preview

Tjx Security Breach Essay

Good Essays

The TJX companies breach has been labeled the largest data breach in the history of security breach and the ultimate wake up call for corporations (Dash, 2007). TJX is the parent company of chains such as TJ Maxx, Marshalls, Homegoods, and a host of retail stores across the US and Canada. In January 2007, it was discovered that hackers stole as many as 200 million customer records due to a failed security system by TJX which resulted in a $4.8 billion dollars’ worth of damages (Swann, 2007). It is said that the breach occurred because they did not have any security measures in place to protect consumer’s data such as their debit cards, credit cards, checking account information, and driver’s license numbers. Reports identified three major …show more content…

In fact, researchers at Darmstadt Technical University in Germany have demonstrated that a WEP key can be broken in less than a minute (Berg, Freeman, & Schneider, 2008). More important, WEP does not satisfy industry standards that require the use of the much stronger WPA (Wi-Fi Protected Access) protocol (Berg, Freeman, & Schneider, 2008). First, they broke into the store’s network and stole employees’ usernames and password, which they were able to gained access to the TJX main database at the corporate headquarters and use those credentials to create their own accounts within the employee database. Once they gain entry into the corporate network, they were able to breach security and gather credit card numbers, and any customer information they wanted. The consumer information was compromised for approximately 18 before TJX became aware of what had been happening. The TJX data storage practices also appear to have violated industry standards. Reports indicate that the company was storing the full-track contents scanned from each customer's card (Swann, 2007). Additionally, customer records seem to have contained the card-validation code (CVC) number and the personal identification numbers (PIN) associated with the customer cards. PCI Data Security Standard 3.2 clearly states that after payment authorization is received, a merchant is not to store sensitive data, such as the CVC, PIN, or full-track information (Berg, Freeman, & Schneider,

Get Access