Preview

It 205 Week 3 Assignment

Good Essays
Open Document
Open Document
667 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 205 Week 3 Assignment
It/205 week five assignments

1. List and describe the security controls in place. Where are the weaknesses?

The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,
And did not properly install another layer of security software it had already purchased .TJX also retained card hold data in its system much longer then stipulated by industry rules for storing such data. This company had very little security controls in place at all. The weakness of having a system that TJX had in place are a hacker can gain unauthorized access by finding weakness in the security protections employed by Web sites and computer systems, often taking advantage of various features of the Internet that make open system that is easy to use another problem is a hacker can install a sniffer which is eavesdropping program that monitors information over the internet so they can find personal information haw they want to.

2 What tools and technologies could have been used to fix the weaknesses?

Here are some of the tools that as owner should be in place, one is Access control it consist of all the policies a company uses to prevent improper access to systems by unauthorized insiders and outsiders. To gain access a user must be authorized and authenticated. Another tool is a firewalls they prevent unauthorized user from accessing private networks. There are a number of firewall screening technologies, and applications, including static packet filtering, stateful inspections, Network Address Translations and application proxy filtering they are often used in combination to provide firewall protection. Others are antivirus and antispyware software, which are designed to check computer systems and drives for the presence of computer viruses and eliminates the virus

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 6 Assignment It/286

    • 1310 Words
    • 6 Pages

    |USB cable and it works fine; however, Julie regularly uses her laptop in different locations throughout the house, so using a USB |…

    • 1310 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Continuing of Richman Investments has expanded with more offices, locations and clients, which the needs of protection for assets are greater. I have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. For Richman Investments Computer User’s Policy, although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be…

    • 1444 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Week 10 Assignment 4

    • 714 Words
    • 3 Pages

    2. Solving the problem by using Solver of M S Excel, the answer report is given below:…

    • 714 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 2 Assignment

    • 320 Words
    • 2 Pages

    Before agreeing to the contract I would like to outline some risks that goes with this current project. I will address the concerns by showing you the qualitative and the quantitative risks…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 2 Assignment 520

    • 752 Words
    • 4 Pages

    State the administrative agency which controls the regulation. Explain why this agency and your proposed regulation interests you (briefly). Will this proposed regulation affect you or the business in which you are working? If so, how? Submit a copy of the proposed regulation along with your responses to these five questions. The proposed regulation can be submitted as either a separate Word document (.doc) or Adobe file (.pdf). This means you will submit two attachments to the Week 2 Dropbox: (a) a Word document with the questions and your answers and (b) a copy of the proposed regulation you used for this assignment. (10 points)…

    • 752 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Fp/101 Week 5 Assignment

    • 697 Words
    • 3 Pages

    You have to make sure you have money to pay the loan back, but if you don’t you will go into default. When you go into default this destroys your credit. The default shows up on your credit, which you don’t want to happen. Having negative credit on your credit report could stop you from getting future loans. Some other consequences of borrowing too much and going into debt are: evictions, foreclosures, wage garnishments, emotional breakdowns, ruined credibility and undesirable credit. Debt affects people in different ways and has a major impact on the life of each person. It often determines how they will be able to live their lives.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Good Essays

    RES 320 Week 3 Assignment

    • 479 Words
    • 3 Pages

    · Make sure the article includes a description of the independent and dependent variables and the sampling plan.…

    • 479 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Com 156 Week 3 Assignment

    • 602 Words
    • 3 Pages

    B. Give examples of upkeep fees, taxes and insurance rates associated with owning a home. IE; lawn, painting and every day mishaps.…

    • 602 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It 242 Week 8 Assignment

    • 686 Words
    • 3 Pages

    Microwave signals transmit using electromagnetic energy. Microwave signals are used commonly in long distance telephone telecommunications, cellular phone networks, and television networks. Microwaves travel in a straight line the wave can be narrow beamed making it more effective for long distance transmissions.…

    • 686 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 2 Assignment 2

    • 289 Words
    • 1 Page

    Which input/output devices will you be using in the next one to three years as…

    • 289 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Tjx Security Breach

    • 1008 Words
    • 5 Pages

    1 When TJX first noticed the issue in Dec of 2006, intrusions had been occurring for at least 16 months,…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Case Study Woldwide Games

    • 358 Words
    • 2 Pages

    The company could have installed proper scanning software to identify any clues to suggest that the system could be hacked. They could have had a continuous test to check on any attacks and they can identify any vulnerable points in their network that can be accessed to prevent this the company should have set up a firewall. I think that the company never thought they would get hacked. The Firewall would prevent outside threats such as hackers and viruses.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In fact they were found to be deficient in 9 of the 12 requirements (Case Study: Operation Get Rich or Die Tryin’, n.d). In an analysis of the data breach by Mounica Vennamaneni, they found company was not just negligent in regards to PCI. There were multiple areas of failure, including, the employees level of awareness, the encryption used and even their logging procedures (Mounica Vennamaneni, 2016). Each of these failures is a lesson that, with any luck, TJX and others have taken to heart and taken steps to rectify.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ssl Weakness

    • 758 Words
    • 4 Pages

    Furthermore, on September 2011, two information technology security researchers came forth announcing that they had successfully extended a previously known vulnerability in SSL v.3 (or TLS v.1.0) into an eavesdropping attack against some applications. The detailed release of the announcement and attack pushed all of the major web servers and client vendors into a state of panic in order to provide the necessary patches to address the disclosed vulnerabilities; however, the progress made has been painstakingly slow due to compatibility complications between web application servers and web clients. Over a year after the disclosure of the attack, at the time of this writing, major commercial sites were still being observed to use TLS v. 1.0 (e.g. Bank of America, Navy Federal Credit Union, Capital One Bank, etc.). Yet, while…

    • 758 Words
    • 4 Pages
    Good Essays