Preview

Short Research on PAYLESS

Good Essays
Open Document
Open Document
654 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Short Research on PAYLESS
From the very first day the Payless Corporation is having issues in these 4 main departments of their business: unavailability of n/w, illegal financial functions/operations, IT security Budget costs & accommodated applications. Due to the non-settlement of these Issues Corporation had gone through severe loss n got diminished.
This memo will help to understand these issues in details:
1. Unavailability of n/w: In the morning of 31 Jan., the users at Payless Foods & different offices at different branches can access the network but with the passage of time they were not able to connect to the network & also the trouble tricking system got overloaded with the cases needs guidance that it got crashed. After this, even the CEO & many other vendors tried to access the n/w but no one gained the access. Then, IDMS also applied their assistance and they too failed.
2. Illegal financial functions/operations:The Head of the Corporation founded that number of subsequent transactions of heavy amount had been occurred out of which only one got cleared & other two were caught causing the corporation the severe loss.
3. IT security Budget costs: Initially, the corporation didn’t bother much about the security & its budget much but after the origin of these types of issues they started to make their security strong. And for this, they invested almost CAD 600 $ in which employees were given the information of creating the passwords & which attachments to open.
4. Accommodated applications: Breaching the one of the major applications of the corporation was the biggest achievement for the hackers to get in with the database & to gain as much information about the client’s credit cards details to use it for their own benefit as security functions were not completely & properly installed.
The issues discussed can be handled by:
1. Unavailability of n/w: As CISO, I started the n/w intrusion detection system that was used in encountering the intruders & malwares before

You May Also Find These Documents Helpful

  • Satisfactory Essays

    JCPenney

    • 247 Words
    • 7 Pages

    (3) a decrease in total assets, (4) a change from a net loss to net income,…

    • 247 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    2. Using the seminar case; list some of the security breaches being practiced by the employees at the agency.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sample Question

    • 5066 Words
    • 21 Pages

    3. The Sarbanes-Oxley Act (SOX) of 2002 does not specifically prohibit an independent auditor from performing the following non-audit function(s) for an audit client:…

    • 5066 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Organizations must ensure the security and control of systems and transactions with clients and vendors. What security breaches may cause harm to an organization or its clients? Why is it important to ensure a proper level of security? What tools are available to prevent breaches?…

    • 369 Words
    • 2 Pages
    Good Essays
  • Good Essays

    When Staff came back to work after break there was some complaints of no printers being connected and also lost documents…

    • 2823 Words
    • 10 Pages
    Good Essays
  • Good Essays

    TJX security breach

    • 801 Words
    • 4 Pages

    Identify & describe the failure points in TJX's security that requires attention (including, but not limited to: People, Work Process, and Technology)?…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    payless

    • 3359 Words
    • 14 Pages

    Payless ShoeSource, Inc. is the largest footwear retailer in the United States. The company operates about 4,700 stores in all 50 states as well as Puerto Rico, Guam, Saipan, the U.S. Virgin Islands, Canada, Central America, the Caribbean, Ecuador, and Japan. It also sells footwear via the Internet at www.payless.com. Payless has built its success by offering a large selection of shoes at very low prices, most selling for less than $15 as of 2004. The company has been able to maintain its affordable prices by sticking exclusively to a self-service format, keeping a tight rein on cost structure, and insisting on efficient sourcing and inventory controls. Payless ShoeSource targets as its main customers women from 18 to 44 years of age with household incomes of less than $75,000, and it estimates that in any given year, 40 percent of the women in this target group buy at least one pair of footwear at a Payless store. The company remained a May subsidiary until 1996, when it was spun off to May shareholders as an independent, publicly traded firm.…

    • 3359 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Jeremy Lent lunched a company named Nextcard. Inc. aims to earn money by helping people get credit card more conveniently. But there is two huge flaws in this strategy, first, the way nextcard to obtain new customers proved to be much higher than the figure Lent had originally projected. Second, the people who signed up for the NextBank credit card proved to be much higher credit risk than Lent had expected. So, the result is big bad debts. But the company’s officials still insist that the increasing allowance for bad debts is caused by hackers and other Internet miscreants. Then in late 2001, they got a large class-action lawsuit by the angry investors.…

    • 342 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    CAN Analysis For Infosys

    • 1071 Words
    • 4 Pages

    2) Under the data corruption prevention subroutine by writing a new comparison algorithm they could reduce the corruption incidents per year from 24 to 0and in the bargain saved cost of three programmers which was an FTE rateof $45 (Rs. 2,070) per…

    • 1071 Words
    • 4 Pages
    Good Essays