Preview

The Ipremier Company: Denial of Serivice Attack. Case Analysis

Good Essays
Open Document
Open Document
1542 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Ipremier Company: Denial of Serivice Attack. Case Analysis
The iPremier Compant (A): Denial of Service Attack
Summary of the case: iPremier, a Seattle based company, was founded in 1996 by two students from Swathmore College. iPremier had become one of a few success web-based commerce, selling luxury, rare, and vintage goods over the Internet. Most of iPremier’s goods sell between fifty and a few hundred dollars, and the customer buys the products online with his or her credit card. iPremier’s competitive advantage is their flexible return policies which allows the customer to thoroughly check out the product and make a decision to keep the product or return it. The majority of iPremier customers are high end, and credit limits are not a problem. iPremier had contracted with Qdata, an Internet hosting business. Qdata provided iPremier with most of their computer equipment and connectivity to the Internet. Qdata was not an industry leader and was selected because it was located close to iPremier’s company headquarters and had been serving iPremier throughout the course of its new and developing business. Qdata did provide basic floor space, power, connectivity, environmental control, and physical security, and offered some high-level management services such as monitoring of web sites for customers and Internet security services such as firewall protection.
On January 12, 2007, iPremier Web servers were brought to a standstill. A denial-of-service (DoS) attack had occurred. Hackers launched the attack on iPremier. Luckily for iPremier, this was only a denial-of service attack, possibly launched by a script-kiddie, or even a competitor trying to disrupt service. The attack could have been a lot worse. iPremier’s customers pay for their purchases with credit cards, and they keep a data base containing all credit card information on their customers. The credit card database is. However, it leaves them vulnerable to an attack by hackers. If a hacker had obtained total access to their system customer credit card

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iPremier a web based company founded in 1996, and located in Seattle, Washington, experienced a outage or denial of service attack in the early monring on January 12th. The disturbance in the iPremier web site occurred as an individual was able to get past the iPremier’s firewall. When instances like this occur in organizationss the disruption greatly impacts operations an can potentially expose an organization to legal issues as data can be compromised. When an event like this occurs in an organization, the first question asked post mortum is how can we prevent his from happening again. From iPremier’s perspective there are a few steps that can be taken.…

    • 504 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    These transactions are resulting in the exploitation of resources of the Web site and of the Credit Card Providers for these users after the User’s reaches their responsible percentage quickly. The Hacker uses their methods to exploit found vulnerabilities or have a User click on an application that allows them to take control undetected while the user continues their shopping. Once the User signs off and leaves the transaction it supposedly closes its session, the Hacker suspends the transaction until the coast is clear and then continues undetected, (Imperva, 2012b).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Pointing to “backward U.S. technology,” Ziobro and Sidel reveal a long-standing issue between the financial industry and retailers that has slowed progression on chip cards. Because these cards are widely used in Europe and Canada, the U.S. has become the preferred target for criminal hackers, according to the authors. As a result, “the breaches keep coming,” and a computer-based attack experienced by Neiman Marcus over the holidays as well is used as further evidence of the widespread problem at hand.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    I can't believe we got attacked by a DoS attack. Below I have prepared a report that discusses the opportunities available to our company iPremier. Through reading this case and analysis of industry trends I have put together a set of recommendations that will help us move forward from this attack.…

    • 1712 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Premier was unprepared for the 75 minutes attack. This might have come due to too much faith in the Qdata’s abilities to control these situation and lack of vision with regards to any threats. Every ones reaction was that of panic because there were no crisis management strategy or disaster plans in place. As the communication lines got crossed and broke down, the sense of panic at iPremier grew higher with no defined plan on how to get out of it.…

    • 815 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Ipremier Dos Attack

    • 1479 Words
    • 6 Pages

    On January 12th, 2007 at 4:31am, Bob Turley, CIO of the iPremier Company, received a panicked phone call from his IT operations staff. Their external facing website was “locked up” and could not be accessed by anyone, including their customers. iPremier is a web-based business that generates revenue through solely processing online orders. While the web server was down, the company could not accept any new orders or allow their customers to view their products. An inadequately third-party managed and configured router/firewall allowed hackers to execute a DOS (Denial of Service) attack on iPremier. I recommend purchasing a new firewall solution that will be managed and configured by the Company’s IT staff internally. This level of control will allow the company to tailor the level of security they desire and give them the ability to mitigate threats accordingly.…

