Preview

Ipremier Case

Good Essays
Open Document
Open Document
545 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ipremier Case
1. I believe during the seventy-five minute attack iPremier company performed in a tolerable way considering the means they had but could had a better plan and resources. Bob Turley was never acquainted with the emergency procedure therefore was unfamiliar with procedures. In addition, the procedure binder was out dated and missing for the other staff members to use. One of the main problems was not having access to their own data center at Qdata. The reason they been using this data center because of a personal relationship of the owner, this should not be the case and may seen as unethical. Next the company could not agree if they should pull the plug or not. There was both concern for credit card safety and loosing logging data. If I were Bob Turley I would have reviewed over the emergency procedure and improved it according. I would have appointed someone to contact Qdata and explain the situation so we would get access to the data center quicker. In addition, if we had a response team I would have listen to them if we should have pulled the plug or not to protect our customer’s information.

2. I believe the company’s operating procedures were not completely deficient but do need an improvement. The reason for this is because they lack of knowledge of the binder placing and outdated procedure. In addition, it was unclear how the CEO was going to be contacted and what information would be distributed. We could improve the operating procedures by having an updated and prepared emergency procedure binder, which would instruct workers what to do in case of any emergency. In addition, having a structure communication system to identify whom to contact in case of an emergency. Finally, making sure the contract with Qdata and who can access the data center since they had trouble accessing it.

3. In order to be better prepared for another attack in the future, iPremier’s has to know the risk they have with their security. They have to take in

You May Also Find These Documents Helpful

  • Good Essays

    Skadurz Pro Case Summary

    • 1223 Words
    • 5 Pages

    3. What are the issues and problems facing the company? (Sort them by importance and urgency . )…

    • 1223 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Kindred Spirit Case Study

    • 1070 Words
    • 5 Pages

    c) The problems seem to mostly stem from the inexperience of the owner in the industry and her poor relations to the employees and assistant manager. By running on a short fuse Ms. Kindred has succeeded in alienating some if not all of her employees, and the firing of three long term employees and instant shift in business practices will and are having detrimental effects on both customer service and profits. The problems seem to mostly stem from Ms. Kindred taking and unfriendly and impersonal attitude to what is a very close-knit staff who are used to contributing to the company in more ways then just manually.…

    • 1070 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    Fourth, in the aftermath of the attack, the risks and threats that the company is exposed are further security breaches that could expose critical and private secret trading information of the company. This could lead to financial loses since hackers can…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Wnz Media Case Study

    • 2778 Words
    • 12 Pages

    1. Based on a careful reading of the case answer the following questions and then complete the table below. In the table below, list in column 1 the most important operational (transactional) activities (i.e. day-to-day work) at WNZ Media Corporation as it operates its business and competes in its markets. Then in column 2 describe the information required to enable or support each of those operations-level requirements.…

    • 2778 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    1. Why is risk mitigation and filling in critical security gaps an important next step after the security assessment is performed?…

    • 960 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    7. Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    Impetus of the Dhs

    • 528 Words
    • 3 Pages

    attacks. It was also desirable that potential targets of terrorism are not left completely vulnerable…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    You Decide Week 5

    • 537 Words
    • 3 Pages

    Based on the information given I have decided that it is best for the company if we investigate the customer complaints further. I have identified several critical issues that need to be addressed.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Evaluation of current business situation within Continental Computers Corporation within the various divisions is as follows:…

    • 3411 Words
    • 13 Pages
    Powerful Essays

Related Topics