Monday, June 3, 2019

The Ipremier Dos Attack

The Ipremier Dos AttackOnline websites and business face several guarantor measure threats from hackers that are aiming to vandalize the website or steal education or at times nonify the company about its internet credentials weaknesses. These threats include malicious code, bots and bot nets, phishing and DDoS or Distri buted Denial of Service (Laudon K., Traver C., (2010)). Ipremier, an online business, faced wizard of these threats, the DDoS ack-ack gun. iPremier is a successful online retailer of luxury, rare and vintage goods (Austin, R., (July 26, 2007)). The DDos attack begins by the hacker distributing bots on several computers and making these computers botnets (Laudon K., Traver C., (2010)). A botnet is a computer that is controlled by a hacker to perform activates such as participating in a DDoS attack (Laudon K., Traver C., (2010)). The hacker uses these botnets or controlled computers to flood a server with cast-off(prenominal) requests which slows or shutdown th e server operations (Laudon K., Traver C., (2010)). This shag be costly to an online business because the customers habit be able to access the website. It can also appropriate the firms reputation if the website doesnt work for long. However, these attacks can notify or clarify for a company its weakness points in its internet security and infrastructure.The CIO Bob Turley was in clean York when an employee called to inform him that the website is not working and that they behave been receiving numerous emails that say Ha (Austin, R., (July 26, 2007)). The CIO called Joanne the technical operations team leader to discuss the authoritative situation but she was still on her way to Qdata where the company servers are located and did not know what was going on (Austin, R., (July 26, 2007)). She suspected that the actions were caused by a hacker and that the vector of the e mail was unknown and hard to track (Austin, R., (July 26, 2007)). Unfortunately, their extremity plan was out dated and they couldnt remember where the document is placed (Austin, R., (July 26, 2007)). A suggestion was do to call the police or FBI but they were concerned about negative publicity (Austin, R., (July 26, 2007)). afterward a while the CIO called the CTO to take his opinion on the military issue (Austin, R., (July 26, 2007)). The CTO refused the idea of pulling the plug because information on the attack ability be lost (Austin, R., (July 26, 2007)). The CEO menti oned that the detailed logging was not enabled so the logs wont provide them with much information (Austin, R., (July 26, 2007)). The legal counselor called as well to provide legal advice on the matter and told the CIO to pull the plug to protect deferred payment card information (Austin, R., (July 26, 2007)). After Joanne arrived at Qdata she wasnt able to access the NOC for security reasons (Austin, R., (July 26, 2007)). The CEO called a senior in Qdata and Joanne was allowed access to the NOC (Austin, R., (July 26, 2007)). He discovered that the attack is directed at their firewall and it is being directed from multiple IP verbalizees (Austin, R., (July 26, 2007)). She tried to shutdown traffic from the IP addresses but it didnt work because when one IP address shuts down another one operates and so on (Austin, R., (July 26, 2007)). The main concern was that customer information was not jeopardized or stolen (Austin, R., (July 26, 2007)). At 546 AM the attack stopped and Joanne suggested that they do a thorough audit to be sure that customer information has not been stolen and to know the points of weakness (Austin, R., (July 26, 2007)).During the attack it was open-and-shut that the employees were shocked by the security threat. They did not know what to do, they never faced a security threat before and they do not have an emergency plan. The employees communicated through phone calls and no one k novel what needs to be done or what was happening. Also, at that place wasnt a prop er emergency communication with Qdata which led to banning the technical team leader from entering the NOC. The team reacted well to the situation despite that they did not have any structured plan to face the problem. They were move to answer the problem through intuition and experience because there wasnt any plan. They tried hard and the top managers were awakened at the middle of the night to solve the crisis. However, when looking at the overall situation there hasnt been any dodgeatic process in solving the problem and instead they relied on intuition and experience.If I was bob truly, the CIO, the first person I would have contacted is the CTO and I would have cancelled the meeting in New York and went to the company if possible. If it was not possible to come on a flight, I would have instructed Leon to get the emergency plan and work on it. Although it is outdated, I would try to modify it as much as I can to match the current situation which can be useful. Also, I wou ld stay in close contact with the CTO and Qdata to solve the problem faster. Some run providers do not respond to customers quickly and require the customer to call them over and over until they perform the request. In addition, after the attack is over I would have called for an emergency meeting to assess the current situation, the companys technological infrastructure, know what information have been or could have been jeopardized and discuss the modifications on the emergency plan.After the attack the company should be worried about the customer information and specially credit card and transaction information. Another thing is that the attack might have gone far and installed a bot on one of the servers. If this happens the servers might be used for another attack and the ipremier will be held responsible. Also, the infrastructure and security is not effective against threats so using Qdata as the website host must be changed. Moreover, I have to be sure that there hasnt been any give away because if the customers know that the website was hacked they may never deal with the company again. They may not understand that these things happen and security threats happen almost all the time, several populate are not familiar with the term Cyber War.The company should create a allayer customer and transaction database that is disconnected from the internet to prevent it from being attacked from the outside. It is an online business, so the customers and their transaction information should be well protected from any attack. I would recommend that not all the website and its information to be outsourced. The server, website design, and website related information can be outsourced but the customer and transaction information should be handled internally for to a greater extent control. They have to find another host other than Qdata with more abilities and more technological advancement to handle their operations and protect them from further attacks. Also, I must have a full understanding of the situation so that if there is any leak to the press I can answer their questions and find a way to assure the customers that their data is safe.In conclusion, ipremier is an example for every online business. They did not expect that an attack may happen and were very confused when it actually happened. What online businesses should learn from ipremier is that an emergency plan is critical for any business. Also, they should know that there isnt one perfect security system that can protect them from all charitables of attacks. They should keep in mind that since man created these security systems then he is able to niche through it.whatwhoWherearchitectureInfrastructurearchitectureInfrastructurearchitectureInfrastructureHardwareDo we need a new security system?What kind of hardware do we need for the new security system?Who knows the most about the companys technological infrastructure?Who will handle the operation of the new security system? Does the new security system require a relocation of our servers?What hardware components need to be changed to install the new security system? packageWhat parts of our companys software will be affected?Do we need any new software for the new security system?Who will be affected by installing a new security system?Who needs to be trained in order to accommodate with the new system?Does the geographical location of our company affect the installation of the new system?Will the new security system have the functionality we need?NetworkDoes the new security system require a minimum bandwidth?Can the current network handle the operations of the new security system?Who will have access to the security system network?Will any body need access from outside the companys physical boundaries?What are the security threats in the companys current technological architecture?Where will the company locate the necessary components of the new security system?DataWill the current data formats be c ongenial with the new security system?Which formats need to be changed?Who will have access to the data provided by the system?Who will be responsible for backup and to whom is the access limited?Where does the current architecture face problems in regards to data flow?Does the company need to change its current storage devices for the new security system?Resources-Austin, R., (July 26, 2007). The iPremier Company (A) Denial of Service Attack. Harvard Business School.Laudon K., Traver C., (2010). E-commerce 2010 (6 Ed.), chapter 5. Pearson Education.

