Preview

It/205 Tjx Companies.Doc

Good Essays
Open Document
Open Document
561 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It/205 Tjx Companies.Doc
The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.

Resources: Ch. 7 & 12 of Essentials of Management Information Systems
Answer the following questions in 200 to 300 words:

• List and describe the security controls in place. Where are the weaknesses? • What tools and technologies could have been used to fix the weaknesses? • What was the business effect of TJX’s data loss on TJX, consumers, and banks? Which moral dimensions may be applied in this situation? How?

CheckPoint: TJX Companies

The TJX Company was using the Wired Equivalent Privacy (WEP) encryption system, which caused the data theft at the TJX Companies. The WEP made it easy for hackers to navigate and steal information. TJX had out of date security and controls. TJX failed to properly encrypt data on many of the employee computers that were using the wireless network. TJX also did not have an effective firewall installed yet. In addition, TJX Company purchased additional security programs, but did not have them installed yet or did not have them installed correctly. Therefore, to have an even stronger resistance to hackers, simply changing from the outdated WEP or Wired Equivalent Privacy to WPA or Wi-Fi Protected Access would of worked. The Wi-Fi Protected Access (WPA) is standard, but has a complex encryption system. Installing firewalls could have reduced or eliminated the ability of the hackers to gain access to customer information. The TJX Company should have check and updated the security and controls. Every small company and home users should check every six months to a year for updates on these types of things. With even larger companies, like TJX, should check almost every three months. By doing this, they are making sure they are up to date, and that nothing can break them down. Installing a round-the-clock security monitoring and detection service from

You May Also Find These Documents Helpful

  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    tjx company analysi

    • 707 Words
    • 3 Pages

    TJX is the largest international apparel and home fashions off-price department store chain in the United States with 26 million in revenues in 2012. It was founded in 1956 as Zayre and is headquartered in Framingham, Massachusetts. Globally it is one of the top 50 retailers in the world, specializing in cheap apparel and footwear. With over 3,000 stores today, we see the potential to expand our store base by over 50%, up to almost 4,800 stores, with our current chains in our current markets alone. Their target customers are female, middle to upper-middle income, between the ages of 25-54 years that are fashion and value conscious. Beyond our successful brick-and-mortar business, we see expanding our e-commerce presence over time as a great opportunity for TJX and another platform to reach more customers with our great values. According to Forbes it is also #95 on the S&P 500. TJX comprises T.J. Maxx, Marshalls, HomeGoods, Winners, and T.K. Maxx. TJX’s stock price is currently selling at $63.52 significantly hire than the prices we calculated using the Price Earnings Model, Dividend Discount Model, and Discount Cash Flow Model which average out to about $33.39.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    TJX Companies Inc. is currently in one of the most secure subsets of the retail industry. The economy is a factor always present in the minds of consumers today, and the retail establishments operated under TJX Companies all cater towards the price conscience customer. They are hitting all ages and genders in the apparel industry in addition to home good products including furniture and accessories. They have expanded to reach many markets, and are continuing their expansion across the United States and throughout international countries in Europe. Their ability to payout higher dividends than the majority of the competitors in their industry, while still expanding their market segment proves their profitability along with their profit margin. The profit margin experienced by TJX has been increasing rapidly. There perfect placement in the marketplace and their successful current performance proves the strengths which lie with TJX Companies Inc. As of right now, TJX should work on growing their revenue to a higher value. Although the company is increasing in revenue from year to year, they have only jumped 4.3%. A possible weakness right now, the company’s current expansion should turn that around. Even still a stagnant revenue is much better than a declining revenue growth, which in this economy is not uncommon. If their revenue is able to grow, than they can focus on reestablishing their previous inventory method. Due to the economy, TJX restructured their inventory system in order to keep a smaller quantity on hand. With larger revenues and more sales, they will be able to profitably keep larger stocks of merchandising inventory on hand. Financial information is all interconnected, balancing and formulating from each aspect. As the economy turns around, sales increase, and revenues increase, the downfalls which TJX has endured will change into even greater profitable quarters.…

    • 1729 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and monitoring the network for security violations. Lastly, the review process modifies the existing policy and adapts to lessons learned.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    St. Luke Case Summary

    • 62 Words
    • 1 Page

    However,they had few IT technical issues related to the network and other security related applications.Some of the issues related as :…

    • 62 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The theft of the records was caused by installing malware on the orgaznization's point of sales systems. These systems were used via third party vendors and had various security issues. This was the reason the hackers were able to break into their systems. The file that contained all the records started taking rounds in the market and was being sold in black. These records were then used to steal money from customer's accounts. There were several fake cards made and identity theft took place. The details were stolen from Faziio Mechanical. The malware was then sent to all the employees in an email. There was a possibility that Citadel malware, a program that steals passwords, was involved.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Laudon, Kenneth C., & Laudon, Jane P. (2009 by Pearson Education, Inc.). Essentials of Management Information Systems (8th ed).,: Prentice Hall.…

    • 1649 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Company Handbook

    • 2249 Words
    • 9 Pages

    “Doing our best to offer YOU the thrill you strive, at a price you DESERVE…………………

    • 2249 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    The data theft identified by the various organizations is not uniform. Some of the steps that can be implement by organizations such as:…

    • 401 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year. Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen.…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    In fact they were found to be deficient in 9 of the 12 requirements (Case Study: Operation Get Rich or Die Tryin’, n.d). In an analysis of the data breach by Mounica Vennamaneni, they found company was not just negligent in regards to PCI. There were multiple areas of failure, including, the employees level of awareness, the encryption used and even their logging procedures (Mounica Vennamaneni, 2016). Each of these failures is a lesson that, with any luck, TJX and others have taken to heart and taken steps to rectify.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Case Study

    • 734 Words
    • 3 Pages

    Essentials of Management Information Systems Essentials KENNETH C. LAUDON AND JANE P. LAUDON CHAPTER 4 CASE 2 IT INFRASTRUCTURE: HARDWARE AND SOFTWARE Salesforce.com: SFA on the iPhone and iPod Touch VIDEO CASE Systems Systems TAGS SUMMARY URL CASE Mobile digital platform; iPhone; Salesforce.com; sales force automation; device-based software development platforms; contemporary software application development; SaaS; PaaS; NetSuite.…

    • 734 Words
    • 3 Pages
    Good Essays