logo

Trusty Carpets qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwerty

   

Added on  2019-10-01

6 Pages1302 Words431 Views
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwTrusty CarpetsRequirements Checklist
Trusty Carpets qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwerty_1
Trusty CarpetsTable of ContentsIntroduction.................................................................................................................................................3Security Requirements.................................................................................................................................3Authentication and Access Control.........................................................................................................3Network Security.....................................................................................................................................3Secure Communications & Reporting.....................................................................................................4Transactional Security.............................................................................................................................4Information Security – Confidentiality, Integrity & Availability.............................................................5References...................................................................................................................................................62
Trusty Carpets qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwerty_2
Trusty CarpetsIntroductionTrusty Carpets is a carpet store that is owned and run by Jerry Montgomery since past twentyyears. Currently, there are three components of the system as Trusty Carpets store, the MetroCarpets store, and Mike’s carpet installation business. All of these components have a separatesales system along with separate customer services and customer base associated with it. Thebusiness was established a long time back and has largely expanded since its inception. The salesnumbers and profits have also gone up over the years. Looking at the current problems of Trusty Carpets, it has been proposed that an integrated salesCustomer Relationship Management (CRM) system shall be developed and implemented in thecompany. SalesforceIQ CRM is the system that has been proposed by the business experts whichis required to be deployed in Trusty Carpets. The document covers the security requirementsassociated with the CRM system. Security RequirementsAuthentication and Access ControlSalesforceIQ, Customer Relationship Management (CRM) system that is required to bedeveloped for Trusty Carpets shall have enhanced authentication and access control implementedin the system. The entry to the system shall be protected and validated with two-foldauthentication verification with the aid of a user id and password combination along with abiometric check for granting access to the system. Also, there shall be access controlimplemented in the database of the CRM system to allow only the authenticated users to accessthe database and carry out data related operations in the system. There shall be an administratoraccount created and only the admin user shall be able to make changes in the database and set upthe user privileges (Jonsson, 2017). Network SecurityThe second security requirement that shall be implemented in the CRM system shall be in theform of network security.3
Trusty Carpets qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwerty_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Unifying Sales and Customer Components of Trusty Carpets with SalesforceIQ CRM
|4
|2304
|494

Implementing Cloud CRM for Trusty Carpets: A Solution for Efficient Merger and Customer Relationship Management
|7
|1530
|186

Security Measures for Trusty Carpets' Proposed Solution
|6
|2486
|145

Security Issues and Protection Mechanisms Data Assignment
|7
|1560
|307

CRM Solution for Trusty Carpets: A Proposed Solution for Unifying Business Components
|5
|2403
|155

Report On Trusty Carpets | Enhancing The Profit Margin
|65
|16269
|492