Cmgt 400 week 2 team assignment kudler fine foods it security report top threats

Page 1

System Threats Table


The following table is in continuation of last week’s memo about system dangers for Kudler Fine Foods. Table 1 explains exactly what the particular danger is for the vulnerability which was mentioned in the memo. The table doesn't identify any type of corrective measures which may be required. In future messages the right measures will be discussed, because it is not part of the existing measure.

Area of System Employee authentication

Threat Illegal users can access

Potential Vulnerability There could be wrong

the system.

information which is geared at rewarding undeserving customers. Customer data could be changed by illegal staff

Data access restrictions

Users have illegal access

as well as users. There are presently not

to data.

any limitations set in place for approved users. This makes it so that all the information is accessible by any type of user, that can lead to thieved, edited, erased, and so on, data

Data transmission across

Data may be intercepted,

wrongdoers. Intercepted information

entire network

duplicated, as well as

may be used to get

changed during transit.

additional access to a network's infrastructure, for instance say in case


user approval to the server was intercepted. Refusal of Service techniques may be used to disrupt company works.

PURCHASE THE ANSWER FILE IMMEDIATELY VISIT http://www.fasthomeworkhelp.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.