preview

Risks of a Dos Attack

Better Essays

The security perspective of an e-commerce company varies based on its business model. iPremier follows a Business-to-consumer (B2C) model and the entire sales come directly through web sales i.e. online B2C transactions. Hence the IT security of iPremier should center on the protection of the customer information and needs. The Federal Reserve includes six types of risks a company could face because of an Information Technology (IT) breach, which are credit, market, liquidity, operational, legal, and reputational in nature (FFIEC, 2006). iPremier faces operational, reputational, legal and market risks in the current situation following the Denial of Service (DoS) attack.
COSTS OF A BREACH
No customer will buy a product from a website …show more content…

Cyber attacks of a nature similar to the DoS attack are a real threat to the operations of any networked system. Prudent planning and preparation can help the organization to minimize the impact of these potentially damaging attacks. The following recommendations can help the company transform from a level where such attacks could cause a total system shutdown to a level where such attacks could cause a slight inconvenience:
DETECT
iPremier should analyze the root cause of the attack with priority. This involves tracking back and analyzing each file to identify which files should not be on the production system. The current logging system is not efficient and the company’s “fingerprints” on the files are not up-to-date. As a result, examination of each file is the only possible way to identify the source of the attack. Risk management groups should be formed to assess the security incident and its effects. A co-operative involvement from the senior management of the company to categorize these threats, identify assets and prioritize the impact of the attacks will assist the risk management group to customize their approach. The risk management group should also enlist the measures needed to take care of the aftermaths of the security breach. Deploying intrusion detection systems and monitoring and logging mechanisms can aid in attack detection. After the postmortem of the attack, the team should start identifying other possible issues with the

Get Access