Unit II Reflection Paper
Use your textbook and search the library for information regarding the Sony hack of 2014. Then, in two pages, ensure that
you do the following:
Summarize the 2014 Sony hack, including the type of breach that occurred.
Explain what you believe the motives were behind the attack and whether you believe the attack was done by outsider(s),
insider(s), or inside-outer(s). Justify your answer.
Discuss the five areas of cybersecurity’s holistic approach, and relate each area to the Sony hack.
Discuss the takeaways from the Sony hack.
Include at least one scholarly source in your paper, and follow APA style.
Information about accessing the grading rubric for this assignment is provided below.Unit II Reflection Paper
Use your textbook and search the library for information regarding the Sony hack of 2014. Then, in two pages, ensure that
you do the following:
Summarize the 2014 Sony hack, including the type of breach that occurred.
Explain what you believe the motives were behind the attack and whether you believe the attack was done by outsider(s),
insider(s), or inside-outer(s). Justify your answer.
Discuss the five areas of cybersecurity’s holistic approach, and relate each area to the Sony hack.
Discuss the takeaways from the Sony hack.
Include at least one scholarly source in your paper, and follow APA style.
Information about accessing the grading rubric for this assignment is provided below.