Located in Seattle Washington, the iPremier company is a web-based commerce company founded in 1996 by two students from Swarthmore College. Since its founding, iPremier has registered a success story in e-commerce selling vintage, luxury and rare goods over the internet. Customers use their credit cards to transact business online. With impressive sales and profit margins, iPremier is among the few companies who survived the 2000 technical stock recession (Austin, 2007).
Management at iPremier consists of young employees who were its pioneers and a number of experienced managers recruited over time. The company’s working atmosphere is dynamic with strong values of professionalism, discipline, commitment to results delivery and partnership for profits achievements (Austin, 2007). iPremier’s management orientation is on “do what it takes” to have projects done on schedule.
Being a web-based commerce company, iPremier had contracted Qdata to provide the majority of their computing equipment and internet connectivity (Austin, 2007). Qdata, though not a leading industry in information technology was selected due to its close proximity to iPremier’s company headquarters.
iPremier once suffered a denial of service attack on 12th January 2007 that almost rendered the company’s site nonfunctional (Austin, 2007). Denial of service attack can be defined simply as an attempt to prevent the availability of computer resources to its legitimate users (Encyclopedia Britannica). This is achieved through halting an internet site or service from working efficiently, temporarily or permanently. Hackers had launched the denial of service attack on iPremier but luckily it was launched either by a script-kiddie or a competitor trying to ...
... middle of paper ...
...sing disk space to enable high logging levels, and updating virus signature files and other security patches (Keri and Carol, 2010). The company also needs to come up with a well designed and documented recovery plan. Last, the Company needs to educate its staff about security and threats.
Mirkovic, J., Dietrich, S., Dittrich and Reiher, P (2005).Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall, New Jersey
Austin, Robert (2007). The iPremier Company (A): Denial of Service Attack. Harvard Business School, Boston, Massachusetts
Denial of service attack (DoS attack). (2010). In Encyclopedia Britannica. Retrieved from http://www.britannica.com/EBchecked/topic/1055468/denial-of-service-attack
Keri E. Pearlson and Carol S. Saunders (2010). Strategic Management of Information Systems, 4th Edition. John Wiley & Sons, New York
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Within the last decade, the internet has proven to be the most efficient way to complete tasks in today’s society. Every major business in today’s society relies on the internet to conduct business. Though the internet is a useful tool, our reliability on it opens up the door for cyber-attacks that can be detrimental to business as a whole. One example of a cyber-attacks that have recently started becoming more prevalent are DDoS attacks. Recently, DDoS attacks have been a rising issue for businesses owners who run their own servers, such as video game companies and other high profile web servers, including banks and other credit card payment gateways.... [tags: DDoS Attacks, Cyber Terrorism]
627 words (1.8 pages)
- Denial of Service Attacks Definition: Denial of Service. A cracker attack that overloads a server to the point that it no longer responds or shuts down completely. To flood a network or individual server with huge amounts of data packets. How it Works In a typical connection, the user sends a message asking the server to authenticate it. The server returns the authentication approval to the user. The user acknowledges this approval and then is allowed onto the server. In a denial of service attack, the user sends several authentication requests to the server, filling it up.... [tags: Essays Papers]
877 words (2.5 pages)
- Denial of Service attacks (DoS) or Distributed Denial of Service Attacks (DDoS), have been around for many years, but only in the past few years have the frequency and magnitude of these attacks increased. They are a significant problem because they can shut an organization off from the Internet for extended periods of time and little can be done to stop them. DoS attacks occur when computer resources become unavailable to legitimate users after being exhausted by false requests for information (Houle and Weaver 1).... [tags: Computers]
2204 words (6.3 pages)
- Tracing the Source of Denial of Service Attacks Abstract: Denial of service attacks are becoming increasingly prevalent and serious, yet the anonymity that these attacks affords the hacker provides no means for a victim to trace the attack. The weakness of the TCP/IP protocol allows for this anonymity, yet it would be very difficult to change this protocol. Savage, Wetherall, Karlin, and Anderson present a method for tracing back the source IP address and network path of denial of service attacks.... [tags: Exploratory Essays Research Papers]
2010 words (5.7 pages)
- ... There ultimate goal is often achieved through denial of service attack. Password cracking is a sneaky method used by hackers to gain unauthorized access to system through someone’s account. According to www.msdn.microsoft.com network systems are at high risk when the password selected is weak; they are easy to guess by hackers such as date of birth, family name or child’s name. On The 1st of February 2013, Twitter announced it had been subjected to unauthorised access attempts over the course of a week.... [tags: virus, hackers, denial of service]
693 words (2 pages)
- Enhancing DNS Resilience against Denial of Service Attacks Abstract The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) attacks have targeted the DNS infrastructure and threaten to disrupt this critical service. In this paper we show that the existing DNS can gain significant resilience against DDoS attacks through a simple change to the current DNS operations, by setting longer time-to-live values for a special class of DNS resource records, the infrastructure records.... [tags: Internet Security]
1001 words (2.9 pages)
- ... Cross-site scripting is a malicious web developer may attach a script to something sent to a web site, such as a URL, an element in a form, or a database inquiry. Later, when the web site responds to you, the malicious script is transferred to your browser. You can potentially expose your web browser to malicious scripts by following links in web pages, email messages, or newsgroup postings without knowing what they link to using interactive forms on an untrustworthy site viewing online discussion groups, forums, or other dynamically generated pages where users can post text containing HTML tags Packet sniffing is a packet sniffer is a program that captures data from information packets... [tags: Trojan horse programs, Denial of Service]
1670 words (4.8 pages)
- This essay will define a “denial of service” (DOS) attack and explain the steps involved in an attack. The new type of DOS attack using phone lines will be the focus of the research provided in this essay. Denial of service attacks can affect both business and financial operations of an individual or a business. The impact of the attack both on financial and business operations will be outlined. The measures a person or business can put into place in order to avoid these attacks will be discussed.... [tags: Network Security ]
1148 words (3.3 pages)
- The United Kingdom intelligence has a branch of specialized hackers that is suspected to be using other questionable ways to track down its enemies and other enemies of British. This was revelation came out from Edward Snowden recent leaks. The leaks reveal that British intelligence GCHQ is in a fight with Anonymous and one LulzSec hacktivists using DDoS to attack. According to a classified report which was revealed through the NBC News coverage, the U.K secret agency (GCHQ) is came up with a special team called JTRIG (The Joint Threat Research Intelligence Group).... [tags: hackers, intelligence, jamming]
627 words (1.8 pages)
- ... Since the 1990s, various structure were developed, one of the structure was "attack tree".  The Attack trees are a way to describe the security threats in a hierarchical, graphical model. The attack tree model was proposed by Bruce Schneier. It is also used to find out vulnerability in a system and design a plan for eliminating them. In attacks trees the security expert will detail all the likely ways to attack a system. The model is used in computer security but it can also be used for household security.... [tags: Cyber, Internet]
1068 words (3.1 pages)