This website uses cookies to ensure you have the best experience. Learn more

Security Breach Essay

1832 words - 8 pages

Running Head: SECURITY BREACH

Security Breach faced by Sony Corporation

Introduction
In the global marketplace, to attract the customers and provide relevant information to the customers, internet is used by most of firms as a promotional tool. In this, web-sites, social networking sites, etc. are used by the firms to communicate with the customers. Although, many security tools and techniques are used by the firms to secure the data of firm and customers, yet, some security breaches are also faced by the firms due to technical advancement. For this paper, Sony Corp. is selected that has faced security breach. Sony Corporation is a multinational firm that ...view middle of the document...

com from outside the United States, 2011).
Customization of products for customers: On the web-site of Sony Corporation, the firm provides information about the customization of products for customer. In this, information about the service technician to solve the problems of customer is also provided by the firm to ensure proper handling of the products for its customers (Premium Services, 2011).
Customer information at purchase: The firm provides privacy and security to the customers’ information at purchase. Additionally, the firm also keeps record of the information of customers at purchase. Extra benefits are also provided by the firm for frequent purchasing (Sony Corp. Info, 2011).
So, these areas are effectively promoted and targeted by Sony Corporation on its web-site to attract the customer.
Internet marketing strategies
Various internet marketing strategies are used by Sony Corporation to communicate with the customers about the products. Following internet marketing strategies are used by the firm:
Social networking: Social networking sites like, face book, twitter, etc. are used by Sony Corporation to promote its products and to attract its potential customers in the international market. Online forum is also offered by the firm for its customers to increase their participation in the promotion of its products. Additionally, to solve the problems of online visitors, the firm provides four campuses such as personal computing, home entertainment, digital photography, and business solutions. It helps the firm to maintain interaction with the customers in effective form (Sony’s History -- Through The Eyes of the Company’s Leaders, 2010).
Affiliate marketing strategy: Affiliated marketing strategies are also used by Sony Corporation as a part of internet marketing strategies. Under this type of marketing strategy, the firm displays the banner of its products on other websites to attract the potential customers. This display helps the firm to redirect potential customers towards the website of firm that is beneficial for the firm to communicate with the customers easily. In this type of strategy, some part of profit is also paid by the firm to affiliate marketers for supporting advertising of their products on their websites (Outline of Principal Operations, 2011).
Search engine marketing: Search engine marketing is also used by Sony Corporation to promote its products among the customers. In this, the firm increases its visibility in search engine result pages or web pages through using appropriate key words. It is conducted by the company through search engine optimization, paid inclusion, paid placement, etc. It helps the firm to attract customers through providing needed information about the products (Sony’s History -- Through the Eyes of the Company’s Leaders, 2010).
So, above discussed internet marketing strategies are used by Sony Corporation to attract potential customers and...

Other Papers Like Security Breach

Target: The Largest Data Breach/Attack Essay

1651 words - 7 pages Target, to not only the nation but to the world. The type of data that was stolen during the data breach was information on guest members. This information included guest members names, addresses (physical and e-mail), and/or phone numbers. This information did not include guest members’ social security numbers. The data breach occurred when hackers, according to Target Corporation (2014), “criminals forced their way into our system, gaining access to

Target Credit Card Breach Essay

682 words - 3 pages impacted and involves the theft of data stored on the magnetic stripe of cards used at the stores. Hackers stole personal information including names, phone numbers as well as email and mailing addresses from as many as 70 million customers as part of a data breach it discovered. The cause of the security breach was when hackers first stole a vendor's credentials, which is how they got access to Target's database. Then they used malware to infect

Breach Notification Rules

2619 words - 11 pages disclosures of the information (Coburn, 2009). Definition of Breach Consistent with the definition of breach in HITECH Act, HHS defines breach as the acquisition, access, use, or disclosure of PHI in a manner not permitted by the HIPAA Privacy Rule which compromises the security or privacy of PHI. The use or disclosure of PHI poses a significant risk of financial, reputational, or other harm to the affected individual (OCR, 2009

The Importance of Measuring Enterprise Impact

561 words - 3 pages .  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment.  There are master minded hacker criminals in the technology world that are able to breach any kind of security and take over your computer. Computer systems can be affected by viruses, and other types of malicious

