state that DDoSing occurs when massive numbers of people or automated machines flood servers with external data requests, crippling the computers to the point where they grind to a halt and are effectively frozen (MCcormack & Spillett, 2014). This caused both console users the inability to use their devices due to the digital technology of the next generation consoles. Each require a connection to the Internet to both sign into user profiles and ultimately play a game. Without the servers, the consoles were basically bricks taking up space. This group also has made terroristic threats on the CEO of Sony during one of his flights, stating that there were explosives on board, which resulted in the plane being diverted to be searched. The digital ethical issue with this case is a group that broke into two corporation’s networks and shut down their servers, resulting in a worldwide incident. Users everywhere were affected by this malicious act. I myself was a victim of this attack. I could not even log onto my Xbox. I like to use my console for other entertainment such as streaming Netflix and I was not able to do this. This group has also made claims to have ties to ISIS...

Words: 435 - Pages: 2

Premium Essay

Computer Memory Hacking

...way into your computer without your permission let alone your knowledge to gain information like banking and documents. On a larger scale it also means getting into banks and big companies like Target or more recently Sony to gain access to accounts and thus steal money/information. There is however steps to prevent this from happening with the right equipment. To know how to prevent someone from hacking into your computer you first have to know what tools they use. There are a plethora of programs that are used some being dSniff, Netcat and John the Ripper. DSniff passively monitors a network for interesting data like passwords, e-mails, files etc. Netcat is designed to be a dependable back-end that has features that include port scanning, transferring files, port listening, and worse used as a backdoor. John the Ripper is a popular password testing and breaking programs but hackers would use it for the later. For dSniff, someone would have to first have access to your computer by the user either downloading the program by accident or the hacker pushing it to you. Then the tool is activated and monitors your computer for the right information. John the Ripper is used to break into computers and external hard drives. It would not be a tool that would be used to hack into a Facebook or Gmail account as they have extra measures for that method. Now that we know some different tools that hackers use we need to know some basic steps to stopping the hackers from entering your space...

Words: 774 - Pages: 4

Premium Essay

Business Fraud

...were filed against Sony Corporation for the theft of user data from the PlayStation game network. The lawsuits accuse Sony of negligence and breach of contract for allowing the personal data of more than 100 million on-line video game users to be compromised (Tauriello, 2011). A hacker stole the names, birth dates and possibly credit-card numbers for millions of people who play online videogames through Sony’s sne in Your Value Your Change Short position PlayStation console. This could rank among the biggest data breaches in history. Sony is being criticized for not alerting customers in a timely manner of the possibility that their personal information may be compromised. The main control issue in this case was the lapse of security. Sony was attacked in a number of areas including their website, network, and gamming platform. Several security problems began simply by entering specific searches in Google. Cyber investigators identified numerous loopholes in various pages from Sony websites that were exposed to being exploited. The Java security console alone was easily accessible on several web pages. This provides access to underlying functions of the website including information. This is normally unavailable on a secure website server. The information extracted from this negligence could be used to access servers, databases, and other security resources. In this case, it seems that the hackers essentially could have accessed any technology within the Sony infrastructure that...

Words: 867 - Pages: 4

Free Essay

Hackers: Scourge of the Internet, or Information Superhero?

...Hackers: Scourge of the Internet, or Information Superhero? Kyle Gonzalez ITT Technical Institute Introduction “And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencys is sought... a bored is found.” – Hackers Manifesto It can be seen all over the news. Visa and PayPal taken offline by hackers, Sony’s PlayStation Network brought to its knees, a cyber defense contractor named Stratfor had its servers hacked and corporate emails leaked. Everything that people know about hacking can be summed up in news articles written by the uninformed. Hacking is bad, and there is no arguing that… Or is there? Most of what people know of hacking comes from the news or Hollywood movies such as Hackers and Swordfish. What they see is only one facet of this fascinating, yet misunderstood world. Hacking is not the evil act that some make it out to be. Hacking can also be a good thing. Enter the White Hat, or Ethical Hackers. These are the network security professionals in which no movies are based. Ethical hacking is used to help analyze networks for security flaws, stop attacks in progress and help keep companies in compliance with government regulations such as PCI or SOX. What is Ethical Hacking? Ethical hacking sounds like an oxymoron, but it does exist and is a very handsomely paying career field. The average ethical hacker can make anywhere...

Words: 2096 - Pages: 9

Free Essay

Assignment 4: Internet Technology, Marketing, and Security

...capability to keep that information flowing. There is a problem when someone outside of that business relationship between the business and the consumer interferes, or hacks, that information flow. An entire industry has been created to protect that information flow from being “hacked”. In 2011, Sony went through what is known as the largest security breach in history. The breach affected 77 million PlayStation Network users, 24.5 million users of Sony Online Entertainment and many more customers across the nation. All this was caused, according to Sony, by an “outdated database from 2007” (Lina, 2011). Assignment 4: Internet Technology, Marketing, and Security In 2011, there were more than 300 corporate security breaches. Sony, Citigroup, and Morgan Stanley Smith Barney are among the major firms that have reported to their customers that they have been hacked (Mintzer, 2011). Hacking is continuously happening to companies all over the world. Sony Corporation is a leading manufacturer of audio, video, game, communications, key device and information technology products for the consumer and professional markets. With its music, pictures, computer entertainment and on-line businesses, Sony is uniquely positioned to be the leading electronics and entertainment company in the world. Sony Corporation was founded on May 7, 1946. The headquarters is located at 1-7-1 Konan, Minato-ku, Tokyo 108-0075, Japan. Its corporate executive officers include Howard...

Words: 1284 - Pages: 6

Premium Essay

Strayer Bus 508 Assignment 4 (Diversification)

...Network Sony Corporation is a well diversified company providing many complementary products and services. Not only does Sony offer electronics through its own website, it has a series of online products and services it offers to its users. The PlayStation Network, a part of the Sony Entertainment Network, is one of these many services. Through the PlayStation Network, owners of Sony PlayStation products can play games online with each other. Users can also purchase games and additional items through the PlayStation Network. Credit card information is stored in the network to be used for future purchases. Storing credit card information allows users to make future purchases very quickly, and possibly increases sales. However, its users entrust Sony to handle this information with care. In April 2011, the Sony PlayStation Network had a series of security breaches that not only compromised users’ login, password, and personal information, but also their financial information such as credit card numbers. The Sony PlayStation Network had to shut down completely and did not return fully for over a month. This paper will discuss the PlayStation Network and the recent security breaches. Despite the fact that the PlayStation Network has over 77 million online users, the system was compromised and Sony was unable to respond adequately to the problem. All companies can learn valuable lessons from the 2011 Sony PlayStation Network breaches. Network Within a Network Sony Corporation...

Words: 1593 - Pages: 7

Premium Essay

• Should Producers of Software-Based Services, Such as Atms, Be Held Liable for Economic Injuries Suffered When Their Systems Fail?

...potentially dangerous programming mistakes? The first question in the discussion board is interesting because there can be valid arguments made on both sides of the question. If it is found that the producer could have taken steps to avoid the economic injuries suffered from their software then they should be held liable for the damages but if the damages are no fault of their own then they should not be held liable. There was a recent case that got worldwide attention when hackers broke into Sony’s PlayStation network and stole account information from millions of customers. One article that I read said that there is a class-action lawsuit against Sony because the weakness in the network was well known and documented but they chose not to rectify the problem and therefore exposed their customers to potential lost. The lawsuit alleges “that Sony failed to encrypt data and establish adequate firewalls to handle a server intrusion contingency.” (1) IW by Matthew J. Schwartz. In terms...

Words: 703 - Pages: 3