Kudler Fine Foods Security Report and System Review
Introduction
Kudler Fine Foods is in the process of developing a customer loyalty program, and a related system to give rewards to their customers. We have been given the task of assisting the development team in creating mechanisms that facilitate information security
This paper serves to direct the development team along a pathway of security, with the intent to share information about the most secured manner to implement this project. It must first be acknowledged that for information to be secured, information security must be integrated into the SDLC from system inception. The early integration of security in the SDLC will enable Kudler Fine Foods to maximize return on investment in their security programs, through early identification and mitigation of security vulnerabilities and security configuration concerns, which may result in lower cost of security control implementation and vulnerability mitigation.
Goals and objectives
Our goals subject themselves to technology that are very direct when considering information security, showcasing specific objectives that conforms to a more secure platform that is different, yet similar to what Kudler Fine Foods development team is familiar with; exercising an advanced and cost effective methodology that is needed to efficiently secure data during and after the implementation of its new customer loyalty program. We aim to intelligently convey the vast significance of properly securing sensitive data, the importance of following policies and procedures that conform to security risk and mitigation methods. Our ultimate objective is to put in place a thorough information security system, which substantially and effectively reduces threats and vulnerabilities to all Kudler’s electronic information.
Platform change
An analysis of the current network infrastructure and software installations
References: Valacich, J. S., George, J. F., & Hoffer, J. A. (2012). Essentials of systems analysis and design (5th ed.). Upper saddle river, NJ: Prentice Hall Granneman, S. (2003, October 06). Linux vs. Windows Viruses. Retrieved September 11, 2013, from The Register: http://www.theregister.co.uk/2003/10/06/linux_vs_windows_viruses/