Preview

It/205 Week 5 Checkpoint

Good Essays
Open Document
Open Document
928 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It/205 Week 5 Checkpoint
Week 5 checkpoint IT

The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.

Resources: Ch. 7 & 12 of Essentials of Management Information Systems

Answer the following questions in 200 to 300 words:

•List and describe the security controls in place. Where are the weaknesses?

The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It321 Week 1

    • 640 Words
    • 3 Pages

    A long distance switch routes traffic through the long distance network. The types of interfaces that terminate on a long distance switch are intermachine trunks (ITMT’s); they can also connect to databases that are used to validate calling card calls.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Explain some of the graphical user interfaces (GUIs) and communications messages that occur during the operation of a microwave…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 210 Week 8 Checkpoint

    • 358 Words
    • 2 Pages

    |Graphical Interface/Central Computer |Communicates with the door, microwave |Incoming messages are from the user,|Outgoing messages tell the generator to |…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 9 Eng 101 Checkpoint

    • 326 Words
    • 2 Pages

    Enter the correct answer for each item by typing either a or b in the second column. Provide an explanation for each choice in the Rationale column. The boxes expand to accommodate your text.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 1 Check Point

    • 509 Words
    • 3 Pages

    The three dimensions of business problems are Organizations, Technology, and People. An example of organizations would be the rules and regulations that are set forth from within the company from the higher ups. If organizations did not set up these rules and regulations then the employee’s would just do what they thought was correct and everyone would be going in different directions and not working as a team to accomplish the same goals FedEx’s organization is set up so when they receive a package, everyone will follow specific procedures to ensure the information about the package is loaded into the system correctly so the package can to get to its final destination on time. Technology is anything from computer hardware to software to networking to the World Wide Web. Companies such as FedEx use technology to their advantage to keep track of all the packages and provide status checks with all of these forms of technology. They can now pinpoint potential delays or misdirection of packages and get it corrected sooner by using computer systems that talk to each other. The people are skilled in what their specific job is within a company to ensure that the overall goals are met. With FedEx there are hundreds if not thousands of different jobs that all have to be accomplished just for someone to send a package and it to get the destination on time. If FedEx did not have drivers, pilots, IT personnel, then the packages would go nowhere and they would be out of business. All companies must be set up with these three dimensions and a full understanding of each dimension to be successful.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    An example of this would be, if the speaker gives a long presentation, which includes key elements of the message. In this case key elements would be lost, so it is imperative to emphasize the points of the message with a method of repetitious messaging; another method that can be utilized for the purpose of communicating main…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 205 Week 1 Check Point

    • 295 Words
    • 2 Pages

    1) Business problems can be solved through the three dimensions of People, Processes, and Technology. People refers to those on staff at a business, as well as customers, vendors, suppliers, and and other stakeholders. No system is complete without considering the impact on the individuals who need to use it, either as operators or as customers. In a data-entry system, the people component might be either administrative assistants (who enter data by hand) or customers (who fill out online forms and populate the database that way). Processes refers to the ways in which the information is manipulated in the system. An example of a process might be the way in which new data is passed to the administrative assistant for entry, and where the assistant files or places the raw data once it is in the system. Finally, technology refers to automated systems, such as computer systems, which make it easier for humans to perform required processes. In the data-entry example, the technology is the combination of the database program and the front-end data entry module.…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Week 4

    • 522 Words
    • 2 Pages

    I believe that e-mail usage with an organization is beneficial to all parties within an organization. Its main purpose is for communications between employees, management, and clients. It is a tool used from a PC to a PC or MAC which is sent and received in seconds, As far as the downside of e-mail usage can be the information being sent and received and the privacy issues. Organizations fear that that the information being sent and or received can lead to a lawsuit or cause adverse publicity for that organization, which could be costly to an organization. This is one of the main reasons organizations limit the usages of e-mails. The path once an e-mail leaves an organization is a very broad one, it goes through an IP address from sender to an IP address to the receiver (or what we call the internet). And the receiver can then take the information sent to them and resend it others without the permission or even knowledge of who in turn will receive it and what they will do with it. An e-mail can pass through many hands before ending up in the right place.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 218 Week 4 Checkpoint

    • 290 Words
    • 2 Pages

    A one dimensional array is a variable that holds more than one index value such as car [ 13 ]. A Two dimensional array will hold two different index values such as…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    War Driving Attack

    • 4214 Words
    • 17 Pages

    The organisational security is locked down. No more false alarms at 4:00am, of an impending internet intrusion. Thanks to a well-configured firewall, you 're stopping a large percentage of the causes of network breaches -- but despite the organisational security precautions. The problem is not with your firewall, these network-level security devices are designed for perimeter protection, and by definition they cannot stop attacks that originate inside your network!…

    • 4214 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Tjx Companies

    • 266 Words
    • 2 Pages

    The TJC Corporation failed to protect its customers by allowing one of the largest security breaches in history. In 2007 they announced that an unauthorized user had accessed their system and compromised over 40 million customers’ data such as credit cards, debit cards and personal pin numbers. TJX was using an older security protocol called WEP which had proven to be easy to access by hackers and had failed to install or properly install other layers of security that had been recommended. They also transmitted data to the credit card companies failing to use proper encryption. They compounded their mistakes by holding on to customer data past the time that was normal within industry standards.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mba Solved Paper

    • 4251 Words
    • 18 Pages

    3. It provides operational, tactical, and strategic level managers with easy access to timely but, for the most, structured information.…

    • 4251 Words
    • 18 Pages
    Good Essays
  • Satisfactory Essays

    Mis Answers

    • 259 Words
    • 2 Pages

    * Decision support systems that enable to develop a strategic approach to align Information System (IS) or Information Technologies (IT) with an organization’s business strategies.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays