We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Kudler Fine Foods IT Security Report Argumentative

The whole doc is available only for registered users
  • Pages: 9
  • Word count: 2065
  • Category: Security

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation. Kudler Fine Foods is an upscale specialty food store that has three locations located in the San Diego area. Kudler has a new initiative they would like to pursue. They want to create a customer rewards program that will track their loyal customers buying behaviors. For customers that participate in this program, they will collect loyalty points that they can redeem for high-end merchandise, specialty food or airline upgrades.

“The customer purchase behavior patterns will help Kudler refine its processes and offerings to best satisfy their valued customers” (University of Phoenix, 2013, para. Sales and Marketing Overview Virtual Organization Portal – Kudler Fine Foods). This IT security report will go over the top security IT threats, security considerations, security policies, and awareness training. The security report will help the design team protect the new system from the threats that have been identified during the design phase of the new system. At the end of this report there will be provisions suggested that will help Kudler Fine Foods internal staff to help validate security measures once the new program is up and running so they can keep the system safe from hackers, attacks or any unauthorized personnel. Identifying Top Threats & Summary

There are many security threats that can affect Kudler Fine Foods. Throughout the week, the team members worked to determine any and all possible threats that could affect Kudler Fine Foods Customer Rewards Program. The two most significant threats that need to be focused on are “Data Loss” and Identity Theft”. Protecting customer’s personal information must be the first priority. To help reduce these risks and threats, it is important to use authentication to allow access to only those who need it. This will in turn reduce network traffic making data transfers smoother and will increase productivity. All virus software, firewalls, and patches will also have to be regularly updated to keep the percentage of security threats to a minimum. It is also very crucial to make sure that all data is backed on at least a daily basis so the data can be retrieved for any future use. This team will use the information that was gathered this week for the foundation of our security plan. This table below will identify threats and the vulnerabilities that each threat will exploit. Kudler Fine Food IT Top Security Threats

Area of System
Potential Vulnerability
POS Terminals
Individual terminals can be compromised, and credit card data stolen Customer Information
Identity Theft
Operating System
Unauthorized Access
Denial of Service (DoS)
User Authentication
Illegal access to the system
Loss or change of information if there is illegal access occurs. Data backup
Data loss
The System can fail, and data will be lost if the proper backup procedures
are not carried out. Network traffic
Unauthorized use can overload the network causing a slowdown in performance Causing a slowdown in performance, production and a loss of profits. Employees visiting harmful sites and downloading damaging apps.

Security Considerations System Development
The chart below will show the system development process phases that were identified. The system development process starts with the planning process, analysis, design, testing, implementation and ends with how the system will be maintained and kept secure. Using the system development process phase, these security considerations will be analyzed in every stage. Every risk cannot be planned. The risks that can be identified will have policies and procedures in place so that a fix can be implemented immediately. With little to no downtime, threats and disaster create small business impacts. System Development Phase

Security Threats
Mitigation of Risks
Do not know if there are any bugs in the system or if the system is secure. Decisions about security. Preliminary risk assessment.
Develop basic security needs. Setting up an outline that will identify the response and control of a threat. Create an outline that will identify the response and control of a threat. Analysis

Vulnerabilities impacts loss of confidentiality, integrity, and availability. Review legal, security requirements and regulations. Determine the effect a disaster will have on the accessibility information, and the time it will take to have the system function properly. Design

Design (continued)
Unauthorized access and use. Bugs that were missed.
Security plan and program security controls are designed and tested. Evaluation plan for security controls. Encryption for data and authentication for each employee at the proper security level. Testing

Multiple viruses and computer exploits left unchecked due to incompatible security enhancements. Preliminary testing and implementation of security measures on isolated machines. Compatibility and stress testing amongst known hardware infections. Implementation

Malware, Spyware because Firewalls and Security programs not updated. Security controls are designed, developed, implemented and tested properly to the fullest extent. Evaluation plan is written. Check any safety or security issues.


Enhancements, modifications, hardware and software added or replaced. User requirements. Ensure all enhancements modifications hardware and software are safe and secure. Replaced hardware or software should be destroyed completely by the security team. Downtimes have to be scheduled very carefully during the off times. Monitor continuously for any user changes.

