TheCaseSolutions.com

  • Order Status
  • Testimonials
  • What Makes Us Different

iPremier (A): Denial of Service Attack (Graphic Novel Version) Harvard Case Solution & Analysis

Home >> Management Case Studies >> iPremier (A): Denial of Service Attack (Graphic Novel Version)

ipremier case study answers

The iPremier Company (A): Denial of Service Attack

About iPremier

iPremier was involved in e-commence retail business and was founded by two college students in 1996. It was the 2 nd largest retail business and the company enough cash in hand. In the last three years, sales were increasing by 20%. This company was included in those few organizations that survived business-to-consumer segment. It was composed of talented employees and experienced managers with compensation based on performance. iPremier had good governing values (See list in Figure-1) and was the pioneer in introducing new features.

Problem Statement

iPremier faced a Daniel of service attack (DoS) and it lasted for 75 minutes. It got resolved on its own and was not resolved by iPremier or Qdata. Due to DoS attacks, customers were not able to reach iPremier web page. Security plan of iPremier had been outdated and they had no plan to deal with that issue.

What is Daniel of Service?

Daniel of the service is an attack that restricts internet users to use services of a particular company. As a result of DoS, network performance goes down, website can’t be accessed and you get spam email.

iPremier Issues:

iPremier had many issues. They did not have updated security plan to deal with those kinds of attacks. Another issue was that they outsourced their technical architecture to Qdata, which did not have state of the art technology. iPremier was facing deficit in operating procedures. Employees of Qdata were not cooperating with iPremier when that attack happened. Employees who were working at night shift were not responsive. Qdata’s key employees were on vacation. iPremier could have better service provider but it was costly for them and this would have increased their expenses.

iPremier management was not able to detect the problem . They were worried about customer credit card information. They were not able to figure out anything and they could not make decision to contact police or FBI. Communication among employees was not centralized. One of their employee informed many other employees about that attack. Chief information officer wanted to keep it secret. There was a lack of formal reporting line.

iPremier Response

iPremier Response was not as good as it should have been. Some employees were giving suggestion to shut down the server. Some were willing to let things happen in order to know the impact of that attack. Management was not able to make any decision.

Recommendation

iPremier is supposed to take many important steps in order to deal with security issues. Following are the alternatives that iPremier can select to overcome the problem.

  • 1.      Change Hosting Company

As it was mentioned in the case that Qdata did not have latest technology and because of this, it lost its market leader position. Qdata could not retain their experienced staff. That’s why their customer service was not up the mark. iPremier is suggested to find new service provider that must have latest technology, which could help companies to stop DoS attacks. Following are the advantage and disadvantages of choosing this option.

  • iPremier will have a company that can give extra security.
  • It will help to increase customer trust.
  • It will reduce the chances of DoS attack in the future.

Disadvantages

  • It will be costly for iPremier and expenses will increase.
  • It will consume time when shifting to new servers.
  • 2.      Make Strategic Alliance

iPremier can have strategic alliance with Qdata. iPremier has strong financial position. They can invest into Qdata to improve technology. Following are the advantages and disadvantages of choosing 2nd option.

  • Service charges will decrease.
  • iPremier will have decision making power in Qdata.
  • iPremier will have to bear initial investment cost.
  • 3.      Create New IT Firm

iPremier is suggested to form its own IT firm that will make sure that the security system is working correctly. Following are the advantages and disadvantages of choosing 3rd ........................

This is just a sample partial case solution. Please place the order on the website to order your own originally done case solution.

Describes the IT security crisis, and raises issues of risk management, crisis preparation, crisis management , computer security, and public disclosure of security threats. "Hide by Robert D. Austin, Jeremy C. Short Source: HBS Premier Case Collection 32 pages. Publication Date: June 25, 2009. Prod. #: 609092-PDF-ENG

Related Case Solutions & Analyses:

ipremier case study answers

Hire us for Originally Written Case Solution/ Analysis

Like us and get updates:.

Harvard Case Solutions

Search Case Solutions

  • Accounting Case Solutions
  • Auditing Case Studies
  • Business Case Studies
  • Economics Case Solutions
  • Finance Case Studies Analysis
  • Harvard Case Study Analysis Solutions
  • Human Resource Cases
  • Ivey Case Solutions
  • Management Case Studies
  • Marketing HBS Case Solutions
  • Operations Management Case Studies
  • Supply Chain Management Cases
  • Taxation Case Studies

More From Management Case Studies

  • Privatization of the Tiger Leaping House in Nanjing, PRC
  • How Do Customers Judge Quality in an E-Tailer
  • Growing Managers: Moving from Team Member to Team Leader
  • Best Buy Inc. - Dual Branding in China
  • Federal Express (B)
  • Thought Leader Interview: Dr. Eric Topol
  • Forbes Technosys Limited (A): Bill Payment Kiosk Business

Contact us:

ipremier case study answers

Check Order Status

Service Guarantee

How Does it Work?

