StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

T. J. Maxx breach - Research Paper Example

Cite this document
Summary
The most infuriating and annoying part of the TJX cyber security issues is that it could have been avoided because the way of encryption used for the wireless internet used by the company was an obsolete one (Stevens, 2010, p. 2).The cyber security incident of the TJX was the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
T. J. Maxx breach
Read Text Preview

Extract of sample "T. J. Maxx breach"

T. J. Maxx breach, Computer sciences and Information technology enter the Number or College 7th December, 2011.• Major characteristics of incident and losses of confidentiality, integrity, and availability The most infuriating and annoying part of the TJX cyber security issues is that it could have been avoided because the way of encryption used for the wireless internet used by the company was an obsolete one (Stevens, 2010, p. 2).The cyber security incident of the TJX was the worst one for the customers, the banks and TJX itself.

According to Matwyshyn (2009, p.9), losses of confidentiality, integrity, and availability are important because they are private and confidential data of the customers. Customers lose their confidence in the companies as well as they get the impression that company does not give importance to the protection of their private and confidential data. Due to the TJX breach not only TJX had to suffer but also different banks had to pay the penalty by reissuing the cards to their customers. Gifford (2009, p 65) states that the protocol in WEP was insecure as it was not encrypted properly. TJX Co. did not apply the obfuscation and encryption policies to protect the consumer data.

The security software purchased by TJX was not implemented correctly by the IT department of TJX Co. weak firewall rules are also a major characteristic of the cyber security incident. TJX had to pay around $80 -$100 million as a cost of settlement. Hence, it is important to secure data instead to pay penalties (Matwyshyn, 2009, p.9).• Technological improvements that would help prevent recurrence According to Matwyshyn (2009, p.10), risk management is an important factor which should be implemented in order to prevent recurrence.

This made the attack more vulnerable in nature as it did not have to undergo any type of hindrance. A chief information security officer should be allocated who has information of where the customer data is stored and moreover which of the third parties have access to it. Matwyshyn (2009, p.11) suggests that the external reports of the breach should be given importance. for example if a customer gets access to other customer’s data on a website and reports to the company then it should be checked instead of ignoring the issue.

There should be regular monitoring of the customer data and its screening should also be done on regular basis. This helps keeping an eye on the usage of data and to remain up to date. The access to data by the employees should also be limited. According to Ballad, Ballad and Banks (2010, p.110) privileges and access to databases should be given only to the people related to information security of the organization. There should be an eye kept on the employees who want to access data, harm it or use it for some other purposes (Menn, 2010, p.179). Hence, I conclude that with little check on the security systems of TJX the data theft could have been avoided.

For future, the organization should encrypt its data and continuously check the weak links in the security systems. This would help in avoiding further such incidents as they are terrible for the company, customers and other associations related with it for example the banks.ReferencesMatwyshyn, A., M., (2009). Harboring data: information security, law, and the corporation, Stanford University Press. Vol. 20 (7), pp.9-11.Gifford, N., (2009). Information security: managing the legal risks, CCH Australia Limited. Vol. 1, pp.65.Stevens, G., (2010). Federal Information Security and Data Breach Notification Laws, CRS Report for Congress, pp. 2. Available at http://www.fas.org/sgp/crs/secrecy/RL34120.pdf. Retrieved December 7, 2011.Ballad, B., Ballad, T.

, Banks, E., (2010). Access Control, Authentication, and Public Key Infrastructure, Jones & Bartlett Publishers. Vol.1, pp.110.Menn, J., (2010).Fatal system error: the hunt for the new crime lords who are bringing down the Internet, Public Affairs. Vol. 1, pp. 179.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“T. J. Maxx breach Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
T. J. Maxx breach Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1586104-t-j-maxx-breach
(T. J. Maxx Breach Research Paper Example | Topics and Well Written Essays - 500 Words)
T. J. Maxx Breach Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1586104-t-j-maxx-breach.
“T. J. Maxx Breach Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1586104-t-j-maxx-breach.
  • Cited: 0 times

CHECK THESE SAMPLES OF T. J. Maxx breach

The God that Failed: A Marxist Perspective on the Financial Crisis

The paper "The God that Failed: A Marxist Perspective on the Financial Crisis" highlights that Marx's writings shed light on what his idea of a solution to the problem would be, assuming Marx would be personally unaffected by the tremendous disaster of these principles being put into practice....
7 Pages (1750 words) Coursework

Sociology: Max Weber

The author focuses on Max Weber who was born and raised in Germany during the mid-1800s.... His father was a politician in the National Liberal Party, the Germany branch, and was also a civil servant.... His mother had absolutions ideas, which were what inspired the thoughts and writings of Max Weber....
1 Pages (250 words) Assignment

Beach Trinkets E-Mail Policy

The objective of this document is to ensure that the company's e-mail system is not used inappropriately.... This policy is meant to lay the guidelines for what company deems as acceptable and unacceptable use.... The purpose of this policy is to prevent such use of the e-mail system.... hellip; An e-mail sent through the company e-mail id will be seen as an official company statement....
4 Pages (1000 words) Essay

The Extensity of Capitalism

The paper "The Extensity of Capitalism" highlights that capitalism created a detailed division of labor in each branch of production.... This required laborers to specialize in particular activities.... With this kind of system, laborers became increasingly dependent on the capitalists.... hellip; The feudalism landownership system was, however, different from the perspective of capitalism dynamics....
5 Pages (1250 words) Essay

Promotional Campaign of Pepsi Max

 This paper is based on the promotional campaign of Pepsi Max “Unbelievable” campaign.... The company launched the “Unbelievable” campaign to promote the new product named Pepsi Max, which is a low-calorie sugar-free soft drink.... hellip; This research will begin with the statement that PepsiCo is one of the best known soft drinks and beverage firm in the world....
12 Pages (3000 words) Essay

Social Thought and Social Change

The paper "Social Thought and Social Change" presents views of different philosophers and scientists on key concepts of classical perspectives and stages of development.... Among them are Kant, Max Weber,  Jesus Mosterin, Adam Smith and his view on labour division, Emile Durkheim and many others,… Enlightenment movement started by the intellectuals of 18th century whose critics towards the European culture including political, social and economical structures, attitudes toward the humankind, the dominant doctrines and institutions of Christianity created a big impact....
6 Pages (1500 words) Assignment

Karl Marx Theory of Social Class

The paper "Karl Marx Theory of Social Class" describes that the difference in resource ownership among individuals in society remains the major source of social differences in society.... Even in the most democratic nations, gender and economic differences continue to dominate.... hellip; The issue of social stratification is amplified by gender inequalities....
8 Pages (2000 words) Essay

Classical Social Theory

This paper under the headline "Classical Social Theory" focuses on the fact that the future society refers to the union of all human beings through modern environments and powerful experiences that cut across geographical and ethnic boundaries, nationality, and class.... nbsp;… Understanding the future society has proven to be a daunting task for social theorists....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us