Preview

TJMax Case analisys

Powerful Essays
Open Document
Open Document
1658 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
TJMax Case analisys
Security Breach at TJX

1. Identify & describe the failure points in TJX's security that require attention (including People, Work Process, and Technology
There were many failures that combined, created the largest breach of personal data ever reported in the history of IT security. People who are associated with the attack and need attention are the top-level executives and the Payment Card Industry Data Security Standard (PCI DSS) auditors. The top-level executives need to understand that IT security is a business issue and not just a technology issue. The article shows how by cutting corners and trying to “save” money by not investing in IT security, a breach cost them hundreds of millions of dollars in losses, which definitely it doesn’t only have an impact on the bottom-line but the image and reputation of TJX. The second major issue was the PCI DSS auditors whose job was to prevent this from happening, but according to the paper the PCI DSS auditors, failed to identify three key security issues when protecting the TJX’s network and they are: absence of network monitoring, absence of log data, and the presence of unencrypted data stored on the system. Another factor, the inexperience of the internal employees working inside the store and the lack of knowledge to identify the kind and use of equipment, allowed the perpetrators to use USB drives to upload software to kiosk system terminals available through the store.
The work process used by TJX to collect, retain and store customer information when a customer return is done without a receipt is unsecure. Unnecessary personal information collection and the length of time the information is stored before archiving it from the system is a main issue and this process needs to be reviewed. Collecting only the most important and basic information from the customer and storing the information for a short period of time or perhaps not accepting returns without a receipt might be a good solution for this

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    FXT2 Task 2 Follow Up

    • 799 Words
    • 3 Pages

    1. Identify areas that were not addressed by the IT staff’s response to the incident.…

    • 799 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    TechMall Case Analysis

    • 925 Words
    • 3 Pages

    3. Given the level of activity in each revenue stream, compare the amount of revenue expected from each revenue stream with the actual revenue. Is TechMall getting their expected revenue from each of the revenues streams?…

    • 925 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Explain the organizational approaches to information security List and describe the functional components of an information security program Determine how to plan and staff an organization’s information security program based on its size…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Case Analysis

    • 3109 Words
    • 13 Pages

    Schmidt, a South Carolina citizen, sued Wachovia Bank in a South Carolina state court for fraudulently inducing him to participate in an illegal tax shelter. Wachovia is a national bank with its main office in North Carolina and branch offices in several other states, including South Carolina. Under federal diversity jurisdiction, federal courts can hear cases in which the parties are citizens of different states. Wachovia filed a petition in Federal District Court, seeking to compel arbitration of the dispute. After the petition was denied on the merits, Wachovia appealed to the Fourth Circuit Court of Appeals, which dismissed the case for lack of jurisdiction. Under 28 U.S.C. Section 1348, national banks are "deemed citizens of the States in which they are respectively located." The Circuit Court interpreted "located" to mean any state where the bank has a branch location. Noting that the statute uses both "located" and "established" to refer to the presence of a bank, the Circuit Court determined that a national bank is "established" in the state where its main office is located, and "located" in every state where it has a branch office. Therefore, under the Fourth Circuit's reasoning, Wachovia was "located" in, and a citizen of, South Carolina (as well as several other states with branch offices). Since both parties, Schmidt and Wachovia, had South Carolina citizenship, the Circuit Court dismissed the case for lack of diversity jurisdiction.…

    • 3109 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    Read the following case description of an IT crisis and answer the questions posed at the end of the description.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Case Analysis

    • 1334 Words
    • 6 Pages

    * “Defendant seeks vacation of a default judgment, contending that the trial lacked jurisdiction over him. We reversed.” (p.199)…

    • 1334 Words
    • 6 Pages
    Better Essays
  • Good Essays

    case analysis

    • 2337 Words
    • 12 Pages

    b.What are the amounts and timing of the acquisition investment’s free cash flow from 2013 through 2022?…

    • 2337 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Case Analysis: Quickmedx

    • 625 Words
    • 3 Pages

    QuickMedx’s business model is to provide fast and convenient testing centers in high-traffic, retail environments that are close to pharmacies (McDonald’s of simple health-care services). For a payment of $35 per visit, patients are provided rapid testing, diagnosis, and prescriptions for 11 common illnesses by a certified nurse practitioner. This service provides an alternative (although not a replacement) to visiting the primary care physician's office or emergency room for simple cases.…

    • 625 Words
    • 3 Pages
    Good Essays