Matthew Chambers, Jason Reynolds, Phyllis Shoff
CMGT/400
March 6, 2015
Instructor Romel Llarena
Kudler Fine Foods IT Security Report
To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation. Kudler Fine Foods is an upscale specialty food store that has three locations located in the San Diego area. Kudler has a new initiative they would like to pursue. They want to create a customer rewards program that will track their loyal customers buying behaviors. For customers that participate in this program, they will collect loyalty points that they can redeem for high-end merchandise, specialty food or airline upgrades. "The customer purchase behavior patterns will help Kudler refine its processes and offerings to best satisfy their valued customers" (University of Phoenix, 2013, para. Sales and Marketing Overview Virtual Organization Portal - Kudler Fine Foods).
This IT security report will go over the top security IT threats, security considerations, security policies, and awareness training. The security report will help the design team protect the new system from the threats that have been identified during the design phase of the new system. At the end of this report there will be provisions suggested that will help Kudler Fine Foods internal staff to help validate security measures once the new program is up and running so they can keep the system safe from hackers, attacks or any
References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothern, C., (2011). Comp TIA Security + (3rd ed.). Retrieved from The University of Phoenix eBook. Gartenberg, M. (2005, January 13). How to develop an enterprise security policy. Retrieved from http://www.computerworld.com/article/2569303/security0/how-to-develop-an-enterprise-security-policy.html Gluscevic, M. (2003). Implementing Basic Security Measures. Retrieved from http://www.net-security.org/article.php?id=458 University of Phoenix. (2013). Virtual Organization Portal - Kudler Fine Foods. Retrieved from University of Phoenix, CMGT400 website. Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course