Preview

Case Summary: Ipremier Case

Good Essays
Open Document
Open Document
408 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Summary: Ipremier Case
Situation
Ipremier was attack by some reason that the website was locked up and customer was not able to access it. The systems seem operated well so the staff did not know what exactly happen and how to solve it. At the time of the attack, Ipremier worried about the security of customer information and the impact of stock price. The employees were tried to solve the problems and minimized the influence of the situations. However, they have problem to access the Qdata headquarter because of the internal policy and they do not know what is the best way to solve the attack for example to pull the plug or not? Finally the attack was over within an hour, fortunately, the privacy of customers was not stolen and their resume business as usual.

Problem Statement
Ipremier, such a well-developed and huge industry company should take risky in to account.

Alternatives
“Now I think of it, preserving the logs may be irrelevant since I’m pretty sure detailed logging is not enabled.” Two men was arguing when the attack occur, they should pull the plug or not. If they do so, it may lose logging data; however, it seems like it is the only way to assure customer data is not being stolen.
“Every time we shut down traffic from an attacker’s address, the zombie we’ve shut down triggers attacks from ten other sites. If it’s a Dos attack, it’s not an intrusion, right?” The executive did not experience the attack before so she does not know how to react at that time.

Recommendations and Next steps
To prevent the attack happens again, Ipremier should arrange a consulting group to define a recovery plan when it occurs. For example, the executive should divide their works into different parts so they can react at the first time when problem happen instead of wasting time on contact each other or ask how to do so. In this case, if they consider the attack happen in advance, the problem that the executive cannot get into Qdata center because of the authority issue would not

You May Also Find These Documents Helpful

  • Good Essays

    QHT1 task 3

    • 492 Words
    • 2 Pages

    Lastly, risk taking, is the aspect that every entrepreneurial company will have to face in order…

    • 492 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Case 08-1

    • 874 Words
    • 4 Pages

    According to ASC 230-10-45-14, sale of accounts receivable should presented as financing cash inflows in the statement of cash flows. According to ASC 230-10-45-12, Cash received from…

    • 874 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Case Brief No 1

    • 699 Words
    • 3 Pages

    Plaintiff and Defendant: The plaintiff/appellant is Harvestons Securities, Inc. The defendant/appellee is Narnia Investments, Ltd.…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    IVK Corporation experienced a sudden shutdown of the customer relationship management (CRM) enterprise information system. The information system shutdown was caused by extensive traffic entering IVK’s network of CRM servers from many locations—an organized attack designed to prevent IVK’s security systems from identifying the attempted intrusion into its corporate network. As a result of the attack, the CRM system will not reboot; customer records cannot be accessed; the CRM system is jammed.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    As part of the network security team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detection and network protection systems will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also contained within this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets:…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    It was determined that authentication and encryption controls as well as a lack of PKI should have been implemented in order to prevent this breach of data.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    After achieving his or her objectives, the attacker typically takes steps to hide the intrusion and possible controls left behind for future visits. Again, in…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Huffman Trucking

    • 4242 Words
    • 17 Pages

    Without any changes, impact to operations can be catastrophic. Critical customer and business information may be vulnerable to Denial of Service (DoS) and other malicious attacks. In these days of increasing identity theft, the legal consequences if customer information is not effectively protected could be extremely detrimental to Huffman business objectives.…

    • 4242 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The goal of this plan is to reduce pandemonium associated with natural disasters’ effects on normative business operations.…

    • 3097 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Training Session Handout

    • 510 Words
    • 3 Pages

    Identify countermeasures- What action needs to be taken, to ensure the problem does not happen again.…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays