Background
Located in Seattle Washington, the iPremier company is a web-based commerce company founded in 1996 by two students from Swarthmore College. Since its founding, iPremier has registered a success story in e-commerce selling vintage, luxury and rare goods over the internet. Customers use their credit cards to transact business online. With impressive sales and profit margins, iPremier is among the few companies who survived the 2000 technical stock recession (Austin, 2007).
Management at iPremier consists of young employees who were its pioneers and a number of experienced managers recruited over time. The company’s working atmosphere is dynamic with strong values of professionalism, discipline, commitment to results delivery and partnership for profits achievements (Austin, 2007). iPremier’s management orientation is on “do what it takes” to have projects done on schedule.
Being a web-based commerce company, iPremier had contracted Qdata to provide the majority of their computing equipment and internet connectivity (Austin, 2007). Qdata, though not a leading industry in information technology was selected due to its close proximity to iPremier’s company headquarters.
iPremier once suffered a denial of service attack on 12th January 2007 that almost rendered the company’s site nonfunctional (Austin, 2007). Denial of service attack can be defined simply as an attempt to prevent the availability of computer resources to its legitimate users (Encyclopedia Britannica). This is achieved through halting an internet site or service from working efficiently, temporarily or permanently. Hackers had launched the denial of service attack on iPremier but luckily it was launched either by a script-kiddie or a competitor trying to ...
... middle of paper ...
...sing disk space to enable high logging levels, and updating virus signature files and other security patches (Keri and Carol, 2010). The company also needs to come up with a well designed and documented recovery plan. Last, the Company needs to educate its staff about security and threats.
Works Cited
Mirkovic, J., Dietrich, S., Dittrich and Reiher, P (2005).Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall, New Jersey
Austin, Robert (2007). The iPremier Company (A): Denial of Service Attack. Harvard Business School, Boston, Massachusetts
Denial of service attack (DoS attack). (2010). In Encyclopedia Britannica. Retrieved from http://www.britannica.com/EBchecked/topic/1055468/denial-of-service-attack
Keri E. Pearlson and Carol S. Saunders (2010). Strategic Management of Information Systems, 4th Edition. John Wiley & Sons, New York
and their use. In Committee on Deterring Cyber attacks: Informing Strategies and Developing Options (Ed.), Proceedings of a Workshop on Deterring Cyber attacks: Informing Strategies and Developing Options for U.S. Policy. Washington, D.C.: National Academies Press.
Strategic use of information systems is one of the most important issues facing firms in today’s business environment. Information systems (IS) can either enable or hinder business growth, so organizations must learn to use IS advantageously. The case study “Building Business Agility at Southwest Airlines” by Ross and Beath (2007) demonstrates how a firm can drive business success through a revolutionary change in its use of IS. In the following case analysis, I will introduce and evaluate Southwest Airlines, describe and analyze its approach to IS as outlined in “Building Business Agility at Southwest Airlines,” and provide future recommendations for the company.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling is a book that focuses on the events that occurred on and led up to the AT&T long-distance telephone switching system crashing on January 15, 1990. Not only was this event rare and unheard of it took place in a time when few people knew what was exactly going on and how to fix the problem. There were a lot of controversies about the events that led up to this event and the events that followed because not only did it happen on Martin Luther King Day, but few knew what the situation truly entailed. There was fear, skepticism, disbelief and worry surrounding the people that were involved and all of the issues that it incorporated. After these events took place the police began to crackdown on the law enforcement on hackers and other computer based law breakers. The story of the Hacker Crackdown is technological, sub cultural, criminal, and legal. There were many raids that took place and it became a symbolic debate between fighting serious computer crime and protecting the civil liberties of those involved.
IBM System Journal. "Strategic Alignment: Leveraging Information Technology for Transforming Organizations." Last accessed April 14, 2007. http://researchweb.watson.ibm.com/journal/sj/382/henderson.pdf
University of Idaho. (2014). Information Technology Services: Appendix 1: ITS Analysis of Strengths, Weaknesses, Opportunities and Threats. Retrieved from http://www.uidaho.edu/its/strategic-plan/appendix-i.
Their would have to be a massive form of data collection of what type of IP address, certain types of words, and certain type of ports to block. This would not just make the cost of internet access massive incremental raise; it would also slow the speed of the entire network around the world down but a horrible mass decrease.
Management; The New Competitive Landscape. Chapter 4, Managing, [University of PhoenixE-Book]. ISBN: 0072538651. Retrieved October 20, 2005, from University of Phoenix EResource, MGT/330-Theory, Practice, and Application, Web site: https://ecampus.phoenix.edu/secure/resource/resource.asp
Ans: Jean Roberge was selected the Vice President of Information Technologies after the merger of ABS with the acquisition of two major insurance companies i.e. General Maritime Protection and Western General Insurance to make ABS as a chief pan Canadian insurer. As the merger took place there was a lot of ineptitude in field of operation, finance, HR and marketing &
Haag, S. & Cummings, M. (2008). Management information systems for the information age (Laureate Education, Inc., custom ed.). Boston: McGraw-Hill/Irwin.
...ng it, crashing it, jamming it, or flooding it. Denial of service is impossible to prevent because of the distributed nature of the network: every network node is connected via other networks, which in turn connect to other networks. A firewall administrator or ISP has control of only a few of the local elements within reach. An attacker can always disrupt a connection "upstream" from where the victim controls it. In other words, someone who wants to take a network off the air can either take the network off the air directly or take the network it connects to off the air, or the network that connects to that network off the air, ad infinitum. Hackers can deny service in many ways, ranging from the complex to the brute-force.
Internet Security covers a broad list of topics. I have chosen to cover hackers and their history. I will go through who hackers are and how we define hackers. I will also cover the history of how hackers got started. This was a very interesting topic and may surprise a lot of people who have had misconceptions of what hackers do due to how the are covered by the media.
Perry, B., 2005, Organisational Management and Information Systems. [e-book] Oxford; Elsevier. Available at: Google Books . [Accessed 14 November 2013]
Ranum, Marcus. "Should Network Security be Based on Blacklisting or Whitelisting?" Information Security 14.1 (2012): 16-18. Applied Science & Technology Source. Web. 22 Dec. 2013.
The internet offers high speed connectivity between countries, which allows criminals to commit cybercrimes from anywhere in the world. Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). This lack of security enables hacker...
Effectively integrating information technology (IT) into an organization’s business processes is critical if the organization wants to increase productivity and remain profitable. IT includes items such as the systems software, application software, computer hardware, and the networks and databases that help manage the organization’s information. When implementing quality standards and processes that are forever changing in the IT world, organizations must balance these changes while continuing to rapidly implement new systems technologies in order to stay competitive.