Preview

Ipremier Dos Attack

Better Essays
Open Document
Open Document
1479 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ipremier Dos Attack
Introduction
On January 12th, 2007 at 4:31am, Bob Turley, CIO of the iPremier Company, received a panicked phone call from his IT operations staff. Their external facing website was “locked up” and could not be accessed by anyone, including their customers. iPremier is a web-based business that generates revenue through solely processing online orders. While the web server was down, the company could not accept any new orders or allow their customers to view their products. An inadequately third-party managed and configured router/firewall allowed hackers to execute a DOS (Denial of Service) attack on iPremier. I recommend purchasing a new firewall solution that will be managed and configured by the Company’s IT staff internally. This level of control will allow the company to tailor the level of security they desire and give them the ability to mitigate threats accordingly.

Summary of Facts
At 4:31am on January 12th, 2007, Bob Turley (CIO of iPremier) received a panicked call from Leon Ledbetter in operations. Leon stated that the Company’s website was down and that customers could not access the site. He also stated emails containing the phrase “ha ha” were being received by the mail server. The Company’s technical operations team leader, Joanne Ripley called Mr. Turley at 4:39am stating she could not access their equipment from the line to their office and indicated she was driving toward the Qdata co-located facility. She confirmed that Qdata (their hosting company) claims there was not a connectivity issue in or out of the building. Ripley stated the she would try to restart the web server once she reached the facility and confirmed she had an outdated copy of emergency procedures in her vehicle. Shortly after Mr. Turley hung up with Ripley he received a call from Warren Spangler, VP of business development. Mr. Spangler was concerned with the affect on the Company’s stock price, calling the police or FBI, and basic PR issues resulting from the incident.



References: Allen, J., Gabbard, D., May, C., Hayes, E., & Sledge, C. (2003). Outsourcing managed security services (No. CMU/SEI-SIM-012). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST. Applegate, L. M., Austin, R. D., & Soule, D. L. (2009). Corporate information strategy and management: Text and cases. Boston: McGraw-Hill Irwin. Lemon, J. (2002, February). Resisting SYN Flood DoS Attacks with a SYN Cache. In BSDCon (Vol. 2002, pp. 89-97).

You May Also Find These Documents Helpful

  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The complete protection of the campus infrastructure from a (D)DoS is futile however, there are measures that can be put into place which will significantly reduce the risk of an outage due to a (D)DoS. Standardizing policies and procedures, segmenting the network into functional areas, active monitoring, and a defense in depth approach will reduce the duration and severity of any future (D)DoS attack.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    A strategy to use against a Denial of Service (DoS) attack would be risk acceptance. Customers and company employees utilize the company’s website on a day to day basis, without a functioning website revenue will be lost. Because a DoS attack can make a business’s website unserviceable, the company will have to take into account this factor while the site is accessible to the public. Risk avoidance and risk assignment cannot be utilized in this situation because the site has to be up and running for customers and employees…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.…

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Better Essays

    effective a baseline installation of the Operating System is required. With the use of In-…

    • 885 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Itp 1101 Research Paper

    • 2125 Words
    • 9 Pages

    This paper provides a general overview of denial-of-service attacks in which the primary goal of the attack is to remove or limit the victim’s access to a particular service or resource. The paper also provides an overview of on methods of attack and its impacts. It also includes information that may assist you on how to respond to such an attack.…

    • 2125 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Ipremier

    • 422 Words
    • 2 Pages

    iPremier had contracted with Qdata, an Internet hosting business. Qdata provided iPremier with most of their computer equipment and connectivity to the Internet. Qdata was not a leader in the industry and was selected mainly because it was located close to iPremier’s company headquarters and had been serving iPremier throughout the course of its new and developing business. However, new technologies were being utilized at many companies while Qdata did not take advantage of these new technologies. iPremier had recently hired Bob Turley as CIO…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The iPremier and Denial of Service Attack case study is a made up case from the Harvard Business School. This case shows clearly how companies may not be taking their security seriously and after several high profile hacking stories, we can see that is the truth. The background of the case is that iPremier, a high end online store, suffered a DOS attack during the night. Those in charge of operations attempted to find the cause of the attack but were met with resistance from their collocation facility. Once granted access and after almost the entire company’s senior management team was involved, the attack stopped. There was no rhyme or reason as to how or why but it stopped and business was back to normal on the site.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In real world scenario, a Denial-of-Service attack DoS attack) or Distributed Denial-of-Service attack (DDoS attack) is an effort to make a machine or network resource unavailable to its genuine users. Although the means to carry out, motives for, and objective of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or eliminate services of a host connected to the internet. One common method of attack involves saturating the target machine with outside communications requests, so much so that it cannot respond to legitimate traffic or responds so lowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are carried out by either…

    • 286 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    iPremier did not sustain any major lapse during the attack. Only a few customers were inconvenienced, the stock price was not affected and the company publically communicated the outage right away. They were very lucky. There are many risk factors when an attack is potentially occurring. iPremier seemed unsure of the extent of the attack. To err on the side of caution, it may have been a better idea to closely examine the incident while it was happening. There may have been risk to ALL customers.…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    On January 12, 2007, iPremier Web servers were brought to a standstill. A denial-of-service (DoS) attack had occurred. Hackers launched the attack on iPremier. Luckily for iPremier, this was only a denial-of service attack, possibly launched by a script-kiddie, or even a competitor trying to disrupt service. The attack could have been a lot worse. iPremier’s customers pay for their purchases with credit cards, and they keep a data base containing all credit card information on their customers. The credit card database is. However, it leaves them vulnerable to an attack by hackers. If a hacker had obtained total access to their system customer credit card…

    • 1542 Words
    • 7 Pages
    Good Essays