T. J. Maxx breach - Research Paper Example

Comments (0) Cite this document
The most infuriating and annoying part of the TJX cyber security issues is that it could have been avoided because the way of encryption used for the wireless internet used by the company was an obsolete one (Stevens, 2010, p. 2).The cyber security incident of the TJX was the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
T. J. Maxx breach
Read TextPreview

Extract of sample "T. J. Maxx breach"

T. J. Maxx breach, Computer sciences and Information technology enter the Number or College 7th December, 2011.
• Major characteristics of incident and losses of confidentiality, integrity, and availability 
The most infuriating and annoying part of the TJX cyber security issues is that it could have been avoided because the way of encryption used for the wireless internet used by the company was an obsolete one (Stevens, 2010, p. 2).The cyber security incident of the TJX was the worst one for the customers, the banks and TJX itself. According to Matwyshyn (2009, p.9), losses of confidentiality, integrity, and availability are important because they are private and confidential data of the customers. Customers lose their confidence in the companies as well as they get the impression that company does not give importance to the protection of their private and confidential data. Due to the TJX breach not only TJX had to suffer but also different banks had to pay the penalty by reissuing the cards to their customers. Gifford (2009, p 65) states that the protocol in WEP was insecure as it was not encrypted properly. TJX Co. did not apply the obfuscation and encryption policies to protect the consumer data. The security software purchased by TJX was not implemented correctly by the IT department of TJX Co. weak firewall rules are also a major characteristic of the cyber security incident. TJX had to pay around $80 -$100 million as a cost of settlement. Hence, it is important to secure data instead to pay penalties (Matwyshyn, 2009, p.9).
• Technological improvements that would help prevent recurrence
According to Matwyshyn (2009, p.10), risk management is an important factor which should be implemented in order to prevent recurrence. This made the attack more vulnerable in nature as it did not have to undergo any type of hindrance. A chief information security officer should be allocated who has information of where the customer data is stored and moreover which of the third parties have access to it. Matwyshyn (2009, p.11) suggests that the external reports of the breach should be given importance. for example if a customer gets access to other customer’s data on a website and reports to the company then it should be checked instead of ignoring the issue. There should be regular monitoring of the customer data and its screening should also be done on regular basis. This helps keeping an eye on the usage of data and to remain up to date. The access to data by the employees should also be limited. According to Ballad, Ballad and Banks (2010, p.110) privileges and access to databases should be given only to the people related to information security of the organization. There should be an eye kept on the employees who want to access data, harm it or use it for some other purposes (Menn, 2010, p.179).
Hence, I conclude that with little check on the security systems of TJX the data theft could have been avoided. For future, the organization should encrypt its data and continuously check the weak links in the security systems. This would help in avoiding further such incidents as they are terrible for the company, customers and other associations related with it for example the banks.
Matwyshyn, A., M., (2009). Harboring data: information security, law, and the corporation, Stanford University Press. Vol. 20 (7), pp.9-11.
Gifford, N., (2009). Information security: managing the legal risks, CCH Australia Limited. Vol. 1, pp.65.
Stevens, G., (2010). Federal Information Security and Data Breach Notification Laws, CRS Report for Congress, pp. 2. Available at Retrieved December 7, 2011.
Ballad, B., Ballad, T., Banks, E., (2010). Access Control, Authentication, and Public Key Infrastructure, Jones & Bartlett Publishers. Vol.1, pp.110.
Menn, J., (2010).Fatal system error: the hunt for the new crime lords who are bringing down the Internet, Public Affairs. Vol. 1, pp. 179. Read More
Cite this document
  • APA
  • MLA
(“T. J. Maxx breach Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
T. J. Maxx breach Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from
(T. J. Maxx Breach Research Paper Example | Topics and Well Written Essays - 500 Words)
T. J. Maxx Breach Research Paper Example | Topics and Well Written Essays - 500 Words.
“T. J. Maxx Breach Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document



...? of the of the J&J Company The J&J Company manufactures the drug Tylenol which is used to cure flue and fever. However since it was first commercially released in the market, it has been in the limelight for various controversies. The reputation of the Company has greatly been tarnished by the stories of deaths which the drug had caused The J&J Company is faced with a dilemma because it cannot give direct warnings regarding specific organs as this would only cause confusion about the use of drug. Also they cannot mention about the risk of death on the warning label because people with suicidal tendencies may start using it. The drug...
1 Pages(250 words)Assignment

IPad's Security Breach

...accountable for the security breach that has transpired. In addition, ‘Gawker media’ never asked from AT&T regarding their position from the impact of the breach (Fpolom's blog, n.d). 3 Factors a CEO should consider Contemporary business tendencies are unified to expedite processes and functions by means of computing procedures. Organizations preserve mission critical data on servers that are protected by proficient hardware based or software based security applications on a truncated cost. CEO is committed to take actions after a security breach, as in case of Apple’s I pad following factors are obligatory to bear the consequences associated with it in a resourceful...
5 Pages(1250 words)Assignment

