CheckPoint TXJ Companies

CheckPoint TXJ Companies - CheckPoint: TXJ Companies From...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CheckPoint: TXJ Companies From what I read, the only thing they used WEP encryption (easy to hack) on wireless devices. They had several weaknesses. First would be the fact that they allowed individuals to put USB devices into their computers, they should have had these computers housed in something that cannot be reached (much like playable game consoles at a store). Secondly, they had no firewalls preventing data from these stores going out to the main company. They could have had something set up where access to records could not be accessed from specific computers (maybe some kind of IP or MAC address filtering). Also there wireless routers or whatever they used had WEP encryption, this is the most basic and oldest used WAN encryption method. They could have at least used WPA, although still crackable but harder to do nonetheless. They also had no virus scanning software on their computers. I’m fairly sure that company licensed virus software has a network scan capability. The master computer scans every computer on a
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/14/2011 for the course IT 205 taught by Professor Kurts during the Spring '08 term at University of Phoenix.

Page1 / 2

CheckPoint TXJ Companies - CheckPoint: TXJ Companies From...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online