Two Hacking Incidents JP Morgan (Bank) And Sony Pictures Essay

Questions:

1. Sony Pictures hacked, confidential emails and films leaked?

2. JP Morgan hack affects most US citizens?

Answers:

Introduction

This report is on two stories; the first one is about Sony pictures been hacked and the second one is about JP Morgan, an American bank been hacked. Both the two scenarios were caused due to the malicious activities of the hackers. Sony has faced this kind of situation earlier and yet they did not tighten their network security. The company should enforce good networking systems. The second organization JP Morgan bank; individual details were leaked in public. They should have hired ethical hackers so that the network security could have been better. The Company should incorporate ethical hacking in their system to stop this kind of hacking incidents. These hacking incidents can ruin the reputation of the company and damage their clients evidently (Goldstein, 2010).

Actor Network Theory

Actor network theory or ANT is concerned with the procedures by which investigative question get to be shut, thoughts acknowledged, instruments and techniques embraced - that is, with how choices are made about what is known.

Actor: Any component which curves space around itself, makes other components subordinate upon itself and decipher their will into the dialect it could call its own.

Actor Network: A varied network of allied interests

1. Sony Pictures hacked, confidential emails and films leaked

Hackers attacked Sony pictures in November 2014. This incident led the company to take decision of turning of their systems.

Actants: Hackers; Sony (company)

How the actants are acting: It was yet another hit to Sony, which does not have the best notoriety for security, taking after a series of assaults against its PlayStation Network. As insights about the assault rose, it has to be clear that data extends from representative subtle elements - including individual data and messages of big names - to unreleased movies being made open. The assault against Sony Pictures prompted the FBI cautioning US organizations that hackers have utilized vindictive programming to dispatch "damaging" assaults against American associations. At the season of composing, there are no reports about the criminal. North Korea was blamed for this incident at first because the company has made a film about the attempt to assassinate the leader of the country. However, North Korea is denying of any involvement in this incident. Whoever executed the assault, it has been yet another humiliating security episode for Sony.

Who is a hacker: In the context of computer security, hacker is somebody who looks for and abuses shortcomings in a PC framework or PC system. A huge number of reasons, for example: benefit, dissent, challenge, enjoyment, or to assess those shortcomings to help with evacuating them may propel programmers (Mcfedries, 2010). The subculture that has advanced around programmers is frequently alluded to as the PC underground and is currently a known group. While different employments of the word programmer exist that are identified with PC security, for example, alluding to somebody with a propelled comprehension of PCs and PC systems, they are infrequently utilized as a part of standard connection. They are liable to the longstanding programmer definition contention about the term's actual significance. In this debate, the term programmer is recovered by PC software engineers who contend that somebody who breaks into PCs, whether computer security expert (white hats) or computer criminal (black hats), is all the more fittingly called a cracker.

How cyber crime is controlled: The penetration and attack tests are run in the company can distinguish those powerless focuses in the system that can be effortlessly gotten to from both outer and inward clients (Engebretson, 2010). In the wake of recognizing these centers, you would have the ability to thwart strikes from external sources and right the pitfalls that could transform into the section demonstrate for gatecrashers hack into your framework. The test must be done from both the internal and outside perspectives to recognize all the powerless core interests (Forte, 2010). Acquaint true blue sifting programming activities with perceive all area centers from the web into the internal arrangement of the association. Any attack to the framework needs to start from these core interests (Farsole, Kashikar and Zunzunwala, 2010). Perceiving these segments concentrate however, a straightforward errand is not in the smallest degree. It is perfect to take the help of skilled good software engineers who have taken phenomenal framework security get ready to perform this errand adequately.

Why the company should use ethical hacking: The Company should incorporate ethical hacking in their system to stop this kind of hacking incidents. These hacking incidents can ruin the reputation of the company and damage their clients evidently. To safeguard their reputation ethical hacking should be introduced in their system. Each and every possible step must be taken to make each one of the customers of the framework aware of the pitfalls of security and the critical security practices to minimize these threats. The organization can coordinate the social-building tests to center the customer care. Until each one of the customers is aware of particular variables related to the framework, affirmation isn't possible in the honest to goodness sentiment the term.

2. JP Morgan hack affects most US citizens

JP Morgan is one of the largest banks in America, it was attacked by the hackers in 2014. The information of the customers were traded off by the criminals.

