1. List and describe the security controls
and weaknesses at TJX Companies
TJX used Wired Equivalent Privacy (WEP) encryption system which was easy for hackers to attack. Furthermore, TJX had neglected to install firewalls and data encryption on many of the computers in the wireless network. Besides, TJX transmitted credit card details to banks without encryption, violating credit card com
security transaction performance by 5 times, and reduce server load.
3. SOFTWARE
3.1 Web Software_ WISELOG
G market uses CRM software named “Wiselog” provided by “Nethru” company. This program analyzes click pattern, key words, influx/purchase scenario, and many other data. It also manages and provides various measuring indexes using packet sniffing, script way, and server log way.
전자상거래(Electronic Commerce : EC)에 대한 개념정의에 대해서는 아직까지 명확하게 정립되지 않았다. 또한 어느 범위까지를 전자상거래에 포함시켜야 할지에 대해서도 아직 논의단계이다. 그러나 대체로 전자상거래라 함은 정보통신망의 개념이 통신수단으로서의 의미를 넘어 시장이라는 개념으로 확대
Security Controls
and Weak-nesses
Security was so lax at the TJ Maxx outlet located in Lawrence, Kansas, that employees were able to log onto company servers using blank passwords, the fired employee, Nick Benson, told The Register
WEP
TJX used Wired Equivalent Privacy (WEP) encryption system which was easy for hackers to attack
Fire walls
TJX had neglected to install firewalls and data e
data is not only huge, but also has various styles
and fast circulation speed. It is hard to manage and analysis
in existing technologies.
3 components of Big Data- 3V
Volume
Variety
Velocity
Volume
It is increasing that even general companies handle data
size of terabyte ~ petabyte.
Among the us companies, there are more than one third of
corporations secur