The iPremier Company, Inc.

Slides:



Advertisements
Similar presentations
The iPremier Company Qing Cao Team #4 Dalal Ahmad, Sayed Almohri
Advertisements

iPremier(A) Denial of Service Attack – Case Study Presentation
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-1 Chapter 7 CHAPTER 7 THE EFFECT OF INFORMATION TECHNOLOGY ON THE AUDIT.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Project Analysis and Evaluation Chapter Eleven.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Credit and Inventory Management Chapter Twenty-One.
5. Economics of “Quality” Pollution control – Damage function Pollution categories – source, dispersion Ambient, emissions – Abatement cost function “Socially.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Working with Financial Statements Chapter Three.
4. Economic Effficiency Efficiency Equity Market system Social cost – External cost Public goods – Private cost.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Financial Leverage and Capital Structure Policy Chapter Seventeen.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Raising Capital Chapter Sixteen.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Options and Corporate Finance Chapter Fourteen.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Introduction to Valuation: The Time Value of Money Chapter Five.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
11. Command & Control: Standards Types of Standards Emission standards Ambient standards Technology standards Economics of Standards Uniformity Equimarginal.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Net Present Value and Other Investment Criteria Chapter Nine.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Short-Term Finance and Planning Chapter Nineteen.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Discounted Cash Flow Valuation Chapter Six.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Determining the Target Cash Balance Chapter Twenty A.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Long-Term Financial Planning and Growth Chapter Four.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Interest Rates and Bond Valuation Chapter Seven.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Risk Management: An Introduction to Financial Engineering Chapter Twenty- Three.
The iPremier Company: Denial of Service Attack
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Option Valuation Chapter Twenty- Four.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
7 - 1 Copyright © 2009 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Return, Risk, and the Security Market Line Chapter Thirteen.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
CHAPTER ELEVEN INTRODUCTION TO MERCHANDISING BUSINESSES: SALES.
Network security policy: best practices
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Sales Kickoff - ARCserve
Protecting People and Information: Threats and Safeguards
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Developing Business/Information Technology Strategies.
Cyber crime & Security Prepared by : Rughani Zarana.
© 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Introduction to Computer Ethics
© 2007 The McGraw-Hill Companies, Inc. All rights reserved.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Awicaksi E-Commerce Security & Payment System E-Commerce.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Job Interviews Module Twenty Nine Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
ImplementationOptionsImplementationOptions.
The Process of Decision Making Much of a supervisor’s job is making decisions that cover all of the functions of management. In many cases, supervisors.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. 1.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
McGraw-Hill/Irwin The I-Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Windows XP Network Services Chapter 8 - Objectives.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. Example 1-Ad A.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
McGraw-Hill/Irwin The I-Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Windows XP Security Chapter 9 - Objectives.
Prepared by: Assistant prof. Aslamzai
Challenges We Face On the Internet
Chapter 5 Electronic Commerce | Security
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Chapter 5 Electronic Commerce | Security
The iPremier Company: Denial of Service Attack
Mid-size organizations cannot be under the impression they will not benefit from a cloud ERP solution. ERP solutions in the cloud make it possible for.
Access Control and Site Security
Discussion Government Private Business Tools for prevention Congress
Presentation transcript:

The iPremier Company, Inc. GSB 522 Information Security The iPremier Company, Inc.

iPremier Company What is it like to be awakened the way Bob Turley is in the case? What are his impressions and experiences during the first few minutes after the telphone rings? What advice might you give for dealing with crisis situations like this one? What principles or recommendations might we follow during a crisis to avoid some of the problems inherent in such situations?

iPremier Company 3. What are Bob Turley’s and iPremier’s priorities? 4. How did iPremier perform during the crisis? What might you have done differently during the crisis? How might they have been better prepared?

iPremier Company 5. What information about these events should iPremier share with its customer and the public?

iPremier Company Case B A few hours after the attack, iPremier disclosed publicly that it had been the victim of a distributed denial of service attack (DDoS) Spokesperson emphasized that the event lasted only 75 minutes and only a few customers had been inconvenienced The company instituted new security measures but was not able to determine whether the firewall had been penetrated. Joanne Ripley recommended what some regarded as an extreme recommendation: disconnect all production computers from the Internet and rebuild the software systems from scratch. Shut down business for 24 to 36 hours to complete the comprehensive rebuild.

iPremier Company Case C The senior management of iPremier decided not to shut down the business for a rebuild of all production platforms. Two weeks later the FBI called Turley to inform him that MarketTop, iPremier’s biggest competitor, had been experiencing a DoS attack – the source of the attack was inside iPremier’s production computing installation. A file that had spawned some of the processes resided on a database server. What did this prove? (Speculation that the DoS attack against iPremier might have been a misdirection tactic to divert attention from hacking). Senior Team faced 3 issues: Whether to implement Ripley’s rebuild recommendation. How to handle the situation between iPremier and competitor MarketTop. The DB server that had been compromised contained credit card numbers.