Top-Rated Free Essay
Preview

IPremier Website Case Study

Good Essays
821 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IPremier Website Case Study
At approximately 4:30 a.m. on January 12, 2009, iPremier’s website suffered a Distributed Denial of Service (DDoS) attack. A DDoS attack is a method used by mischievous hackers to force a computer resource to stop responding to legitimate users. The hacker achieves this by taking control of a fleet of remote computers, often referred to as “zombies”, in order to send a flood of network traffic to a specific target, in this case, iPremier’s website. The website quickly becomes so overwhelmed dealing with the attacker’s traffic that it essentially locks up, preventing users from accessing the site. (1) After discussing the attack with Bob Turley, CIO, and the IT department, it’s apparent that the website was not prepared for such an attack, as users couldn’t enter the website for approximately one hour and sixteen minutes. Management of iPremier must adjust the company’s IT protocol if the company is to prevent further cyber attacks. In order to accomplish a more secure data system, we suggest management hire a well-known IT specialist to evaluate the situation and give professional advice on how to implement a strong defense. We also advise management to dissolve iPremier’s relationship with Qdata and establish a search team to find a new top notch IT service provider. To combat future virtual attacks, we first advise management to hire, as mentioned above, an IT specialist to review iPremier’s IT infrastructure. The IT consultant can then pinpoint the high-risk areas in the company’s infrastructure and design a more appropriate system to prevent future attacks. We strongly encourage management to heed the advice of the IT consultant and have funds appropriated to fulfilling the consultant’s recommendations without delay. Although the costs might reduce profits, iPremier cannot afford an infiltration into a system that possesses thousands of users’ credit card information. This could lead to years of litigation and lawsuits, leading to a falling stock price, and potentially suffocating the company into bankruptcy. After discussing the attack with Mr. Turley, we discovered that the company’s cyber attack procedures were both outdated and not implemented in a timely manner. Although we hope the consultant’s preventative measures will impede any sort of future attack, it’s paramount that iPremier have procedures in place in order to mitigate the damage done by a virtual assault. In other words, the company must have a damage recovery system in place. Therefore, we will request the consultant to provide detailed reports on how to mitigate the more likely attacks on iPremier’s system. Such reports shall distributed throughout the IT department, and shall be updated every couple of years, in order to stay up to date with evolving technology. In addition, we advise the implementation of a security-training program for all of iPreimer’s staff in order to avoid common mistakes in computer security. We also advise management to approve a yearly cyber attack simulation, allowing employees to better prepare for a cyber attack. Lastly, we strongly advise iPremier to disassociate itself from Qdata as quickly as possible. We’re extremely displeased with the performance of Qdata during this crisis. Our contract with Qdata stipulates 24/7 support, however, we found no such support during the attack. If anything, Qdata prolonged the attack as they prevented Joanne Ripley, head of the IT department, from entering the data center to combat the attack, as Qdata’s own specialist was on vacation. Although the attack appears to not have infiltrated the data center, iPremier cannot risk losing credit card information due to an uncooperative “partner”. We’re aware that Mr. Raj, a founder of iPremier, has a strong relationship with Qdata, however, in order to protect the interests of our consumers and employees, iPremier simply cannot show bias. The company must find a provider who will provide the security and support necessary to sustain long-term success and growth, and it’s our belief that Qdata will not aid the company in achieving these objectives. Luckily for iPremier, it appears this was only a denial-of service attack, with no signs of infiltration. However, a lack of intrusion into the data system should not impede management from taking this matter seriously. In addition, the DDoS stopped the attack on its own, preventing the loss of sales throughout the day. We cannot hope to be as lucky during the next cyber attack. For too long, iPremier has shown minimal interest in protecting its systems. We cannot stand for this any longer. Although the suggestions above will not completely eliminate the risks associated with operating an online retailer, iPremier will at the very least be able to mitigate the attack to a low level.

Works Cited

1. What is DDoS denial of service | Overview | Distributed Denial of Service. (n.d.). Retrieved March 8, 2015, from http://www.prolexic.com/knowledge-center-what-is-ddos-denial-of-service.html

2. Striking the Balance: In-House vs. Outsourced IT. (n.d.). Retrieved March 8, 2015, from http://www.datacenterjournal.com/it/striking-balance-inhouse-outsourced/

Cited: 1. What is DDoS denial of service | Overview | Distributed Denial of Service. (n.d.). Retrieved March 8, 2015, from http://www.prolexic.com/knowledge-center-what-is-ddos-denial-of-service.html 2. Striking the Balance: In-House vs. Outsourced IT. (n.d.). Retrieved March 8, 2015, from http://www.datacenterjournal.com/it/striking-balance-inhouse-outsourced/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    A strategy to use against a Denial of Service (DoS) attack would be risk acceptance. Customers and company employees utilize the company’s website on a day to day basis, without a functioning website revenue will be lost. Because a DoS attack can make a business’s website unserviceable, the company will have to take into account this factor while the site is accessible to the public. Risk avoidance and risk assignment cannot be utilized in this situation because the site has to be up and running for customers and employees…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Itp 1101 Research Paper

    • 2125 Words
    • 9 Pages

    This paper provides a general overview of denial-of-service attacks in which the primary goal of the attack is to remove or limit the victim’s access to a particular service or resource. The paper also provides an overview of on methods of attack and its impacts. It also includes information that may assist you on how to respond to such an attack.…

    • 2125 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Ipsy.com case study

    • 1490 Words
    • 5 Pages

    “Full-sized and not expensive makeup samples” provided by ipsy solved another problem. Phan witnessed young women being depressed after spending a…

    • 1490 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    “Every time we shut down traffic from an attacker’s address, the zombie we’ve shut down triggers attacks from ten other sites. If it’s a Dos attack, it’s not an intrusion, right?” The executive did not experience the attack before so she does not know how to react at that time.…

    • 408 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Incident Response Plan

    • 930 Words
    • 4 Pages

    In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack.…

    • 930 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Malware is a danger to our virtual society and appears in a myriad of forms Worms, Viruses, Trojan Horses, Macro viruses, Spyware. More forms of malware are being developed every day known as zero-day attacks since they haven’t been seen before, some of these have the possibility to be a new form of malware and the rest will fit the types previously listed. These high-profile attacks have consumers and companies considering more high-technology defense strategies. There are countless others that don’t want to consider them and they are weak links in virtual security. Some vendors that control programs or features numerous customers use such as: power grid management, shipping software, hospital patient…

    • 1842 Words
    • 8 Pages
    Better Essays

Related Topics