Business Fraud

933 words - 4 pages JP Morgan Chase, U.S. Bancorp, Citigroup, Capital One, and Barclays Bank to name a few. Roughly 50 companies were affected by this major breach one that the Guardian called “the largest Internet security breaches in U.S. history” . Experts say the good news is this was not credit card data, Social Security numbers, or account numbers and passwords. The hackers mainly got email addresses and names. Even though these scammers did not receive credit

Case Study 3

1028 words - 5 pages be confined from other outside entities. It is the duty of Flayton Electronics to ensure the client records are kept safe. An envisioned security breach might have been looked into to prevent the firm from losing their profits. Illegal use of any client information is considered an offense committed against them without their consent. To offset this problem, authentication of credit card transaction needs to be given to the bank during the

Network Security

586 words - 3 pages monthly password change could have kept this from ever happening. Not only did it cause millions in damage but target has to now invest millions in network security. Such a data breach at a smaller business such as Swagger distribution would be devastating that could result in the company going bankrupt. Sources: 1. Internet Security; Reference for Business, Encyclopedia of Business 2nd edition. http://www.referenceforbusiness.com/small

What Is Computer Security?

286 words - 2 pages , conscious, knowledgeable and free decision on the part of legitimate authorities in order to make it insecure. Audit trails tracking system activity, so that when a security breach occurs, the mechanism and extent of the breach can be determined. Storing audit trails remotely, where they can only be appended to, can keep intruders from covering their tracks. Full disclosure to ensure that when bugs are found the "window of vulnerability" is kept as short as possible.

Preventing Security Breaches

542 words - 3 pages Preventing Security Breaches There have been many large security breaches in the past few years, including such huge corporations as JP Morgan, Home Depot and Target. According to a report published by Ponemon Institute in September of 2014, almost half of all U.S. companies experienced a security breach of some kind in the past year. On top of that, an Identity Theft Resource Center report found more security attacks in the U.S. in 2014 than

It Failure Paper

921 words - 4 pages 5 References Kerner, S. M. 2014. How the Target Breach Happened. EWeek. Retrieved from http://www.eweek.com/security/how-the-target-breach-happened-2.html Monocello, M. 2014. How The Target Credit Card Breach Could Have Been Avoided. Business Solutions: Growth Strategies For The IT Channel. Retrieved from http://www.bsminfo.com/doc/how-the-target-credit-card-breach-could-have-been-avoided-0001

Data Breach Research Papaer

1475 words - 6 pages database, it becomes the business's responsibility to protect this information. With the amount of sensitive data being stored in databases, current cyber security measures and laws are not up to par. Infamous Data Breaches In 2015, there were 781 data breaches according to the Identity Theft Resource Center (ITRC). One of these infamous breaches being with Anthem, otherwise known as BlueCross BlueShield insurance company. In this breach

Related Essays

Security Breach Essay

1672 words - 7 pages Security Breach Madeleisy Molerio HCS/533 December 1, 2014 KYM PFRANK Security Breach  Patient medical records privacy and security is the most essential parts of the St. Johns Hospital program of behavior, the hospital take satisfaction in the complete policies and actions that are set to preserve patient privacy. Each worker is apprehended to an extreme standard of upholding the maximum level of confidentiality and privacy when

Ipad Security Breach Essay

1876 words - 8 pages iPad’s Security Breach Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. Sony Ericsson is the largest mobile phone selling and making company and their website has been hacked. Due to hacking of their website, there were 10 core online user accounts affected. In order to prevent the hacking, all servers were

Security Breach At Tjx Essay

1977 words - 8 pages determine for themselves when, and to what extent, information about them is communicated to others.” (Lecture notes) One of the privacy problems includes unauthorized access, which violates the laws and company’s policies, can limit a person to access to his/her personal information, and threaten the company’s legitimacy in its interactions with its stakeholders. In this case, TJX experienced an information security breach, caused over 94

Security Breach Action Plan Essay

1918 words - 8 pages Security Breach Action Plan Lisa Moran University of Phoenix HCS/533 February 2, 2015 Dr. Chong Daleiden Security Breach Action Plan Introduction Guarding patient’s confidentiality is most vital when working in any health care arena. There are individuals who are looking to take information which does not belong to them for their gain. When individuals are able to obtain this information for personal gain it is known as identity theft