Why TheCaseSolutions.com?

ipremier case study answers

IPremier Co. (A): Denial of Service Attack

By: Robert D. Austin, Larry Leibrock, Alan Murray

Describes a new CIO trying to manage a denial of service (DOS) attack against his e-retailing business. The attack and its aftermath provide students an opportunity to discuss the business issues…

  • Length: 13 page(s)
  • Publication Date: Feb 13, 2001
  • Discipline: Operations Management
  • Product #: 601114-PDF-ENG

What's included:

  • Teaching Note
  • Educator Copy

$4.95 per student

degree granting course

$8.95 per student

non-degree granting course

Get access to this material, plus much more with a free Educator Account:

  • Access to world-famous HBS cases
  • Up to 60% off materials for your students
  • Resources for teaching online
  • Tips and reviews from other Educators

Already registered? Sign in

  • Student Registration
  • Non-Academic Registration
  • Included Materials

Describes a new CIO trying to manage a denial of service (DOS) attack against his e-retailing business. The attack and its aftermath provide students an opportunity to discuss the business issues that are interwoven with computer security issues.

Learning Objectives

Introduces students to the complex business and legal issues involved in making an e-business secure against breaches in security.

Feb 13, 2001 (Revised: Feb 28, 2018)

Discipline:

Operations Management

Geographies:

Industries:

Retail trade

Harvard Business School

601114-PDF-ENG

We use cookies to understand how you use our site and to improve your experience, including personalizing content. Learn More . By continuing to use our site, you accept our use of cookies and revised Privacy Policy .

ipremier case study answers

The iPremier Company: Denial of Service Attack Essay

Located in Seattle Washington, the iPremier company is a web-based commerce company founded in 1996 by two students from Swarthmore College. Since its founding, iPremier has registered a success story in e-commerce selling vintage, luxury and rare goods over the internet (Austin, 2007). Customers use their credit cards to transact business online. With impressive sales and profit margins, iPremier is among the few companies that survived the 2000 technical stock recession (Austin, 2007).

Management at iPremier consists of young employees who were its pioneers and a number of experienced managers recruited over time. The company’s working atmosphere is dynamic with strong values of professionalism, discipline, commitment to results delivery and partnership for-profits achievements (Austin, 2007). iPremier’s management orientation is on “do what it takes” to have projects done on schedule.

Being a web-based commerce company, iPremier had contracted Qdata to provide the majority of its computing equipment and internet connectivity (Austin, 2007). Qdata, though not a leading industry in information technology was selected due to its close proximity to iPremier’s company headquarters.

iPremier once suffered a denial of service attack on 12 th January 2007 that almost rendered the company’s site nonfunctional (Austin, 2007). A denial of service attack can be defined simply as an attempt to prevent the availability of computer resources to its legitimate users (Encyclopedia Britannica). This is achieved through halting an internet site or service from working efficiently and can be temporarily or permanently. Hackers had launched the denial of service attack on iPremier but luckily it was launched either by a script-kiddie or a competitor trying to interfere with service otherwise it would be worse. The attack lasted for about 75 minutes after which it cleared without any intervention either from Qdata or iPremier.

With this insight, the remaining part of this essay, therefore, seeks to analyze how iPremier addressed this situation in relation to professional ways of addressing the denial of service attacks.

The case excerpt prepared by Robert Austin shows clearly that iPremier was unprepared for the attack. This might have resulted from over trusting Qdata’s ability to control such a situation and the apparent lack of vision regarding any threats that might arise. Everyone reacted in a panic because there was no disaster/crisis management plan in place. The response to the attack was generally poor (Austin, 2007). They were unable to decide whether or not; to disconnect communication lines, rebuild all systems, and involve the FBI or Seattle police. However, some employees like Joanne Ripley are credited for their quick response to the crisis although her efforts did not yield much in averting the attack. It is worth noting that the attack stopped after approximately 75 minutes without any intervention either from Qdata or iPremier. Bob Turley also reacted professionally by contacting relevant parties and listening to their pieces of advice but he should have done much more being the chief information officer.

If I were Bob Turley, I would have convened a teleconference with the company’s technical executives to discuss appropriate risk management measures. I would also include Qdata’s key contact person on the issue to provide possible recovery measures for the situation. I would also ask the legal advisor to listen to the conversation to get a clear picture of the situation and provide legal advice for the plan.