Sunday, June 2, 2019

The Need for Available Contraceptives Essay -- Birth Control Children

The Need for Available Contraceptives With each miraculous birth the worlds universe heads further towards destruction due to overpopulation. Globally, the population is increasing at a appreciate of 1 billion every decade, a rate that mankind has neer seen before (Bongaarts). Most of this huge increase in population is in developing countries where the population is currently 4.3 billion and is expected to more than double at heart the next hundred years (Bongaarts). Considering that the worlds resources are already being stretched to sustain the current population a high birth rate will be catastrophic if if is allowed to continue. This population boom must be stopped in order to ensure that future generations can experience the standards of sustentation we enjoy today. Though the high birth rate is mainly due to developing countries, all of humanity must work together to overcome it. promise for the future is only possible if the developed world supports the effort with funds and resources. The key weapon in this battle is birth control, which must be transmit orbiculately to those who lack means of controlling their fertility. Although one little child does not put a significant stress on the worlds resources, the number of children currently being born will cause irreversible and unreasonable demands on the earth. President of the Population Institute Werner Fornos warns, Population growth is a leading contributor to environmental degradation (Keynote address). Environmental degradation happens and will continue to happen as we pollute the earth, contribute to global warming, create landfills, and consume our precious and often nonrenewable resources (Bongaarts). Realizing the drastic damage our population h... ...ption and Induced Abortion in Rural Ghana. Tropical Medicine & internationalistic Health 7 (2002) 708-716.Hartmann, Betsy. Population Control I Birth of an Ideology. International journal of health services 27 (1997 ) 523-540.Keynote address. Boston College Environmental personal business Law Review 21 (1994) 251-256.Nothing is unthinkable. The Lancet 336 (1990) 659(3).Rosenfield, Allan. The Fifth Freedom Revisited I, Background and Existing Programmes. The Lancet 336 (1990) 1227-1232.Sharpless, John. World population Growth, Family Planning, and American Foreign Policy. ledger of Policy History 7 (1995) 72-102.United Nations Secretariat. Dept. of Economic and Social Affairs. Population Division. Fertility, Contraception and Population Policies. 25 April 2003.Whose future? Whose world? The Lancet 342 (1993) 1125-1127.

