Preview

Week 5 Checkpoint

Satisfactory Essays
Open Document
Open Document
297 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 5 Checkpoint
• List and describe the security controls in place. Where are the weaknesses?

I did not notice any securities in place. The article did mention a second layer or security that was not properly installed. The systems were out of date and TJX used an old Wired Equivalent Privacy (WEP) encryption system. Other companies made the switch to a
Wi-Fi Protected Access (WAP) with more complex encryption. The article also states that they failed to install firewalls and data encryption on some of the hardware using wireless networks. These are all areas of weakness to the security in my book and I feel that these items should not have been overlooked (Laudon & Laudon, 2011).

• What tools and technologies could have been used to fix the weaknesses?

A WEP used in conjunction with a VPN would have helped with security. A firewall could have been put in place to prevent unauthorized access but most importantly in this case TJX should have implemented an intrusion detection system (Laudon & Laudon, 2011).

• What was the business effect of TJX’s data loss on TJX, consumers, and banks? TJX lost many customers due to this as the article states that many of them would not shop at a company without a secure network. Banks had cost of over 300 million just with replacing the stolen cards and also had to cover the fraudulent purchases (Laudon & Laudon, 2011).

• Which moral dimensions may be applied in this situation? How?

Accountability and control in the first one that stands out in this situation. TJX didn’t seem to really have as much accountability as the banks did and they were the ones that failed to meet security standards (Laudon & Laudon, 2011).

Reference:
Laudon, J. P., & Laudon, K. C. (2011). Essentials of management information systems (9th ed.). Upper Saddle River, NJ: Prentice Hall.

You May Also Find These Documents Helpful

  • Best Essays

    O 'Brien, J. A., & Marakas, G. M. (2009). Management Information Systems (9th ed.). Boston, MA: McGraw-Hill Irwin.…

    • 4147 Words
    • 17 Pages
    Best Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    Laudon, K. C., & Laudon, J. P. (2010). Management Information Systems (11th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    TJX Maxx Code Of Conduct

    • 1247 Words
    • 5 Pages

    This external stakeholders is really where the influence on the political interest affects TJX. The security breach affected it's external stakeholders in a way that has never been seen before. Customers, creditors and the government were outraged to hear about the monumental security breach. That the demanded political action and the Security and Exchange Commissions started mandating states to have Data Breach Laws. California already had laws in place since 2002, but this TJX breach really got the government on the forefront of Data Breach Laws. After the breach, "The Massachusetts security breach and data destruction law and security regulations are considered to “constitute one of the most comprehensive sets of…

    • 1247 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    lasb 8 IS3220

    • 390 Words
    • 2 Pages

    5. If the organization implemented wireless LAN (WLAN) technology, what would you recommend regarding the use of VPNs or encryption within the…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: O 'Brien, J., & Marakas, G. (2008). Management information systems (8th Edition ed.). The McGraw-Hill Companies.…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    References: Laudon, Kenneth C., & Laudon, Jane P. (2009 by Pearson Education, Inc.). Essentials of Management Information Systems (8th ed).,: Prentice Hall.…

    • 1649 Words
    • 7 Pages
    Better Essays
  • Best Essays

    3) From past history, reputation, and numerous achieved certification; they wish to provide a highly secure means of communication through mobile devices…

    • 2834 Words
    • 12 Pages
    Best Essays
  • Good Essays

    It/205 Week 8 Checkpoint

    • 339 Words
    • 2 Pages

    References: Laudon, J. P., &Laudon, K. C. (2011).Essentials of management information systems (9th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    References: Laudon, J. P., & Laudon, K. C. (2011). Essentials of management information systems (9th ed.).…

    • 1010 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Inf 220: Is Principles.

    • 1851 Words
    • 8 Pages

    Laudon, K., Laudon, J. (2009). Essentials of management information systems (8th Ed.). Upper Saddle River, NJ: Pearson Prentice Hall.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    In fact they were found to be deficient in 9 of the 12 requirements (Case Study: Operation Get Rich or Die Tryin’, n.d). In an analysis of the data breach by Mounica Vennamaneni, they found company was not just negligent in regards to PCI. There were multiple areas of failure, including, the employees level of awareness, the encryption used and even their logging procedures (Mounica Vennamaneni, 2016). Each of these failures is a lesson that, with any luck, TJX and others have taken to heart and taken steps to rectify.…

    • 724 Words
    • 3 Pages
    Good Essays