In the aftermath of the attack, it is obvious that one would be worried about the reputation of the business and the company in general (Mirkovic, Dietrich, Dittrich and Reiher, 2005). My main worry would be on the damages to the network and business at large. I would be more than concerned about the possibilities of future attacks. The iPremier company had placed much focus on its profits and coming up with new features for its customer’s benefit at the expense of coming up with technology architecture that would protect its system from viruses and hackers (Austin, 2007). This attack must have served as a wake-up call to the company. To this end, I would propose the following recommendations to iPremier.

First, the company needs to revisit its choice of ‘colocation’ partner. Qdata had completely lost any prospect of leadership in the market and was slow to invest in advanced technology thus would have not been a good choice for a company like iPremier. The company also needs to create an incident management team and ensure that its network management software is made remotely accessible to the security team. Third, I would recommend that the company adopts appropriate security/privacy measures like the use of cryptography for sensitive data, installing a sophisticated firewall, purchasing disk space to enable high logging levels, and updating virus signature files and other security patches (Keri and Carol, 2010). The company also needs to come up with a well-designed and documented recovery plan. Last but not least, the Company needs to educate its staff about security and threats.

Austin, R. (2007). The iPremier Company (A): Denial of Service Attack. Boston , Massachusetts : Harvard Business School. Web.

Denial of service attack (DoS attack). (2010). In Encyclopedia Britannica . Web.

Keri E. P. and Carol S. S. (2010). Strategic Management of Information Systems (4th Edition). New York: John Wiley & Sons.

Mirkovic, J., Dietrich, S., Dittrich and Reiher, P (2005). Internet Denial of Service: Attack and Defense Mechanisms . New Jersey: Prentice Hall.

  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2023, November 9). The iPremier Company: Denial of Service Attack. https://ivypanda.com/essays/the-ipremier-company-denial-of-service-attack/

"The iPremier Company: Denial of Service Attack." IvyPanda , 9 Nov. 2023, ivypanda.com/essays/the-ipremier-company-denial-of-service-attack/.

IvyPanda . (2023) 'The iPremier Company: Denial of Service Attack'. 9 November.

IvyPanda . 2023. "The iPremier Company: Denial of Service Attack." November 9, 2023. https://ivypanda.com/essays/the-ipremier-company-denial-of-service-attack/.

1. IvyPanda . "The iPremier Company: Denial of Service Attack." November 9, 2023. https://ivypanda.com/essays/the-ipremier-company-denial-of-service-attack/.

Bibliography

IvyPanda . "The iPremier Company: Denial of Service Attack." November 9, 2023. https://ivypanda.com/essays/the-ipremier-company-denial-of-service-attack/.

  • The Incident of the Distributed Denial of Service Attack
  • IPremier Company's Information Technology Governance
  • Edward Snowden in Government Lies and Secrets
  • Seattle's Hospitality, Travel and Tourism
  • The Seattle-Tacoma International Airport
  • Indonesian Students Settling in Seattle
  • What about Bob
  • Aspect of Democracy in Seattle
  • "Sleepless in Seattle" and "Mrs. Doubtfire"
  • "What About Bob" by Frank Oz
  • Fault Tolerance of an Information System
  • Sawtel Defender: Network Security
  • Information Security and Privacy
  • Current Laws and Acts That Pertain to Computer Security
  • Global Corporation Inc.: Data Protection Policy Statement

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

THE iPREMIER COMPANY (A): Denial of Service Attack

Profile image of Sarabdeep Singh

shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell shell

Related Papers

International Journal of Engineering Research and Technology (IJERT)

IJERT Journal

https://www.ijert.org/denial-of-service-attacks-tools-and-categories https://www.ijert.org/research/denial-of-service-attacks-tools-and-categories-IJERTV9IS030289.pdf DoS attacks cause severe damage to services available online. This kind of attacks try to prevent legitimate users from using their rights to online services by bringing down servers. Issues in Internet security provide the hackers with ways to attack network systems. These attacks can be performed using many tools and techniques. This paper gives an overview on DoS attacks categories and tools. Also, it defines the most known Dos attack incidents and explains the IP Spoofing.

ipremier case study answers

Network Security–Current status and …

Aikaterini Mitrokotsa

Leonard wandera

https://www.ijert.org/distributed-denial-of-service-attack-at-application-and-transport-layers-and-precautions https://www.ijert.org/research/distributed-denial-of-service-attack-at-application-and-transport-layers-and-precautions-IJERTV2IS2462.pdf The frequency of Denial of Service (DoS) and Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. (DDoS) attack has the significant ability of concealing the traffic because it is very much like normal traffic. The Internet is part of the critical national infrastructure but is unique in that it has no customary borders to safeguard it from attacks. Network security becomes critical part in the internet world. Attacks that are seen everyday on the Internet include direct attacks, remote controlled attacks, reflective attacks, worms, and viruses. Specific attacks directed at a service provider's infrastructure can be very damaging and cause wide spread outages. In this paper we describe DDoS attacks in the application layer and transport layer of the OSI model and precautions to avoid the attack.

