The Incident of the Distributed Denial of Service Attack Report

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Following the Distributed Denial of Service attack on the website of the iPremier Company, the company’s Chief Information Officer (CIO) requested an evaluation report on the incident. The present paper analyzes and reports the incident along with the provided response.

The IT management of iPremier has managed fairly well against the attack that occurred on the webserver of the company. The IT HR of the company was utilized, and at the same time, the main response to the attack was not left to QData to handle. The attack was responded to in a timely manner, utilizing the fact that it was nighttime, and thus, the issue could be solved prior to customers’ awakening, without substantial interruption to the service. The identification of what information was at stake, and at the same time evaluating several solutions was a good managerial decision. In that regard, Turley had the option of pulling the plug, but nevertheless, he evaluated such a decision between the risks at stake and the identification of the type and the source of the attack, favoring the latter. Accordingly, Turley played his role as the CIO of the company, namely “planning and implementing strategies to limit the impact of natural and human-made disasters on information technology and, consequently, the conduct of business” (Pearlson & Saunders, 2010, p. 221).

If taking the role of Turley, one difference can be seen through is forming a team right away that would handle the situation in this case. Accordingly, critical services should be determined right away, with priorities being put on what actions should follow once the threat is identified (Vries, 2004). Additionally, immediate direct communication should have occurred with the service provider, in which the scale of the threat should have been communicated, and accordingly, no delays in access would have occurred. When evaluating the decision of pulling the plug, shutting down the power might have been optimal, considering the benefit for all stakeholders involved in this case.

The steps that should be followed after the attack can be seen through three dimensions, assessing the impact, mitigating the impact, and performing all the necessary steps that shall minimize the possibility of such threat occurring in the future. In terms of assessment, the main aspect that should be focused on is customers’ confidential data stored on the company’s servers. The issue whether it was a distributed denial of service (DDoS) attack or it was an intrusion. The response that should follow will depend on the nature of the attack that occurred. If there was an intrusion as well, the company will be ethically obliged to inform the customers of such an incident. The attack should be evaluated, in order to identify the weaknesses in the company’s infrastructure, in addition, t those weaknesses that were known and/or identified before and during the attack. Considering the weaknesses identified, the most appropriate steps, including those identified in the case would involve the following aspects:

  • Purchasing additional hard disks massive for leading detailed logging.
  • Changing the Internet Service Provider (ISP) provider, following the theory of benefitting the stakeholders involved when choosing an ISP, rather than moral obligation.
  • Providing sufficient focus to security issues, including such aspects as firewalls, which are capable of identifying such types of attacks, and distinguishing between normal and unwanted artificial responses, both at the gateway and with traffic going through the service provider.
  • Developing strict procedures for response in such cases, identifying the roles and assigning responsibilities to those who should be responsible. CIO should not manage regular tasks and day-by-day responsibilities. CIO should be concerned with long-term strategies instead.

Accordingly, an audit might be recommended to be conducted in the company, in which the CIO of the company should work with the auditors to assess the internal controls in the company. In that regard, an assessment framework might be needed to be established in order to assess the impact of such incidents in the future.

The translation of the company’s architecture mentioned in the case, into infrastructure can be conducted as follows:

ComponentGoalsArchitectureInfrastructure
HardwareReceiving benefits through selling good son the internet.Providing access to internetRouter
Being available for purchase 24 hours a day.Providing access to the company’s webpage.Web servers
Are capable of sharing knowledge internally and externally, between customers, employees, and suppliers.Connecting the internal network of the companySwitches
Providing appropriate means to monitor the infrastructure of the company.Storing log data in the networkHard disk clusters providing storage.
SoftwareManaging the confidentiality and the privacy of the customers’ data. Maintaining the reputation as a reliable company.Protecting the company’s network from intrusionHardware and software firewall
DataHolding accountability of the customers’ confidentiality.Storage of customers’ informationDatabase

It can be concluded that despite the timely response of the company to the attack, there are many aspects that should be managed and many steps that should be taken afterward.

References

Pearlson, K., & Saunders, C. S. (2010). Managing and using information systems: a strategic approach (4th ed.). Hoboken, N.J.: Wiley.

Vries, S. D. (2004). Surviving Distributed Denial of Service (DDoS) Attacks. Corsair Limited. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 23). The Incident of the Distributed Denial of Service Attack. https://ivypanda.com/essays/the-incident-of-the-distributed-denial-of-service-attack/

Work Cited

"The Incident of the Distributed Denial of Service Attack." IvyPanda, 23 Mar. 2022, ivypanda.com/essays/the-incident-of-the-distributed-denial-of-service-attack/.

References

IvyPanda. (2022) 'The Incident of the Distributed Denial of Service Attack'. 23 March.

References

IvyPanda. 2022. "The Incident of the Distributed Denial of Service Attack." March 23, 2022. https://ivypanda.com/essays/the-incident-of-the-distributed-denial-of-service-attack/.

1. IvyPanda. "The Incident of the Distributed Denial of Service Attack." March 23, 2022. https://ivypanda.com/essays/the-incident-of-the-distributed-denial-of-service-attack/.


Bibliography


IvyPanda. "The Incident of the Distributed Denial of Service Attack." March 23, 2022. https://ivypanda.com/essays/the-incident-of-the-distributed-denial-of-service-attack/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1