The Ipremier Company

The iPremier Company: Denial of Service Attack
1. Company overview
The iPremier is Web-based Commerce Company and established in 1996 by two founder students from Swarthmore College. The company is one of the top two retail businesses in online transaction which selling from vintage goods and to the luxury item. Its well knows that during fiscal year 2006, iPremier has grabbed profit $2. 1 millions with sales of $32 million from their high-end customer.

The company has also recorded with growth by 20% annually for the last three years consecutive sales whereas back in late 1998, the company’s history of stock price had nearly tripled, especially when the euphoria of the 1999, which the market is rose to tripling, prices. Its mean the company has strong cash position. The most interesting strategic is flexibility return policies which to allow customer to thoroughly examine the products before deciding whether to keep them.
2. Management and culture
The management at the company is build-up from the mix of talented youngster who been loyal from long time period and experiences managers who had been gradually recruited as the company grew. The recruiter team has focused on well-educated technical background with knowhow in business environment especially business professionals with reputations for high performance. All employees will subject to quarterly performance appraisal that tied directly to the compensation. It’s competitive environments work, whereby unsuccessful managers will not last long.
Company has standardized on its governing value in terms of discipline, professionalism, commitment to delivering results and partnership for achieving profits. iPremier orientation towards doing “whatever it takes” to get projects done on schedule, which is especially related with customer satisfaction orientation by providing benefit. It’s essential in company to develop the competitiveness environment in order to compete the MarketTop as major competitor. Therefore the R&D team should more creative to be advance by developing the related software require for the program to attract customer.
3. iPremier IT Technical Architecture
In general, iPremier has engaged Q-data for collocation facility where Internet data’s will store in outsource system. The collocation facilities are sometime called “Internet Data Center” or simply “hosting facilities”. Q-data as partner will provide floor space, redundant power supplies, and high-speed connectivity to the Internet, environmental control and physical security. All these recognized as Network Operation Center for websites basis. Figure-1, shown the iPremier IT technical architecture system that include of “firewall” system to protect a local network and the computers that could be a feature of against unauthorized access. pic] Figure-1, iPremier IT Technical Architecture
4. Case of Hacked January 12, 2007
iPremier system has hacked by unknown intruder sending email in every second with message “ha” and locked the website that caused iPremier customer can’t access. It’s the first time iPremier through Q-data attack by unauthorized people. The chronology as follow: 04:30 am, as the approximately the first email received in Q-data mailbox system and continued in every second, that could said “ha.. ha.. ha.. a” from anonymous source. Leon Ledbetter as the new operation staff was suggested by Joanne Ripley, technical operation team leader, should report and make an emergency call to the iPremier new CIO, Bob Turley on which being away from the HQ and just arrived in New York to meet with Wall Street analysis. Bob Turley has give suggestion to check the emergency procedure in motion and make call operation staff in Q-data since he understood that iPremier has the right to get better service of monitoring 24/7. 4:39 am, the consolidation period to handle the case with few suggestion from other iPremier senior high level management such as seeking the business operation standard (emergency procedure and business continuity plan), IT help desk, restarting the Web server, pull the plug (physically disconnect to the communication line) and approach on DoS system that it maybe potentially targeted by hacker. 05:27 am, restoration system period by trial and error approach on SYNCHRONIZED
System that related with the DoS system as the next step.
There was something happened in SYN-ACT system which looks like “SYN flood” from multiple sites directed at the routers that runs the firewall services. SYN-ACT is the Web server communication whereas each conversation begins with a sequence of “handshake” interaction. The computer system will initiate to send information to synchronize in the web server. The contacted Web server responds with a synchronized acknowledge or “SYN-ACT” Theoretically, SYN flood is an attack on a Web server intended to make it think a very large number of “conversations” that are being initiated in rapid succession.
Because each interaction seems real traffic to the Web site whereas the Web server will automatically expands resources dealing with each one. By flooding the site, an attacker can effectively paralyze the Web server by trying to start too many conversations with it. 05:46 am, systems back to normal, the attack just stopped without any action to be done. It seems DoS denial of service attack. The Web site is running, and customer who visits iPremier website wouldn’t know anything since the hacked was stopped by own self.
5. Answer the questions
Q-1: How well did this company perform during this attack? In general, iPremier seems not well prepare when hack has happened although the business operation standard i. e. emergency procedure and business continuity plan in ordered but misplaced due to in proper filing. There are few items highlighted from the case; o No crisis management strategy which means there is no emergency procedure in motion being set for business continuity plan whereby the current business operation standard is not in proper binder and out of date from the current use of technology No disaster recovery plans in place o Too much reliance on outsourcing o Never practice incident response o External factor that indirectly affect to company Q-2: What should they have done differently, before or during the event? Before: o iPremier should have chosen a better Internet Hosting business with better firewalls (software and hardware) – be accessible 24/7, have their own technical support, keep logs of events, do regular system updates and backups. Standard Operating Procedures (SOP) in case of DoS attacks (as well as other technical problems), and have emergency response team ready to execute it as soon as possible. PR SOP for every crisis scenarios, and the PR team should have prepared statements ready within the first couple of hours o Engaged the help of external Tiger Team to test its systems and external audit company to do a security audit During the event: o Follow suggestion by Joanne Ripley to disconnect all production computers and rebuild from scratch.
They have documentations for that, minimal risk of something going wrong o Attempts to place a spyware/malware inside the company’s systems through a thorough check on all files in the system o Release a prepared statement to all stakeholders. Information flow on the company’s effort to restore service to normal should be constant o Keep records of company’s effort to overcome the threats and find any other unusual activities in the systems, which will be useful for post-mortem o iPremier should alert and get help from relevant authorities o The aim of this effort is twofold; Firstly, to defeat the threats to the company’s systems as comprehensively as possible
• Secondly, to alert the authorities that the company is currently under attack by unknown attacker(s), and the company is not liable for any illegal activities that might have emanate from the company’s computers while the company is under attack Q-3: What should they do in the aftermath of the event? iPremier as virtual business company (Web-based Commerce) should do correction action plan with the following area; Provide accurate, reliable info about the status of the event o File-by-file examination:
Evidence of missing data

Begin study of how ‘digital signature technology’ might be used to assure that files on production computers were the same files initially installed there
Restart all production computer equipment sequentially without interrupting service to customers
Implement secure shell access so that production computing equipment could be modified and managed from off site
Practicing simulated attack by nominated task force incident response team
Define the security requirements for the system, and then begin a process of reworking its security architecture accordingly
Get infrastructure up and running quickly by lease sophisticated firewall, upgrade and up-to-date OS as well as Security Policy

Establish secure encrypted tunnel through Virtual Private Line Q-4: What, if anything, should they say to customers, investors, and the public about what has happen?
In Information Technology and System business that ethic in information society is important which affect to the responsibility, accountability and liability of the company, especially where the Company has public registered. It’s therefore iPremier senior high level management has done the right action to disclose the incident to avoid panic investor, legal action and minimize the customer impact. 6. Conclusion Revisit and update the Standard Operation Plan and Business Continuity Plan as Company strategy to sustain in core business as Web-retailer provider o Regularly revisit and upgrade the server security system – hardware and software o Avoid dependency on single source provider for data storage and server security system o Providing proper and sufficient disk space for back-up data o Upgrade with the new security system.

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Order your essay today and save 25% with the discount code: THANKYOUPlace Order
+