dslreports logo
Search similar:


uniqs
389

siljaline
I'm lovin' that double wide
Premium Member
join:2002-10-12
Montreal, QC
kudos:18

siljaline

Premium Member

Fortune digs into the details of the Sony hack in a three-part story

From Kim Zetter via @ Wired.com
A timeline for the now famous Sony hack -
»fortune.com/sony-hack-part-1/
HELLFIRE
MVM
join:2009-11-25
kudos:30

HELLFIRE

MVM

Some personal "food for thought" items I pulled out while reading thru all 3 parts

quote:
But it’s clear that Sony, which failed to employ several basic safeguards, didn’t put up much of a fight.
quote:
In congressional testimony, Tim Schaaff, the chief of Sony’s PlayStation Network, used language that was strikingly similar to what Sony Pictures would employ years later: The company, he insisted, had fallen victim to a “highly sophisticated” breach, “unprecedented in its size and scope,” despite “very, very strong” security.
quote:
It’s not known precisely what new safeguards Sony Pictures implemented in the wake of Hirai’s promises; the company declined to provide examples. But it’s painfully clear whatever steps it took weren’t enough.
quote:
Spaltro seemed more afraid of the costs than the risks. “We literally could go broke trying to cover for everything,” he told CIO. “I will not invest $10 million to avoid a possible $1 million loss,” he reasoned.
quote:
For more than two months Sony’s hackers roamed freely, identifying what they wanted to steal. This was possible because the studio, with few exceptions, didn’t segregate or provide extra security for even its most precious secrets.
quote:
Two hours later the computer would restart to display another chilling message: “Operating system not found.”
quote:
Whodunit? Twenty-five days after the hack, the FBI attributed the Sony attack to North Korea. The determination came extremely fast, and it was rare for the agency to identify a government as the culprit.
...major takeaway?

a) as the article points out, "what security?"

b) While Sony licks its wounds, it's easier for them to play the victim and the "external force" conspiracy card... go figure.

If anyone else reads something into this, or something different, feel free to shoot down my 00000010bits

Regards