Preview

Tjx Companies

Satisfactory Essays
Open Document
Open Document
271 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tjx Companies
Week 5 Checkpoint – TJX Companies
IT/205
Joshua Bailey The credit card data theft that TJX Companies experienced happened because they were using WEP wireless security, which is the weakest form of wireless encryption today, and hackers could access the credit card data easily. If TJX had taken the time to implement a stronger encryption method, thousands of dollars would have been saved by the company. Proper site surveying could also have prevented the attackers from making a breach. TJX Companies had other weaknesses. They allowed certain people to use USB devices in their computers. Someone could easily steal data on a USB device and use it. Also they didn’t have a firewall preventing data from intrusion to the main company. They could have had something set up where access to records could not be accessed from specific computers. They also had no virus scanning software on their computers. TXJ didn’t implement any data encryption to their systems data.. Using data encryption algorithms makes it harder for hackers to decipher any stolen information.
The hacking and theft of the credit card data of TJX Companies was a severe loss to the company and to their customers, seriously tarnishing the company’s reputation. With the lawsuits and insurance claims, millions of dollars were lost and surely TJX Companies is feeling the repercussions from this incident and have learned a valuable lesson if they are still in business. The cardholders had to have gone through a financial burden and suffered the most. TJX Companies must be accountable from the loss and proper measures have to be applied to secure any company from

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    tjx company analysi

    • 707 Words
    • 3 Pages

    TJX is the largest international apparel and home fashions off-price department store chain in the United States with 26 million in revenues in 2012. It was founded in 1956 as Zayre and is headquartered in Framingham, Massachusetts. Globally it is one of the top 50 retailers in the world, specializing in cheap apparel and footwear. With over 3,000 stores today, we see the potential to expand our store base by over 50%, up to almost 4,800 stores, with our current chains in our current markets alone. Their target customers are female, middle to upper-middle income, between the ages of 25-54 years that are fashion and value conscious. Beyond our successful brick-and-mortar business, we see expanding our e-commerce presence over time as a great opportunity for TJX and another platform to reach more customers with our great values. According to Forbes it is also #95 on the S&P 500. TJX comprises T.J. Maxx, Marshalls, HomeGoods, Winners, and T.K. Maxx. TJX’s stock price is currently selling at $63.52 significantly hire than the prices we calculated using the Price Earnings Model, Dividend Discount Model, and Discount Cash Flow Model which average out to about $33.39.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    And did not properly install another layer of security software it had already purchased .TJX also retained card hold data in its system much longer then stipulated by industry rules for storing such data. This company had very little security controls in place at all. The weakness of having a system that TJX had in place are a hacker can gain unauthorized access by finding weakness in the security protections employed by Web sites and computer systems, often taking advantage of various features of the Internet that make open system that is easy to use another problem is a hacker can install a sniffer which is eavesdropping program that monitors information over the internet so they can find personal information haw they want to.…

    • 667 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Jva Corporation

    • 638 Words
    • 3 Pages

    .Performance, as well as revenue, is reviewed every 6 months. This way it allows JVA Corp. to cut or increases pay every 6 months and review its bottom line. Employees can also benefit by having the opportunity to earn pay raises potentially twice a year, rather than the typical annual reviews.…

    • 638 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    This company needs to look at for the future, for data loss prevention to be effective, the company must decide on the right strategy, employ the right people, target the right data and purchase the right technology. With these accommodations this should reduce the likelihood and cost of future data, breaches and or violating compliance, rules and laws and or regulations. This will also allow the company to have control over how and what data is being exported and what employees or students are online and how this data is used throughout this company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The article was considerably valid as was demonstrated by credible news programs and other articles. The importance of keeping patches and antivirus signatures up to date, to help prevent these types of attacks was discussed in detail. Users selecting strong passwords was also discussed, and revealed as a key component in the ability to compromise these accounts. This article was valuable and affected a lot of people. It is clear that there are prevention methods that can be used, to secure your…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    These transactions are resulting in the exploitation of resources of the Web site and of the Credit Card Providers for these users after the User’s reaches their responsible percentage quickly. The Hacker uses their methods to exploit found vulnerabilities or have a User click on an application that allows them to take control undetected while the user continues their shopping. Once the User signs off and leaves the transaction it supposedly closes its session, the Hacker suspends the transaction until the coast is clear and then continues undetected, (Imperva, 2012b).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Unit 12 P6

    • 916 Words
    • 3 Pages

    Customers can be very concerned about payment security with transactions on the internet. Some of these concerns are from stories about hackers, identity theft and even fake…

    • 916 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The theft of the records was caused by installing malware on the orgaznization's point of sales systems. These systems were used via third party vendors and had various security issues. This was the reason the hackers were able to break into their systems. The file that contained all the records started taking rounds in the market and was being sold in black. These records were then used to steal money from customer's accounts. There were several fake cards made and identity theft took place. The details were stolen from Faziio Mechanical. The malware was then sent to all the employees in an email. There was a possibility that Citadel malware, a program that steals passwords, was involved.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Disclosure Analysis Paper

    • 903 Words
    • 4 Pages

    The publicly held company selected to use as the basis for this paper is Apple Inc. Apple Inc. designs, manufactures and markets mobile communication and media devices, personal computers, and portable digital music players, and sells a variety of related software, services, peripherals, networking solutions, and third-party digital content and applications. The Company’s business strategy leverages its unique ability to design and develop its own operating systems, hardware, application software, and services to provide its customers new products and solutions with superior ease-of-use, seamless integration, and innovative design. The Company believes continual investment in research and development and marketing and advertising is critical to the development and sale of innovative products and technologies. (Form 10-K, 2011, p. 1)…

    • 903 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Timken Company

    • 4910 Words
    • 20 Pages

    The case is best suited as a firm-valuation exercise in a first-year MBA finance course. It…

    • 4910 Words
    • 20 Pages
    Satisfactory Essays
  • Good Essays

    Rough Draft

    • 567 Words
    • 3 Pages

    Imagine if someone is pretending to be you, using your credit card to indulge themselves in items that they would never be able to afford. Credit card fraud is far too common today, losing a wallet can mean losing your identity. A credit card can be a positive or negative thing, depending whose hands it’s in. Credit card fraud is a problem, that I believe, I have found the solution to.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In fact they were found to be deficient in 9 of the 12 requirements (Case Study: Operation Get Rich or Die Tryin’, n.d). In an analysis of the data breach by Mounica Vennamaneni, they found company was not just negligent in regards to PCI. There were multiple areas of failure, including, the employees level of awareness, the encryption used and even their logging procedures (Mounica Vennamaneni, 2016). Each of these failures is a lesson that, with any luck, TJX and others have taken to heart and taken steps to rectify.…

    • 724 Words
    • 3 Pages
    Good Essays