CheckPoint Week 5

CheckPoint Week 5 - CheckPoint Week 5 The TJX Corporation...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CheckPoint Week 5 The TJX Corporation had very outdated security software to protect their systems and the information that was contained within them. This case provided information that TJX was negligent in providing accurate security measures. A hacker was able to gain easy access to the terminal that was provided for store clients to use and connect a USB Drive that allowed the hacker to gain access to the system and the internet which was also connected to the corporate server. The company believed since this system was for client services there was no chance of a breach and was left with little to no security protection. According to the report, TJX failed to utilize proper firewalls to keep suspicious traffic from entering the system and was using outdated security software for their wireless network which allowed the hacker to intercept data that was being transmitted. The wireless network which allowed the hacker to intercept data that was being transmitted....
View Full Document

This note was uploaded on 04/17/2011 for the course IT 205 taught by Professor Kurts during the Fall '08 term at University of Phoenix.

Page1 / 2

CheckPoint Week 5 - CheckPoint Week 5 The TJX Corporation...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online