Preview

The Ipremier Company: Denial of Serivice Attack. Case Analysis

Good Essays
Open Document
Open Document
1542 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Ipremier Company: Denial of Serivice Attack. Case Analysis
The iPremier Compant (A): Denial of Service Attack
Summary of the case: iPremier, a Seattle based company, was founded in 1996 by two students from Swathmore College. iPremier had become one of a few success web-based commerce, selling luxury, rare, and vintage goods over the Internet. Most of iPremier’s goods sell between fifty and a few hundred dollars, and the customer buys the products online with his or her credit card. iPremier’s competitive advantage is their flexible return policies which allows the customer to thoroughly check out the product and make a decision to keep the product or return it. The majority of iPremier customers are high end, and credit limits are not a problem. iPremier had contracted with Qdata, an Internet hosting business. Qdata provided iPremier with most of their computer equipment and connectivity to the Internet. Qdata was not an industry leader and was selected because it was located close to iPremier’s company headquarters and had been serving iPremier throughout the course of its new and developing business. Qdata did provide basic floor space, power, connectivity, environmental control, and physical security, and offered some high-level management services such as monitoring of web sites for customers and Internet security services such as firewall protection.
On January 12, 2007, iPremier Web servers were brought to a standstill. A denial-of-service (DoS) attack had occurred. Hackers launched the attack on iPremier. Luckily for iPremier, this was only a denial-of service attack, possibly launched by a script-kiddie, or even a competitor trying to disrupt service. The attack could have been a lot worse. iPremier’s customers pay for their purchases with credit cards, and they keep a data base containing all credit card information on their customers. The credit card database is. However, it leaves them vulnerable to an attack by hackers. If a hacker had obtained total access to their system customer credit card

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    QRT2 Task 2

    • 2107 Words
    • 9 Pages

    In the times that we live in, and the times we are heading towards, e-commerce is an ever growing and ever important way to help a company reach its potential. Making items available online provides an incredibly convenient way for customers to browse a store’s inventory from anywhere in the world. Not only for current customers, but even more importantly, for people who may not have the ability to visit a physical store. The reasons can be plentiful that would prevent someone from visiting the physical store. It could be because of geographical limitations, current weather conditions, and on and on with the infinite amount of reasons.…

    • 2107 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    These transactions are resulting in the exploitation of resources of the Web site and of the Credit Card Providers for these users after the User’s reaches their responsible percentage quickly. The Hacker uses their methods to exploit found vulnerabilities or have a User click on an application that allows them to take control undetected while the user continues their shopping. Once the User signs off and leaves the transaction it supposedly closes its session, the Hacker suspends the transaction until the coast is clear and then continues undetected, (Imperva, 2012b).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Capstone Project Bus599

    • 2781 Words
    • 12 Pages

    The Internet has changed the way that we perceive business and the way that we as consumers may make our purchases. In fact, the online consumer today knows the convenience of purchasing a book online and having it delivered to their door in a matter of a few days. There is no more need to fight crowds, find a parking spot, and deal with traffic. The high street and mail order systems still have a place in the mix of purchase routes; however it is no longer the only method of making purchases. The Internet revolution has seen a massive increase in the long distance purchases made by consumers, as geographical barriers are no longer as important as they were. The lack of geographical importance has influenced the strategy of Internet companies. One of the first companies that took advantage of this was the online bookshop Amazon.com.…

    • 2781 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Background: Flayton Electronics, a second generation family business, has just been notified that there may have been a data breech associated with credit cards used at their stores. The initial reports indicates at least 1500 accounts may have been compromised although this number appears to be growing quickly as more banks and clearing houses are notified of the possible breech. Flayton is a small, regional electronics business with 32 stores in six (6) states. The case study is happening within 24 hours of first notification of the possible breech.…

    • 2381 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Overstock.com E-Business

    • 3406 Words
    • 14 Pages

    The e-commerce system chosen is the Overstock.com. Overstock.com is an online retailer offering a broad variety of high-quality, branded name goods at discount prices, including bedding, home decor, appliances, watches, jewellery, electronics, sporting goods, clothing and shoes. At the beginning, Overstock.com sold surplus and returned merchandise on an online E-commerce marketplace and liquidating the inventories of the failed dot-com companies at below-wholesale prices (Drummond, 2006). Recently, it has expanded to sell new merchandise and also offering manufacturers, distributors and other retailers an alternative sales channel for liquidating their inventory. In addition to its direct retail sales, Overstock.com has also offered online auctions on its website. The company’s major competitors are eBay and Amazon.com (Mann, 2005).…

    • 3406 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Kickstarter Current Event

    • 662 Words
    • 3 Pages

    With the internet came a whole new type of economy. Sites popped up with whole new ways to make purchases. Almost anything from around the world can be purchased online. For a while, the most popular transactional methods were to buy direct from a store’s website, from a large retailer like…

    • 662 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    With more and more regularity, we learn about the loss of personal and financial information because of cybercrimes originating from around the world. Elections, power grids, movie productions companies, government agencies, and financial institutions are vulnerable to cybercriminals. Each time a breach occurs we hope that it will not reach our personal or business lives. However, the likelihood of staying cyber safe seems less and less likely to happen. One only has to look at the Equifax fiasco, which alone resulted in the loss of personal financial data for 143 million Americans.…

    • 92 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lands End

    • 7425 Words
    • 30 Pages

    Blake Ives Information Systems Research Center University of Houston blake.ives@uh.edu Gabriele Piccoli Cornell University ABSTRACT The case describes a hugely successful example of IT-driven strategy, the Lands’ End custom tailored apparel initiative. In less than a year, 40% of Lands’ End customers buying chinos and jeans from the firm’s web site were buying tailored products. Over 20% of these customers never made a purchase over the web before. The case explores mass customization and web-based customer service initiatives while providing a rich opportunity to discuss the sustainability of competitive advantage derived from IT-driven strategic initiatives. The case also describes the cross-organizational and cross-border supply chain that Lands’ End and its business partner, Archetype Solutions, Inc constructed as well as Archetype’s extension of that chain to other retailers. Keywords: apparel, jeans, online shopping Editor’s Note: A teaching note is available from the first author to faculty so requiring it who are listed in the MISRC-ISWorld Faculty Directory. I. INTRODUCTION A tall man, Larry Cantera1 always found buying clothes a frustrating proposition. Only the largest US cities had high quality big and tall men’s apparel stores; the selection was usually small and the prices high. Cantera was intrigued when Lands’ End’s custom tailored chinos program was announced in late October of 2001. Using the web-based service, customers could custom tailor trousers based on length, waist size, and a number of other fit variables. Customers could also select among a variety of color and style options (e.g., cuffs, pleats). Only men’s and women’s chinos were included in the initial…

    • 7425 Words
    • 30 Pages
    Good Essays
  • Good Essays

    Pointing to “backward U.S. technology,” Ziobro and Sidel reveal a long-standing issue between the financial industry and retailers that has slowed progression on chip cards. Because these cards are widely used in Europe and Canada, the U.S. has become the preferred target for criminal hackers, according to the authors. As a result, “the breaches keep coming,” and a computer-based attack experienced by Neiman Marcus over the holidays as well is used as further evidence of the widespread problem at hand.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    HIPAA Research Paper

    • 564 Words
    • 3 Pages

    In the health care industry, many patients make card payments. It is very important that they protect and secure the cardholder data. Hackers will try to enter the organization through vulnerabilities in an application, network or a system. It is important that they are secured. The main objectives are:…

    • 564 Words
    • 3 Pages
    Satisfactory Essays