(3) If you were a hacker, what approach would you have used to break into Sony’s system? What do you think the most important SETA elements would be to prevent future cyberattacks against Sony or other media firms?