AT&T Breach of Contract Suit

...? Hendricks v. AT&T of Parties The parties in this case were Patrick Hendricks of Alameda County who was the plaintiff acting for himself and others similarly situated. For the purposes of the suit the plaintiff was a customer of the defendant. The defendant was AT &T MOBILITY LLC’S a company incorporated under the United States law. The company provides a full range of wireless, data services, messaging to consumers and also enterprise customers. After Verizon AT & T mobility services is the second largest wireless data and voice carrier in the United States. American journal on wireless voice and data carriers, 2011, shows that the company gives its services to an estimated 95 million...
6 Pages(1500 words)Research Paper

Data breach

...?According to Rouse, “A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so.” As such, this paper seeks to discuss the data breach of South Africa Police and evaluate its impact on different people affected by this action. Jason Boswell of eNCA reports that thousands of people have been left vulnerable after the South African Police Service (SAPS) website was hacked on 21 may 2013. This security breach is known as ‘hacktivism’ and this data breach has negatively affected the police service and other individuals involved. In this security breach,...
3 Pages(750 words)Essay

T. S. Eliot -- The Love Song of J. Alfred Prufrock

...of the English Literature ic and Modern) of the Teacher 11 December T.S. Eliot- The Love Song of J. Alfred Prufrock There is no denying the fact that The Love Song of J Alfred Prufrock happens to be one of the most well known poems of the 20th century. The poem consists of a dramatic monologue by the central character that is J. Alfred Prufrock, trying to come to terms with the social setup in which he is placed. In the poem T.S. Eliot presents Prufrock as an anti-hero who is timid, middle aged, unsure, indecisive and confused. The poet allows the reader to have an insight into Prufrock’s stream of consciousness that dangles forward and backwards, evincing psychological connections...
4 Pages(1000 words)Essay

T. S. Eliot: The Love Song of Alfred J Prufrock

...the eyes of a futile dilletante. The title, “The Love Song of J. Alfred Prufrock” sets the mood for the poem with its contrast between the alluring love song and the unromantic business signature of J. Alfred Prufrock. We shall now venture to analyze Eliot’s poem – the words love song taken from the title suggests conventional sentiment to readers, but this is immediately questioned by the curious name, J. Alfred Prufrock. This name is generally associated with a business card, not with a love song. There is some kind of secrecy and pretentiousness in the initial J, especially followed by the good old Anglo-Saxon Alfred which is frank, honest and open. The Pru in...
8 Pages(2000 words)Essay

Breach of EU Directive

...Breach of EU Directive The council of the EU adopted a directive 2004/222 in October 2004. This directive specified the maximum amount of nibline that could be used in food products. In particular, article 4 of this directive had specified that the amount of nibline that could be added to carrot juice was not to exceed 3 mg per litre. Moreover, article 6 of this directive had stipulated that by October 2006, the Member States had to limit the nibline content in the carrot juice sold. The UK government had instituted the carrot directorate to enforce the standards specified for carrot juice. In the year 2005, Grant enrolled at the Sunderland University, and resorted to consuming carrot juice, in order to cope up with the...
10 Pages(2500 words)Essay

IPad's Security Breach

... iPad’s Security Breach Introduction Recently controversy hit Apple’s iPad or more specifically the iPad’s cellular network, AT&T as a security research company, Goatse Security pointed out a flaw in the security system. Goatse Security, reported to Gawker that using a script available at AT&T’s website, they were able to hack into the iPad and retrieve email addresses of possibly 11,4000 people including top celebrities, politicians, media personalities and also military personal. AT&T was informed on the breach and corrected the issue within a few days. However Apple remained silent on the issue since the breach occurred on the side...
5 Pages(1250 words)Research Paper

Accounting Ethics Breach

...Accounting Ethics Breach: Case Study Accounting Ethics Breach: Case Study The recent decade witnessed a series of corporate scandals and bank failures as a result of poor corporate governance practices. The failures of corporate giants like Enron and WorldCom greatly insisted the corporate world to review the existing corporate governance principles and improve the transparency of corporate transactions. Hence, the current business and regulatory environment is more conducive to ethical behaviour than that of the past. In response to the recent accounting scandals such as Enron, Tyco International, Adelphia, Peregrine Systems, and WorldCom in the United States, the Federal government has enacted a law...
4 Pages(1000 words)Research Paper

T S Eliot The Love Song of J Alfred Prufrock

...Concerns in the Poem ‘The Love Song of J. Alfred Prufrock’ There are many concerns present in different verses of the poem that have been addressed by Eliot in the poem. Eliot uses poetic devices to put the thematic concerns into perspective. Some of the poetic devices used include metaphors, allusion, imagery, and juxtaposition to help the audience understand the core details of the poem. The devices confirm that Eliot is more concerned with something that is larger than a man’s obsession with a woman. The poem covers the idea of hell through the Dante’s Inferno epigraph. The allusion from Dante’s work presents the different levels of hell and use together with the central idea of the theme. Prufrock is depicted as a...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic T. J. Maxx breach for FREE!

Contact Us