Preview

Cmgt400 Week3

Better Essays
Open Document
Open Document
1493 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt400 Week3
CMGT400
Disaster Securing and Protecting Information
Introduction

Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner. Security authentication is, as defined by our text, “the process of establishing a user 's identity to enable the granting of permissions.” This is a rather simple definition of a process that has many different areas and permutations that it encapsulates and includes within its scope. In order to better illustrate the concepts and requirements of a viable information security plan, they will be applied to Kudler Fine Foods. The final analysis of the weaknesses and strengths in the current setup of Kudler Fine Foods information security setup will provide a good direction for the new policy to be implemented. After an analysis of Kudler Fine Foods potential problem security areas, a better and more detailed layout of the needs of Kudler and the steps that need to be taken in order to answer those needs. The steps outlined by the traditional model of the software development lifecycle will be the guiding outline to aid in the construction of an appropriate plan of attack to deal with the individual security needs a business like Kudler Fine Foods has for its projected security system. Through defining and enumerating the assets possessed by Kudler Fine Foods, a clearer picture of what may come to be under attack by outside forces will be seen to develop logically and in a comprehensive fashion. The following information disseminated by this paper will go to illustrate the potential flaws in a burgeoning information security system, as well as the steps to protect the same system, and what the future will most probably hold for the advancement of electronic security measures and countermeasures.
Threats



References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill. 2. Financial Times. (2011). Retrieved from http://74.6.238.254/search/srpcache?ei=UTF-8&p=industrial+espionage&type=723823&fr=chr-greentree_ie&u=http://cc.bingj.com/cache.aspx?q=industrial+espionage&d=4754198581283049&mkt=en-US&setlang=en-US&w=c6513897,8485017a&icp=1&.intl=us&sig=AdqFKEgeQYX8L6I.CV_rgw--#axzz1pgutTQxson March 20, 2012

You May Also Find These Documents Helpful

  • Good Essays

    Before any of this can take place, Kudler Fine Foods must consider the issues that can arise when implementing this rewards program. One issue is information security because it will be Kudler Fine Foods responsibility to keep all customer information confidential. If customers do volunteer for the rewards program, they are placing trust in Kudler Fine Foods. Kudler Fine Foods have to follow the privacy rights laws and be cautious of overwhelming customers with ads and phone calls.…

    • 806 Words
    • 4 Pages
    Good Essays
  • Better Essays

    This IT security report will go over the top security IT threats, security considerations, security policies, and awareness training. The security report will help the design team protect the new system from the threats that have been identified during the design phase of the new system. At the end of this report there will be provisions suggested that will help Kudler Fine Foods internal staff to help validate security measures once the new program is up and running so they can keep the system safe from hackers, attacks or any…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Service Request Sr-Kf-013

    • 744 Words
    • 3 Pages

    In this paper I will discuss how Kudler Fine Foods is in the process of developing a new frequent shopper program and describe the potential legal, ethical, and information security concerns related to the development of the Kudler Fine Foods Frequent Shopper Program. I would like to go into a little detail of the company, Kathy Kudler is the founder and owner of the company and their first location is located in La Jolla, San Diego CA. Kathy basically wanted a place from which people and chefs can purchase high end food and cooking tools for cooking. Kudler Fine Food has three store fronts and now expanding online as well. With this in mind can create many problems down the line for Kathy and from which I will explain.…

    • 744 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CMGT 575 Week 2 Summary

    • 348 Words
    • 2 Pages

    This file includes CMGT 575 Week 2 Individual Assignment SR-rm-004 Project plan of HR Integration of Riordan Manufacturing…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The first step Kudler must do is establish a rewards program for customers to evaluate the purchasing habits of customers. This is a basic form of market research, but it will be used to increase sales in certain demographic area. To gather such data, customer data must be performed legally with a strong consideration for customer privacy. Customers may choose to disclose or withhold personal information with Kudler Fine Foods. Customers who choose to disclose personal information will assist the company in increasing sales figures, whereas customers that withhold personal information will hinder the data the store needs to use for the reward program and will be unable to participate in the rewards program. Customers willing to share personal data will be protected in terms of privacy. The use of customer information for any other use not specified initially by the company may result in some form of legal action in relation to individual privacy and…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    CMGT/430 Week 4

    • 622 Words
    • 3 Pages

    Lafleur Trading Company, established in 1975, is a worldwide supplier of the finest foods and wines. With buyers dealing strictly with reputable producers and exporters, Lafleur Trading Company guarantees the highest quality products. Some concerns have surfaced about the direction the organization should take in regards to some key areas.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CMGT 575 Week 6 Summary

    • 385 Words
    • 2 Pages

    This work of CMGT 575 Week 6 Learning Team Assignment SR-kf-001 Project Final Presentation includes: Kudler Fine Foods - Coupons Project SR-kf-001…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Cmgt 430 Week 2

    • 1585 Words
    • 7 Pages

    University of Phoenix (2005). Huffman Trucking Service Request SR-ht-001. Materials section. Retrieved February 08, 2011, from https://ecampus.phoenix.edu/secure/aapd/cist/…

    • 1585 Words
    • 7 Pages
    Best Essays
  • Better Essays

    The program will record and save sensitive information along with their purchases. Without the protection of consumer privacy can result in the data getting compromised. There are many policies per law that Kudler Fine Foods need to follow to protect consumer rights. These polices include fair information guidelines for the promise to protect consumer information and the right to share with third parties. Consumers should be able to contact the company with any questions or concerns regarding the privacy of their information. Prior to signing up for the program, a descriptive privacy policy should be read, agreed, and signed by each customer. This will make certain the consumer is aware his or her information is kept secured and…

    • 892 Words
    • 4 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Security Concerns

    • 266 Words
    • 2 Pages

    It is because of the possibility that something like this could happen Kudler Fine Foods must maintain their current security system. For the safety of every customer, every employee, and even the future of the company, it is vital that this system stays in…

    • 266 Words
    • 2 Pages
    Satisfactory Essays