Preview

iPremier Case Analysis Report

Satisfactory Essays
Open Document
Open Document
1712 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
iPremier Case Analysis Report
Case Analysis Report
The iPremier Company and the Denial of Services Attack
Analysis by:

October 23, 2014

Bob Turley:

I can't believe we got attacked by a DoS attack. Below I have prepared a report that discusses the opportunities available to our company iPremier. Through reading this case and analysis of industry trends I have put together a set of recommendations that will help us move forward from this attack.

With Qdata not taking advantage of new technologies we should have seen something like this coming eventually. We should have taken more action into moving our computing to another facility rather than putting it off sticking with Qdata. The damage is already done but we can still move forward.

Please review the details in the report below. Don't hesitate to contact me if you have any questions or comments.

Regards,

Technical Operations Team Leader
Joanne Ripley

In this section I needed to add a statement like your problem is... I recommend that you... Other than that and some proof reading Dr. Cross didn't have any other comments.

Background Information Based in Seattle, Washington, iPremier was founded in 1996 by two students at Swarthmore College. Since then iPremier has become one of the top two online retail businesses selling luxury, rare and vintage goods on the web. We were able to survive the technical stock recession in 2000. One business advantage that we have is our flexible return policy which enables customers to fully examine their products before deciding if they wanted to keep them. Our customer base is high-end so we never have to worry about credit limits even on our more expensive items.

Summary of Facts On January 12, 2007, at 4:31 AM iPremier Web servers were brought to a sudden stop. They had been attacked with a denial-of-service (DoS) attack. A DoS attack is where a ton of packets consumer networking resources and cause a stand still. This stand still prevents customers from using online services. The

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The complete protection of the campus infrastructure from a (D)DoS is futile however, there are measures that can be put into place which will significantly reduce the risk of an outage due to a (D)DoS. Standardizing policies and procedures, segmenting the network into functional areas, active monitoring, and a defense in depth approach will reduce the duration and severity of any future (D)DoS attack.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Denial of services is an attack on networks that are intended at making computer or particular service on a computer unavailable.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    DoS/DDoS attack from the WAN/Internet: buy more bandwidth, denial of service, and good load balancing.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.…

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    abuse assessment hnc

    • 3141 Words
    • 12 Pages

    This is an excellent report but there are some places where you have not included all the information. Please add the details that I’ve requested. I couldn’t see Appendix A.…

    • 3141 Words
    • 12 Pages
    Powerful Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Good Essays

    INSTRUCTIONS You will complete this assignment individually. You are required to submit a written report based on the task given below.…

    • 806 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lynn, Samara (2011, January 28). IP Addresses Are Running Out: What You Need to Know. PC…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    If you have any questions regarding the interpretation of this report please feel free to contact me at the address above. Thank you for your funding of this project and I look forward to working with you again soon.…

    • 2881 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    Introduction ...................................................................................................... 4 1.1 Concerns around the securit y of the Internet .......................................... 4 1.2. Short discussion about IP Routing ................................................................ 5 1.2 Research activities to improve IP routing security ......................................... 7 2. Short list of IP routing attack vectors .............................................................. 9 2.1. Malicious Route Injection .............................................................................. 9 2.2. Unallocated Route Injection .......................................................................... 9 2.3. TCP Resets ................................................................................................. 10 2.4. Resource Exhaustion .................................................................................. 10 3. Measures to further secure IP routing ........................................................... 11 3.1. Protecting Router Configurations ................................................................ 11 3.2. Generalized TTL Security Mechanism (GTSM) ........................................... 12 3.3. Filtering ....................................................................................................... 12 3.4. Access Control Lists (ACLs)........................................................................ 12 3.5. Digital Signatures ........................................................................................ 13 4. Conclusion ....................................................................................................... 13 5. References…

    • 5094 Words
    • 21 Pages
    Powerful Essays

Related Topics