Preview

Ipremier Case Study Essay Example

Satisfactory Essays
Open Document
Open Document
504 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ipremier Case Study Essay Example
iPremier a web based company founded in 1996, and located in Seattle, Washington, experienced a outage or denial of service attack in the early monring on January 12th. The disturbance in the iPremier web site occurred as an individual was able to get past the iPremier’s firewall. When instances like this occur in organizationss the disruption greatly impacts operations an can potentially expose an organization to legal issues as data can be compromised. When an event like this occurs in an organization, the first question asked post mortum is how can we prevent his from happening again. From iPremier’s perspective there are a few steps that can be taken.

First, an overall evaluation of their security infrastructure and the individuals that support the structure. iPremier used a third party vendor to handle IT systems and support. This may be an area of weakness and the service that is provided by Qdata should be looked at closely. Although it may be cost effective to use a thirdy party vendor for this service, it is important to constantly evaluate their service and infrastructure compliance.

Second, although Qdata manages iPremier’s IT systems it is important for iPremiere to have standard operating procudures and compliance standards. Preparing such documentation after an outage is the perfect time because a lot of what went wrong is still in their head and helps provide some ground level requirements. Once iPremier establishes their processes and procedures they should periodically “test” the process in a live drill. At my company we run several maintenance processes every month as well as disaster recovery testing once a year with some in between quarterly testing. It’s important to put the process, procedure and plan together, but equally important to test it in order to identify gaps. This process also needs to be written and locatable in the event it is needed for reference. Establishing a location for the process both in

You May Also Find These Documents Helpful

  • Powerful Essays

    4. The calculation should be executed only after all the valid input values are provided.…

    • 1488 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    James Cash Penney opened his first store located in Kemmerer Wyoming in 1902, at the age of 25. The first store was opened in partnership between Penney, T.M Callahan and Guy Johnson as a ‘cash only’ store, refusing to take mining script or extend credit. Investing his entire savings of $500, Penney had to borrow $1,500 and was cautioned against his ‘cash only’ policy, as other stores in mining towns had been failing. The store was a success in spite of bankers warnings earning $28,898 in sales. Within two years Penney bought out Callahan and Johnson, and Penney had taken over their three other stores. Expanding rapidly, by 1915 there were 83 stores and by 1917 there were 175. Currently there are over 1,200 with over 205,000 employees stores ranging from the all 50 states as well as Puerto Rico, Mexico and Chile, the company is currently headquartered in Plano Texas.…

    • 1525 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Assignment 2: Case Study

    • 686 Words
    • 3 Pages

    Brett and Kathy’s filing status used to be married, filing jointly. Although both of Brett and Kathy want to get divorce, they have not divorced considering financial pressure and their three children. From 2014, Brett begins to contribute more than Kathy do to support the home and their children. Also they want to file income tax returns separately. Thus Brett believes he can claim head of household filing status.…

    • 686 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Before any scheduled orientation can take place, paperwork needs to be verified on all potential candidates. This should include verifying all…

    • 1475 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    215: Case Study Essay

    • 4915 Words
    • 20 Pages

    Child A and his one older sister, Child B, all live at home with Mum and Dad. It was first noticed that Child A had additional needs when he started nursery, where he didn’t settle or mix with the other children. Child A was diagnosed with Autistic Spectrum Disorder (ASD) in 2011; he also experiences a lot of difficulties with anxiety. While there are some things that are known triggers for the anxiety, such as being touched, it is often not clear what has caused it. This means that some of Child A’s behaviour, actions and reactions can also be inconsistent and unpredictable. (Reference K2)…

    • 4915 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Problem definition: Design a program that will allow a user to Input a list of your family members along with their age and state where they reside. Determine and print the average age of your family and print the names of anyone who live in Texas.…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project 1 Essay Example

    • 545 Words
    • 3 Pages

    Assignment Question 1: Read the scenario below and then analyze what is wrong with the hypothesis given.…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Case Study 2 Essay

    • 696 Words
    • 2 Pages

    I am writing in response to your health concerns. Unfortunately, according to your biography, it is reasonable for your doctor to be concerned about your overall health. I believe that she has noticed that you have multiple risk factors that predispose you to cardiovascular disease, metabolic syndrome, and type II diabetes. Those factors include your cholesterol, weight, and the fact that you are prediabetic.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Re: Assignment Essay Example

    • 6011 Words
    • 24 Pages

    P2: Outline the arrangements for providing quality care for looked after children and young people…

    • 6011 Words
    • 24 Pages
    Powerful Essays
  • Satisfactory Essays

    In a recent Information Management lecture we went through the case of iPremier (read the full case) which is a popular case study from Harvard Business School. It was a made up case but the recent high profile hacking stories (such as Gawker) show that companies are not taking security seriously.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ipremier Case

    • 545 Words
    • 3 Pages

    1. I believe during the seventy-five minute attack iPremier company performed in a tolerable way considering the means they had but could had a better plan and resources. Bob Turley was never acquainted with the emergency procedure therefore was unfamiliar with procedures. In addition, the procedure binder was out dated and missing for the other staff members to use. One of the main problems was not having access to their own data center at Qdata. The reason they been using this data center because of a personal relationship of the owner, this should not be the case and may seen as unethical. Next the company could not agree if they should pull the plug or not. There was both concern for credit card safety and loosing logging data. If I were Bob Turley I would have reviewed over the emergency procedure and improved it according. I would have appointed someone to contact Qdata and explain the situation so we would get access to the data center quicker. In addition, if we had a response team I would have listen to them if we should have pulled the plug or not to protect our customer’s information.…

    • 545 Words
    • 3 Pages
    Good Essays
  • Good Essays

    EuroDisney, currently named Disneyland Paris, opened for business in April of 1992. Much to Disney's surprise this theme park did not attract the expected number of visitors necessary to allow for profits. By 1993, after announcing their fourth-quarter results, losses were reported to be $517 million. In 1994, Prince Al-Walid agreed to invest up to $500 million for a 24 percent stake in the park. This cash infusion along with a change in local management led Disney back to the road of recovery. By 1996, Disneyland Paris became France's most visited tourist attraction.…

    • 855 Words
    • 4 Pages
    Good Essays