The TJX Companies, Incorporated is based in Framingham, Massachusetts. It is originally evolved from the Zayre discount department store chain. In 1988, Zayre sold the depatrtment store and renamed the company as The TJX Companies, Incorporated. The first branch of T.J Maxx was opened in 1976. And it moved up to 141st in the Fortune 500 rankings in 2004. In 2009, it became the largest international apparel and home fashions off-price company in the United States.
The TJX Companies, Incorporated has stores and brands over US, UK and Canada. It also stocked a wide range of goods, such as jewelry, furniture, clothes and footwear, etc. The target customer groups of the company are the middle and upper middle women.
In 2006, TJX suffered from security problem, up to 45 million credit and debit card numbers was stolen, due to the security weakness of the ...view middle of the document...
WEP is a security algorithm for IEEE 802.11 wireless networks. Its intention is to provide data confidentiality comparable to tat f a traditional wired network. WEP is widely in use. There are two methods of authentication for WEP, Open authentication and Shared Key authentication. WEP shares one single WEP key between every node on the network. That means the WEP key for the access points is the same with the client stations.
The second security control is the installment of firewall. Firewall is a device designed to permit or deny network transmissions based upon a set of rules and is frequently used to prevent unauthorized or unwanted communications between computer networks or host while permitting legitimate communication to pass. Nowadays, many personal computer operating systems has already included firewall in the package. Many routers that pass data between networks contain firewall components and many of the firewall can perform basic routing functions.
The third security control is the data encryption. Data encryption is to transform information or plaintext using an algorithm. It is used to make the information unreadable to others and protect data in transit. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read the information.
The forth security control is the purchase of security software. Other layer of security software provides the company another layer of security. This extra layer of security helps to prevent hackers to steal the company’s information and data.
The major issue in TJX is the security weakness. TJX faced the worst data lost in 2006. TJX reported there was up to 45million credit and debt card record lost due to the security weakness. The security weakness in TJX mainly because the company did not use the most updated and advanced security algorithm, only install firewall and have data encryption in some of the computer but not all and the security software purchased were not installed properly. These will be further discussed in the following section.