Preview

TJX security breach

Good Essays
Open Document
Open Document
801 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
TJX security breach
1. Identify & describe the failure points in TJX's security that requires attention (including, but not limited to: People, Work Process, and Technology)? After analyzing the Ivey case on TJX data fiasco, I would say there were three major failure points that caused this $168MM financial hit to the corporation.
• Technology: it is obvious that TJX had several technology deficiencies mainly driven by systems limitations and vulnerability. For example, inadequate wireless network security allowed the hackers to attack specific stores just by using a laptop and an antenna which permitted the thieves access to the central database. As it was mentioned in the business case, TJX was using (WEP) as the security protocol and it is well-known in the e-commerce arena that WEP encryption can be deciphered in less than one minute which makes it very unreliable and risky for business transactions. Last but not least, TJX failed to encrypt customer data.
• Auditors: it is concerning that TJX passed a PCI DSS check up and that non auditor noticed the technology issues TJX was facing.
• Executives at TJX: It is evident that the company wasn’t in compliance with the Payment Card Industry (PCI) standards. Primarily, the person in charge of the IT department should have been on top of ensuring TJX to be in compliance, by setting expectations and objectives pertained to security within its organization. In addition to the head of IT, I would also find guilty, all the other executives in the company responsible for the health of the business. Secondly, TJX violated industry standards by storing full track records from each customer.
2. How should the company's IT security be improved and strengthened?
TJX IT security could be improved and strengthened by doing the following:
• Implementing good security governance: as we know TJX didn’t have any auditing access on a regular basis neither they were monitoring or having log data to do forensic analysis.
• Improve

You May Also Find These Documents Helpful

  • Good Essays

    The case highlights the need to review and reassess the audit committee’s duties, especially considering its existing workload. Plaintiffs also claimed the transfer did not cover all the risk responsibilities from the prior risk committee. In addition, it reveals the need to have in place a process to receive information that may have a significant impact on financial reporting – in this case arising from a defective product. Finally, the case raises the question of corporate culture and the role it plays in the effectiveness of a complaint process in a large multifaceted…

    • 1598 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    FXT2 Task 2 Follow Up

    • 799 Words
    • 3 Pages

    1. Identify areas that were not addressed by the IT staff’s response to the incident.…

    • 799 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    TJX Maxx Code Of Conduct

    • 1247 Words
    • 5 Pages

    TJX like many large corporation are broken down by their teams which they refer to as governance. Of this team you have, the executive committee, executive compensation committee, audit committee, finance committee and corporate governance committee. According to their corporate governance they claim, "As part of our governance practices, we are committed to high standards of ethics, which are reflected in our Associate Global Code of Conduct, Code of Ethics for TJX Executives, Director Code of Business Conduct and Ethics, and Corporate Governance Principles."…

    • 1247 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    tjx company analysi

    • 707 Words
    • 3 Pages

    TJX is the largest international apparel and home fashions off-price department store chain in the United States with 26 million in revenues in 2012. It was founded in 1956 as Zayre and is headquartered in Framingham, Massachusetts. Globally it is one of the top 50 retailers in the world, specializing in cheap apparel and footwear. With over 3,000 stores today, we see the potential to expand our store base by over 50%, up to almost 4,800 stores, with our current chains in our current markets alone. Their target customers are female, middle to upper-middle income, between the ages of 25-54 years that are fashion and value conscious. Beyond our successful brick-and-mortar business, we see expanding our e-commerce presence over time as a great opportunity for TJX and another platform to reach more customers with our great values. According to Forbes it is also #95 on the S&P 500. TJX comprises T.J. Maxx, Marshalls, HomeGoods, Winners, and T.K. Maxx. TJX’s stock price is currently selling at $63.52 significantly hire than the prices we calculated using the Price Earnings Model, Dividend Discount Model, and Discount Cash Flow Model which average out to about $33.39.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. Yes. If we don’t hold someone accountable for the criminal acts of employees, then companies will be more likely to push the legal limits when marketing their products. After all, Solomon is the CEO. I only partially agree with this answer because yes Solomon was the CEO and he should be held accountable, but I believe that everyone that was involved should be held accountable also. Solomon might not have known that his marketing team was going around the FDA regulation by marketing to Pediatricians and offering kickbacks, but he is still responsible for the company and what is going on inside it. I believe that those on the marketing team should be held accountable and also the Pediatricians that accepted those kickbacks for prescribing Celexa.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    1. Itemize the nature of the information security breach at ChoicePoint and how this adversely affected the organization. Be sure to include both tangible and intangible losses in preparing your response. [table]…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    A few security breaches that the employees practiced where visible and the sharing and displaying of username and password information on post it notes. They should not have this information in clear view and should change them often. Employees where making the mistake of leaking information and visiting malware sites. They were also using common passwords which showed their lack of training. They need to be trained in network security and a strong policy needs to be enforced.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Swot Outline

    • 320 Words
    • 2 Pages

    1. Explanation of the Dimension within the General Environment and specific Force coming from that dimension that is creating the opportunity…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The massive data breach at Target started on November 27, 2013, and by December Target personnel discovered the breach and notified the U.S. Justice Department. On December 18th, security blogger Brian Krebs broke the story in this post: "Nationwide retail giant Target is investigating a data breach potentially involving millions of customer credit and debit card records," mentioned Krebs. "The sources said the breach appears to have begun on or around Black Friday 2013 -- by far the busiest shopping day the year." (Vijayan, 2014)…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In fact they were found to be deficient in 9 of the 12 requirements (Case Study: Operation Get Rich or Die Tryin’, n.d). In an analysis of the data breach by Mounica Vennamaneni, they found company was not just negligent in regards to PCI. There were multiple areas of failure, including, the employees level of awareness, the encryption used and even their logging procedures (Mounica Vennamaneni, 2016). Each of these failures is a lesson that, with any luck, TJX and others have taken to heart and taken steps to rectify.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Here at Nortex, Inc., we offer several auditing and assurance services. The most common is auditing of financial statements. In a financial statement audit, our auditors attest that financial statements are fairly stated in accordance with Generally Accepted Accounting Principles (GAAP). Publicly traded companies are required to have their financial statements audited annually by an independent auditor as required by federal law. Private companies often choose to have their financial statements audited as well to assist with obtaining financing. Nortex, Inc. includes auditing of internal controls during auditing of financial statements. With audits of internal controls over financial statements, auditors attest to effectiveness of internal controls. By having this audit included with financial statement auditing, users gain more confidence in reporting because having effective controls reduces the likelihood of misstatements. The in-depth examination and attestation provided by auditors allows users a higher level of confidence in internal controls and reporting for financial statements.…

    • 662 Words
    • 3 Pages
    Satisfactory Essays