Page 1 of 2 Background iPremier (A), iPremier (B), and iPremier (C) cases describe an IT security crisis, and raise issues of risk management,

Page 1 of 2

Background

iPremier (A), iPremier (B), and iPremier (C) cases describe an IT security crisis, and raise issues of
risk management, preparation for crisis, management of crises, computer security, and public
disclosure of security risks.

After you experience the cases and debrief what you have learned, you should have a better
understanding in a number of areas, including the following:

1. Discover human biases that lead to ineffective behavior while responding to a crisis in
real time

2. Recognize the importance of crisis preparedness
3. Learn to ascertain and manage priorities during a crisis
4. Practice collaboration and decision-making to structure effective diagnosis and

response
5. Understand the complexities of communicating upward, outward, and internally

during and after a crisis

Instructions

• Shortly answer the following questions:

1. What is a “Denial of Service” (DoS) attack?
2. How easy is to lunch a DoS attack?
3. What is a “Distributed Denial of Service” (DDoS) attack?
4. What is the difference between a DDoS attack and an intrusion?
5. Does the fact that a DDoS attack has happened mean that an intrusion has also definitely

happened?
6. How common are DDoS attacks?

• Purchase iPremier (A), iPremier (B), and iPremier (C) for $10.85 using the following link and
read all three cases in detail:

CSEC 340

Assignment 1: iPremier Case Series

Page 2 of 2

• Answer the following case-relate questions. Use your critical thinking skills and discuss the
questions from multiple perspectives.

7. Identify the risks faced by iPremier as a result of the crisis.
8. Identify the priorities that should serve as the basis for crisis decision making (for

example: revenue, customer trust, and market value).
9. What was the only major choice of iPremier during the crisis event?
10. List of preparations iPremier might have made before the crisis? Now that the attack

has ended, what can the iPremier company do to prepare for another such attack?
11. In the aftermath of the attack, what would you be worried about? What actions

would you recommend? Should iPremier shut the business down for 36 hours?
12. Should iPremier disclose the attack to public? If yes, give the wording of a press

release explaining the outage.

• Submit your answers to the “short-answer” and “case-related” questions as a single pdf file
on D2L no later than Sunday Sep 15th, 11:30 p.m.

• Up to four pages
• Font: Calibri, Font Size: 11, Line Space: 1.0
• APA Citation Format (if needed)

Grading

This assignment values 10 points of your grade:

• Answer to “short-answer” questions: 3 points
• Answer to “case-related” questions: 7 points

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Need this expanded  4 Security Recommendations Reports Tung Nkengazong Security

Need this expanded  4 Security Recommendations Reports Tung Nkengazong Security Recommendations Reports The critical security challenges of BRI require a comprehensive security strategy that is multi-dimensional in approach. In the first place, BRI needs to enhance controls over-identification and authentication. Adoption of multi-factor authentication (MFA) will drastically reduce the likelihood

Please review attachments Student Name: _________________ Program: Project Management Essentials Lesson 12 Assignment Lesson 12 Assignment

Please review attachments Student Name: _________________ Program: Project Management Essentials Lesson 12 Assignment Lesson 12 Assignment Handout Assignment Instructions For this assignment, you will develop a stakeholder register based on the information in the project overview. The project overview and a template table have been provided in the handout below.

100 word response 1 reference due 6/22/2024 Emmons Discussion 3-3:

100 word response 1 reference due 6/22/2024 Emmons Discussion 3-3: Compliance within the Remote Access Domain What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy?  What risks, threats, and vulnerabilities are introduced by implementing a remote