If the system is ever removed from service due to power outages, internet outages or other disasters scenarios, all users will be moved to a manual mode. If there is not a backup system, then the data security will be compromised. Data integrity may also be affected because the information will be inaccessible. To overcome this, all users will have training on both main and backup systems. The users will also be instructed on manual procedures and policies. A backup in system place will enable multiple points of data restoration (cloud, network storage, and remote). These security measures will enforce the protection of data. Security Policy and Training

It will be necessary to establish several security policies for the creation of Kudler Fine Food’s Customer Rewards program. The program’s completion will increase sales and customer service exponentially. In order for this system to remain secure, an authentication and accessibility policy is developed. Users will only be granted access if a form of pre-authorization exists. It is important to determine who has the ability to access the information. Information is important for any company and consequently authentication and accessibility to said information must be limited. A security policy is required to ensure that the buyer’s program maintains the shopper’s information. This is made possible through the Enterprise Information Security Policy (EISP). The EISP is a plan that is accountable for a range of areas of data security and safety. This will include all maintenance plans, procedures and responsibilities for the users. The plan may help with legal issues, which may arise from unforeseen situations. The EISP documents will include the following factors: Review of Awareness on Protection

Duties Shared by Users
Duties Specific to Each Role

Security Policy Elements
Kudler Fine Foods is required to protect its customer and organizational information. To do this, a security policy will be created by senior management and reviewed by the legal department. An awareness training session will be held for all employees to go over this policy. A strong security policy will ensure this information is kept safe. The following elements will be included in the security policy: Classification of Information

Acceptable Use
Internet Usage Policy
E-Mail Usage Policy
Need to Know & Less Privilege
Privacy Policy
Username & Password
Disposable & Destruction of Information
Ensuring that all company employees are properly trained on each listed security policy is vital. Items such as “Privacy Policy” and “Classification of Information” will exist on the forefront of these training sessions. This is to ensure that all customer information entered into the new system remains safe from misuse. Sessions will be reviewed and updated periodically to promote knowledge retention. “In a changing environment, policies can retain their effectiveness only if they are periodically reviewed for currency and accuracy, and modified to keep them current” (Whitman. 2004, p.154). “Policies can be made stronger by including references to the authority who made the policy (whether this policy comes from the CEO or is a department level-policy) and also refer to any laws or regulations that are applicable to the specific policy and environment” (Conklin et al. 2011, p. 39). Once the security policy is created and reviewed by the legal department procedures will also be established to comply with the security policy that every employee will receive a copy. Audit Provisions

The following audit provisions will help Kudler Fine Foods internal staff to validate security measures to keep the new customer rewards program safe from hackers, attacks and unauthorized personnel. There will be ten practices for the internal staff to start with. Gluscevic (2003), “These ten practices include different kinds of information security, such as policy, process, people, and technology, all of which are necessary for deployment of a successful security process” (Introduction). By adopting these practices, it will give Kudler Fine Foods and any other organization a secure way to manage their security risk. The ten practices are: General Management – Security managers create the security policies and processes. Their job is to make sure the policies and procedures are followed on a daily basis. They will also create the audit processes.

Policy – Written rules to educate employees how they need to conduct business every day while keeping the information safe. Risk Management – Conduct risk evaluations that will identify threats, vulnerabilities, and risks. Security Architecture & Design – Know the assets that need to be secured. User Issues – Accountability, integrity, and training.

System & Network Management – Access controls, software integrity, backups, and data encryption. Do regular virus checks and updates. Authentication & Authorization – Provide network access to all users based on the level of access they are approved for. Restrict users to levels, they do not have approved access. Monitor – Use system monitoring tools to audit, inspect and respond to activity in question to report on the events and conditions of the system. Physical Security – This practice is usually always forgotten, but this is a necessary practice to help secure who has access. Use physical controls, for example, badges, swipe cards, keys, and a sign-off feature for certain of inactivity on a laptop or computer. Disaster Recovery – This is just in case your data is lost or damaged. Hopefully, it will not be by using the practices above but just in case create a disaster recovery plan and test it to make sure it works before you need it. Using these practices will help keep Kudler Fine Foods new system safe from threats, attacks and unauthorized users getting access to information they do not have authority to see. Conclusion

In conclusion, Kudler Fine Foods is having a customer rewards program system created. This team was given the assignment to create an IT security report where we identified the top IT security threats, security consideration, security policies, and security awareness training. The design team will use this report to build in security features at the beginning, so they do not have to backtrack and create this features after the design phase. Security awareness training is crucial that Kudler gives their employees. This training will help the employees detect possible intrusions and will understand how valuable the information is to their employer and the integrity. If everyone follows the security policies and procedures, this system will be free of hackers, attacks, and unauthorized personnel.


Conklin, W. A., White, G., Williams, D., Davis, R., & Cothern, C., (2011). Comp TIA Security + (3rd ed.). Retrieved from The University of Phoenix eBook.

Gartenberg, M. (2005, January 13). How to develop an enterprise security policy. Retrieved from http://www.computerworld.com/article/2569303/security0/how-to-develop-an-enterprise-security-policy.html

Gluscevic, M. (2003). Implementing Basic Security Measures. Retrieved from

University of Phoenix. (2013). Virtual Organization Portal – Kudler Fine Foods. Retrieved from University of Phoenix, CMGT400 website.

Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access

Your Answer Is Very Helpful For Us
Thank You A Lot!


Emma Taylor


Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59