Preview

Case Summary: Ipremier Case

Good Essays
Open Document
Open Document
408 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Summary: Ipremier Case
Situation
Ipremier was attack by some reason that the website was locked up and customer was not able to access it. The systems seem operated well so the staff did not know what exactly happen and how to solve it. At the time of the attack, Ipremier worried about the security of customer information and the impact of stock price. The employees were tried to solve the problems and minimized the influence of the situations. However, they have problem to access the Qdata headquarter because of the internal policy and they do not know what is the best way to solve the attack for example to pull the plug or not? Finally the attack was over within an hour, fortunately, the privacy of customers was not stolen and their resume business as usual.

Problem Statement
Ipremier, such a well-developed and huge industry company should take risky in to account.

Alternatives
“Now I think of it, preserving the logs may be irrelevant since I’m pretty sure detailed logging is not enabled.” Two men was arguing when the attack occur, they should pull the plug or not. If they do so, it may lose logging data; however, it seems like it is the only way to assure customer data is not being stolen.
“Every time we shut down traffic from an attacker’s address, the zombie we’ve shut down triggers attacks from ten other sites. If it’s a Dos attack, it’s not an intrusion, right?” The executive did not experience the attack before so she does not know how to react at that time.

Recommendations and Next steps
To prevent the attack happens again, Ipremier should arrange a consulting group to define a recovery plan when it occurs. For example, the executive should divide their works into different parts so they can react at the first time when problem happen instead of wasting time on contact each other or ask how to do so. In this case, if they consider the attack happen in advance, the problem that the executive cannot get into Qdata center because of the authority issue would not

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Case 08-1

    • 874 Words
    • 4 Pages

    According to ASC 230-10-45-14, sale of accounts receivable should presented as financing cash inflows in the statement of cash flows. According to ASC 230-10-45-12, Cash received from…

    • 874 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Case Brief 11.2

    • 250 Words
    • 1 Page

    Lester Cooper and Julie Smith were engaged, Lester gave various gifts to both Julie & Janet Smith while living in Janet’s house. Later they had a disagreement causing the engagement to break off and Cooper desired his gifts given back. Julie gave back only the engagement ring. Cooper subsequently sued the Smith’s.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Case Brief No 1

    • 699 Words
    • 3 Pages

    Plaintiff and Defendant: The plaintiff/appellant is Harvestons Securities, Inc. The defendant/appellee is Narnia Investments, Ltd.…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    It was determined that authentication and encryption controls as well as a lack of PKI should have been implemented in order to prevent this breach of data.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Miller, S. (2005-2011). A Simple Guide In Developing A Crisis Management Plan. Retrieved from http://www.articledashboard.com/Article/A-Simple-Guide-in-Developing-a-Crisis-Management-Plan/2357892…

    • 692 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The goal of this plan is to reduce pandemonium associated with natural disasters’ effects on normative business operations.…

    • 3097 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Huffman Trucking

    • 4242 Words
    • 17 Pages

    Without any changes, impact to operations can be catastrophic. Critical customer and business information may be vulnerable to Denial of Service (DoS) and other malicious attacks. In these days of increasing identity theft, the legal consequences if customer information is not effectively protected could be extremely detrimental to Huffman business objectives.…

    • 4242 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    QHT1 task 3

    • 492 Words
    • 2 Pages

    Lastly, risk taking, is the aspect that every entrepreneurial company will have to face in order…

    • 492 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Training Session Handout

    • 510 Words
    • 3 Pages

    Identify countermeasures- What action needs to be taken, to ensure the problem does not happen again.…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Effective communication will provide good relationships with people using the service and their carers. It is important that this occurs so service users are kept informed about their care so they can express their needs, views and opinions and therefore feel comfortable within the environment they are in.…

    • 1387 Words
    • 6 Pages
    Good Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    As part of the network security team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detection and network protection systems will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also contained within this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Good Essays

    I believe peaceful resistance to laws positively impacts a free society. Peaceful resistance is a way to express your beliefs and protest potentially other harmful policies or laws. More importantly, I feel it also inspires change. While violence escalates tensions and leads to revenge, peaceful resistance should inspire thoughtful progress and civilized improvements in a free society.…

    • 520 Words
    • 3 Pages
    Good Essays