International Journal of Engineering Research & Technology

Hadeel S . Obaid

DoS attacks cause severe damage to services available online. This kind of attacks try to prevent legitimate users from using their rights to online services by bringing down servers. Issues in Internet security provide the hackers with ways to attack network systems. These attacks can be performed using many tools and techniques. This paper gives an overview on DoS attacks categories and tools. Also, it defines the most known Dos attack incidents and explains the IP Spoofing.

Michalis Masikos

We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources. An attacker may attempt to: "flood" a network and thus reduce a legitimate user's bandwidth, prevent access to a service, or disrupt service to a specific system or a user. We describe methods and techniques used in denial of service attacks, and we list possible defenses. In our study, we simulate a distributed denial of service attack using ns-2 network simulator. We examine how various queuing algorithms implemented in a network router perform during an attack, and whether legitimate users can obtain desired bandwidth. We find that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes ...

International Journal for Research in Applied Science and Engineering Technology IJRASET

IJRASET Publication

With the emergence of new technologies in this technological era the cyber world has also seen an increase in the number of attacks out of which the DDOS attack remains one of the most silent yet dangerous attack. DDOS attacks are carried by professionals who have the motivation of bringing down working systems, websites due to some personal or political agenda. This research paper is intended to highlight some ways in which a DDOS attack is detected and mitigated. We will also see how Machine Learning can be helpful in mitigating the DDOS attacks.

The Ijes The Ijes

Khaled Elleithy

John Palfrey

RELATED PAPERS

JURNAL TERAPAN MANAJEMEN DAN BISNIS

Aris Munandar

Journal of Petroleum Science and Engineering

International Journal of Molecular Sciences

Mei-lan Tsai

South African Journal of Childhood Education

HASINA EBRAHIM

The Comparatist

Lisa Propst

Adjunct Publication of the 24th International Conference on Human-Computer Interaction with Mobile Devices and Services

Owen Brierley

Maria Teresa Lombardo

IEEE Transactions on Evolutionary Computation

José B Nieto

Adjeng Putri Yani

Marine Corhay

Congreso Internacional Andalucía Barroca. III. Literatura, Música y Fiesta

José Lara Garrido

2007 Winter Simulation Conference

Linda Nozick

Journal of cognitive neuroscience

Tamara Swaab

Microbiology Resource Announcements

Poliane Alfenas-Zerbini

Nuclear Physics B

Tristan Hubsch

JIIP - Jurnal Ilmiah Ilmu Pendidikan

lailatul afifah

Marek Treiman

arXiv (Cornell University)

Miguel H Berasategui

Clinical and Experimental Hypertension

Apostolos Batsidis

Organic Letters

cristina veresmortean

Revista de Ciencias Sociales

Henry Sebastian VARGAS MUCHA

Journal of Applied Polymer Science

hidayet mazı

Jasna Džunuzović

Biochemical and Biophysical Research Communications

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Order my new book The HERO Transformation Playbook

Arif Harbott

CTO | Transformation | Angel Investor

iPremier and Denial Of Service Attack – Case Study

Arif Harbott

In a recent Information Management lecture we went through the case of iPremier ( read the full case ) which is a popular case study from Harvard Business School. It was a made up case but the recent high profile hacking stories ( such as Gawker ) show that companies are not taking security seriously.

The background is that iPremier suffered a DOS attack in the middle of the night which caused chaos in the company. After an hour the attack stopped and the company went back to business as normal. Two weeks later another DOS attack was spawned from the company’s server directed at a competitor which proved that their server had been compromised. The FBI became involved, the competitor threatened to sue and the city analysts were thinking of downgrading the stock.

Our role was to come up with recommendations as to how the processes and plans could be improved for the future. Keeping in mind that the security is about more than just technology we needed to brainstorm around people and processes as well.

1. People and processes

  • Develop a business continuity plan (test it end to end including suppliers and keep it updated)
  • Develop an IT governance framework that includes security in its remit
  • Develop clear reporting lines
  • Better training for emergencies
  • Trust your technical leaders and make sure they have the resources to lead in a crisis
  • Make security part of strategy
  • Hire an independent audit team who report into the board
  • Hire a security and risk expert
  • Develop a better relationship with your hosting provider

2. Technology

  • Avoid single points of failure. Separate the server stack so that database, web and file servers are not on the same network
  • Use a reputable hosting provider with a world class infrastructure and support
  • Make sure all your software is up to date
  • Use a combination of hardware and or software firewalls
  • Backup and redundancy planning and testing
  • Active monitoring
  • Strong one-way encryption of passwords
  • Use open auth systems such as Facebook connect

I know there are lots and lots of other things you can do but this was the result of a very quick group collaboration.

