Preview

The iPremier Company (A): Denial of Service Attack

Satisfactory Essays
Open Document
Open Document
658 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The iPremier Company (A): Denial of Service Attack
CI Perp Note 7

The iPremier Company (A): Denial of Service Attack
The iPremier Company was founded in 1996 and had evolved into one of thefew success stories of web-based commerce. It also sells luxury, rare, and vintage goods on the web. In the treacherous business-to-business segment, iPremier was one of a few survivors.

Although the company was a really successful company in business field, during the 75 minute attack, iPremier performed very ineffectively and acted negatively, which would tell customers that it is lack of ability to solve the problem. When picking up the phone to know the website is locked up, Turley, the CIO of the iPremier Company, did not have the plan and strategy to solve the problem. He just waited for the outsourced company, Qdata, giving the solution. What is worse, the company could not make sure if the credit cards and customer data are safe. All the managers in the company just waited until the attack stopped.

Of course the company’s operating procedures were deficient. Actually, there was totally no procedure for solving the attacks according to the case. The staffs, including the CIO and the technology team, could not come up with a complete strategy before the attack happening. When the company’s website was attacked, there was no plan to solve the problem. The CIO even did not sure about what the threat is. If the attack happened in the work time instead of early morning, the company would lose not only the information of the customers and the profits, but also the reputation from the customers.

The iPremier Company should make sure that there is the security system to make sure that when facing attacks, the company can stop it as soon as possible. The employees, especially the technology team, should take the responsibilities of protecting the information of the customers. Also not just the IT department, they have to connect the public relation department to explain what happened to the press and the customers.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    Fourth, in the aftermath of the attack, the risks and threats that the company is exposed are further security breaches that could expose critical and private secret trading information of the company. This could lead to financial loses since hackers can…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT team – provide help regarding the organisations systems e.g. telephones, computers, laptops, date storage and security, networks, aiding customers to use it correctly improving their quality of work.…

    • 1212 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    Threats |Confidentiality |Integrity |Availability | |Denial of Service Attack |Low |Medium |High | |Power Supply Failure |Low |Low |High | |Malicious Code Infection |High |High |High | |Theft and Fraud |High |Medium |High | |Website Intrusion |High |High |High | |Unauthorized Data Access |High |High |Low | |The small business and companies should address and take care of the security holes and threats, and it should not be necessarily a complicated and costly process. The small business and companies need to have information security, for the following reasons:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    Develop Responsibilities generic procedures to respondto an incedent, determine cuase of incident determine best response to an incident, and protect collected evidence, to ensure that there is noo tampering of evidence.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Suggest at least four (4) best practices that should be implemented when developing a…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    caregroup

    • 721 Words
    • 4 Pages

    network failure, the institutions needs to aggressively deal with security. The cause of this could…

    • 721 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case Study Woldwide Games

    • 358 Words
    • 2 Pages

    The company could have installed proper scanning software to identify any clues to suggest that the system could be hacked. They could have had a continuous test to check on any attacks and they can identify any vulnerable points in their network that can be accessed to prevent this the company should have set up a firewall. I think that the company never thought they would get hacked. The Firewall would prevent outside threats such as hackers and viruses.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    There are many ways to tighten up security when it comes to network security, but the most important part of the security in the actual user. If the user is not trained on the system and does not know ones regulations of the company then security is out the door. First and for most, the personal must continues training on the systems that they will have access to. Then there system must be prepared for the environment that they will be placed in. If the policy allows access to facebook then the server address won’t be blocked. If they don’t allow any other programs, software, or web sites then for work, then the computer must be set up for that purpose of working only. That is how one lowers the threat level on the user’s level. For authentication, authorization, and accounting the IT department must stay on top of their duties and have the passwords changed every so often. The IT team must also give the correct level of access to the person that is due it. And continue with follow ups on the system to insure that all is still well. For prevention they must try and stay one step ahead of the intruders. They must think like the hackers and try and get through their systems. For responding to intrusions a company should have a response team or a Disaster Recovery Team in place to act in cases of intrusions. There should be back systems in place to as not hinder the company day to day operation. Files should be backed up in a timely manner also. But a system is never fully…

    • 310 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    After a thorough investigation by federal law enforcement it had been determined that hackers were able to infiltrate the network and place malware on several pieces of the companies Point of Sale (POS) systems. The attackers were meticulous and thought through their attack, attempting to…

    • 1162 Words
    • 5 Pages
    Better Essays

Related Topics