Uncategorized

Sony Hack 2014 (Cybersecurity Unit 2)

Then, in two pages, ensure thatyou do the following:Summarize the 2014 Sony hack, including the type of breach that occurred.Explain what you believe the motives were behind the attack and whether you believe the attack was done by outsider(s),insider(s), or inside-outer(s). Justify your answer.Discuss the five areas of cybersecurity’s holistic approach, and relate each area to the Sony hack.Discuss the takeaways from the Sony hack.Include at least one scholarly source in your paper, and follow APA style.Information about accessing the grading rubric for this assignment is provided below.