Saturday, June 1, 2019

Essay --

The Christian view of theology is found in two slipway general revelation and special revelation. General revelation is available to completely people at all times and can be found in the nature and design of the entire universe. Special revelation is given to specific people at specific times and places and can be found in Christ and the Scriptures. These two types of revelation show something very important to the cornerstone of Christian theology, it shows that matinee idol is personal. Through the revelation it can be seen that God is self-aware, self-determining, and He has emotions, the characteristics of a person. Another key vagary to Christian theology is the fact that God is triune, He exists in the Father, Son, and the Spirit. Each one of the three branches serves a opposite purpose, but all are equally important and equally powerful. Matthew 2819 affirms the idea of the Trinity by saying Go ye therefore, and teach all nations, baptizing them in the name of the Father , and of the Son, and of the Holy Ghost, mentioning every eccentric of the trinity. God is a loving God who gave us His own Son in couch to save us from our sins even though we didnt deserve to be saved. Our Christian theology is based on this idea that Christ came and died for our sins, with this idea Christianity any stands or falls.Philosophy is also a major part in the Christian worldview even though some people use the first part of Colossians 28, which tells us not to be deceived by philosophy, as a way to say our faith doesnt need to have reason and doesnt have to be defended. These people negate the second part of the verse which says to not fall prey to philosophy based on mans ideas. One question directed towards Christianity is the question of how is it po... ...volution in order to create humans. This idea however, is ridiculous and inefficient, and with an understanding Christians are able to defend the idea that God created all things. One of greatest arguments for Creationism is the idea of teleology, because there is design in the universe there must be a designer. We can see this in DNA, which has an incredible amount of order and information in just a small space, and functions as the blueprint for life. The gene pool is another thing that supports the idea of Creationism because it shows that macroevolution, not microevolution, is impossible. Creatures arent able to breed outside of their own gene pools, and we can see that this didnt happen because of the many gaps in the fossil record. The Christian view of Creationism provides a good explanation for the origins of life, which points back to an all-powerful God.

Friday, May 31, 2019

The Popularity of E-mail Essay -- Internet Communication Web email Ess

The Popularity of E-mailE-mail in one way or another plays a role in well(p) about everyones life. Just about everyone has a figurer and uses it to communicate. E-mailing and instant messaging is easy and almost essential for people in todays world.E-mailing and instant messaging definitely plays a large role in my life. In all honesty one of the first things I do in the morning is sign on up and sort out my e-mail to see if anyone has sent me a message. Its become a routine for me. I get up get ready for school and chick my messages fair(a) like many of my friends and a good portion of todays world.Personally I think that displace e-mails and instant messaging is great as long as you don?t let yourself get too caught up with it. I usually check my mail when I first wake up and before I go to bed at night. I see no problem with that, unless I have friends and family members that spend a good portion of there day sitting in front of there computer screen just sending e-mails bac k and forth. Its almost like the computer has control of them, they sit and wait to receive a short message from a friend just to send one back.In ?We?ve Got Mail Always?, Andrew Leonard talks about how many people in today isolate themselves in front of the computer and essentially waste there whole day away. While this is true he also says it can be used to bring people unitedly and help us manage our lives better. The computer definitely has its ups and downs.In a l...

