Preview

It205 Week 5 Checkpoint

Satisfactory Essays
Open Document
Open Document
272 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It205 Week 5 Checkpoint
CheckPoint: TXJ Companies

TJX was still using the old Wired Equivalent Privacy (WEP) encryption system, which was not hard for the hackers to figure out. One weakness was poorly secured computer kiosks located in many of TJX’s retail stores, which let people apply for jobs electronically. These same kiosks also provided access to the company’s internal corporate network.

TJX could have switched to the more secure Wi-Fi Protected Access (WPA) standard with more complex encryption. TJX had also failed to install firewalls and data encryption on a lot of their computers by using the wireless network, system passwords and should have had good up- to- date antivirus software

The banks have been affected the most by the stolen data more so than the retailers, the credit card companies or TJX, and may have to pay up to $300 million to recover stolen credit cards in addition to covering fraudulent purchases. TJX is being sued for not protecting their customers’ information and estimates losses at $1 billion over 5 years. The customers have lost trust in TJX and those polled said they would never again shop at the effected retail stores.

I would say information rights and obligations, because TJX relied on their customers to keep patronizing their many retail chains, TJX had a moral obligation to their customers to keep their customers credit card, social security numbers, and all other information safe and secure from fraud and theft.

I hope this helps i tried to keep it simple but it meets the criteria. I got a perdect grade on it so should you.

the the the the the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It321 Week 1

    • 640 Words
    • 3 Pages

    A long distance switch routes traffic through the long distance network. The types of interfaces that terminate on a long distance switch are intermachine trunks (ITMT’s); they can also connect to databases that are used to validate calling card calls.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It236 Week9 Final

    • 576 Words
    • 3 Pages

    The web site chosen for this project is the Belleville News-Democrat Newspaper web site from Belleville, Illinois. It is the hometown newspaper of this papers author. The site URL is http://www.bnd.com/ .…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Anthem Syndrome

    • 340 Words
    • 2 Pages

    Having an encrypted data is good but it is not enough when such large scale of breach has been done which most likely…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Checkpoint

    • 1016 Words
    • 5 Pages

    Livingston made some mistakes initially. Describe at least two of them and provide how you would handle the situations.…

    • 1016 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Week 8 Checkpoint

    • 330 Words
    • 2 Pages

    People travel to many different places for many different reasons every day. One of the reasons why most people travel is to sight see. For many people seeing new places and things can be very exciting and entertaining. Very often people tend to sight see while doing of the things that almost every single one of us does and that’s going on vacation. Taking a vacation is one of the most common reasons that I think people travel. Whether you’re taking a vacation to simply get away from work, going to see a family member, or a romantic getaway most of do this at least once a year.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Acc 225 Week 4 Checkpoint

    • 454 Words
    • 2 Pages

    List the steps in preparing a work sheet in their proper order by writing numbers 1 – 5 in the blank spaces provided.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is535 Week 1 Quiz

    • 457 Words
    • 2 Pages

    2. Question: The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its _____.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The main problem for the company was that they didn’t have a plan of attack or set plan on how to deal with situations like these. Many of the employees and management were on the newer side and weren’t aware of any type of plan of action to take with an intruder attack. There was some type of “binder” for these situations that had contacts and steps but that it wasn’t really used and hadn’t been updated. Another problem was the resistance and lack of support they had with their collocation facility Qdata. They met resistance when trying to access the necessary equipment and didn’t get much support when they contacted the facility.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    TJX security breach

    • 801 Words
    • 4 Pages

    Identify & describe the failure points in TJX's security that requires attention (including, but not limited to: People, Work Process, and Technology)?…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Tjx Case Study

    • 9608 Words
    • 39 Pages

    William Xu Gerald Grant Hai Nguyen Xianyi Dai Carleton University, Sprott School of Business wxu3@connect.carleton.ca…

    • 9608 Words
    • 39 Pages
    Good Essays
  • Satisfactory Essays

    Tjx Companies

    • 398 Words
    • 2 Pages

    TJX corporate systems had poor security controls. The computer kiosks that were located in some of their stores were supposed to be secure. They also had some firewall protection. TJX wireless network was protected by WEP encryption system.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    * Upgrade all Wired Equivalency Privacy ("WEP ') based wireless systems in TJX retail stores to wired systems or Wi-Fi Protected Access ("WPA") wired…

    • 791 Words
    • 4 Pages
    Better Essays
  • Good Essays

    First of all, the TXJ Companies did not have as much security controls at all. The security controls that were in place were controls that were easy for hackers to have access to. The security’s controls weaknesses are that the computers that were used where computers that did not have the correct firewall installed. The firewall that was installed were firewalls that did not have as much of protection. They were not installed properly. The computers did not have any data encryption at all. These computers were easily to be access by hackers.…

    • 285 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Kessler International (2000, January 4). Employees, Not Hackers, Greatest Computer Threat. Retrieved December 13, 2003, from http://www.investigation.com/articles/library/2000articles/articles18.htm…

    • 4047 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    About Tjx Assignment

    • 525 Words
    • 3 Pages

    Ans: TJX faces consumer and bank class action lawsuits over the exposure of as many as 100m customer records as the result of a security breach that lasted for two distinct six-month periods between 2003 and December 2006. Hackers broke into a system that stored data on credit card, debit card, cheque, and return details in an attack blamed on a poorly secured wireless network in one of its stores. Subsequent credit card frauds have been traced to data swiped as a result of these breaches, and a number of arrests have been made.…

    • 525 Words
    • 3 Pages
    Good Essays