According to Whitman (2012) “In a denial-of-service (DoS) attack, the attacker sends a large number of connection or information requests to a target. So many requests are made that the target system becomes overloaded and cannot respond to legitimate requests for service.” (P.67). The system could crash or basically become unable to perform normal functions. Most DoS attacks are led by a planning phase in which many systems, perhaps thousands, are compromised. The compromised machines are turned into zombies, machines that are directed remotely by the attacker to participate in the attack. In fact, iPremier suffered a DoS attack in the middle of the night that caused a chain of security confusion events in the company. As a result, after the attack stopped, iPremier officials …show more content…
Therefore, the main purpose to secure the company infrastructure was to propose recommendations on how the processes and plans could be improved for the future, keeping in mind people and processes as well. First, according to Whitman (2012) “An intrusion occurs when an attacker attempts to gain entry into or disrupt the normal operations of an information system, almost always with the intent to do harm. Even when such attacks are self-propagating, as in the case of viruses and distributed denial-of-service attacks, they are almost always instigated by someone whose purpose is to harm an organization.” (P. 293). To emphasize, iPremier was completely unprepared for the seventy-five-minute attack. One of the main reasons is that there was too much responsibility associated with Qdata’s capabilities to control this type of attack and failing to have a structured emergency response plan. In fact, iPremier hired Qdata, to provide hosting, internet services, computer equipment due to a very close location to iPremier headquarters location. Consequently, the attack was handled competently by all