Currently, organizations are facing a major challenge in physical security. More compromises occur in the computer and technology environment as a result of increased technology. It is possible for an individual to access unauthorized information using smartphones, tablets, laptops, and USB hard drives since they are portable. Initially, computers were locked in rooms and used by a few people since only large mainframe computers were available. Today, it is easy to access company data remotely using mobile laptops as well as desktop computers. Therefore, it is difficult to protect the system, networks, and data because of portability nature of computers. The dynamic and complex environment has caused an increase in theft, accidents, sabotage, vandalism and fraud which increase costs for organizations. The paper aims to present a scenario of unauthorized access that occurred on Sony picture.
It was easy to physical access Sony network since an individual from the inside facilitated an authorized entry according to Salted Hash and GOP statement. The primary objective of the physical entry was to advocate for equality. Sony uses information technology in the locking of the entries; thus, it was essential for the attacker to use the inside individual to gain access. It is difficult to recover evidence that shows breaches of physical security since the inside people can remove or tamper with the evidence. Inability to trace or determine an individual that facilitate unauthorized access to Sony picture led to suspending of the Sony activities for a day.
Ragan, Steve. “Hackers suggest they had physical access during attack on Sony Pictures.” Salted Hash- Top security news 2014. 17 April 2014. <https://www.csoonline.com/article/2851649/physical-security/hackers-suggest-they-had-physical-access-during-attack-on-sony-pictures.html>.