.

Saturday, April 20, 2019

T. J. Maxx breach Research Paper Example | Topics and Well Written Essays - 500 words

T. J. Maxx breach - Research Paper mannequinDue to the TJX breach not only TJX had to suffer but also different banks had to pay the penalization by reissuing the cards to their clients. Gifford (2009, p 65) states that the protocol in WEP was insecure as it was not encrypted properly. TJX Co. did not follow through the obfuscation and encryption policies to protect the consumer data. The security software purchased by TJX was not implemented correctly by the IT department of TJX Co. weak firewall rules are also a major characteristic of the cyber security incident. TJX had to pay nearly $80 -$100 million as a cost of settlement. Hence, it is important to secure data rather to pay penalties (Matwyshyn, 2009, p.9). agree to Matwyshyn (2009, p.10), risk management is an important factor which should be implemented in line of battle to prevent recurrence. This made the attack more vulnerable in nature as it did not adjudge to undergo any type of hindrance. A chief discipline sec urity officer should be allocated who has information of where the customer data is stored and moreover which of the third parties have access to it. Matwyshyn (2009, p.11) suggests that the external reports of the breach should be disposed importance. for example if a customer gets access to other customers data on a website and reports to the company then it should be checked instead of ignoring the issue. on that point should be regular monitoring of the customer data and its screening should also be done on regular basis. This helps keeping an eye on the usage of data and to remain up to date. The access to data by the employees should also be limited. According to Ballad, Ballad and Banks (2010, p.110) privileges and access to databases should be given only to the people related to information security of the organization. There should be an eye kept on the employees who want to access data, harm it or use it for nigh other purposes

No comments:

Post a Comment