Kudler Fine Foods Security Report
Autor: failinggeek • November 30, 2015 • Essay • 2,120 Words (9 Pages) • 1,011 Views
Kudler Fine Foods Security Report
CMGT400
10/19/15
David Kell
Kudler Fine Foods Security Report
Kudler Fine Foods is an upscale food store located in San Diego, CA. It is a thriving business that upholds a reputation for carrying the best products from around the world. It has three locations La Jolla, Del Mar, and Encinitas. Each location carries the best domestic and imported fare. It has a large selection of:
• Fresh Produce
• Pastry Products
• Fresh Meat & Seafood
• Special Dairy Products
Kudler Fine Foods wants to develop a new rewards program that benefits loyal customers who have been shopping with them over time. The program rewards shoppers that have been loyal to the store and returns them with discounts and merchandise. The program will also evaluate the customers' history of purchases and suggest other items that they might be interested Not only does the program benefit customers, but also it increases the customer base.
As the customer database increases, there must be a security structure that can protect the customers' information to respect their privacy. Kudler Fine Foods wants to maintain their reputation and protect their information and assets. Kudler Fine Foods has picked Team B for the project. Team B will do an assessment, identify all threats, analyze and provide security measures to prevent risks and protect information and assets.
Security threats are major concerns for every organization. It is a top priority to protect sensitive data and assets. There are many different types of threats and they can range from human error, physical theft, and network and system threats. Since Kudler Fine Foods is implementing a new program their database has been growing and needs Team B to identify all top threats, the vulnerabilities and potential risks.
Area of System Threats Potentials Vulnerability
Network Vulnerabilities Vulnerabilities allow access by unauthorized users Improper network administration could leave a client data vulnerable to theft.
Employee authentication
Unauthorized users we have access to the system Unauthorized user may access the company's secured network and steal valuable information
Customers information
Customers personal information may be leaked and viewable to the public The customer's' personal information may be leaked
...