Professional Documents
Culture Documents
Date: 16/10/2022
Name: SRN: Section
SAI PRANATHI SEPURI PES2UG20CS297 E
1. How well did the iPremier Company perform during the seventy-five-
minute attack? If you were Bob Turley, what might you have done
differently during the attack?
Bob Turley, the new CIO was not really the best in acting under
pressure. Even though he was responsible for the people,
processes, and technology of the company, for most of the part,
he seemed quite unfamiliar with the company and ultimately
relied on his counterparts in taking decisions.
Check for other attacks even though the website is hit by DDos
attack. The DDos attack can work as a diversion for other attacks.
Data theft could happen simultaneously when all eyes are on the
SYN floods and website crash.
Ans-
The company’s operating procedures were deficit in responding to
the attack. There was a lot of confusion among the teams and
incapability prevailing with respect to tackling the situation.
They team was unsure about the nature, status of the attack.
One thing that could prove useful is to document every single step
and action with details.
Check for illegal logins and unusual activities in the system to trace
information related to the attack.
Call for additional help if required and establish contact with law
enforcement agencies for further legal procedures.
3. Now that the attack has ended, what can the iPremier Company do to
prepare for another such attack?
Train the technical team with every detail about the infrastructure
as well as the Business continuity to choose right course of action
during an attack.
Try to trace the hacker or the one behind the attack to ensure that
no misuse of customer’s credit card or personal information has
been done and take strict actions for the same.
Ensure real time monitoring with proper details takes place all day
long. Block application level DDos attacks. These are generally in a
cautious manner and are difficult to be detected.
Other biggest concerns would be the business loss and the stock price.
Steady decrease of stocks may decrease the company’s market
capitalization and its market value.
This one attack can expose the company to data breaches, loss of
customers and other potential losses. It could be proved as a great
advantage for the competitors.
The ransom costs, customer churn and time to mitigation are downsides
of the attack.
References-
Austin, R. D., Leibrock, L., Murray, A., & Harvard University. Graduate School of Business
Administration. (2001). The IPremier Company (A): Denial of Service Attack.