Premium Essay

Cmgt 400 Team Final

In:

Submitted By knapp1970
Words 3313
Pages 14
Running Head: KUDLER FINE FOODS IT SECURITY REPORT

Kudler Fine Foods IT Security Report
CMGT/400

Abstract Kudler Fine Foods is developing a customer loyalty program that will reward customers and increase sales. Kudler has requested the team to design the customer loyalty program while making sure that system meets security requirements. The following paper will describe a plan on how Kudler can achieve their goal by using the Systems Development Life Cycle or SDLC, which has five phases, and how they can use each one. As part of establishing Kudler’s reputation, the company will emphasize the need for security for the business and its customers.

Introduction Kudler Fine Foods is a local business based in San Diego California that would like to increase their sales in their three other California locations. Kudler has decided to implement a customer loyalty program. The customer loyalty program will reward customers for shopping within the locations. One of the goals is to increase sales by tracking customer purchases so that sales can be more relevant and to attract customers. Kudler has decided that a development team is needed to build this new service for its customers. As part of the development, the System Development Life Cycle will be used to obtain the goal while paying attention to the security needs that the program will create. Our team will develop the SDLC and identify the potential threats and vulnerabilities have the customer loyalty program. Based on our findings we will recommend security needs to mitigate potential risks to Kudler and customers. Our team will also develop system wide security policies to benefit Kudler and its future endeavors.
SDLC
The SDLC, Systems Development Life Cycle, consists of five phases; the initiation phase, acquisition/development phase, implementation/assessment phase, operations/maintenance

Similar Documents

Premium Essay

Get Online Help with Ur Assignment Ashford a+Material

...http://homeworktimes.com/downloads/acc-206-new-week-2-journal-institute-management-accounting/ http://homeworktimes.com/downloads/acc-206-new-week-3-assignment-chapter-four-five-problems/ http://homeworktimes.com/downloads/acc-206-new-week-3-journal-hershey-company/ http://homeworktimes.com/downloads/acc-206-new-week-4-assignment-chapter-six-seven-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-chapter-eight-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-final-paper/ http://homeworktimes.com/downloads/acc-212-financial-accounting/ http://homeworktimes.com/downloads/acc-250-complete-course-acc-205-entire-course/ http://homeworktimes.com/downloads/acc-290-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-291-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-340-entire-course-acc-340-complete-course/ http://homeworktimes.com/downloads/acc-400-complete-course-acc-400-entire-course/ http://homeworktimes.com/downloads/acc-407-entire-course/ http://homeworktimes.com/downloads/acc-455-complete-course/ http://homeworktimes.com/downloads/acc-492-complete-course-acc-492-entire-course/ http://homeworktimes.com/downloads/acc-548-entire-course-acc-548-complete-course/ http://homeworktimes.com/downloads/acc-556-entire-course/ http://homeworktimes.com/downloads/acc-556-week-1-internal-accountantgcos-report-management/ http://homeworktimes.com/downloads/acc-556-week-2-procedures-collecting-forensic-evidence/...

Words: 3197 - Pages: 13

Premium Essay

Project Controls

...Week Four Team Charter, Project Plan, & Costing Learning Team D Barbara Fulton, Israel Salinas, Jessica Thomas, Jesse Moody, Solomon Kebede CMGT/410 September 30, 2013 Kara McFall, EdD, PMP General Information |Project Title: |Racing games for Smartphone’s | |Brief Project |Video game production company that makes video games for the popular consoles and now wants to make a version of | |Description: |one of their racing games for Smartphone’s hosting the android operating system. | |Prepared By: |Team “D” | |Date: |9/30/2013 |Version: |Three | Background Information VG Production Company is a company that specializes in video games for popular gaming consoles. Founded in 1994, VG has been one of the most successful video game production companies in the United States. Recently, the demand in video game applications for smart phones on the Android market has been growing exponentially. As a result, VG Production Company has decided to extend its video games from consoles to smart phones, starting with its most popular racing game, Extreme Burner’s. Goals and Objectives The goal of...

Words: 2039 - Pages: 9

Premium Essay

Kudler Fine Foods

...CMGT/400 Final Project Kudler Fine Foods IT Security report This table is developed to help us identify the top threats with the new customer rewards program that we are putting into play. Kudler Fine Foods is getting a new and improved system that will help them keep track of the shoppers purchase activities. This table was developed by us in hopes of letting them know the vulnerabilities’ and threats that may arise while doing so. Also we have drafted a summary of the threats that we the team feel will be very influential to this process. This security report and presentation is what we have prepared in hopes of gathering this information that it will help them with their new system. Table of Threats Area of System | Threats | Potential Vulnerability | Loyalty Program | External and Internal Users | Loss of customer financial data, loss of customer privacy information. | System Network Access | Internet | Hackers can gain customer and business info. Loss of Revenue, Loss of customer data. | Employees (Kudler) | Information misplacement | Accidental loss of customer data, Loss of Revenue | Point of Sale System | Unauthorized user | Data breach, loss of customer information, company data loss. | | | |   |   |   | You have to also consider your technical security when starting any kind of project such as this frequent shopper program. You have firewall that is needed to help defend the server and stop a data breach. The user configuration that...

