Management of Information System Week 5 CheckPoint

Management of Information System Week 5 CheckPoint - One of...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
One of the security controls that TXJ had in place was a Wired Equivalent Privacy or WEP. The basic WEP specification calls for an access point and all of its users to share the same 40-bit encrypted password, which can be easily decrypted by hackers from a small amount of traffic (Laudon & Laudon, 2009). The weakness lies in how easy it is to hack into the system. All a hacker would have to do is wait for a few employees to access the network, and then they would be able to have the necessary information required to have access to the system. The fact that the kiosks did not have a firewall is also a weakness. You would think a computer that could be accessed by any member of the public would have at least had a firewall. TJX should have been more concerned about the possible security risk of letting just anyone use a piece of equipment that can access their network. I would not take the smartest person in the world to figure out that you could simply upload malicious file through the USB drive. Troubleshooting for possible security breaches is obviously something that TXJ did not spend enough time thinking about. A firewall you have greatly decreased the prospective security breach offered by kiosks located in each of the stores owned by TJX. An intrusion detection system may have been an effective piece of software for
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/29/2011 for the course IT 205 taught by Professor Kurts during the Spring '08 term at University of Phoenix.

Page1 / 2

Management of Information System Week 5 CheckPoint - One of...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online