Preview

It/205 Week 5 Checkpoint

Good Essays
Open Document
Open Document
928 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It/205 Week 5 Checkpoint
Week 5 checkpoint IT

The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.

Resources: Ch. 7 & 12 of Essentials of Management Information Systems

Answer the following questions in 200 to 300 words:

•List and describe the security controls in place. Where are the weaknesses?

The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five

You May Also Find These Documents Helpful

  • Good Essays

    a) Joan’s first mistake is not using control of cash receipts. She is having only one person go through the whole accounting controls process. There should be other people involved in this process including Joan herself. Joan must also realize the limitations of human controls. One person going through the entire process is bound to make a human error.…

    • 710 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It321 Week 1

    • 640 Words
    • 3 Pages

    A long distance switch routes traffic through the long distance network. The types of interfaces that terminate on a long distance switch are intermachine trunks (ITMT’s); they can also connect to databases that are used to validate calling card calls.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fp 101 Week 5

    • 333 Words
    • 2 Pages

    1. You place $5,000 in a savings account earning 2.50% interest compounded annually. Assuming you do NOT make additional monthly deposits (set that to $0), how much will you have at the end of four years? How much would you have at the end of four years if interest is compounded semiannually? 5,524.14 are what will be after four years with Simi annual intrust compound.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT210 Week 3

    • 756 Words
    • 4 Pages

    Resources: Review the example in Appendix E and the additional examples on pgs 80-83 of Prelude to Programming…

    • 756 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Explain some of the graphical user interfaces (GUIs) and communications messages that occur during the operation of a microwave…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 210 Week 8 Checkpoint

    • 358 Words
    • 2 Pages

    |Graphical Interface/Central Computer |Communicates with the door, microwave |Incoming messages are from the user,|Outgoing messages tell the generator to |…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 1 Check Point

    • 509 Words
    • 3 Pages

    The three dimensions of business problems are Organizations, Technology, and People. An example of organizations would be the rules and regulations that are set forth from within the company from the higher ups. If organizations did not set up these rules and regulations then the employee’s would just do what they thought was correct and everyone would be going in different directions and not working as a team to accomplish the same goals FedEx’s organization is set up so when they receive a package, everyone will follow specific procedures to ensure the information about the package is loaded into the system correctly so the package can to get to its final destination on time. Technology is anything from computer hardware to software to networking to the World Wide Web. Companies such as FedEx use technology to their advantage to keep track of all the packages and provide status checks with all of these forms of technology. They can now pinpoint potential delays or misdirection of packages and get it corrected sooner by using computer systems that talk to each other. The people are skilled in what their specific job is within a company to ensure that the overall goals are met. With FedEx there are hundreds if not thousands of different jobs that all have to be accomplished just for someone to send a package and it to get the destination on time. If FedEx did not have drivers, pilots, IT personnel, then the packages would go nowhere and they would be out of business. All companies must be set up with these three dimensions and a full understanding of each dimension to be successful.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    An example of this would be, if the speaker gives a long presentation, which includes key elements of the message. In this case key elements would be lost, so it is imperative to emphasize the points of the message with a method of repetitious messaging; another method that can be utilized for the purpose of communicating main…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 218 Week 4 Checkpoint

    • 290 Words
    • 2 Pages

    A one dimensional array is a variable that holds more than one index value such as car [ 13 ]. A Two dimensional array will hold two different index values such as…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    War Driving Attack

    • 4214 Words
    • 17 Pages

    The organisational security is locked down. No more false alarms at 4:00am, of an impending internet intrusion. Thanks to a well-configured firewall, you 're stopping a large percentage of the causes of network breaches -- but despite the organisational security precautions. The problem is not with your firewall, these network-level security devices are designed for perimeter protection, and by definition they cannot stop attacks that originate inside your network!…

    • 4214 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Tjx Companies

    • 266 Words
    • 2 Pages

    The TJC Corporation failed to protect its customers by allowing one of the largest security breaches in history. In 2007 they announced that an unauthorized user had accessed their system and compromised over 40 million customers’ data such as credit cards, debit cards and personal pin numbers. TJX was using an older security protocol called WEP which had proven to be easy to access by hackers and had failed to install or properly install other layers of security that had been recommended. They also transmitted data to the credit card companies failing to use proper encryption. They compounded their mistakes by holding on to customer data past the time that was normal within industry standards.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mba Solved Paper

    • 4251 Words
    • 18 Pages

    3. It provides operational, tactical, and strategic level managers with easy access to timely but, for the most, structured information.…

    • 4251 Words
    • 18 Pages
    Good Essays
  • Satisfactory Essays

    Mis Answers

    • 259 Words
    • 2 Pages

    * Decision support systems that enable to develop a strategic approach to align Information System (IS) or Information Technologies (IT) with an organization’s business strategies.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays