Assignment 1: iPremier Case Series Background iPremier (A), iPremier (B), and iPremier (C) cases describe an IT security crisis, and raise issues of risk management, preparation for crisis, management...

1 answer below »
Look at paper uploaded.


Assignment 1: iPremier Case Series Background iPremier (A), iPremier (B), and iPremier (C) cases describe an IT security crisis, and raise issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure of security risks. After you experience the cases and debrief what you have learned, you should have a better understanding in a number of areas, including the following: 1. Discover human biases that lead to ineffective behavior while responding to a crisis in real time 2. Recognize the importance of crisis preparedness 3. Learn to ascertain and manage priorities during a crisis 4. Practice collaboration and decision-making to structure effective diagnosis and response 5. Understand the complexities of communicating upward, outward, and internally during and after a crisis Instructions • Shortly answer the following questions: 1. What is a “Denial of Service” (DoS) attack? 2. How easy is to lunch a DoS attack? 3. What is a “Distributed Denial of Service” (DDoS) attack? 4. What is the difference between a DDoS attack and an intrusion? 5. Does the fact that a DDoS attack has happened mean that an intrusion has also definitely happened? 6. How common are DDoS attacks? Page 1 of 2 • Answer the following case-relate questions. Use your critical thinking skills and discuss the questions from multiple perspectives. 7. Identify the risks faced by iPremier as a result of the crisis. 8. Identify the priorities that should serve as the basis for crisis decision making (for example: revenue, customer trust, and market value). 9. What was the only major choice of iPremier during the crisis event? 10. List of preparations iPremier might have made before the crisis? Now that the attack has ended, what can the iPremier company do to prepare for another such attack? 11. In the aftermath of the attack, what would you be worried about? What actions would you recommend? Should iPremier shut the business down for 36 hours? 12. Should iPremier disclose the attack to public? If yes, give the wording of a press release explaining the outage. • Submit your answers to the “short-answer” and “case-related” questions as a single pdf file on D2L • Up to four pages • Font: Calibri, Font Size: 11, Line Space: 1.0 • APA Citation Format (if needed) Page 2 of 2 iPremier (B): Denial of Service Attack (Graphic Novel Version) 9-609-093 J U N E 2 9 , 2 0 0 9 ________________________________________________________________________________________________________________ HBS Professor Robert D. Austin prepared the original version of this case, “The iPremier Company (B): Denial of Service Attack,” HBS No. 601-115. This graphic novel version was prepared jointly by HBS Professor Robert D. Austin and Professor Jeremy C. Short of Texas Tech University. The authors gratefully acknowledge the contributions of Rachael Simmons (pencils), Will Terrell (inking), and Tessa Short (lettering) in developing the case. The situation described in this case is fictional. Any resemblance to actual companies, offerings, or individuals is accidental. HBS cases are developed solely as the basis for class discussion. Cases are not intended to serve as endorsements, sources of primary data, or illustrations of effective or ineffective management. Copyright © 2009 President and Fellows of Harvard College. To order copies or request permission to reproduce materials, call 1-800-545-7685, write Harvard Business School Publishing, Boston, MA 02163, or go to www.hbsp.harvard.edu/educators. This publication may not be digitized, photocopied, or otherwise reproduced, posted, or transmitted, without the permission of Harvard Business School. R O B E R T D . A U S T I N J E R E M Y C . S H O R T iPremier (B): Denial of Service Attack (Graphic Novel Version) For the exclusive use of M. Kirkwood, 2022. This document is authorized for use only by Mike Kirkwood in W22/Assignments taught by Fereshteh Ghahramani, DePaul University from Dec 2021 to Jun 2022. 609-093 iPremier (B): Denial of Service Attack (Graphic Novel Version) 2 For the exclusive use of M. Kirkwood, 2022. This document is authorized for use only by Mike Kirkwood in W22/Assignments taught by Fereshteh Ghahramani, DePaul University from Dec 2021 to Jun 2022. iPremier (B): Denial of Service Attack (Graphic Novel Version) 609-093 3 For the exclusive use of M. Kirkwood, 2022. This document is authorized for use only by Mike Kirkwood in W22/Assignments taught by Fereshteh Ghahramani, DePaul University from Dec 2021 to Jun 2022. 