Preview

Ipremier Denial of Service Case

Good Essays
Open Document
Open Document
815 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ipremier Denial of Service Case
1. Premier was unprepared for the 75 minutes attack. This might have come due to too much faith in the Qdata’s abilities to control these situation and lack of vision with regards to any threats. Every ones reaction was that of panic because there were no crisis management strategy or disaster plans in place. As the communication lines got crossed and broke down, the sense of panic at iPremier grew higher with no defined plan on how to get out of it.
2. We would have had a teleconference with all the Technical Executives to discuss their risk assessment measures, then we would also included the Qdata key point of contact on the issue at hand to discuss possible recovery plan for this situation. The legal advisor will be asked to listen in on this conversation so he can better understand the situation and provide legal advice for the plan.
3. Despite the sense of professionalism maintained by Turley and Ripley it was clear that the company has no procedures in place to deal with infrastructure risk at any level. Needless to say that if this or any similar attack occurred during high traffic time the consequences might be excessive to the infrastructure, business and the reputation of the company. It was clear in the case that Jack hired Bob to create and implement proper policies and procedures for the infrastructure risk management. To do this, iPremier has to assess all known threats to the infrastructure risk matrix and develop procedures to immediately identify the type and risk. These threats would need to be continually assessed as new ones emerge and identification would determine the proper procedures defending against them. Additionally, the incident team manager must have a flawless understanding of the infrastructure design in order to identify where the highest risk of consequences from the attack will be. The case clearly illustrates that an important component of any procedure, regardless of the threat, is a chain of command. Incident

You May Also Find These Documents Helpful

  • Powerful Essays

    271. Kral, P. (2011, December 5). Incident handlers Handbook. Retrieved January 2014, from Sans.org: http://www.sans.org/security-training/The incident Handlers Handbook…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The complete protection of the campus infrastructure from a (D)DoS is futile however, there are measures that can be put into place which will significantly reduce the risk of an outage due to a (D)DoS. Standardizing policies and procedures, segmenting the network into functional areas, active monitoring, and a defense in depth approach will reduce the duration and severity of any future (D)DoS attack.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There were several breakdowns in Target’s security operations. First, the security system was not compliant to the latest standards nor was the architecture robust enough – too many systems were chained together without defenses between them. Second, Target did not make the changes that were suggested to them on multiple fronts, but instead either ignored them completely or did not implement a plan that would last long. Third, the response to the multiple warnings, from both the monitoring system and the security teams, was not enough in comparison to the severity of the warnings. Like most organizations, Target could not predict the kind of attack that would be executed on them; however, had they responded to any of these problems directly and more carefully, they could have stopped the breach much sooner.3.…

    • 523 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    RTT1

    • 1535 Words
    • 5 Pages

    Next, the team should determine what should have happened. This may involve policy and procedure review, research of best practice models and conversations with department heads and specialists…

    • 1535 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    9/11 Security Factors

    • 555 Words
    • 3 Pages

    Security response: What Infrastructures were immediately put in place after the attack? I will be looking at the physical increase in security, funding by the government and zoning to prevent terrorism…

    • 555 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

     I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    e. Summarise the outcome of the call and any actions that you or your customer will take as a result…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? Because it helps to demand what areas need your attention first…

    • 287 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Under this particular circumstance, D&G fails to give a timely response to the public and underestimated the power of media. The delayed first statement issued by D&G did not satisfy and was not accepted by Hong Kong people, further worsen the situation. The statement gives an impression of their insincerity that D&G is not willing to apologies and will not give further explanation to it. Also, Social media has accelerated the speed that information about a crisis can spread. D&G then failed to prevent the issue turning into an actual crisis. A timely response would show the respect and concerns of the company to the incident and their customers; it would helps to reduce the level of dissatisfaction and anger of Hong Kong people.…

    • 500 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This document provides a structured approach to prepare DOMEIGHN Company in the event of disruptions which may affect the whole network services due to factors beyond our control (ex. natural disasters or man-made events). The Plan would also guide restoration of network integrity and normal operations of the network the fastest possible when an incident occurs.…

    • 986 Words
    • 4 Pages
    Good Essays

Related Topics