Preview

Ipremier Attack Essay

Good Essays
Open Document
Open Document
503 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ipremier Attack Essay
1. How well did the iPremier Company perform during the seventy-five-minute attack? If you were Bob Turley, what might you have done differently during the attack?

iPremier company did a mediocre job with the seventy-five-minute attack. The company’s lack of standard procedures for incident and event management. Furthermore, the contingency plans in place weren’t adopted by the entire company. The use of binder with policies and procedures seems perfunctory. Moreover, there wasn’t a plan for disaster recovery mainly a backup server in the case of data breaches. Lastly, while outsourcing is a common practice in IT, iPremiere didn’t have a solid relationship with QData. The company’s lack of resistance to provide access NOC (Network Operating Center) delayed finding the root cause of the attack. If I were Bob Turley, I would have called my counterpart at iPremier to gain access to the NOC. I understand the call to the CEO, however given the risk of a breach he had the autonomy (or should’ve had) to escalate the matter. Also, Hurley needed a better
…show more content…
The iPremier Company CEO, Jack Samuelson, had already expressed to Bob Turley his concern that the company might eventually suffer from a “deficit in operating procedures.” Were the company’s operating procedures deficient in responding to this attack? What additional procedures might have been in place to better handle the attack?

Yes, the company’s operating procedures were deficient in responding to this attack. There was poor contingency planning. Some additional procedures that may have helped during the attack include an Incident Command Center. At my company when emergency events occur Leadership makes the decision to enact a CERC (Corporate Emergency Response Center). A CERC includes a Logistics Coordinator to facilitate among all departments to resolve the problem. The company can benefit from enforcing ITIL

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    Fourth, in the aftermath of the attack, the risks and threats that the company is exposed are further security breaches that could expose critical and private secret trading information of the company. This could lead to financial loses since hackers can…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS3230 Final Project

    • 687 Words
    • 2 Pages

    The entirety of the network will have to be protected with Barracuda Firewalls as the threat to intrusion is rather high judging the frequency of the preceding attacks. The company will need to do a cost management analysis to this, however from my understanding, with the increased efficiency; we will be looking to come out on top after a three year return of investment on this purchase. I fully recommend we look at putting a honeypot somewhere in the DMZ so we can monitor how hackers attempt to gain access and thwart their efforts in the future. The Warsaw, Poland location, we must find a new proxy server to replace the IBM Infinity hardened server.…

    • 687 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets:…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Meltdown at Jetblue

    • 394 Words
    • 2 Pages

    Management made the first mistake by looking at the problem too simply, and not thinking about the end result fully. When I say this, I am talking about the planes and the weather, but it could also apply to the IT solutions that Jet Blue had implemented prior. The planes should have been left in the terminal until the weather cleared, instead of loaded with passengers and try to make the flight out on time when the weather was so bad. Management looked so blindly at the goal of achieving on time flights, that it ignored the reality that on time flights could not happen in this weather. (Rainer, R. K., Jr., & Turban, E. (2009)).…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    No business plans on encountering a situation that cause’s a disruption in their day to day business or laws suits against the company. However, that doesn’t mean businesses shouldn’t make a crisis management plan for if and when such incidents occur. A crisis management plan is a basic guide to providing a response system to how to handle these types of situations. This consists of step by step processes and policies for the company and the employee’s to follow. This will allow the employee’s to know what information they can and cannot release to the press, customers and employee family members regarding the crisis. This will also assist in how the company should address the issue in a timely efficient manner with minimal damage to the company.…

    • 692 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In Neil Postman's "Defending Against the Indefensible", he suggests that our society has been culturally brainwashed. Therefore, Postman has given us seven key elements of critical thinking to help us understand the English language and avoid the manipulation of language: definition, questions, simplicity of words, metaphors, reification, style and tone, and the non-neutrality of media.…

    • 796 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Training Session Handout

    • 510 Words
    • 3 Pages

    Identify countermeasures- What action needs to be taken, to ensure the problem does not happen again.…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Environmental risks that could affect the business are obviously major storms, floods, tornados, etc. A tornado could knock out the internet and prevent Sunica Music and Movies from accessing their databases for either inventory or accounting purposes which would make running the business virtually impossible. External Risks to Sunica Music and Movies could be a struggling economy or competitor sabotage. These tend to be factors that are out of the businesses control and depend on an outside source to create them. Internal risks are things like a worker strike or employee sabotage. These are problems that are generated within the organization. A…

    • 914 Words
    • 4 Pages
    Good Essays