Words: 1511 - Pages: 7

Premium Essay

Securing and Protecting Information

...CMGT 400 Week 3 Securing and Protecting Information Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like brute-force or wordbook attacks, impersonation of users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable with the organization in which you are exchanging your information with. Authentication is the method in which a person must prove that they are who they say they are. Public and private networks, utilize authorized logins and passwords. Data is ran through the password database to ensure that the user is someone that has the credentials to access the network. In order to allow access a company’s intranet, they must register or be registered with the appropriate credentials to access this network. For this reason, net business and plenty of alternative transactions need additional authentication methods. “The utilization of digital certificates issued and verified by a Certificate Authority (CA) as a part of a public key infrastructure is taken into account probably to become the quality thanks to perform authentication on the web” (D'Arcy, Hovav, & Galletta, 2009). Process includes: Create a strong password policy Establish an account lock out policy Assign logon hours Create a ticket expiration policy Establish network authentication...

Words: 1442 - Pages: 6

Premium Essay

Security Threat

...Security Considerations for Pro Trans Brian Smith CMGT/400 July 27, 2015 Professor Iwona Rusin Security Considerations for Pro Trans To identify any of the vulnerabilities that may be associated with Pro Trans, I would first conduct a detailed risk analysis report that would include data related to variable aspects of the business. First, all of the possible risks will need to be evaluated. How those risks are being controlled will need to be assessed. It will be important to identify any assets that belong to the company that can be tampered with or stolen. The past and possible threats will also need to be documented. Simulated attacks can provide information on the possible impact they would have on the company. This data includes SLE or Single Loss Expectancy rating and an Annualized Loss Expectancy rating with monetary values for both. How much control the company has over specific and general attacks is important also. This data will reveal how safe the system truly is. Conducting interviews with each department staff leader will also be a key step in assessing risk. This would give a general idea of how day-to-day operations are run, how many employees have access to the system, and how many remote locations they have. Since the servers used for data storage are connected to the same network as the servers used for software and Internet programs, there is a serious risk when using web components. For example, all of the employees in the accounting department...

Words: 2340 - Pages: 10

Premium Essay

Kudler Fine Foods Frequent Shopper Program

...Kudler Fine Foods Frequent Shopper Program Brian Musha, Darrell Jones, David Kress, Matthew DiMare, Jason Longo, Thomas Kunis CMGT/400 February 9, 2015 Robert Quintin Introduction Team C has been tasked to develop a Customer Loyalty Program for frequent shoppers at Kudler Fine Foods. The program will consist of loyalty points that may be used by the frequent shoppers to purchase high value merchandise from the vendors of the loyalty points partner program. The team has also been tasked to insure that the information collected from the frequent shoppers is securely protected from outsiders and others that may make the system vulnerable to threats. Team C will cover each step within the system development life cycle to cover all systems affected and mitigation of risks and will at properly satisfy the needs of Kudler. Outline of Customer Loyalty Program Kudler Fine Foods prides itself on delivering the finest in specialty foods from around the world. In continuing with the tradition of providing the best for their customers Kudler has decided to develop a Customer Loyalty Program. This program will consist of a loyalty points program with said point being accrued from purchases made from Kudler. The customer will have to sign up for the program and after doing so will have their purchases tracked and with each purchase will collect loyalty points that can later be used towards high value items provided by vendors of a loyalty points partner program. The reasoning...

Words: 4127 - Pages: 17

Premium Essay

Project Management

...Project Management Project CMGT/410 Kudler Fine Food Implementation Project Introduction Kudler Fine Foods is a privately owned California-based gourmet food store founded in 1998 by Kathy Kudler. Kudler Fine Foods has three stores in La Jolla, Del Mar, and El Encinitas, California. KFF offers high-end products and markets them in upscale neighborhoods. KFF has expressed an interest in the development of an Enterprise Resource Planning (ERP) system to improve business administration and integrate stores and business systems. The desired results from a successful implementation of the ERP: devising more informed decision-making strategies, streamlining sales and business processes across the three stores and integration all functional business systems for effective business management. This document serves as a project plan to define necessary information and detail for the development and implementation of the Kudler Fine Foods ERP system in reference to Service Request SR-kf-004. Background and Statement of Need Kudler Fine Foods is a specialty food store that currently has three locations in the San Diego metropolitan area. The stores stock specialty foods that are both domestic and imported and are also perishable. The owner is in the process of opening two additional stores as well as developing a website that consumers would be able to make purchases and the stores would be able to track inventory and stock as well. In addition...

Words: 7534 - Pages: 31