Thursday, May 30, 2019

Pearl Harbor :: essays research papers

Pearl Harbor was one of the most vicious attacks on American soil. The surprise attack by Japan took place on sunlight morning December 7, 1941. Japan cherished to immobilize U.S.s Pacific pass by and destroy any chance of a counter strike in from the Pacific. The join States responded by creating Japanese-American Internment Camps, which uprooted tens of thousands of Japanese-American families. And later America decided to use atomic weapons to end the war with Japan. Tension between Japan and the United States started in 1931. Japan had taken over Manchuria, which was then a part of China. In 1937 Japan had started a campaign to conquer the rest of China that was long durable and didnt work. In 1940 Japan signed the Axis Alliance with Germany and occupied all of Indochina the next year. The U.S. was worried by Japans movements because of economic interests that the United States had in East Asia. The U.S. strengthened military aid to China and increased financial aid. They al so built up the military in the Pacific. The U.S. also fade off shipments of oil and raw materials to Japan. Japanese government saw this move as a threat to Japans survival because Japan doesnt have many natural resources. Japans next plan was to take control of the territories of South East Asia that have good amounts of natural resources, counterbalance though it would start a war with the United States. (Lord,Walter. Day of Infamy ) (www.history.navy.mil) (http//campus.northpark.edu)The only thing that stood in the way of this plan was the threat posed by the U.S. Pacific fleet stationed in Pearl Harbor, Hawaii. Admiral Isoroku Yamamoto, the leader of the Japanese fleet, was the mastermind behind the plan to cripple the U.S. fleet. Yamamoto wanted to disable the U.S. Pacific fleet by destroying enough ships, airfields, runways, planes, support facilities, and 4.5 billion gallons of fuel so that there was no chance for a counter attack. As Yamamoto put it he wanted to destroy t he dagger pointed at our throat. (Beck, Roger. Black, Linda. Krieger, Larry. Naylor, Phillip. Ibo Shabaka, Dahia. World History pg.827 830)Yamamoto devised a clever plan that would have the attacking Japanese follow a ramp front and keep strict radio silence to avoid being detected by American radar. The Japanese attack was led by Vice-Admiral Chuichi Nagumo and consisted of 6 aircraft carriers, 2 battleships, and 2 cruisers.

Wednesday, May 29, 2019

William Henry Harrison :: essays research papers

William Henry HarrisonWilliam Henry Harrison was born in Berkeley, Virginia in 1773. He grew up on a farm and worked as a planter. At the age of 18 he attended Hampden Sydney College. on that point he studied history, later on he went to culture medicine in Richmond, Virginia. That same year he switched his interest an in 1791 he joined the First Infantry of the Regular Army. Harrison then headed to the Northwest, where he dog-tired much of his life.During his time in the Army he served as an aid to General Mad Anthony Wayne. Together they fought in the Battle of Fallen Timbers. The win of this strife opened most of the Ohio area to settlework forcet. In 1798 he resigned from the Army and became Secretary of the Northwest Territory. There he was the first delegate to Congress, and obtained a legislation dividing the filth Into the northwest and Indiana territories. In 1801 he became the governor of the Indiana Territory, serving 12 years. Harrison was responsible for defending all of the settlements from the Indians.In 1809 a powerful Indian force led by an energetic chieftain Tecumseh posed a threat to the settlers. Tecumseh was responsible for strengthening the Indian confederation to prevent settlers from moving in on their territory. However on November 7, 1871 Harrison planned an attack on the Indian Confederacy. As Harrisons men moved in they were attacked at the Tippecanoe River. 190 men were dead or wounded, this was known as the Battle of Tippecanoe. Although Harrison experienced a loss of men, he still led victorious.The Indians were still persistent in their raids against Harrison and the settlers. Harrison was given the title of brigadier general of the army during the War of 1812. He also defeated the combined British and Indian forces at the Battle of the Thames on October 5, 1813. There he killed Tecumseh and forced all the Indians to the Northwest.After his victory he returned to civilian life and nominated by the Whigs to be president in 1840. Tragically afterward being in office not even a month he passed away.

Aviation Essay -- essays research papers

There are several factors that enabled Wilbur and Orville Wright, two high indoctrinate dropouts, to produce a successful airplane controlled by a pilot. The Wright brothers were self-educated and very experienced with several types of technologies when they began their efforts to produce an airplane. Having worked as bicycle mechanics, they understood the wideness of several technologies working together to create one particular design, as well as the significance of balance. The brothers worked well together, learning from past attempts at aviation, and displace from others findings, in addition to discovering many of their own. One of the most distinct differences in their attempt from other aviators was that the brothers began by first learning to locomote and control the airplane in glider fo...