Develop a table that identifies the top threats to the new customer rewards program at Kudler Fine Foods

Develop a table that identifies the top threats to the new customer rewards program at Kudler Fine Foods in preparation for your final report (due in Week Five). Include the likely vulnerabilities each threat might exploit. The following table is an example of one you might use:

 

THIS IS WHAT I NEED NEXT:

 

Draft the security considerations for each phase of the systems development process.

 

Identify specific concerns if the system is ever removed from service.

 

Specify what can be done in each systems development process phase to mitigate the risk for each entry in the table from the previous week. Be specific, but high-level in your mitigations. Most or all items will have something to check or do in each stage of the systems development process.

 

 

Area of system Threat Potential Vulnerability
Customers User account Unauthorized access to user accountsternal Companies
Access External companies’ products may be compromised
Kudler Fine Foods Access Kudler Fine Foods products may be compromised

 

Area of system Threat Potential Vulnerability
Customers User account Unauthorized access to user accounts
External Companies Access External companies’ products may be compromised
Kudler Fine Foods

 

 

Access Kudler Fine Foods products may be compromised

Latest Assignments