Read the Case Study 7-2, Sony Pictures: The Criminals Won. Answer the following questions:
- Setting aside the political issues between North Korea and the United States, is there a reasonable way to respond to an anonymous threat found on the Internet somewhere?
- What accessUp and data protection controls would you recommend Sony use to provide better security for unreleased digital films and e-mails?
- If you were a hacker, what approach would you have used to break into Sony’s system?
- What do you think the most important SETA elements would be to prevent future hacker attacks against Sony or other media firms?