Preview

It 205 Week 3 Assignment

Good Essays
Open Document
Open Document
667 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 205 Week 3 Assignment
It/205 week five assignments

1. List and describe the security controls in place. Where are the weaknesses?

The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,
And did not properly install another layer of security software it had already purchased .TJX also retained card hold data in its system much longer then stipulated by industry rules for storing such data. This company had very little security controls in place at all. The weakness of having a system that TJX had in place are a hacker can gain unauthorized access by finding weakness in the security protections employed by Web sites and computer systems, often taking advantage of various features of the Internet that make open system that is easy to use another problem is a hacker can install a sniffer which is eavesdropping program that monitors information over the internet so they can find personal information haw they want to.

2 What tools and technologies could have been used to fix the weaknesses?

Here are some of the tools that as owner should be in place, one is Access control it consist of all the policies a company uses to prevent improper access to systems by unauthorized insiders and outsiders. To gain access a user must be authorized and authenticated. Another tool is a firewalls they prevent unauthorized user from accessing private networks. There are a number of firewall screening technologies, and applications, including static packet filtering, stateful inspections, Network Address Translations and application proxy filtering they are often used in combination to provide firewall protection. Others are antivirus and antispyware software, which are designed to check computer systems and drives for the presence of computer viruses and eliminates the virus

You May Also Find These Documents Helpful

  • Good Essays

    Please complete the following 7 exercises below in either Excel or a word document (but must be single document). You must show your work where appropriate (leaving the calculations within Excel cells is acceptable). Save the document, and submit it in the appropriate week using the Assignment Submission button.…

    • 1284 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 6 Assignment It/286

    • 1310 Words
    • 6 Pages

    |USB cable and it works fine; however, Julie regularly uses her laptop in different locations throughout the house, so using a USB |…

    • 1310 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Continuing of Richman Investments has expanded with more offices, locations and clients, which the needs of protection for assets are greater. I have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. For Richman Investments Computer User’s Policy, although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be…

    • 1444 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Week 2 Assignment

    • 320 Words
    • 2 Pages

    Before agreeing to the contract I would like to outline some risks that goes with this current project. I will address the concerns by showing you the qualitative and the quantitative risks…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fp/101 Week 5 Assignment

    • 697 Words
    • 3 Pages

    You have to make sure you have money to pay the loan back, but if you don’t you will go into default. When you go into default this destroys your credit. The default shows up on your credit, which you don’t want to happen. Having negative credit on your credit report could stop you from getting future loans. Some other consequences of borrowing too much and going into debt are: evictions, foreclosures, wage garnishments, emotional breakdowns, ruined credibility and undesirable credit. Debt affects people in different ways and has a major impact on the life of each person. It often determines how they will be able to live their lives.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IT 286 Week 4 Assignment

    • 1790 Words
    • 5 Pages

    Working in a technical support role requires someone who is both adept with technology and who also has the necessary customer service skills that are required to work with people. Anytime a technical support person is presented with a problem they must know based on the description of the problem how to diagnose the issue. Without a wide understanding of PCs and the operating system being used that a technical support person would spend lots of wasted time trying to figure out the issue. A technician should know based on their computer knowledge certain types of problems are typically caused by certain components or software in the system. This knowledge will allow the technician to identify the issues the customer is having.…

    • 1790 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    RES 320 Week 3 Assignment

    • 479 Words
    • 3 Pages

    · Make sure the article includes a description of the independent and dependent variables and the sampling plan.…

    • 479 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Com 156 Week 3 Assignment

    • 602 Words
    • 3 Pages

    B. Give examples of upkeep fees, taxes and insurance rates associated with owning a home. IE; lawn, painting and every day mishaps.…

    • 602 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It 242 Week 8 Assignment

    • 686 Words
    • 3 Pages

    Microwave signals transmit using electromagnetic energy. Microwave signals are used commonly in long distance telephone telecommunications, cellular phone networks, and television networks. Microwaves travel in a straight line the wave can be narrow beamed making it more effective for long distance transmissions.…

    • 686 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Tjx Security Breach

    • 1008 Words
    • 5 Pages

    1 When TJX first noticed the issue in Dec of 2006, intrusions had been occurring for at least 16 months,…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Case Study Woldwide Games

    • 358 Words
    • 2 Pages

    The company could have installed proper scanning software to identify any clues to suggest that the system could be hacked. They could have had a continuous test to check on any attacks and they can identify any vulnerable points in their network that can be accessed to prevent this the company should have set up a firewall. I think that the company never thought they would get hacked. The Firewall would prevent outside threats such as hackers and viruses.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In fact they were found to be deficient in 9 of the 12 requirements (Case Study: Operation Get Rich or Die Tryin’, n.d). In an analysis of the data breach by Mounica Vennamaneni, they found company was not just negligent in regards to PCI. There were multiple areas of failure, including, the employees level of awareness, the encryption used and even their logging procedures (Mounica Vennamaneni, 2016). Each of these failures is a lesson that, with any luck, TJX and others have taken to heart and taken steps to rectify.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ssl Weakness

    • 758 Words
    • 4 Pages

    Furthermore, on September 2011, two information technology security researchers came forth announcing that they had successfully extended a previously known vulnerability in SSL v.3 (or TLS v.1.0) into an eavesdropping attack against some applications. The detailed release of the announcement and attack pushed all of the major web servers and client vendors into a state of panic in order to provide the necessary patches to address the disclosed vulnerabilities; however, the progress made has been painstakingly slow due to compatibility complications between web application servers and web clients. Over a year after the disclosure of the attack, at the time of this writing, major commercial sites were still being observed to use TLS v. 1.0 (e.g. Bank of America, Navy Federal Credit Union, Capital One Bank, etc.). Yet, while…

    • 758 Words
    • 4 Pages
    Good Essays