609-093 iPremier (B): Denial of Service Attack (Graphic Novel Version) 4 For the exclusive use of M. Kirkwood, 2022. This document is authorized for use only by Mike Kirkwood in W22/Assignments taught by Fereshteh Ghahramani, DePaul University from Dec 2021 to Jun 2022. iPremier (B): Denial of Service Attack (Graphic Novel Version) 609-093 5 For the exclusive use of M. Kirkwood, 2022. This document is authorized for use only by Mike Kirkwood in W22/Assignments taught by Fereshteh Ghahramani, DePaul University from Dec 2021 to Jun 2022. 609-093 iPremier (B): Denial of Service Attack (Graphic Novel Version) 6 For the exclusive use of M. Kirkwood, 2022. This document is authorized for use only by Mike Kirkwood in W22/Assignments taught by Fereshteh Ghahramani, DePaul University from Dec 2021 to Jun 2022. iPremier (B): Denial of Service Attack (Graphic Novel Version) 609-093 7 For the exclusive use of M. Kirkwood, 2022. This document is authorized for use only by Mike Kirkwood in W22/Assignments taught by Fereshteh Ghahramani, DePaul University from Dec 2021 to Jun 2022. 609-093 iPremier (B): Denial of Service Attack (Graphic Novel Version) 8 For the exclusive use of M. Kirkwood, 2022. This document is authorized for use only by Mike Kirkwood in W22/Assignments taught by Fereshteh Ghahramani, DePaul University from Dec 2021 to Jun 2022. iPremier (B): Denial of Service Attack (Graphic Novel Version) 609-093 9 For the exclusive use of M. Kirkwood, 2022. This document is authorized for use only by Mike Kirkwood in W22/Assignments taught by Fereshteh Ghahramani, DePaul University from Dec 2021 to Jun 2022. < /ascii85encodepages false /allowtransparency false /autopositionepsfiles true /autorotatepages /none /binding /left /calgrayprofile (gray gamma 2.2) /calrgbprofile (srgb iec61966-2.1) /calcmykprofile (u.s. web coated \050swop\051 v2) /srgbprofile (srgb iec61966-2.1) /cannotembedfontpolicy /error /compatibilitylevel 1.3 /compressobjects /off /compresspages true /convertimagestoindexed true /passthroughjpegimages true /createjdffile false /createjobticket false /defaultrenderingintent /default /detectblends true /detectcurves 0.0000 /colorconversionstrategy /leavecolorunchanged /dothumbnails true /embedallfonts true /embedopentype false /parseiccprofilesincomments true /embedjoboptions true /dscreportinglevel 0 /emitdscwarnings false /endpage -1 /imagememory 1048576 /lockdistillerparams true /maxsubsetpct 99 /optimize true /opm 1 /parsedsccomments true /parsedsccommentsfordocinfo true /preservecopypage true /preservedicmykvalues true /preserveepsinfo true /preserveflatness true /preservehalftoneinfo false /preserveopicomments false /preserveoverprintsettings true /startpage 1 /subsetfonts false /transferfunctioninfo /preserve /ucrandbginfo /remove /useprologue false /colorsettingsfile () /alwaysembed [ true /agencyfb-bold /agencyfb-reg /agfarotissemiserif /agfarotissemiserif-bold /agfarotisserif /agfarotisserif-bold /agfarotisserif-italic /allegrobt-regular /amertypewriteritcbybt-medium /arial-black /arial-blackitalic /arial-bolditalicmt /arial-boldmt /arial-italicmt /arialmt /arialnarrow /arialnarrow-bold /arialnarrow-bolditalic /arialnarrow-italic /arialroundedmtbold /arialunicodems /avantgardeitcbybt-book /avantgardeitcbybt-bookoblique /avantgardeitcbybt-medium /avantgardeitcbybt-mediumoblique /bankgothicbt-medium /batang /batangche /benguiatitcbybt-bold /bernhardfashionbt-regular /bernhardmodernbt-bold /bernhardmodernbt-bolditalic /blackadderitc-regular /bodonimt /bodonimtblack /bodonimtblack-italic /bodonimt-bold /bodonimt-bolditalic /bodonimtcondensed /bodonimtcondensed-bold /bodonimtcondensed-bolditalic /bodonimtcondensed-italic /bodonimt-italic /bookantiqua /bookantiqua-bold /bookantiqua-bolditalic /bookantiqua-italic /bookmanoldstyle /bookmanoldstyle-bold /bookmanoldstyle-bolditalic /bookmanoldstyle-italic /bookshelfsymbolseven /bradleyhanditc /bremenbt-bold /calismtbol /calistomt /calistomt-bolditalic /calistomt-italic /castellar /century /centurygothic /centurygothic-bold /centurygothic-bolditalic /centurygothic-italic /centuryschoolbook /centuryschoolbook-bold /centuryschoolbook-bolditalic /centuryschoolbook-italic /charlesworthbold /comicsansms /comicsansms-bold /copperplategothic-bold /copperplategothicbt-bold /copperplategothic-light /couriernewps-bolditalicmt /couriernewps-boldmt /couriernewps-italicmt /couriernewpsmt /curlzmt /dauphinplain /dotum /dotumche /edwardianscriptitc /elephant-italic /elephant-regular /english111vivacebt-regular /engraversmt /erasitc-bold /erasitc-demi /erasitc-light /erasitc-medium /estrangeloedessa /felixtitlingmt /fortemt /franklingothic-book /franklingothic-bookitalic /franklingothic-demi /franklingothic-demicond /franklingothic-demiitalic /franklingothic-heavy /franklingothic-heavyitalic /franklingothic-medium /franklingothic-mediumcond /franklingothic-mediumitalic /frenchscriptmt /futurablackbt-regular /futurabt-bold /futurabt-bolditalic /futurabt-extrablack /futurabt-light /futurabt-lightitalic /garamond /garamond-bold /garamond-italic /gautami /georgia /georgia-bold /georgia-bolditalic ascii85encodepages="" false="" allowtransparency="" false="" autopositionepsfiles="" true="" autorotatepages="" none="" binding="" left="" calgrayprofile="" (gray="" gamma="" 2.2)="" calrgbprofile="" (srgb="" iec61966-2.1)="" calcmykprofile="" (u.s.="" web="" coated="" \050swop\051="" v2)="" srgbprofile="" (srgb="" iec61966-2.1)="" cannotembedfontpolicy="" error="" compatibilitylevel="" 1.3="" compressobjects="" off="" compresspages="" true="" convertimagestoindexed="" true="" passthroughjpegimages="" true="" createjdffile="" false="" createjobticket="" false="" defaultrenderingintent="" default="" detectblends="" true="" detectcurves="" 0.0000="" colorconversionstrategy="" leavecolorunchanged="" dothumbnails="" true="" embedallfonts="" true="" embedopentype="" false="" parseiccprofilesincomments="" true="" embedjoboptions="" true="" dscreportinglevel="" 0="" emitdscwarnings="" false="" endpage="" -1="" imagememory="" 1048576="" lockdistillerparams="" true="" maxsubsetpct="" 99="" optimize="" true="" opm="" 1="" parsedsccomments="" true="" parsedsccommentsfordocinfo="" true="" preservecopypage="" true="" preservedicmykvalues="" true="" preserveepsinfo="" true="" preserveflatness="" true="" preservehalftoneinfo="" false="" preserveopicomments="" false="" preserveoverprintsettings="" true="" startpage="" 1="" subsetfonts="" false="" transferfunctioninfo="" preserve="" ucrandbginfo="" remove="" useprologue="" false="" colorsettingsfile="" ()="" alwaysembed="" [="" true="" agencyfb-bold="" agencyfb-reg="" agfarotissemiserif="" agfarotissemiserif-bold="" agfarotisserif="" agfarotisserif-bold="" agfarotisserif-italic="" allegrobt-regular="" amertypewriteritcbybt-medium="" arial-black="" arial-blackitalic="" arial-bolditalicmt="" arial-boldmt="" arial-italicmt="" arialmt="" arialnarrow="" arialnarrow-bold="" arialnarrow-bolditalic="" arialnarrow-italic="" arialroundedmtbold="" arialunicodems="" avantgardeitcbybt-book="" avantgardeitcbybt-bookoblique="" avantgardeitcbybt-medium="" avantgardeitcbybt-mediumoblique="" bankgothicbt-medium="" batang="" batangche="" benguiatitcbybt-bold="" bernhardfashionbt-regular="" bernhardmodernbt-bold="" bernhardmodernbt-bolditalic="" blackadderitc-regular="" bodonimt="" bodonimtblack="" bodonimtblack-italic="" bodonimt-bold="" bodonimt-bolditalic="" bodonimtcondensed="" bodonimtcondensed-bold="" bodonimtcondensed-bolditalic="" bodonimtcondensed-italic="" bodonimt-italic="" bookantiqua="" bookantiqua-bold="" bookantiqua-bolditalic="" bookantiqua-italic="" bookmanoldstyle="" bookmanoldstyle-bold="" bookmanoldstyle-bolditalic="" bookmanoldstyle-italic="" bookshelfsymbolseven="" bradleyhanditc="" bremenbt-bold="" calismtbol="" calistomt="" calistomt-bolditalic="" calistomt-italic="" castellar="" century="" centurygothic="" centurygothic-bold="" centurygothic-bolditalic="" centurygothic-italic="" centuryschoolbook="" centuryschoolbook-bold="" centuryschoolbook-bolditalic="" centuryschoolbook-italic="" charlesworthbold="" comicsansms="" comicsansms-bold="" copperplategothic-bold="" copperplategothicbt-bold="" copperplategothic-light="" couriernewps-bolditalicmt="" couriernewps-boldmt="" couriernewps-italicmt="" couriernewpsmt="" curlzmt="" dauphinplain="" dotum="" dotumche="" edwardianscriptitc="" elephant-italic="" elephant-regular="" english111vivacebt-regular="" engraversmt="" erasitc-bold="" erasitc-demi="" erasitc-light="" erasitc-medium="" estrangeloedessa="" felixtitlingmt="" fortemt="" franklingothic-book="" franklingothic-bookitalic="" franklingothic-demi="" franklingothic-demicond="" franklingothic-demiitalic="" franklingothic-heavy="" franklingothic-heavyitalic="" franklingothic-medium="" franklingothic-mediumcond="" franklingothic-mediumitalic="" frenchscriptmt="" futurablackbt-regular="" futurabt-bold="" futurabt-bolditalic="" futurabt-extrablack="" futurabt-light="" futurabt-lightitalic="" garamond="" garamond-bold="" garamond-italic="" gautami="" georgia="" georgia-bold="">
Answered 2 days AfterJan 10, 2022

Answer To: Assignment 1: iPremier Case Series Background iPremier (A), iPremier (B), and iPremier (C) cases...

Chandrima answered on Jan 12 2022
122 Votes
iPremier Case Series
Assignment 1: iPremier Case Series
iPremier Case Series
Short answer

1. What is a “Denial of Service” (DoS) attack?

A denial-of-service attack, commonly known as a DoS attack, is a kind of cyber-a
ttack where an
attacker attempts to prevent individuals from accessing a computer or other network by temporarily
or permanently interrupting the daily operation of a host connected to the Internet. A denial-of-
service (DoS) attack occurs when a cybercriminal prohibits a legitimate user from accessing their
private information or files.

2. How easy is to lunch a DoS attack?

A single or a group of computers are often utilised to initiate a DoS attack. When these assaults go
live, they disrupt a wide range of services, including online accounts, personal information, emails,
websites, and other platforms that rely on the hijacked computer or network. Some software make
DoS attacks simple as inserting an IP address and selecting "Start." We can use the following tool to
launch a DoS attack:

- Metasploit, Deathping, Nmap

To defend against denial of service attacks, security patches for operating systems, router
configuration, firewalls, and intrusion detection systems can be implemented.

3. What is a “Distributed Denial of Service” (DDoS) attack?

DDoS (Distributed Denial of Service) attacks are a unique type of cybercrime. A criminal infects a
number of computers with malicious software that can be activated by an external computer user.
These programs are called as Trojan horses because they disguise themselves as something
harmless, such as a photo or document attached to an e-mail, and enter the computers of
unsuspecting users.
This Trojan horse application starts sending messages to a preset site at a predefined period. If
enough machines have been compromised, it is conceivable that the targeted site will be so
effectively held down that only a small amount of legitimate traffic will be able to reach it.

4. What is the difference between a DDoS attack and an intrusion?



Intrusion
• Intrusions occur when an attacker
gains access to the network in order to
read, damage, or steal data. These
attacks can be categorized into two
categories: Pre-intrusion activities
and intrusions.
• Single...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here