The Sony case study provides a foundation for which to base your ongoing project on, however you are encouraged to conduct further research to engage with the nuances of the case and to enforce your reasoning. (See Sony’s case study and course learning material attached) Address the following points in your analysis: • Identify the threat Sony faced in the 2014 hack, and explain their motives. Explain whether or not you think the aspects of Sony’s sector made it vulnerable to the threat you have identified. • Offer an explanation of the methods of attack the threat actor employed to breach its cybersecurity, and justify your reasoning. • Describe a scenario of what method of attack at least one other type of threat actor could use in the future, and why. The answer should be between 400(min) and 500(max) words.
#Identify #organizations #threats #Sonys #case #study