Develop a table that identifies the top threats to the new customer rewards program at Kudler Fine Foods in preparation for your final report (due in Week Five). Include the likely vulnerabilities each threat might exploit. The following table is an example of one you might use:
THIS IS WHAT I NEED NEXT:
Draft the security considerations for each phase of the systems development process.
Identify specific concerns if the system is ever removed from service.
Specify what can be done in each systems development process phase to mitigate the risk for each entry in the table from the previous week. Be specific, but high-level in your mitigations. Most or all items will have something to check or do in each stage of the systems development process.
| Area of system | Threat | Potential Vulnerability |
| Customers | User account | Unauthorized access to user accountsternal Companies |
| Access | External companies’ products may be compromised | |
| Kudler Fine Foods | Access | Kudler Fine Foods products may be compromised |
| Area of system | Threat | Potential Vulnerability |
| Customers | User account | Unauthorized access to user accounts |
| External Companies | Access | External companies’ products may be compromised |
| Kudler Fine Foods
|
Access | Kudler Fine Foods products may be compromised |