Subscribe To Our Newsletters

Hey, i share a lot of interesting insights with my people every month, do you want to receive it too, get my curated once per month email newsletter with all of my latest posts as well as the best tech news, trends and innovations..

  • Harvard Business School →
  • Faculty & Research →
  • February 2001 (Revised February 2018)
  • HBS Case Collection

The iPremier Company (A): Distributed Denial of Service Attack

  • Format: Print
  • | Language: English
  • | Pages: 13

Related Work

  • Faculty Research
  • The iPremier Company (A): Distributed Denial of Service Attack  By: Robert D. Austin, Larry Leibrock and Alan Murray

Ipremier Case Study Answers

The essay sample on Ipremier Case Study Answers dwells on its problems, providing shortened but comprehensive overview of basic facts and arguments related to it. To read the essay, scroll down.

Introduction On January 12th. 2007 at 4:31am. Bob Turley. CIO of the iPremier Company. received a panicky phone call from his IT operations staff. Their external facing web site was “locked up” and could non be accessed by anyone. including their clients. iPremier is a web-based concern that generates gross through entirely treating on-line orders.

While the web waiter was down. the company could non accept any new orders or let their clients to see their merchandises. An inadequately third-party managed and configured router/firewall allowed hackers to put to death a DOS ( Denial of Service ) onslaught on iPremier. I recommend buying a new firewall solution that will be managed and configured by the Company’s IT staff internally. This degree of control will let the company to orient the degree of security they desire and give them the ability to extenuate menaces consequently.

Summary of Facts At 4:31am on January 12th. 2007. Bob Turley ( CIO of iPremier ) received a panicky call from Leon Ledbetter in operations. Leon stated that the Company’s web site was down and that clients could non entree the site. He besides stated electronic mails incorporating the phrase “ha ha” were being received by the mail waiter. The Company’s proficient operations squad leader. Joanne Ripley called Mr. Turley at 4:39am saying she could non entree their equipment from the line to their office and indicated she was driving toward the Qdata co-located installation.

ipremier case study answers

Proficient in: Internet

“ Thank you so much for accepting my assignment the night before it was due. I look forward to working with you moving forward ”

She confirmed that Qdata ( their hosting company ) claims there was non a connectivity issue in or out of the edifice. Ripley stated the she would seek to re-start the web waiter once she reached the installation and confirmed she had an outdated transcript of exigency processs in her vehicle. Shortly after Mr. Turley hung up with Ripley he received a call from Warren Spangler. VP of concern development. Mr. Spangler was concerned with the affect on the Company’s stock monetary value. naming the constabulary or FBI. and basic PR issues ensuing from the incident. After Mr. Turley hung up with Spangler. he received a call from Ripley saying that Leon from operations notified Mr. Spangler of the incident. Turley so proceeded to name Tim Mandel. the Company’s CTO. Mandel advised Turley non to draw the Internet connexion so farther logging could be obtained. He besides disclosed advanced farinaceous logging would non be available due to infinite restraints from finance issues.

He besides received a call from Peter Stewart. the Company’s legal advocate. reding him to draw the stopper on the Internet connexion. Stewart advised that Jack Samuelson. the Company’s CEO. asked him to supply legal advice on the affair. Ripley besides called in and reported she could non entree the NOC due to knowledge and staffing issues at the Qdata installation. At this point Samuelson called Turley straight and advised that his chief concern was acquiring the Company back online and reiterated that Turley should non worry about any PR issues at this minute in clip. Shortly after. Ripley obtained entree to the hosted firewall and determined the closure was due to a SYN inundation type of DOS onslaught. A SYN inundation occurs when “external hosts attempt to overpower the waiter machine by directing a changeless watercourse of TCP connexion petitions. coercing the waiter to apportion resources for each new connexion until all resources are exhausted ( Lemon. 2002 ) .

Ripley attempted to barricade entree from the arising IP reference but rapidly learned that living dead machines were being used in the onslaught. rendering this attack useless. He hung up with Ripley so received another call from her at 5:46am saying that the onslaught all of a sudden stopped. Ripley confirmed the web site was back on-line and the concern was running every bit usual.

This DOS onslaught prevented iPremier from selling merchandises. and allowing clients position merchandises. on their web site. This is the exclusive presence of the concern. and when the web site is down. the company can non bring forth gross. All responsible parties and directors were rapidly involved and attempted to extenuate negative effects to the company. There appeared to be a little gulf between the legal and functional leading advice across the board. The web site was merely down for a small over an hr and iPremier provinces there was no significant impact to the concern at this clip. Problem and Options

This denial of service onslaught occurred due to inadequate firewall constellation and direction. This job was farther amplified by the fact that the firewall service was hosted by a third-party seller. Qdata. iPremier recognized staffing and general IT cognition and direction issues with Qdata in the past. but chose non to move upon their finds. iPremier did non hold any active monitoring of the firewall and merely knew there was a series concern runing issue merely when the web waiter was to the full unapproachable and unresponsive.

