Read the Case Study 7-2, Sony Pictures: The Criminals Won. Answer the following questions:
Setting aside the political issues between North Korea and the United States, is there a reasonable way to respond to an anonymous threat found on the Internet somewhere?
What accessUp and data protection controls would you recommend Sony use to provide better security for unreleased digital films and e-mails?
If you were a hacker, what approach would you have used to break into Sonys system?
What do you think the most important SETA elements would be to prevent future hacker attacks against Sony or other media firms?