Nobody downloaded yet

T. J. Maxx breach - Research Paper Example

Comments (0) Cite this document
Summary
The most infuriating and annoying part of the TJX cyber security issues is that it could have been avoided because the way of encryption used for the wireless internet used by the company was an obsolete one (Stevens, 2010, p. 2).The cyber security incident of the TJX was the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
T. J. Maxx breach
Read TextPreview

Extract of sample
"T. J. Maxx breach"

Download file to see previous pages Due to the TJX breach not only TJX had to suffer but also different banks had to pay the penalty by reissuing the cards to their customers. Gifford (2009, p 65) states that the protocol in WEP was insecure as it was not encrypted properly. TJX Co. did not apply the obfuscation and encryption policies to protect the consumer data. The security software purchased by TJX was not implemented correctly by the IT department of TJX Co. weak firewall rules are also a major characteristic of the cyber security incident. TJX had to pay around $80 -$100 million as a cost of settlement. Hence, it is important to secure data instead to pay penalties (Matwyshyn, 2009, p.9).
According to Matwyshyn (2009, p.10), risk management is an important factor which should be implemented in order to prevent recurrence. This made the attack more vulnerable in nature as it did not have to undergo any type of hindrance. A chief information security officer should be allocated who has information of where the customer data is stored and moreover which of the third parties have access to it. Matwyshyn (2009, p.11) suggests that the external reports of the breach should be given importance. for example if a customer gets access to other customer’s data on a website and reports to the company then it should be checked instead of ignoring the issue. There should be regular monitoring of the customer data and its screening should also be done on regular basis. This helps keeping an eye on the usage of data and to remain up to date. The access to data by the employees should also be limited. According to Ballad, Ballad and Banks (2010, p.110) privileges and access to databases should be given only to the people related to information security of the organization. There should be an eye kept on the employees who want to access data, harm it or use it for some other purposes ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“T. J. Maxx breach Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
T. J. Maxx breach Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1586104-t-j-maxx-breach
(T. J. Maxx Breach Research Paper Example | Topics and Well Written Essays - 500 Words)
T. J. Maxx Breach Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1586104-t-j-maxx-breach.
“T. J. Maxx Breach Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1586104-t-j-maxx-breach.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Friendship quality and social development and Effects of friendship on pro-social intentions and behavior by T. J. Berndt; Flow: The psychology of optimal experience by M. Csikszentmihalyi and others
The purpose of this research is to investigate the following works: “Friendship quality and social development” and “Effects of friendship on pro-social intentions and behavior” by T. J. Berndt; “Flow: The psychology of optimal experience” by M. Csikszentmihalyi; “Cognitive Psychology: A student’s handbook” by W. M. Eysenck, & M. T. Keane; “Psychology” by D.G. Myers and others.
4 Pages(1000 words)Research Paper
Public Administration and Analytical Observations on the works of T. J. Lowi
It also came to be believed that the prophesied Republican majority by Kevin Phillips in the late 1960s had come to reality. The Republicans under the leadership of Newt Gingrich and Rush Limbaugh brought three disparate groups on one platform, namely: the Entrepreneurial Republicans, the Evangelical Republicans, and the Eurocentric Republicans.
10 Pages(2500 words)Research Paper
J&J
The reputation of the Company has greatly been tarnished by the stories of deaths which the drug had caused The J&J Company is faced with a dilemma because it cannot give direct warnings regarding specific organs as this would only cause confusion about the use of drug.
1 Pages(250 words)Assignment
AT&T
AT&T’s new cell phone will be unique in the sense that it will offer features which are relatively not available in other phones. Considering this fact, this product will be targeted at the customers looking for more mobility while at the same time performing and completing their essential online tasks on the go.
2 Pages(500 words)Research Paper
AT&T T-MOBILE MERGER
One of the most notable mergers that have recently been announced involves AT&T and T-Mobile companies. AT&T is an American based telecommunication company that provides mobile telephony and data services (Kleinfield 13). On the other hand, T-Mobile is a German based firm with subsidiaries in Europe and US.
8 Pages(2000 words)Research Paper
AT&T Breach of Contract Suit
For the purposes of the suit the plaintiff was a customer of the defendant. The defendant was AT &T MOBILITY LLC’S a company incorporated under the United States law. The company provides a full range of wireless, data services, messaging to consumers and also enterprise customers.
6 Pages(1500 words)Research Paper
ENRON Ethical Breach
From 1985 to 2001, the company continued to gain favor and confidence in the stock market, leading to share prices rising to a staggering $90 per share. The company owned a diverse line of services and commodities such as gas pipelines, electricity plants, water plants, and internet services around the world.
4 Pages(1000 words)Research Paper
T. S. Eliot -- The Love Song of J. Alfred Prufrock
The poem consists of a dramatic monologue by the central character that is J. Alfred Prufrock, trying to come to terms with the social setup in which he is placed. In the poem T.S. Eliot presents Prufrock as an anti-hero who is timid, middle aged, unsure, indecisive and confused.
4 Pages(1000 words)Essay
Physician Responsibilities and A Breach of Contract
The physician should write a notice to the patient for contact termination depending on the needs of the patient. Legal termination of the contract involves making sure that the patient finds another physician to attend them. After the contract termination, the physician
2 Pages(500 words)Research Paper
Does the salary of human resource managers depend on the sex
Male and female human resource managers are assumed to be earning equal salaries yet there is no sufficient evidence to prove this claim. Thus, from a data of independent samples of ten females and ten males, their salaries are collected and recording independently.
2 Pages(500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Research Paper on topic T. J. Maxx breach for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us