One solution is for iPremier to buy their ain firewall where they can use the proper constellation to forestall farther onslaughts. This degree of direction will besides supply them with advantages where they could to the full supervise the device and to setup dismaies bespeaking when there is a possible issue. iPremier will hold full control over the device leting them to custom-make the degree of security they desire. The drawback is the cognition necessary to adequately configure and keep the device.

Another solution is to go on their firewall service with Qdata after a complete audit was performed. Any failings in the security design would hold to be addressed and some type of warrant of service would hold to be put in authorship. I would besides urge that iPremier obtains some type of service degree understanding from Qdata to guarantee a prompt response clip during an incident. Some type of eventuality program must besides be put into topographic point leting them to instantly entree the device locally and remotely during a serious issue.

The advantage here is maintaining the current supplier which would non necessitate them to do any web or equipment alterations. The obvious disadvantage would be go oning service with a company who has already failed them in the past screening hapless credibleness.

A 3rd solution would be for iPremier to exchange to a firewall and security supplier who would supply a high degree of service for a fee they would experience comfy with. The same type of entree demands would be required during a serious issue to let iPremier entree when deemed necessary. “Shopping” around for a seller would let them to to a great extent research best in industry suppliers with a proved path record. The advantage here is obtaining a top-level service supplier with the right “know how” but finally iPremier would hold to reconfigure some equipment and do web alterations. Harmonizing to Allen. Gabbard. May. Hayes. & A ; Sledge ( 2003 ) . utilizing a managed service supplier is a feasible solution for administering security operations and duties where the organisation still owns the associated hazards. but allows sharing and extenuation of the hazards. Decision and Decision

Regardless of which solution iPremier chooses to implement. they must execute a full audit to bring out precisely what let this DOS onslaught to happen. We know the failing was in the firewall. but cognizing the root cause will let iPremier to utilize this calamity as a larning experience to construct upon in the hereafter. Joanne Ripley seems competent and willing to implement a “better” solution and I recommend prosecuting her in all treatments affecting this incident traveling frontward. Internal control of a firewall solution will let iPremier direction to acquire every bit involved as they want to be. The CTO and CIO could besides potentially pull studies from the device leting them to do future security planning determinations. Harmonizing to Applegate. Austin. & A ; Soule. ( 2009 ) . exchanging IT systems can go hard and dearly-won once it is ingrained into daily activities.

This facet of the security solution should decidedly be examined and taken into consideration. Allowing direction and IT staff to be involved in the Company’s security solution will assist maintain up security consciousness in the workplace every bit good. One individual may lose a possible menace that another staff member could acknowledge. Person as plugged in and competent as Ripley should merely be allowed to do alterations to the device. Staff should merely hold adequate entree to execute the necessary undertaking at manus. This would typically merely affect read-only entree to the security devices. iPremier conducts all of its concern through their web site and they can non afford for it to be down for any sum of clip. Mentions

Allen. J. . Gabbard. D. . May. C. . Hayes. E. . & A ; Sledge. C. ( 2003 ) . Outsourcing managed security services ( No. CMU/SEI-SIM-012 ) . CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.

Applegate. L. M. . Austin. R. D. . & A ; Soule. D. L. ( 2009 ) . Corporate information scheme and direction: Text and instances. Boston: McGraw-Hill Irwin.

Lemon. J. ( 2002. February ) . Defying SYN Flood DoS Attacks with a SYN Cache. In BSDCon ( Vol. 2002. pp. 89-97 ) .

Cite this page

Ipremier Case Study Answers. (2019, Dec 07). Retrieved from https://paperap.com/paper-on-ipremier-dos-attack-essay/

"Ipremier Case Study Answers." PaperAp.com , 7 Dec 2019, https://paperap.com/paper-on-ipremier-dos-attack-essay/

PaperAp.com. (2019). Ipremier Case Study Answers . [Online]. Available at: https://paperap.com/paper-on-ipremier-dos-attack-essay/ [Accessed: 8 May. 2024]

"Ipremier Case Study Answers." PaperAp.com, Dec 07, 2019. Accessed May 8, 2024. https://paperap.com/paper-on-ipremier-dos-attack-essay/

"Ipremier Case Study Answers," PaperAp.com , 07-Dec-2019. [Online]. Available: https://paperap.com/paper-on-ipremier-dos-attack-essay/. [Accessed: 8-May-2024]

