Preview

Case Study Of Kudler Fine Foods IT Security Report: Top Threats

Satisfactory Essays
Open Document
Open Document
377 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study Of Kudler Fine Foods IT Security Report: Top Threats
Kudler Fine Foods IT Security Report – Top Threats
Anthony Bynum, Sally Lowe,
CMGT400
19 January 2015
David Kell
Kudler Fine Foods IT Security Report – Top Threats
The following table represents the potential threats that Kudler Fine Foods could face if the appropriate measures are not taken.

Area of System
Threats
Potential Vulnerability
Intranet Web Site
Theft of Sensitive Data
No login procedures to prevent unauthorized access.
Financing & Accounting
(Budgets Page)
Embedded Malicious Code
Links to downloadable files and media could be replaced with malicious code and hackers could gain access and monitor activity within the company.
Financing & Accounting
(Procedures Page)
Theft of Money Physically and by Electronic Means
Employees


You May Also Find These Documents Helpful

  • Good Essays

    Kudler Fine Foods is a small business that is looking for exceptional ways to expand and broaden their business. Goddard and Associates have been hired to review their current systems of both business and accounting to see what areas of hardware and software can be upgraded for the company to perform better and more effectively. Kathy Kudler, the founder and owner of Kudler Fine Foods, prides herself in the company’s mission statement. “Kudler Fine Foods is committed to providing our customers with the finest selection of the very best foods and wines so that your culinary visions can come true” (Kudler Fine Foods, Strategic Plan, pg 3).…

    • 936 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Kudler Fine Foods is a company that is looking to expand and integrate their accounting software. Accuracy and the ability to have all locations communicate are essential in the decisions of the direction the company. Software that caters to the majority needs of the company will facilitate the recording process and increase the accuracy of such action. There are several types of accounting information systems the company could use. Each type has their advantages and disadvantages on the development and usage of the software. The company has many issues to consider in deciding which…

    • 1064 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Kudler Fine Foods has reached a point in their growth that they need to enhance the systems they are currently using for processing their financial information. It is necessary for Kudler to make some decisions on these upgrades. The recommended automation, enhancement, and maintenance schedules supported by flowcharts show the data flow for each of the four accounting upgrades for payroll, accounts payable, accounts receivable, and inventory are included within the brief. The accounting operations of Kudler Fine Foods will be enhanced by the addition of the new software to their existing system.…

    • 699 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Risk management plan is a useful tool that prepares organizations for major changes. Most businesses have fallen short because the lack of preparation. Kudler Fine Foods must always be aware of any problems or changes that may occur and have a contingency plan on hand. Those changes can create other alternatives. Kathy must be able to identify and understand any changes or risks. Lack of changes can keep all tasks and other projects on time and within its budget. Most risk management plans fall short because of the lack of time for research and other problem-solving tools. To stay with its time frame, Kathy Kudler must keep all research within her budget. This means making sure that all materials are ordered at a certain time, keeping the salaries within the approved budget, and staying within the budget on the opening stages of…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When working with reports and company information, data tables are great visual aids and very helpful. Data tables presents information in an organized format. A more detailed data table is more commonly used in order to be able to make a report effective. Kudler Fine Foods uses a basic data table to represent their Inventory Report. The design element is very basic with improvement being needed.…

    • 547 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Kudler Fine Foods was established 1998 in La Jolla, CA by Kathy Kudler. Although Kathy has seen much success with her business she is also experiencing difficulties. Some of the areas of the business she is experiencing difficulties with include the Del Mar location is not performing as expected, some of the employees are underpaid, and Kathy has too many responsibilities (Kudler, 2003).…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A marketing analysis conducted for the Kudler Fine Foods to obtain a complete and comprehensive review of the…

    • 1058 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Keown, A. J., Martin, J. D., Petty, J. W., & Scott, D. F. (2005). Financial management:…

    • 2183 Words
    • 9 Pages
    Better Essays
  • Better Essays

    The program will record and save sensitive information along with their purchases. Without the protection of consumer privacy can result in the data getting compromised. There are many policies per law that Kudler Fine Foods need to follow to protect consumer rights. These polices include fair information guidelines for the promise to protect consumer information and the right to share with third parties. Consumers should be able to contact the company with any questions or concerns regarding the privacy of their information. Prior to signing up for the program, a descriptive privacy policy should be read, agreed, and signed by each customer. This will make certain the consumer is aware his or her information is kept secured and…

    • 892 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Bsa 310 Week 2

    • 653 Words
    • 3 Pages

    In order to start this process Kudler Fine Foods will need certain elements that must be deployed before hand; we will be discussing the legal, ethical, and security consideration for the development of this program to launch. And we will combine the separate entities into an operational system in order to track purposes of individual customers this way we are able to track the customers loyalty points for redemption for specialty foods and gift items and other products made available by our partnership companies.…

    • 653 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The current strategies in Human Resources are keeping Kudler from expanding, improving sales, and are not adequately compensating employees.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    - Growth market thanks to the development of cybercrime industry and the fact that more and more people use the Internet…

    • 872 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The biggest risks are from tech savvy vendors and customers applying a DOS attack amongst other types of attacks and internal non – compliance. VPN’s also can pose a viable threat if infiltrated. Wireless network, server farms, etc.…

    • 460 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Copyright law applies to all information that is available to view and be stored. It applies to music downloads, personal details, medical history, financial records, and protects a company or creator from plagiarism and theft of owned ideas and work. When referencing someone else’s work it is important to acknowledging sources such as websites or books used. This also applies to images taken from imaging sites unless bought through stock photography. Electronically, access to information can be restricted and permissions granted to only those chosen by the authority, an example of this is an HR folder in a company network. Only authorised members of the HR department would have access to the folder and its contents as it would contain personal and confidential information. A person or a business proven to be breaking the Data Protection Act and Copyright laws will be heavily fined and can face a prison sentence.…

    • 1321 Words
    • 5 Pages
    Powerful Essays

Related Topics