The 2014 Sony Pictures Hack: Theories of the Truth

Contributed by Mikal Chavez

Many users in today’s society are precarious about the topic of information security while exploring the depths of the virtual world. Fortunately, there are pre-configured layers of security provided by default via the operating systems firewall. However, how much protection do we truly believe the manufacturers and service providers offer in the terms of safeguarding our personal information?

In the content of this report, I intend to expand the recognition of newly discovered system vulnerabilities through malware insertion. These malicious tactics include cross-site scripting (XSS), embedded cookies and email spoofing used to exploit the information of a targeted user or enterprise. In doing so, my purpose is to share knowledge of the enterprise level of attack and inform best practice of disaster response methods by examining The 2014 Sony Pictures Hack.

This document is in PDF format. To view it click here.

Rate this article: 
Average: 2 (2 votes)