    • 1479 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    an Internet business specializing in the sale of oversize shoes ranked among the top results in Google searches for its products. Its prime location on the virtual equivalent of new York’s high-end shopping mecca Fifth Avenue brought a steady stream of clicks and revenue. But success was fleeting:…

    • 4479 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Ipremier Case

    • 545 Words
    • 3 Pages

    1. I believe during the seventy-five minute attack iPremier company performed in a tolerable way considering the means they had but could had a better plan and resources. Bob Turley was never acquainted with the emergency procedure therefore was unfamiliar with procedures. In addition, the procedure binder was out dated and missing for the other staff members to use. One of the main problems was not having access to their own data center at Qdata. The reason they been using this data center because of a personal relationship of the owner, this should not be the case and may seen as unethical. Next the company could not agree if they should pull the plug or not. There was both concern for credit card safety and loosing logging data. If I were Bob Turley I would have reviewed over the emergency procedure and improved it according. I would have appointed someone to contact Qdata and explain the situation so we would get access to the data center quicker. In addition, if we had a response team I would have listen to them if we should have pulled the plug or not to protect our customer’s information.…

    • 545 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lands End

    • 7425 Words
    • 30 Pages

    Blake Ives Information Systems Research Center University of Houston blake.ives@uh.edu Gabriele Piccoli Cornell University ABSTRACT The case describes a hugely successful example of IT-driven strategy, the Lands’ End custom tailored apparel initiative. In less than a year, 40% of Lands’ End customers buying chinos and jeans from the firm’s web site were buying tailored products. Over 20% of these customers never made a purchase over the web before. The case explores mass customization and web-based customer service initiatives while providing a rich opportunity to discuss the sustainability of competitive advantage derived from IT-driven strategic initiatives. The case also describes the cross-organizational and cross-border supply chain that Lands’ End and its business partner, Archetype Solutions, Inc constructed as well as Archetype’s extension of that chain to other retailers. Keywords: apparel, jeans, online shopping Editor’s Note: A teaching note is available from the first author to faculty so requiring it who are listed in the MISRC-ISWorld Faculty Directory. I. INTRODUCTION A tall man, Larry Cantera1 always found buying clothes a frustrating proposition. Only the largest US cities had high quality big and tall men’s apparel stores; the selection was usually small and the prices high. Cantera was intrigued when Lands’ End’s custom tailored chinos program was announced in late October of 2001. Using the web-based service, customers could custom tailor trousers based on length, waist size, and a number of other fit variables. Customers could also select among a variety of color and style options (e.g., cuffs, pleats). Only men’s and women’s chinos were included in the initial…

    • 7425 Words
    • 30 Pages
    Good Essays
  • Good Essays

    Ipremier was attack by some reason that the website was locked up and customer was not able to access it. The systems seem operated well so the staff did not know what exactly happen and how to solve it. At the time of the attack, Ipremier worried about the security of customer information and the impact of stock price. The employees were tried to solve the problems and minimized the influence of the situations. However, they have problem to access the Qdata headquarter because of the internal policy and they do not know what is the best way to solve the attack for example to pull the plug or not? Finally the attack was over within an hour, fortunately, the privacy of customers was not stolen and their resume business as usual.…

    • 408 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    How well did the iPremier company perform during the 75 min attack? If you were Bob Turley, would you have done anything differently during the attack?…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University Outline • Example: iPremier Company (HBR article) – Background about company – Business Implications – Some recommendations for future • Management’s role in information security • Framework for a balanced approach to security Example: DDoS attack on iPremier Company • For a background about the company - refer to MS Word Document distributed in class. • Problems at Colocation facility: •…

    • 1251 Words
    • 10 Pages
    Good Essays