Preview

Kudler Fine Foods IT Security Report and Presentation – Top Threats

Good Essays
Open Document
Open Document
745 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kudler Fine Foods IT Security Report and Presentation – Top Threats
Kudler Fine Foods IT Security Report and Presentation – Top Threats

CMGT/400
December 2, 2013

Kudler Fine Foods IT Security Report and Presentation – Top Threats
Team B has been commissioned to examine the Kudler Fine Foods’ (KFF), frequent shopper, Customer Loyalty Program that is currently in development. The team has also been asked to direct the system development team to ensure the system is established securely so that it properly protects company data and customer information throughout all stages of the system development process. In week 2, the team will examine the Customer Loyalty Program for vulnerabilities in different areas of the system. The study will define the possible threats that exist to the security of the organization’s and the customers’ data and information, the potential vulnerabilities each threat may exploit, and area of the system affected by the threats. Additionally, a summary of the most critical threats to Kudler’s Customer Loyalty Program will be provided.
The following table presents the possible threats, the potential vulnerabilities each threat may exploit, and area of the system effected by the threats:
Area of Systems
Threat
Potential Vulnerability
Networks
Unauthorized access
Unsecured equipment room

Confidentiality breach
E-mail that doesn't employ scanning of messages

Denial of Service
Lack of inside firewall can lead to worm spread

Natural Disaster
Potential issues from lack of redundancy

Sniffing
Network infiltration via wireless access point
Workstations
Unauthorized access
Patches not current

Sniffing
Old software versions

Natural Disaster
Firewall not active
Servers
Unauthorized access
Patches not current

Sniffing
Old software versions

Natural Disaster
Firewall not active
Employees
Social Engineering
Training not current

Corruption
Unhappy

Malicious behavior poor work ethic
Data
Corruption
Non secured

Deletion

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Links to downloadable files and media could be replaced with malicious code and hackers could gain access and monitor activity within the company.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    For starters Kudler will need to have a way for their customer’s information to be stored and securely kept. They will most likely use some sort of paper application to start up the program per customer. The application will be very generic and should only consist of things that may already be public knowledge, ie, first and last name, home phone number along with address. All this information will be entered into a database and the paper application will be destroyed. The customers will then be issued a “Customer Loyalty Card”. The card will have the customer’s name only on it along with an encrypted barcode, which will still only contain the customer’s basic information. The barcode will also be able to store and send the purchases back to corporate office to customer purchase tracking can begin. The system will be set up similarly for customers who shop on-line and prefer to register on-line for a “Customer Loyalty Card” that way security is still maintained. EMC offers a Frequent Shopper Application Processing application that can convert paper records into digital files and stores the information. This program will capture the POS (point of sales) information, which can also be used to track loyalty points. (EMC)…

    • 671 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    KUDLER FINE FOODS

    • 3315 Words
    • 14 Pages

    Kudler Fine Foods is in the process of developing a customer loyalty program, and a related system to give rewards to their customers. We have been given the task of assisting the development team in creating mechanisms that facilitate information security…

    • 3315 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    In the late of 2013, we start hearing the scandal that our customers’ personal information is leaking. The customer private information including customer’s name, phone number, home address, and even credit card information. Our customers entered their private information when purchasing our products online at target.com, and registering for our loyal reward card REDcard. According to the latest customer survey in United States, there are around 189.4 million digital shoppers in 2013 and will be expected 210.2 million digital shoppers in 2017 (Statista, 2014). From the feedback in stores, about 20% customers use REDcard to pay for their purchase…

    • 2317 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Data security would be a method that corporations use to keep important and confidential information protected. Access to this type of secure information is limited to those who have the authorization to view it. Data security is enforced so that private information that a corporation has about its employees, customers and others that they conduct business with is kept safe from any potential corruption from those who want to use it to their advantage. Many companies go to great lengths to keep their data safe and sound from hackers who can get confidential information from their systems. If a company is not careful and does not protect their confidential information many problems can occur. Some of these problems include identity theft of customers and employees. Hackers can steal information such as social security numbers, addresses, credit card information and many other key pieces of information that can let hackers easily access ones identity. The focus of this research paper would be about the Michaels Stores…

    • 813 Words
    • 4 Pages
    Better Essays
  • Good Essays

    - Growth market thanks to the development of cybercrime industry and the fact that more and more people use the Internet…

    • 872 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security Control Tutorial

    • 468 Words
    • 2 Pages

    A Threat to a computing system is a set of circumstances that has the potential to cause loss or harm. There are many threats to a computer system, including human-initiated and computer-initiated ones.…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    UNMC has adopted information security industry best practices to implement its information security system (UNMC, 2014). They have become so effective that during 2011, a Hitrust Gap assessment was performed, and no significant gaps were found within its security program. The worksheet below outlines how these programs have been rolled out by different offices in the university.…

    • 1202 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    With all new product introductions, there are inherent risks to the organization. The largest risks to Walmart in their online grocery service line involve customer information protection/security, technology and financial viability. As customers enter their sensitive information online (demographic information and payment/account information), Walmart becomes responsible for keeping this information secure and protected from online hackers. Customer’s spending habits could also contain sensitive information and be at risk for hacking. The success of this venture and Walmart’s entire online presence is dependent on their ability to keep customer’s information secure and maintain a reputation of credibility.…

    • 1293 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In computer, an attack is any effort to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. An attack usually is perpetrated by someone with bad intentions. The general term used to describe the category of software used to logically attacking computers is called malware. IT Security risk means that there might be unauthorized access to or theft of proprietary data. Common people often post their business email addresses on external websites. These can be picked up and used to hack into other corporate accounts or flood employee in-boxes with unwanted spam. Installing unlawful wireless access points also increases the risk that outside agents could hack into company servers. It also degrades the quality of the internal wireless local area network system, subsequently potentially resulting in lost productivity.…

    • 2138 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Honeypots

    • 702 Words
    • 3 Pages

     Definition: “A security resource who's value lies in being probed, attacked or compromised”  Doesn’t have to be a system: Honeytokens  We want to get compromised!  Certainly not a standalone security mechanism.  Why? • FUN! • No false-positives! • Research: Malware analysis/reverse engineering • Reducing available attack surface/early warning system…

    • 702 Words
    • 3 Pages
    Satisfactory Essays