Located in Seattle Washington, the iPremier company is a web-based commerce company founded in 1996 by two students from Swarthmore College. Since its founding, iPremier has registered a success story in e-commerce selling vintage, luxury and rare goods over the internet. Customers use their credit cards to transact business online. With impressive sales and profit margins, iPremier is among the few companies who survived the 2000 technical stock recession (Austin, 2007).
Management at iPremier consists of young employees who were its pioneers and a number of experienced managers recruited over time. The company’s working atmosphere is dynamic with strong values of professionalism, discipline, commitment to results delivery and partnership for profits achievements (Austin, 2007). iPremier’s management orientation is on “do what it takes” to have projects done on schedule.
Being a web-based commerce company, iPremier had contracted Qdata to provide the majority of their computing equipment and internet connectivity (Austin, 2007). Qdata, though not a leading industry in information technology was selected due to its close proximity to iPremier’s company headquarters.
iPremier once suffered a denial of service attack on 12th January 2007 that almost rendered the company’s site nonfunctional (Austin, 2007). Denial of service attack can be defined simply as an attempt to prevent the availability of computer resources to its legitimate users (Encyclopedia Britannica). This is achieved through halting an internet site or service from working efficiently, temporarily or permanently. Hackers had launched the denial of service attack on iPremier but luckily it was launched either by a script-kiddie or a competitor trying to ...
... middle of paper ...
...sing disk space to enable high logging levels, and updating virus signature files and other security patches (Keri and Carol, 2010). The company also needs to come up with a well designed and documented recovery plan. Last, the Company needs to educate its staff about security and threats.
Mirkovic, J., Dietrich, S., Dittrich and Reiher, P (2005).Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall, New Jersey
Austin, Robert (2007). The iPremier Company (A): Denial of Service Attack. Harvard Business School, Boston, Massachusetts
Denial of service attack (DoS attack). (2010). In Encyclopedia Britannica. Retrieved from http://www.britannica.com/EBchecked/topic/1055468/denial-of-service-attack
Keri E. Pearlson and Carol S. Saunders (2010). Strategic Management of Information Systems, 4th Edition. John Wiley & Sons, New York
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- On January 12th at approximately 4:31am EST iPremier’s website experienced an unplanned downtime due to a distributed Denial-of-Service (DDoS) attack. A distributed denial-of-service attack occurs when multiple systems flood the bandwidth or resources of a targeted system, in this case iPremier’s ecommerce website. This type of attack is often a caused by multiple compromised systems flooding a target system with incoming messages, forcing it to shut down, in doing so denies service to legitimate users.... [tags: Denial-of-service attack, Attack, Firewall]
1614 words (4.6 pages)
- The History of Cybercrimes – Maya Poole A cyber-crime is an illegal activity that takes place on the computer or internet (Williams). Before the internet was invented criminals were stealing information from the computers committing data theft (VPN). The first major cyber-crime was in the 80s, criminals would send a lot of scams to the inbox of emails (VPN). Most of the scams included a desperate story hoping that someone would feel bad for them and send them money or they asked for bank card numbers in order to send them some money.... [tags: Identity theft, Denial-of-service attack, Theft]
1482 words (4.2 pages)
- Within the last decade, the internet has proven to be the most efficient way to complete tasks in today’s society. Every major business in today’s society relies on the internet to conduct business. Though the internet is a useful tool, our reliability on it opens up the door for cyber-attacks that can be detrimental to business as a whole. One example of a cyber-attacks that have recently started becoming more prevalent are DDoS attacks. Recently, DDoS attacks have been a rising issue for businesses owners who run their own servers, such as video game companies and other high profile web servers, including banks and other credit card payment gateways.... [tags: DDoS Attacks, Cyber Terrorism]
627 words (1.8 pages)
- Denial of Service Attacks Definition: Denial of Service. A cracker attack that overloads a server to the point that it no longer responds or shuts down completely. To flood a network or individual server with huge amounts of data packets. How it Works In a typical connection, the user sends a message asking the server to authenticate it. The server returns the authentication approval to the user. The user acknowledges this approval and then is allowed onto the server. In a denial of service attack, the user sends several authentication requests to the server, filling it up.... [tags: Essays Papers]
877 words (2.5 pages)
- Denial of Service attacks (DoS) or Distributed Denial of Service Attacks (DDoS), have been around for many years, but only in the past few years have the frequency and magnitude of these attacks increased. They are a significant problem because they can shut an organization off from the Internet for extended periods of time and little can be done to stop them. DoS attacks occur when computer resources become unavailable to legitimate users after being exhausted by false requests for information (Houle and Weaver 1).... [tags: Computers]
2204 words (6.3 pages)
- Tracing the Source of Denial of Service Attacks Abstract: Denial of service attacks are becoming increasingly prevalent and serious, yet the anonymity that these attacks affords the hacker provides no means for a victim to trace the attack. The weakness of the TCP/IP protocol allows for this anonymity, yet it would be very difficult to change this protocol. Savage, Wetherall, Karlin, and Anderson present a method for tracing back the source IP address and network path of denial of service attacks.... [tags: Exploratory Essays Research Papers]
2010 words (5.7 pages)
- Enhancing DNS Resilience against Denial of Service Attacks Abstract The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) attacks have targeted the DNS infrastructure and threaten to disrupt this critical service. In this paper we show that the existing DNS can gain significant resilience against DDoS attacks through a simple change to the current DNS operations, by setting longer time-to-live values for a special class of DNS resource records, the infrastructure records.... [tags: Internet Security]
1001 words (2.9 pages)
- ... There ultimate goal is often achieved through denial of service attack. Password cracking is a sneaky method used by hackers to gain unauthorized access to system through someone’s account. According to www.msdn.microsoft.com network systems are at high risk when the password selected is weak; they are easy to guess by hackers such as date of birth, family name or child’s name. On The 1st of February 2013, Twitter announced it had been subjected to unauthorised access attempts over the course of a week.... [tags: virus, hackers, denial of service]
693 words (2 pages)
- ... Cross-site scripting is a malicious web developer may attach a script to something sent to a web site, such as a URL, an element in a form, or a database inquiry. Later, when the web site responds to you, the malicious script is transferred to your browser. You can potentially expose your web browser to malicious scripts by following links in web pages, email messages, or newsgroup postings without knowing what they link to using interactive forms on an untrustworthy site viewing online discussion groups, forums, or other dynamically generated pages where users can post text containing HTML tags Packet sniffing is a packet sniffer is a program that captures data from information packets... [tags: Trojan horse programs, Denial of Service]
1670 words (4.8 pages)
- This essay will define a “denial of service” (DOS) attack and explain the steps involved in an attack. The new type of DOS attack using phone lines will be the focus of the research provided in this essay. Denial of service attacks can affect both business and financial operations of an individual or a business. The impact of the attack both on financial and business operations will be outlined. The measures a person or business can put into place in order to avoid these attacks will be discussed.... [tags: Network Security ]
1148 words (3.3 pages)
- Savagery in Chronicles of a Death Foretold and Candide
- Controversy Surrounding Alienated Characters in Literary Works
- The City of Constantinople and Warfare of the Byzantine Empire
- Corporate Social Responsibility
- The Positive Impact of Globalization Upon China and India
- English Law’s Approach to Same Sex Marriage