Preview

Nt1330 Unit 6 Paper

Good Essays
Open Document
Open Document
853 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 6 Paper
and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.
Fourth, in the aftermath of the attack, the risks and threats that the company is exposed are further security breaches that could expose critical and private secret trading information of the company. This could lead to financial loses since hackers can
…show more content…
In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 6 Paper

    • 368 Words
    • 2 Pages

    The stakeholder involved in this decision is Anne Distagne, the CEO of Linkage Construction, Inc. She was the individual involved in the decision-making process. of falsifying information to not display the significant increase in profit.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Test Paper

    • 381 Words
    • 2 Pages

    1. Create an insert function that will take nodes and add them up in the binary tree.…

    • 381 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Test Paper

    • 746 Words
    • 3 Pages

    We are running programs on a machine where values of type int have a 32-…

    • 746 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 712 Words
    • 3 Pages

    When looking at security of your network first you must determine what laws and regulations you must abide by. Being a police department do you have information stored in your database that would be considered ePHI from when a inmate was treated then you may fall under HIPAA. Do you take credit card for payment of violations? If so you may be required to protect data under SOX or PCI. You must know what data you have and how you must protect it. Are you required to report to the public or the court if your data is breeched? If so at what level or detail?…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt 1110 Nas Paper

    • 721 Words
    • 3 Pages

    If you have multiple computers on your network, you're a candidate for a network-attached storage (NAS) device. Some NAS servers simply act as a shared volume for backing up and sharing files across your network, while others can do a lot more, such as sharing a printer among your networked PCs, acting as a media streamer or even a surveillance system by supporting IP cameras. You'll find NAS devices with a single drive and those with multiple drives that allow for greater data protection and higher capacities.…

    • 721 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It was possible that the company was using older point of sale software that could not reconfigure to comply with the PCI standards. Another problem mention by The CPA Journal is the failure of TJX to properly encrypt customer data or the hackers stole the encryption key. Nonetheless, the bottom line was the company did not maintain industry standards.…

    • 791 Words
    • 4 Pages
    Better Essays
  • Good Essays

    TJX security breach

    • 801 Words
    • 4 Pages

    Executives at TJX: It is evident that the company wasn’t in compliance with the Payment Card Industry (PCI) standards. Primarily, the person in charge of the IT department should have been on top of ensuring TJX to be in compliance, by setting expectations and objectives pertained to security within its organization. In addition to the head of IT, I would also find guilty, all the other executives in the company responsible for the health of the business. Secondly, TJX violated industry standards by storing full track records from each customer.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cybersecurity Case Study

    • 1111 Words
    • 5 Pages

    Getting an adequate cybersecurity budget can be one of the most challenging tasks that many CISOs face. The board wants to keep shareholders happy, which means that they prefer spending on IT to be devoted to business growth and revenue generation. The frequency of breaches makes desensitization more likely, leading to a decreased feeling of urgency to ensure the strength of cybersecurity. Furthermore, many executives have been lulled into a false or misguided sense of security; companies have survived major breaches, and the impact on companies' stock prices has not been as extreme as the declines that followed on the heels of early breaches. It does not help that the return…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Bad news is never good for any business. The moment your customers know that you have been hacked, they will try to leave you as soon as possible.…

    • 986 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Tjx Companies

    • 266 Words
    • 2 Pages

    The TJC Corporation failed to protect its customers by allowing one of the largest security breaches in history. In 2007 they announced that an unauthorized user had accessed their system and compromised over 40 million customers’ data such as credit cards, debit cards and personal pin numbers. TJX was using an older security protocol called WEP which had proven to be easy to access by hackers and had failed to install or properly install other layers of security that had been recommended. They also transmitted data to the credit card companies failing to use proper encryption. They compounded their mistakes by holding on to customer data past the time that was normal within industry standards.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Tjx Company

    • 344 Words
    • 2 Pages

    The TJX company did not have many security controls put in place to prevent something like this from happening. The company used Wired Equivalent Privacy encryption system to handle their client’s credit and debit card information. This system was very easy for any hacker to gain access to people’s information. It was completely out of date and did not encrypt anything within the company, which made it more vulnerable. They did not install firewall security correctly. TJX had purchased many other security programs that were not properly installed. They kept customer’s information in their system longer than what is required by law.…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In fact they were found to be deficient in 9 of the 12 requirements (Case Study: Operation Get Rich or Die Tryin’, n.d). In an analysis of the data breach by Mounica Vennamaneni, they found company was not just negligent in regards to PCI. There were multiple areas of failure, including, the employees level of awareness, the encryption used and even their logging procedures (Mounica Vennamaneni, 2016). Each of these failures is a lesson that, with any luck, TJX and others have taken to heart and taken steps to rectify.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    TJMax Case analisys

    • 1658 Words
    • 7 Pages

    There were many failures that combined, created the largest breach of personal data ever reported in the history of IT security. People who are associated with the attack and need attention are the top-level executives and the Payment Card Industry Data Security Standard (PCI DSS) auditors. The top-level executives need to understand that IT security is a business issue and not just a technology issue. The article shows how by cutting corners and trying to “save” money by not investing in IT security, a breach cost them hundreds of millions of dollars in losses, which definitely it doesn’t only have an impact on the bottom-line but the image and reputation of TJX. The second major issue was the PCI DSS auditors whose job was to prevent this from happening, but according to the paper the PCI DSS auditors, failed to identify three key security issues when protecting the TJX’s network and they are: absence of network monitoring, absence of log data, and the presence of unencrypted data stored on the system. Another factor, the inexperience of the internal employees working inside the store and the lack of knowledge to identify the kind and use of equipment, allowed the perpetrators to use USB drives to upload software to kiosk system terminals available through the store.…

    • 1658 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Essay About Hacking

    • 261 Words
    • 2 Pages

    The effect of hacking can lead to the loss of data that store in the computer. Moreover, this can expose the sensitive data and personal information of victims. At the end, the victims will suffer emotional disturbances and it is not impossible if I say the victims will commit suicide. Other than that, the victims especially for the big company, will suffer huge losses because of the hackers doing. What is sad here is that they would have gone bankrupt.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security risk management

    • 45681 Words
    • 183 Pages

    Most organizations recognize the critical role that information technology (IT) plays in supporting their business objectives. But today's highly connected IT infrastructures exist in an environment that is increasingly hostile—attacks are being mounted with increasing frequency and are demanding ever shorter reaction times. Often, organizations are unable to react to new security threats before their business is impacted. Managing the security of their infrastructures—and the business value that those infrastructures deliver—has become a primary concern for IT departments.…

    • 45681 Words
    • 183 Pages
    Good Essays