Checkpoint - TXJ Companies

Checkpoint - TXJ Companies - Running head: CHECKPOINT - TXJ...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Running head: CHECKPOINT - TXJ COMPANIES 1 Checkpoint - TXJ Companies Lori J. Babler IT205 July 15, 2010 Daniel Dronsick
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CHECKPOINT - TXJ COMPANIES 2 Checkpoint - TXJ Companies The security controls in place at the time of TXJ Company’s credit card data theft were as follows: Firewalls – A combination of hardware and software used to control the flow of incoming and outgoing network traffic. It acts as a gatekeeper and examines the credentials of each user prior to allowing access to the network. WEP – Wired Equivalent Policy encryption system – Data encryption system used to secure data that requires user activation before it can be effective. It also requires that a unique SSID be assigned and that specific instructions to not broadcast be sent to the router. I found that the company’s weaknesses at the time of this theft included the poorly secured and monitored retail store computer kiosks, which provided access to open and available USB ports and the data within the internal corporate network. I also believe that the improperly
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

Checkpoint - TXJ Companies - Running head: CHECKPOINT - TXJ...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online