Summary Of Ipremier: Denial Of Service Attack

Great Essays
Case Analysis Report iPremier: Denial of Service Attack
Analysis by: Aaron Sevy
10/20/2015

October 20th, 2015

iPremier Executive Team:

I would like to start off by saying how deeply honored we are to have this chance to discuss the many opportunities available to iPremier. After meeting with key members of your staff and thorough research of industry standards and trends my team and I have put together some recommendations to resolve your business continuity needs.

With the recent DoS attack on iPremiers website it showed us some vulnerabilities and areas that need to be addressed. This attack left iPremier exposed and with last year’s sales at $32 million there is a lot of sensitive information on your servers. That’s why our recommendation
…show more content…
iPremier and Qdata had a long standing relationship, a sort of loyalty to each other if you must. The colocation center which Qdata hosted in this case provided iPremier with some floor space, power, connectivity, environmental controlled cooling, and physical security for their web hosting servers and networking equipment. On January 12th, 2007 iPremier fell victim to a SYN flood DoS attack (Denial of Service Attack) (Figure 3). This sort of attack barraged or flooded their web servers and made their website inaccessible to both employees and customers alike. At the time, Chief Information Officer Bob Turley was out of town on business which made this situation more difficult to handle. The colocation facility Qdata was not prepared and ill-equipped to deal with a problem of this magnitude. Because TechOps was unable to fix the issue in house Joanne Ripley, who was the lead rushed over to Qdata to try and restart the servers and figure out what was happening. When Joanne arrived, Qdata employees denied her entry in to the NOC which caused valuable lost time. The standard operating procedures for such emergencies were unknown or non-existent to anyone in the company which lead to panic and confusion. Key parties started acting on their own accord thinking of their own interest first, without knowing all of the facts. The escalation chain was unstructured in such a way that everyone started calling everyone and soon the Chief Executive Officer Jack Samuelson was involved (Figure 2). When Joanne started killing the IP address from the attack, it started sprouting zombies or duplicating itself. After 75 minutes from the beginning of the attack the problem ceased with no real reason why or how it happened. This time it only ended up being a denial-of service attack but it could have been a lot worse. While there is no evidence on who

Related Documents

  • Improved Essays

    One of the biggest components to the cause of the incident was the failure of the pilots to successfully manage distractions. During the approach phase of the flight,…

    • 764 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    No one really knew what to do. As discussed earlier, this event could have been prevented because it was clear Cho was a risk to himself and/or others. The emergency plan of VT did not deal with prevention of events, i.e., threat or risk…

    • 1796 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    2) Network traffic shows that hundreds of hosts are constantly sending only SYN packets to a single Web server on campus. a. This type of traffic suggests a SYN flood attack, which according to Techtarget (http://searchsecurity.techtarget.com/definition/SYN-flooding) is when half-open connections are attempted by the user only sending SYN packets. The server will respond with SYN/ACK packets (on open ports), but the client ignores them and re-sends SYN packets. This means the server cannot handle legitimate traffic when needed. Similar to #1 above, IDS and IPS devices can detect all of this traffic and an IPS can drop the packets before they get to the target server after the pattern is recognized as an attack.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Do You Know? EVERY 24 SECONDS A host accesses a malicious website EVERY 1 MINUTE A bot communicates with its command and control center…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Technical Paper – Honeypot IT-548-Q1088 Information Security Submitted by Anudeep Gali Professor: Dr. Derek Holbert Southern New Hampshire University Abstract: Internet is one of the useful resources to the mankind but on the other hand possess so many threats and provides a means of attack for the Intruders. In this project we will be building a secure shell Honeypot and deploy on a public server to research the cyber attacks. Once we deploy the system, we will concentrate on recording all the attempts made by the intruder to enter the information system. We will be able to analyze the most commonly used usernames and passwords and analyze the shell commands used by the intruders to develop remedies of attacks on the original…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    “0736 hours! For Christ sake that was almost twelve hours ago. Why was I not notified sooner?” “Sir, protocol states that the commanding officer needn’t be contacted until at least a level three bio-safety security breach. Up until now, the breach remained confined in laboratories four and five which worked with non lethal threat leveled agents classified at zero or two.…

    • 355 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Snc's Team: Case Study

    • 148 Words
    • 1 Pages

    Everyone began to rush on their own and random times. There was no actual cover being provided during rushing and there was no dispersion and these are all things the team leader failed to maintain during the execution of the attack. SNC did do her consolidated 360 in the end and identified the location of the enemy almost immediately and responded appropriately to the initial…

    • 148 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Meet Brian Thomas Mettenbrink, an unsuspecting 20-year-old computer geek from Nebraska. He looks just like you and me, acts just like you and me, but yet there is a defining difference about him that separates us: he will be serving a year sentencing in a federal prison for his relation to the 2008 DDoS (distributed denial-of-service) attack on the Church of Scientology’s website called Project Chanology. The goal of a DDoS attack is to overwhelm the targeted website with repeated access requests to the point where the website either slows down to a crawl or goes offline. Prior to the cyber-attack, a video from 2004 depicting actor, Tom Cruise, preaching the churches strange and creepy sentiments was leaked online and viewed millions of times.…

    • 1865 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Dupont Controversy

    • 1511 Words
    • 7 Pages

    At this point most people in the community were not happy since now they came to the realization that indeed they have been poisoned by the company they trusted the most. The support from the community was withdrawn since the company had created more harm than good to the…

    • 1511 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The explosion was so powerful it blew off the north side of the wall. 911 was flooded with call. Emergency responders responded very quickly. They arrived on scene to see a disaster. The destruction was horrific, and very heart breaking.…

    • 765 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Infinite Campus is used by many schools in the state and nation. Infinite Campus offers many tools that will be useful as a teacher. Infinite Campus offers a tool that will help teachers create a seating chart in the classroom. Infinite campus can be used to do attendance, post grades, post assignments, and look up information on a student. Infinite Campus offers you a training to help you understand how to use to the best of your ability.…

    • 129 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Curfew Persuasive Essay

    • 774 Words
    • 4 Pages

    Take a seat mom and dad because what I’m going to explain to you two is going to take a while. When you were younger did you have a curfew? Probably not and that’s why you gave me one so I do not make the same mistakes from you. That’s one of your jobs to make us turn out better then you, sort of like a generation that becomes a better person over generation.…

    • 774 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    The final phase is watching out for new vulnerabilities and implementing fixes patches and updates in a timely matter to alleviate future compromises. Also in this phase, reports are created of errors that have occurred and prevention of new errors from rising. The web server attack can cause harm to an organizations name and brand. The consequences can be website damage and destruction, compromised information, alteration of data (users ' personal data), and web server infringement.…

    • 1189 Words
    • 5 Pages
    Improved Essays