{"id":875,"date":"2011-06-03T11:06:33","date_gmt":"2011-06-03T16:06:33","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=875"},"modified":"2011-06-03T11:06:33","modified_gmt":"2011-06-03T16:06:33","slug":"game-over-lessons-from-the-sony-playstation-network-fiasco","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2011\/06\/game-over-lessons-from-the-sony-playstation-network-fiasco\/","title":{"rendered":"Game over! Lessons from the Sony PlayStation Network Fiasco"},"content":{"rendered":"

For those of you who are not online gamers, you might not be aware of the major hacking of the Sony PlayStation Network that occurred in April, which caused the company to shut down that service. Recalling an earlier post, 10 things to consider before you migrate to cloud services<\/a><\/strong>, there are some lessons to learn from the Sony experience…<\/em><\/p>\n

In mid- to late-April, reports began to circulate in the media that one of Sony’s networks had been hacked. The only sign of trouble was that there had been a major outage of the online service for Sony’s PlayStation 3 and portable consoles, the PlayStation Network. However, as the outage continued and frustration among gamers grew, on 22 April Sony reported on its blog that its PlayStation Network and Qriocity services had been affected by an \u201cexternal intrusion\u201d<\/em>. The company suspended the two services until further notice, and explained that its efforts \u201c<\/em>to resolve this matter involve re-building our system to further strengthen our network infrastructure<\/a><\/em>\u201d<\/em>.<\/p>\n

What eventually became clear was that details for PlayStation Network’s members, which number 70+ million,\u00a0had been stolen. The stolen information included names, addresses, and possibly credit card numbers (TechCrunch<\/a>). As expected, Sony has been working assiduously to rebuild its network. Additionally, it has established a free identity theft insurance protection programme for each of its PlayStation Network and Qriocity members who sign up for the protection. The programme includes up to USD 1 million in coverage per person to cover costs associated with an identity theft incident linked to its hacked network. However, while Sony tries to extricate itself from this mess, there are a number of lesson we can learn.<\/p>\n

1. Do not underestimate the commitment of hackers.<\/strong> Sony is a huge and reputable company, hence there is an expectation of top-notch online security. However, there are cyber-criminals who have dedicated themselves to breaching cloud security. For example, on top of all of Sony’s problems with its PlayStation Network, on 22 May, news began to trickle out that Sony BMG in Greece had been hacked and user data had been exposed (Sophos<\/a>). The stolen information included the names, email addresses and usernames of registered site members. On 24 May, it was reported that the website for Sony Music Japan was hacked. Although data from the site was exposed, it appeared not to include personal user information. However, the attackers left some evidence of their infiltration and highlighted additional weaknesses of the site (Sophos<\/a>). Then on 25 May, Geek<\/a> reported that Sony Canada has been hacked and the personal details for 2,000 members had been stolen.<\/p>\n

2. Businesses are not as vigilant as they should be<\/strong>.\u00a0 Cloud providers and businesses that are operating or involved in cloud-like services are often aware of the type of threats and ways they could be vulnerable online. However, over the last few years, experts have been of the view that cloud operators and providers in particular have not been vigilant enough to try to keep one step ahead of the criminals.<\/p>\n

3. Encryption is not a panacea for online security. <\/strong>In an article recently published by the BBC<\/a>,<\/p>\n

William Beer, director of Price Waterhouse Cooper’s security division, says “even if credit card details are encrypted, there is software that may be able to decrypt it given enough processing power” once it has been stolen from the cloud itself.<\/em><\/p>\n

Encryption is often seen as a silver bullet. We need to be very careful because there are many different types of encryption. It can introduce an air of complacency into organisations and what we’re starting to see are criminals actually looking to the cloud.<\/em><\/p><\/blockquote>\n

Hence the objective of online security is really to prevent<\/strong> a breach. Once a network has been successfully hacked and information stolen, the thieves can then concentrate on cracking the encryption.<\/p>\n

4. Cloud\/network security is an intensive undertaking. <\/strong>As unpalatable as it might be, online security is a resource intensive undertaking \u2013 not only in terms of cost, but with regard to the manpower and effort that must also be continually made available. It is not enough to design and implement the agreed security systems, considerable and comprehensive testing must be performed regularly. The systems must also be upgraded as and when new threats are reported, and not necessarily based on a scheduled timeline only.<\/p>\n

In closing, it is important that we learn from Sony’s experience. The company has estimated the cost of the PlayStation Network breach at USD 171.5 million (PC Magazine<\/a>), which might be a conservative figure, in light of the fact that the network has only in recent days resumed service. Further, the figure does not factor in the cost of the Sony BMG Greece, Sony Music Japan and Sony Canada \u00a0breaches, along with any other hacks that have occurred but have not been as widely reported (e.g. Sony Thailand and Sony Indonesia). Ultimately, a pre-emptive approach would be far cheaper than the cost (not just financial) of all of the repercussions that have already occurred, and will most likely continue for months and possibly years to come.<\/p>\n

_____________<\/p>\n","protected":false},"excerpt":{"rendered":"

For those of you who are not online gamers, you might not be aware of the major hacking of the Sony PlayStation Network that occurred in April, which caused the […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[17,27,11,6],"tags":[3,38,39,41],"class_list":["post-875","post","type-post","status-publish","format-standard","hentry","category-caribbean","category-computing","category-ict-tech","category-internet","tag-cloud-computing","tag-data-protection","tag-equipment-security","tag-privacy","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-e7","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=875"}],"version-history":[{"count":13,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/875\/revisions"}],"predecessor-version":[{"id":897,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/875\/revisions\/897"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}