Sony SPE cyber attack 2014
I am new to this field and am currently enrolled in the Harvard VPAL course. I am having difficulty relating what I am learning in my course to my case study about the 2014 Sony SPE hack. I suppose my question would be what systems, networks, and data does Sony SPE use for its operations. Any insight is appreciated. Thank you.