Preview

KUDLER FINE FOODS

Better Essays
Open Document
Open Document
3315 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
KUDLER FINE FOODS
Kudler Fine Foods Security Report and System Review

Kudler Fine Foods Security Report and System Review
Introduction
Kudler Fine Foods is in the process of developing a customer loyalty program, and a related system to give rewards to their customers. We have been given the task of assisting the development team in creating mechanisms that facilitate information security
This paper serves to direct the development team along a pathway of security, with the intent to share information about the most secured manner to implement this project. It must first be acknowledged that for information to be secured, information security must be integrated into the SDLC from system inception. The early integration of security in the SDLC will enable Kudler Fine Foods to maximize return on investment in their security programs, through early identification and mitigation of security vulnerabilities and security configuration concerns, which may result in lower cost of security control implementation and vulnerability mitigation.
Goals and objectives
Our goals subject themselves to technology that are very direct when considering information security, showcasing specific objectives that conforms to a more secure platform that is different, yet similar to what Kudler Fine Foods development team is familiar with; exercising an advanced and cost effective methodology that is needed to efficiently secure data during and after the implementation of its new customer loyalty program. We aim to intelligently convey the vast significance of properly securing sensitive data, the importance of following policies and procedures that conform to security risk and mitigation methods. Our ultimate objective is to put in place a thorough information security system, which substantially and effectively reduces threats and vulnerabilities to all Kudler’s electronic information.

Platform change
An analysis of the current network infrastructure and software installations



References: Valacich, J. S., George, J. F., & Hoffer, J. A. (2012). Essentials of systems analysis and design (5th ed.). Upper saddle river, NJ: Prentice Hall Granneman, S. (2003, October 06). Linux vs. Windows Viruses. Retrieved September 11, 2013, from The Register: http://www.theregister.co.uk/2003/10/06/linux_vs_windows_viruses/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Team B has been commissioned to examine the Kudler Fine Foods’ (KFF), frequent shopper, Customer Loyalty Program that is currently in development. The team has also been asked to direct the system development team to ensure the system is established securely so that it properly protects company data and customer information throughout all stages of the system development process. In week 2, the team will examine the Customer Loyalty Program for vulnerabilities in different areas of the system. The study will define the possible threats that exist to the security of the organization’s and the customers’ data and information, the potential vulnerabilities each threat may exploit, and area of the system affected by the threats. Additionally, a summary of the most critical threats to Kudler’s Customer Loyalty Program will be provided.…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is, as defined by our text, “the process of establishing a user 's identity to enable the granting of permissions.” This is a rather simple definition of a process that has many different areas and permutations that it encapsulates and includes within its scope. In order to better illustrate the concepts and requirements of a viable information security plan, they will be applied to Kudler Fine Foods. The final analysis of the weaknesses and strengths in the current setup of Kudler Fine Foods information security setup will provide a good direction for the new policy to be implemented.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Final

    • 6639 Words
    • 27 Pages

    George, J. F., Hoffer, J. A., & Valacich, J. S. (2009). Essentials of System Analysis and Design…

    • 6639 Words
    • 27 Pages
    Powerful Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    Mobile use has become increasingly popular because of the advances in phone, tablet and laptop technology. Kudler Fine Foods must embrace this new technology not only to use it to further their business goals but to also address the security concerns that it poses. Allowing mobile use on the organizational network would mean using wireless connectivity, this opens up the network to a number of threats such as:…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Active Review #4

    • 552 Words
    • 3 Pages

    Information Systems Development and Information Security Management are two of the most common workflow in almost every business and organization. If information systems is development well and correctly, many benefits will occur, including increase productivity, reduce the stock of material production, eliminating activities, improve service and customer satisfaction (“Benefits of management,” 2012). Certainly, Information Security Management is critical in today’s business. Information security management raises awareness throughout the business for information security risks and organization will improve credibility and trust among internal stakeholder and external vendors (“Six Main Benefits”, 2012). Information Security Managements an Information Systems Development are explained in many ways.…

    • 552 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The emerging technology of today’s generation brought up the advancement of processes in people’s lives. Information technology (I.T.) is a more specific term that stresses the role of unified communication and the integration of telecommunication and computers (Murray, 2011). Specifically, computer is a general purpose device that can be programmed to carry out a finite set of arithmetic and logical operations. It lessens the tedious tasks carried out in manual based operations in the society. However, providing efficient security is still considered as one of the arising difficulties in information technology.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Security mechanisms are implanted to guarantee the confidentiality and integrity of the content, as well as the identity of the client and supplier.…

    • 2330 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    making eBay work

    • 4280 Words
    • 18 Pages

    Many companies in today’s competitive economic environment strive to meet customer’s security demands with a great challenge for meeting those expectations. Therefore, our company went a step further in its product innovation to provide the customers with their current needs and demands for improved security.…

    • 4280 Words
    • 18 Pages
    Powerful Essays
  • Best Essays

    Initially, accounting information systems were predominantly developed “in-house” as legacy systems. Such solutions were difficult to develop and expensive to maintain. Today, accounting information systems are more commonly sold as prebuilt software packages from vendors such as Microsoft, Sage Group, SAP and Oracle where it is configured and customized to match the organization’s business processes. As the need for connectivity and consolidation between other business systems increased, accounting information systems were merged with larger, more centralized systems known as enterprise resource planning (ERP). Before, with separate applications to manage different business functions,…

    • 2520 Words
    • 11 Pages
    Best Essays