This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: CheckPoint Week 5 The TJX Corporation had very outdated security software to protect their systems and the information that was contained within them. This case provided information that TJX was negligent in providing accurate security measures. A hacker was able to gain easy access to the terminal that was provided for store clients to use and connect a USB Drive that allowed the hacker to gain access to the system and the internet which was also connected to the corporate server. The company believed since this system was for client services there was no chance of a breach and was left with little to no security protection. According to the report, TJX failed to utilize proper firewalls to keep suspicious traffic from entering the system and was using outdated security software for their wireless network which allowed the hacker to intercept data that was being transmitted. The wireless network which allowed the hacker to intercept data that was being transmitted....
View Full Document
This note was uploaded on 04/17/2011 for the course IT 205 taught by Professor Kurts during the Fall '08 term at University of Phoenix.
- Fall '08