Preview

Tjx Companies

Good Essays
Open Document
Open Document
791 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tjx Companies
TJX Companies
List and describe the security controls in place. Where are the weaknesses?

TJX companies had very little security measures in place, and even the ones they had were mostly outdated. The company was using a Wired Equivalent Privacy (WEP) network encryption system. By today’s standards, and even at the time of intrusion, it is a fairly insecure system and is considered easy to hack into. Wi-Fi Protected Access (WPA), a more complex encryption system, was already available at the time of breach but the company did not upgrade to this more secure system. The wireless network they were using also did not have firewalls on many computers nor did they install any additional security software. Proprietary information, such as credit card data, was stored on the system for an extended period of time, and was not encrypted when it was sent.

What tools and technologies could have been used to fix the weaknesses?

TJX companies needed quite a few enhancements into their security setup. The first change that could have been made was updating the Wi-Fi network security. Using the WPA encryption system should have been a priority upgrade considering the weak security alternatives. In addition to that encryption, a firewall could have been active on every computer. Most computers have firewalls for their internet browsing, but an additional firewall could protect an area of the company’s network, such as credit card information. Another important tool is updated anti-virus software. Anti-virus software only protects against known viruses so it important to keep the software updated. Credit card data should always be encrypted, especially when being sent to another party (on the off chance it is intercepted). Security systems should be tested frequently and checked for errors or flaws in the system.

What was the business effect of TJX’s data loss on TJX, consumers, and banks?

Reputation is one of the hardest hits that these companies take. Once you



References: Laudon K., L. C. (2001). Essentials of M.I.S. (9 ed., p. 243 & 421). Boston, MA: Prentice Hall.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    And did not properly install another layer of security software it had already purchased .TJX also retained card hold data in its system much longer then stipulated by industry rules for storing such data. This company had very little security controls in place at all. The weakness of having a system that TJX had in place are a hacker can gain unauthorized access by finding weakness in the security protections employed by Web sites and computer systems, often taking advantage of various features of the Internet that make open system that is easy to use another problem is a hacker can install a sniffer which is eavesdropping program that monitors information over the internet so they can find personal information haw they want to.…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Week 5 Checkpoint

    • 272 Words
    • 2 Pages

    TJX could have switched to the more secure Wi-Fi Protected Access (WPA) standard with more complex encryption. TJX had also failed to install firewalls and data encryption on a lot of their computers by using the wireless network, system passwords and should have had good up- to- date antivirus software…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year. Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen.…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    References: Harrington, C., Choiniere, J., Goldmann, M., Jacobsen, F., Lloyd, L., McGregor, M., & ...…

    • 460 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    St. Luke Case Summary

    • 62 Words
    • 1 Page

    However,they had few IT technical issues related to the network and other security related applications.Some of the issues related as :…

    • 62 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The theft of the records was caused by installing malware on the orgaznization's point of sales systems. These systems were used via third party vendors and had various security issues. This was the reason the hackers were able to break into their systems. The file that contained all the records started taking rounds in the market and was being sold in black. These records were then used to steal money from customer's accounts. There were several fake cards made and identity theft took place. The details were stolen from Faziio Mechanical. The malware was then sent to all the employees in an email. There was a possibility that Citadel malware, a program that steals passwords, was involved.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Morris, C. G., & Maisto, A. A. (2002). Psychology: An Introduction. 12th. NJ: Prentice- Hall.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Q.3. Is there anything else that can be done to curtail this sort of egregious business behaviour (scandals) other than legislation?…

    • 659 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Timken Company

    • 4910 Words
    • 20 Pages

    The case is best suited as a firm-valuation exercise in a first-year MBA finance course. It…

    • 4910 Words
    • 20 Pages
    Satisfactory Essays
  • Good Essays

    Hrm 520

    • 790 Words
    • 4 Pages

    References: Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2011). Fundamentals of human…

    • 790 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Ashford, K., Hahn, E., Hall, L., Rayens, M., Noland, M., & Ferguson, J. (2010).The…

    • 635 Words
    • 3 Pages
    Good Essays