TXJ Companies - List and describe the security controls in...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
List and describe the security controls in place. Where are the weaknesses? What tools and technologies could have been used to fix the weaknesses? What was the business effect of TXJ’s data loss on TXJ, consumers, and banks? Which moral dimensions may be applied in this situation? How? The only security controls TJX had in place was an old Wired Equivalent Privacy encryption system also known as (WEP). Wired Equivalent Privacy is a security protocol for wireless local area networks (WLANs). They had over several vulnerable entry points in TJX corporate system. One was a computer kiosk which was located in many of TJX’s retail stores, the ones people use to apply for a job. Which, in turn provide direct access to the company’s internal corporate network system. Hackers could have opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. Another entry point was wireless. The hackers may have used mobile data access
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

TXJ Companies - List and describe the security controls in...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online