Preview

It205 Week 5 Checkpoint

Satisfactory Essays
Open Document
Open Document
272 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It205 Week 5 Checkpoint
CheckPoint: TXJ Companies

TJX was still using the old Wired Equivalent Privacy (WEP) encryption system, which was not hard for the hackers to figure out. One weakness was poorly secured computer kiosks located in many of TJX’s retail stores, which let people apply for jobs electronically. These same kiosks also provided access to the company’s internal corporate network.

TJX could have switched to the more secure Wi-Fi Protected Access (WPA) standard with more complex encryption. TJX had also failed to install firewalls and data encryption on a lot of their computers by using the wireless network, system passwords and should have had good up- to- date antivirus software

The banks have been affected the most by the stolen data more so than the retailers, the credit card companies or TJX, and may have to pay up to $300 million to recover stolen credit cards in addition to covering fraudulent purchases. TJX is being sued for not protecting their customers’ information and estimates losses at $1 billion over 5 years. The customers have lost trust in TJX and those polled said they would never again shop at the effected retail stores.

I would say information rights and obligations, because TJX relied on their customers to keep patronizing their many retail chains, TJX had a moral obligation to their customers to keep their customers credit card, social security numbers, and all other information safe and secure from fraud and theft.

I hope this helps i tried to keep it simple but it meets the criteria. I got a perdect grade on it so should you.

the the the the the

You May Also Find These Documents Helpful

  • Good Essays

    On December 19th Target revealed that 40 million credit and debit card accounts were compromised by a data breach. The information had appeared to be stole around black friday of 2013. This is the busiest shopping day of the year.The retailer said that the information stolen between November 27 and December 15, 2013 included personal information of as many as 70 million people more than the 40 million the company originally estimated. Target discovered the breach on December 13th and notified the justice department.The information stolen included names, mailing addresses, phone numbers and email addresses. The hackers tole 11 Gb worth of personal information. Target said that it will provide one year of free credit monitoring…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Xacc/280 Week 3 Quiz

    • 826 Words
    • 4 Pages

    A physical count of merchandise inventory on November 30 reveals that there are 90 units on hand. Assume a periodic inventory system is used. Ending inventory under LIFO is…

    • 826 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It240 Week 3

    • 370 Words
    • 2 Pages

    For all three settings given the conditions in which to work with a client server based model is the choice. This choice is made for a few different reasons while considering multiple factors. First off client server includes an option for flexibility. That is growth and, or modification to any existing device, or future additions to the system. The design, implication, material, and budget demands are reasonably accomplishable. A client server offers tighter security through a central database which houses an array of customized permissions which allows an appointed user whatever access is needed. A client server base model is reasonably equipped to accommodate the expanding business to the business with everything…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It321 Week 1

    • 640 Words
    • 3 Pages

    A long distance switch routes traffic through the long distance network. The types of interfaces that terminate on a long distance switch are intermachine trunks (ITMT’s); they can also connect to databases that are used to validate calling card calls.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Checkpoint Week 3 It242

    • 407 Words
    • 2 Pages

    I would have to say that the proposed solution would not resolve this issue of future growth because it would not allow for the bandwidth to increase which is vital for growth it would also not increase the response time. By installing CAT 5UTP cables and using network cards that support speeds up to 100Mbps would also not allow for an increase in bandwidth on the network.…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It236 Week9 Final

    • 576 Words
    • 3 Pages

    The web site chosen for this project is the Belleville News-Democrat Newspaper web site from Belleville, Illinois. It is the hometown newspaper of this papers author. The site URL is http://www.bnd.com/ .…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    What would you most commonly do to reduce the potential risk from a threat/vulnerability pair?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Checkpoint

    • 1016 Words
    • 5 Pages

    Livingston made some mistakes initially. Describe at least two of them and provide how you would handle the situations.…

    • 1016 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Acc 225 Week 4 Checkpoint

    • 454 Words
    • 2 Pages

    List the steps in preparing a work sheet in their proper order by writing numbers 1 – 5 in the blank spaces provided.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 8 Checkpoint

    • 330 Words
    • 2 Pages

    People travel to many different places for many different reasons every day. One of the reasons why most people travel is to sight see. For many people seeing new places and things can be very exciting and entertaining. Very often people tend to sight see while doing of the things that almost every single one of us does and that’s going on vacation. Taking a vacation is one of the most common reasons that I think people travel. Whether you’re taking a vacation to simply get away from work, going to see a family member, or a romantic getaway most of do this at least once a year.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kessler International (2000, January 4). Employees, Not Hackers, Greatest Computer Threat. Retrieved December 13, 2003, from http://www.investigation.com/articles/library/2000articles/articles18.htm…

    • 4047 Words
    • 17 Pages
    Powerful Essays