PaperAp.com. (2019). Ipremier Case Study Answers . [Online]. Available at: https://paperap.com/paper-on-ipremier-dos-attack-essay/ [Accessed: 8-May-2024]

  • Ipremier Company History Pages: 6 (1556 words)
  • Nintendo Case Study Questions And Answers Pages: 4 (1005 words)
  • ESPN Brand Case Study Questions and Answers Pages: 2 (530 words)
  • Motorola China Experience Case Answers Pages: 16 (4512 words)
  • Romeo and Juliet All Study Guide Questions and Answers Pages: 10 (2729 words)
  • To Kill a Mockingbird Final Test Study Guide (With Answers) Pages: 3 (633 words)
  • outsiders study guide questions and answers Pages: 4 (1181 words)
  • Scarlet Letter Study Guide Answers Pages: 11 (3011 words)
  • Cowles Case Study and the Woolworth Case Pages: 5 (1324 words)
  • Poetry Reading Test #4 Questions and Answers Pages: 1 (245 words)

Ipremier Case Study Answers

ipremier case study answers

Snapsolve any problem by taking a picture. Try it in the Numerade app?

IMAGES

  1. Ipremier Case Study Answers

    ipremier case study answers

  2. iPremier Case Analysis.docx

    ipremier case study answers

  3. Case 4 iPremier v2

    ipremier case study answers

  4. iPremier Case Analysis.pptx

    ipremier case study answers

  5. Ipremier Case Study Answers

    ipremier case study answers

  6. iPremier Case study problem statement.docx

    ipremier case study answers

VIDEO

  1. case study iPremier

  2. ipremier Case study

  3. PRIMERICA LIFE INSURANCE EXAM questions verified with 100% correct answers

  4. Market Leader Intermediate: Case Study Unit 4

  5. Burlington English IELTS Reading Answers Practice Test 1-3 (IDP)

  6. XIBMS GMS ANSWER SHEETS

COMMENTS

  1. iPremier (A): Denial of Service Attack (Graphic Novel Version) Case

    iPremier (A): Denial of Service Attack (Graphic Novel Version) Case Solution,iPremier (A): Denial of Service Attack (Graphic Novel Version) Case Analysis, iPremier (A): Denial of Service Attack (Graphic Novel Version) Case Study Solution, The iPremier Company (A): Denial of Service Attack About iPremier iPremier was involved in e-commence retail business and was founded by two college

  2. iPremier and Denial Of Service Attack

    The background is that iPremier suffered a DOS attack in the middle of the night which caused chaos in the company. After an hour the attack stopped and the company went back to business as normal ...

  3. iPremier Case Answers.docx

    Kay-Lynn Klug BADM 7401 iPremier Case Study 1. How well did the iPremier Company perform during the. AI Homework Help. Expert Help. Study Resources. ... Target Case Answers.docx. Solutions Available. Louisiana State University. BADM 7401. Case Assignment3_PiyushKakkar. Solutions Available. University of Texas, Dallas. ITM MIS 6330.

  4. IPremier Co. (A): Denial of Service Attack

    Classic. IPremier Co. (A): Denial of Service Attack. By: Robert D. Austin, Larry Leibrock, Alan Murray. Describes a new CIO trying to manage a denial of service (DOS) attack against his e-retailing business. The attack and its aftermath provide students an opportunity to discuss the business issues…. Length: 13 page (s)

  5. iPremier Case Study Report.docx

    View iPremier Case Study Report.docx from ISM 4915 at St. Petersburg College. iPremier Case Study Report Name: Akhil Somaiya Date: 10/19/2022 Class: ISM 4915 Senior Capstone Project Professor: Dr.

  6. The iPremier Company: Denial of Service Attack Essay

    Located in Seattle Washington, the iPremier company is a web-based commerce company founded in 1996 by two students from Swarthmore College. Since its founding, iPremier has registered a success story in e-commerce selling vintage, luxury and rare goods over the internet (Austin, 2007). Customers use their credit cards to transact business ...

  7. THE iPREMIER COMPANY (A): Denial of Service Attack

    A DDoS attack is easily accomplished by the use of script kiddies and hacker websites. Hackers launched the attack on iPremier. Luckily for iPremier, this was only a denial-of service attack, possibly launched by a script-kiddie, a disgruntled employee, or even a competitor trying to disrupt service.

  8. Solved Read the assigned case study "The iPremier Co. (A ...

    Computer Science questions and answers; Read the assigned case study "The iPremier Co. (A): Denial of Service Attack." By Day 7 Submit a 3- to 4-page paper addresses the following questions: How well did the iPremier Company perform during the 75-minute attack? If you were Bob Turley, what might you have done differently during the attack?

  9. iPremier and Denial Of Service Attack

    In a recent Information Management lecture we went through the case of iPremier (read the full case) which is a popular case study from Harvard Business School.It was a made up case but the recent high profile hacking stories (such as Gawker) show that companies are not taking security seriously.The background is that iPremier suffered a DOS attack in the middle of the night which caused chaos ...

  10. The iPremier Company (A): Distributed Denial of Service Attack

    Austin, Robert D., Larry Leibrock, and Alan Murray. "The iPremier Company (A): Distributed Denial of Service Attack." Harvard Business School Case 601-114, February 2001. (Revised February 2018 ...

  11. Solved iPremier Company: Denial of Service Attack Case

    The basic assumption is that there is no decision to be made if there are no problems. To understand the problem, we need to know the business of the firm (business model), how well the firm is doing (market share, profits, etc.), industry and competition. What is (are) the. iPremier Company: Denial of Service Attack. Case Study.

  12. iPremier was a successful, high-end, web-based

    iPremier was a successful, high-end, web-based retailer that was shut down by a distributed denial of service attack (DDoS) for 75 minutes. Like many companies, iPremier was not well prepared for this attack. In this Assignment, you will discuss and analyze the actions that iPremier took. To Prepare: Read the assigned case study "The iPremier Co.

  13. Ipremier Case Study Answers Free Essay Example

    227. The essay sample on Ipremier Case Study Answers dwells on its problems, providing shortened but comprehensive overview of basic facts and arguments related to it. To read the essay, scroll down. Introduction. On January 12th. 2007 at 4:31am. Bob Turley. CIO of the iPremier Company. received a panicky phone call from his IT operations staff.

  14. Ipremier

    case study rev: february 28, 2018 robert austin the ipremier company distributed denial of service attack january 12, 2018, 4:31 am somewhere phone was chirping ... Ipremier - case study. Course: Executive MBA (EPGP-11) 101 Documents. Students shared 101 documents in this course. University: Indian Institute of Management Kozhikode.

  15. iPremier Company: Denial of Service Attack Case Study

    6-12 months. Identify our needs and requirements. Identify IT firms that are suited to handles our needs. Send out bids to selected IT firms that meet our needs and requirements. Evaluate bids options. Selected best suited candidate and justify cost. Begin transition to new IT provider. Monitor and evaluate change.

  16. Solved a. Read the iPremier case and read the definitions

    Computer Science questions and answers. a. Read the iPremier case and read the definitions and examples of countermeasure categories in the class handout on Page 35 (Access Control, Human Resource Control, Operational Control, Communications Control, Application Control, Incidence Control, and Compliance Control).

  17. IPremier Case Write Up

    IPremier Case Write Up - Free download as Word Doc (.doc / .docx), PDF File (.pdf), Text File (.txt) or read online for free. MIS

  18. iPremier case study

    View iPremier case study - assignment 3.pdf from CS 1552 at Pes College Of Engineering. Assignment 3 iPremier case study 1. ... They had to also think about the stocks and also how are they going to answer their customers. So, different people in the same company had different opinions and Bob could not make one decision. So, till the attack ...

  19. SOLVED: Text: Read the iPremier case study and answer the questions

    Chapter Case Study Spring 2021 Compatibility Mode Word Insert Draw Design Layout References Mailings Review "VIC" Seardi Susie Aranda Home Help share Laments Study Guide Questions: Microbial Genetics Please read Chapter in your Cowan Microbiology textbook and answer the study guide questions below: These questions are worth 10 points and should be submitted for grading on Canvas no later than ...

  20. Solved Case Study. iPremier Company: Denial of

    The basic assumption is that there is no decision to be made if there are no problems. To understand the problem, we need to know the business of the firm (business model), how well the firm is doing (market share, profits, etc.), industry and competition. What is (are) the decisions. Case Study. iPremier Company: Denial of Service Attack.

  21. iPremier Case Study by Stefan Leonhardt

    1. Public Cloud Computing. Switch from Qdata to total cloud computing. 2. In-house Technical Architecture. Bring all technology needs in-house. 3. Public and Private Cloud Computing- Hybrid. Use both public and private cloud computing.

  22. iPremier Company: A Case Study in Denial of

    Operations Management questions and answers; iPremier Company: A Case Study in Denial of Service Attacks3Executive SummaryiPremier is a company success story from the late 90's in which an internet based company was able to grow and expand through several online website crashes.

  23. Solved Read the iPremier case study and answer the

    Question 1: (10 minutes) Exhibit 1 illustrates the services provided by QData. Which of the three primary cloud computing models does this QData service represent? Justify your answer in no more than 150 words. [5 points) Question 2: (15 minutes) 2.1) In 3 or 4 sentences, describe the feature of the TCP protocol that caused the iPremier web ...