Unformatted text preview: T XJ
T he only real security that I really seen in the reading was them having the old style w ireless equivalent privacy encryption also known as WEP. They lacked any real firewall p rotection, there password protection methods were outdated, and under run. They were not even following mandatory regulations given by the credit card company on disposal of sensitive information. I don’t believe that they had a technician to monitor the system, m aking sure i t was up to date, and watching for and securing breaches. Some tools that could have prevented this would be a more secure network. A network t hat didn’t allow a connection through the kiosks would have been a great safeguard. Better f irewalls and passwords that were not the same as vendor users would have prevented the i nt ruders from gaining so much access so quickly. There should have also been some encryption software in play. This would have encrypted sensitive data while it was being p rocessed and t ransferred online. T he effect of the breach and theft left many organizations with a money loss and bad customer relations. Some organizations were unable to refund the money back that was spent at their establishment. The consumers were impacted by the amount of debt that was a ttached to their name by the fraudulent use of their credit cards. The banks lost thousands d ue to replacing funds that were used for purchases during the identity theft. For many banks there was no refund of money from businesses where the money was spent. TJX also lost customers, probably credit card contracts, not to mention lawsuits, and loss of business. Some dimensions that could come into effect would be Information Rights; TXJ should have taken more steps towards safeguarding the information of the consumers. They were entrusted with information and morally protecting that information should have been more i mportant than i t seems i t was. I also think that Accountability and Control comes into p lay. TXJ should be held accountable for the loss, they were not keeping the standards up to date to safeguard valuable information, and as a result there was a major fraudulent crime. T hey lacked the responsibility to ensure the protection of thousands of people, and their money. ...
View Full Document
This note was uploaded on 03/21/2011 for the course COMP 205 taught by Professor Jon during the Spring '11 term at AUP.
- Spring '11