Preview

Tjx Companies

Good Essays
Open Document
Open Document
791 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tjx Companies
TJX Companies
List and describe the security controls in place. Where are the weaknesses?

TJX companies had very little security measures in place, and even the ones they had were mostly outdated. The company was using a Wired Equivalent Privacy (WEP) network encryption system. By today’s standards, and even at the time of intrusion, it is a fairly insecure system and is considered easy to hack into. Wi-Fi Protected Access (WPA), a more complex encryption system, was already available at the time of breach but the company did not upgrade to this more secure system. The wireless network they were using also did not have firewalls on many computers nor did they install any additional security software. Proprietary information, such as credit card data, was stored on the system for an extended period of time, and was not encrypted when it was sent.

What tools and technologies could have been used to fix the weaknesses?

TJX companies needed quite a few enhancements into their security setup. The first change that could have been made was updating the Wi-Fi network security. Using the WPA encryption system should have been a priority upgrade considering the weak security alternatives. In addition to that encryption, a firewall could have been active on every computer. Most computers have firewalls for their internet browsing, but an additional firewall could protect an area of the company’s network, such as credit card information. Another important tool is updated anti-virus software. Anti-virus software only protects against known viruses so it important to keep the software updated. Credit card data should always be encrypted, especially when being sent to another party (on the off chance it is intercepted). Security systems should be tested frequently and checked for errors or flaws in the system.

What was the business effect of TJX’s data loss on TJX, consumers, and banks?

Reputation is one of the hardest hits that these companies take. Once you



References: Laudon K., L. C. (2001). Essentials of M.I.S. (9 ed., p. 243 & 421). Boston, MA: Prentice Hall.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    St. Luke Case Summary

    • 62 Words
    • 1 Page

    However,they had few IT technical issues related to the network and other security related applications.Some of the issues related as :…

    • 62 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Identity theft is the one of the biggest concerns. If a person becomes a victim of identity theft, then it is almost impossible to prove innocence. Therefore, the customers should be informed about such attacks that can take place. They need to know the consequences of using online softwares and how to tackle them. Another thing that the organizations can adopt is the authentication and authorization technologies. This will make sure that the hackers are unable to steal the data. They should also put up resistive technology in place like firewalls, content filtering and encryption. These technologies should be of the highest quality.The strength of the passwords should be really strong. If any suspicious movement of data is found, then the organization must take an immediate step and not take it lightly. Lastly, they should devise an information security plan to protect their…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Week 5 Checkpoint

    • 272 Words
    • 2 Pages

    TJX was still using the old Wired Equivalent Privacy (WEP) encryption system, which was not hard for the hackers to figure out. One weakness was poorly secured computer kiosks located in many of TJX’s retail stores, which let people apply for jobs electronically. These same kiosks also provided access to the company’s internal corporate network.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Harrington, C., Choiniere, J., Goldmann, M., Jacobsen, F., Lloyd, L., McGregor, M., & ...…

    • 460 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The Timken Company

    • 4910 Words
    • 20 Pages

    The case is best suited as a firm-valuation exercise in a first-year MBA finance course. It…

    • 4910 Words
    • 20 Pages
    Satisfactory Essays
  • Good Essays

    References: Morris, C. G., & Maisto, A. A. (2002). Psychology: An Introduction. 12th. NJ: Prentice- Hall.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Q.3. Is there anything else that can be done to curtail this sort of egregious business behaviour (scandals) other than legislation?…

    • 659 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hrm 520

    • 790 Words
    • 4 Pages

    References: Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2011). Fundamentals of human…

    • 790 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Ashford, K., Hahn, E., Hall, L., Rayens, M., Noland, M., & Ferguson, J. (2010).The…

    • 635 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year. Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen.…

    • 1162 Words
    • 5 Pages
    Better Essays