Actants: Hackers; JP Morgan (Assaulted organization); Customers

How the actants are acting: A virtual assault on JPMorgan Chase traded off the report of seventy six million families and 7 million little companies, a tally that people past evaluations by the bank and puts the disruption among the largest ever. The subtle elements of the break uncovered in a securities recording on 2014 developed during an era when buyer trust in the automated operations of commercial America is shaken. Various different retailers and Home depot have maintained significant information ruptures. The data of 70 million others and 40 million cardholders were traded off at Target a year ago, while an assault at Home Depot in September influenced fifty six million cards.

Perhaps if JP Morgan have utilized moral hacking methods that was utilized by the Bank of England, something that could have maybe kept one of the biggest information ruptures ever. The digital assaults against the bank at first happened in August, which prompted the FBI testing Russian government connections to the JP Morgan hack. On the other hand, paying little mind to who completed the assault, the outcomes were to a great degree extensive, with the names, locations, telephone numbers and email locations of 76 million family units and seven million little business records uncovered.

What is ethical hacking: Ethical hacker is a networking and computer administration specialist who efficiently actions to enter a PC system for its owners with a goal of discovering vulnerabilities in security that malevolent hackers could possibly abuse (Bodhani, 2012). Ethical hacker utilize the same strategies and methods to test and detour a framework's resistances as their less-principled partners, but instead than exploiting any vulnerabilities discovered, they record them and give significant counsel on the best way to alter them so the association can enhance its general security.

Why JP Morgan should have used Ethical hacking: The reason for ethical hacking is to assess the security of a system or framework's base In-text: (Beaver, 2010). It involves discovering and endeavoring to misuse any vulnerability to figure out if unapproved access or different pernicious exercises are conceivable. Vulnerabilities have a tendency to be found in poor or uncalled for framework design, known and obscure equipment or programming defects, and operational shortcomings in procedure or specialized countermeasures. One of the first cases of moral hacking happened in the 1970s, when the United States government utilized gatherings of specialists called "red groups" to hack its own PC frameworks (Palmer, 2001). It has turn into a sizable sub-industry inside of the data security showcase and has extended to likewise cover the physical and human components of an association's resistances. An effective test does not fundamentally mean a system or framework is 100 percent safe, yet it ought to have the capacity to withstand computerized assaults and untalented programmers. Any association that has a system joined with the Internet or gives an online administration ought to consider subjecting it to an infiltration test. Different guidelines, for example, the Payment Card Industry Data Security Standard oblige organizations to direct entrance testing from both an inside and outside point of view on a yearly premise and after any huge change in the framework or applications.

Conclusion

This report is on the two hacking incidents that took place in JP Morgan (bank) and Sony Pictures. These two incidents were caused due to lack in the security system or the good and advanced knowledge of the cyber criminals. Both these incidents could have been avoided if the networking of these organizations would have been better. They can employ ethical hackers who would find the loopholes in their system and try to fix the problem or report them to the organization. The purpose behind ethical hacking is to survey the security of a framework or structure's base. It includes finding and attempting to abuse any defenselessness to make sense of if unapproved access.

References

Beaver, K. (2010). Hacking for dummies. Hoboken, NJ: Wiley Pub.

Bodhani, A. (2012). Bad... in a good way [ethical hacking]. Engineering & Technology, 7(12), pp.64-68.

Cache, J., Wright, J. and Liu, V. (2010). Hacking exposed wireless. New York: McGraw-Hill.

Cloud Security and Privacy * Hacking * iPhone SDK Development. (2010). ITNOW, 52(2), pp.28-28.

Engebretson, P. (2010). The basics of hacking and penetration testing. Waltham, MA: Elsevier.

Farsole, A., Kashikar, A. and Zunzunwala, A. (2010). Ethical Hacking. International Journal of Computer Applications, 1(10), pp.14-20.

Forte, D. (2010). Preventing and investigating hacking by auditing web applications. Network Security, 2010(2), pp.18-20.

Goldstein, H. (2010). Hacking for humanity. IEEE Spectr., 47(2), pp.33-34.

Hacking popular among students. (2010). Network Security, 2010(9), p.20.

Koch, C. (2010). A smart vision of brain hacking. Nature, 467(7311), pp.32-32.

Mcfedries, P. (2010). Hacking the planet [technically speaking. IEEE Spectr., 47(8), pp.23-23.

Palmer, C. (2001). Ethical hacking. IBM Syst. J., 40(3), pp.769-780.

Philipp, A., Cowen, D. and Davis, C. (2010). Hacking exposed computer forensics. New York: McGraw-Hill/Osborne.

Wilhelm, T. (2010). Professional penetration testing. Rockland, Mass.: Syngress.

How to cite this essay: