Premium Essay

Security Issues

In: Business and Management

Submitted By viktoriaatanasov
Words 4569
Pages 19
Front office and guest safety and security

Security Issues
Security encompasses areas such as security of the property itself, company assets, employees' and customers' personal belongings and valuables, life security, personal security etc. In all workplaces management stipulates that it is not responsible for valuables and employees personal belongings (their handbags, items kept in the personal lockers, etc.). Yet management must take all possible measures to prevent theft among employees and of employee belongings through its hiring practices and through the implementation of effective management, human resources and operational policies, such as: • Background checks of selected applicants • Policies related to employees' entry to, and exit from, the workplace • Spot checks of locker rooms and lockers • Effective supervision and control during the work cycle • Policies related to the discovery of criminal records and wrongdoing among, and by, employees • Control of people entering and exiting the workplace
With regard to guest valuables, management informs guests that the hotel is not responsible for valuables left in the room, advising them to secure these in safety deposit boxes provided by the hotel. Besides taking care of security issues related to the people they employ (as outlined above), management must undertake some necessary measures, among which: • Providing "secure" (safety) deposit boxes and areas to keep valuables • Policies and practices to ensure the security of these boxes and areas • Management and operational policies regarding the security of guest rooms • Management and operational policies regarding the security of public areas • Security policies and practices for the back-of-the-house areas • Employment and training of security personnel…...

Similar Documents

Premium Essay

Security Issues

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |CMGT/582 | | |Security & Ethics | Copyright © 2010, 2009 by University of Phoenix. All rights reserved. Course Description The ethical issues examined in the course include information privacy, accessibility, and ownership from an organizational perspective. Information laws, regulations, and compliance requirements are examined in this course as well as the considerations for creating a safe digital environment within the organization. Policies Faculty and students or learners will be held responsible for understanding and adhering to all policies contained within this syllabus and the following two additional documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class.......

Words: 2637 - Pages: 11

Premium Essay

Rfid Security Issues

... RFID Security Issues in the Healthcare System Enterprise Wireless Network The use of RFID in the healthcare system has proved very important as it has helped the system take their service to another level. RFID has been used effectively to track the activities in the healthcare industry as it could be used to locate doctors, nurses, patients and even medications given to patients. Although RFID has its potential benefits, it has also been accompanied by threats of privacy violations. These threats pertain to the potential risks of unauthorized data access, misuse of patient data, and the capabilities of permanently saving and linking information about individuals through temporal and spatial extension of data collection activities. RFID tags can be read by unauthorized reader without the knowledge of the victims since individuals are not sensitive to radio signals. To effectively create a solution to these issues, many innovative Privacy Enhancing Technologies (PETs) have been developed with the hope of addressing these privacy concerns, however, RFID privacy threats cannot be merely addressed by the introduction of technical solutions, so the combination of both technological and regulatory solutions will go a long way in solving these issues. In an effort to alleviate privacy concerns and improve the effectiveness of the U.S. health care system, the Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, Public Law......

Words: 312 - Pages: 2

Free Essay

Security Issue on Social Media

...tell you about facebook’s security issue problem. Hackers continue to challenge facebook’s I.T. department, and as of now there are winning. So the world largest social networking website is calling in some big dogs for help. Facebook has been plagued with fake url’s. (url’s are address of web sites.) Advertising something and when you click on it a small program is searching for password’s, credit cards and other personal information all while your checking out a good deal on a product or the latest movie clip or game. Other problems facebook is dealing with is phising, (sending fake e-mails). E-mails pretending to be from a legitimate companies while trying to get to personal information. Cheap car insurance, lawyers, the best coupons on the internet, and join for free e-mails. Malwares is also a major headache with facebook. Malwares is software that is intended to cause damage to computers and computers systems by slowing down computers system deleting important system files and causing fatal damage to the operating system forcing expensive repairs. That’s why facebook is seeking help from websense a global leader with a reputation in data, email, and web security. Websense is using there threat seeker platform, it notifies the facebook uses of malicious content an adviser’s that you don’t continue. Facebook hopes to see a change very soon but as for now the threats continues. This information is regarding facebook security issues and there planes of......

Words: 270 - Pages: 2

Free Essay

Legal Issues Associated with Security

...The Miranda Rights are the most common legal issues that must be observed when conducting an interview or an interrogation. Suspects are presumed innocent until proven guilty, and they have rights that must be respected. Arresting officers must always inform suspects of their alienable rights. Failure to inform the suspect of his or her rights can lead to legal technicalities that can render any information taken during the suspect’s interview or interrogation null and void. The Miranda Rights provides protection based on a person’s Fifth Amendment rights to prevent self-incrimination. There rights are recited to individuals while being taken under custody. These rights are read, “You have the right to remain silent. If you give up the right to remain silent, anything you say can and will be used against you in a court of law. You have the right to an attorney. If you desire an attorney and cannot afford one, an attorney will be obtained for you before police questioning” (Criminal Law, n.d.). A pertinent legal issue associated with security interrogations is the authority to make judgment calls. There had been many debates on interrogation tactics used to elicit a confession from a suspect. The use of torture is a common issue of contention in modern society. The dilemma of whether it is acceptable to use torture to save lives had been debated in courtrooms, senates and public forums with no definite policy set in place. In the interrogations of top Al-Qaida operatives in...

Words: 377 - Pages: 2

Premium Essay

Cotemporary Security Issues

...Cotemporary Security Issues 2/19/2014 Cyber security has been slowly taking over as the main concern for security professionals as well as organizations. This is due to a larger emphasis on using paperless methods in order to keep track of customer’s data, financial records as well as many other important documents. Without properly trained IT professionals as well as an increase in maintaining up to date security these attacks will continue to have success. Another issue is the lack of legislation regarding cyber crime and their perpetrators. Although billions of dollars are spent by organizations and governments in order to protect digital assets news of attacks are reported on, which many times are successful. Despite the fact that myriad tech risks were identified by the study’s 469 participants, many firms aren’t making the grade when it comes to putting the necessary protections in place to combat these threats. Specifically, one-third of organizations with less than $100 million in revenue said they did not conduct any form of IT audit risk assessment, while 42 percent of all surveyed firms reported that in lieu of their own internal resources, they depended on external assistance to inform their IT audit departments. (Caldwell Partners, 2014) Given the large amount of media attention given to cyber-attacks, the lack of internal attention given to cyber security is astonishing. While budget constraints are one factor contributing to a lack of security without......

Words: 691 - Pages: 3

Premium Essay

Web Security Issues

...Web Security Issues/Concerns Comparing to other online Apollo group organizations Riordan manufacturing has a few locations. No matter the size of the business but still the information and the database needs to be protected in any way. To overcome this the web up-time needs to be more effective and fast. In that case if a customer place an online order it can transmitted real fast to Riordan manufacturing to process the order. A weak point I found on Riordan manufacturing website is there is no option for customers for online entries. Also if they are willing to create a for customer information entry it should be protected by (DOS) Denial of Service to prevent online attacks and threats wise versa. Current Riordan Manufacturing website specifications As I went through the information each Riordan manufacturing facility has their own web server which runs internally, but with any firewall which is a huge risk. I found out that each web server is being installed and maintained by different vendors without any continuity plan or proper security measures. In case if a customer needs to contact Riordan manufacturing they has the option to send a text message describing their need. The email and phone numbers of Riordan are listed on the website as well. Recommendations to secure the web security I do suggest that if Riordan can setup one server on a location and connect all locations to it. It that case they can maintain and monitor their system easily and quickly before a...

Words: 356 - Pages: 2

Premium Essay

Security Issues

...Onboard Systems Security Issues Embry-Riddle Aeronautical University On-board Systems There are many benefits and there are also some security concerns that need to be addressed when talking about common networks that are used on board an airplane or in this case a passenger plane. These systems can be affected in many different ways which could really cause some problems for the airline and even for the passengers themselves. However, if all of the necessary safeguards are put into place, then nobody should have to worry about whether their network is safe or if it is at risk. The benefits for using a common network are pretty straightforward when you look at it. All of the passengers are able to connect to one solitary network therefore reducing the need for more networks and having connectivity issues while in the air. However, if you have the air traffic controllers and the pilots using the same network as the passengers to maintain the aircraft, then you potentially have a lot of issues if not handled the correct way. According to Kim Zetter, there was an incident that Boeing was involved in and they had a special condition given to them by the FAA that allowed a Boeing 787 to “connect a passenger internet network with networks that control the plane's navigation and maintenance systems (Zetter 2008).” I cannot even begin to describe how dangerous that is regardless of whether you have the correct safeguards in place that do not allow passengers to have......

Words: 516 - Pages: 3

Premium Essay

Handling Security and Ethical Issues

...Handling Security and Ethical Issues at TBWI Course: IT560-01 Handling Security and Ethical Issues at TBWI A growing concern, especially with the recent information leak at Target, is the issue of security. Outlined are security concerns for TBWI and how best to handle them. In addition to handling security issues, there may be complicated ethical issues that may occur. To best handle these situations, those ethical issues are addressed, with recommendations for how best to handle them. Security Concerns In 2013, B2B International and Kaspersky Lab conducted a Global Corporate IT Security Risks survey and the results were quite startling. In a conservative estimate, “The average damage suffered by large companies from a single serious incident was $649,000. For small and medium-sized companies, the average damage was $50,000” ("Global corporate it," 2013). These damages can be the result of fines, lawsuits, as well as lost revenue from customers, who no longer have faith in the security of the company. It takes many years for a business, such as TBWI, to build a reputation, but it can all be lost in a matter of seconds. Because of this, the following security concerns need to be recognized, with a plan in place for prevention. External threats External threats are those that occur from people not involved with TBWI. These could be competitors or random hackers or thieves. These types of threats can occur at the software and......

Words: 1640 - Pages: 7

Premium Essay

Networking and Security Issues

...IT for Decision Makers NETWORKING AND SECURITY ISSUES Handout 1 Overview Introduction Many organizations have invested vast amount of money in computer networks, only to find out that although it is providing means of improving the efficiency and productivity of the organization but it also exposes the Organization to possible attacks and threats. Such attacks have been the most challenging issue for most network administrators and a worrying topic for administrators. Organizations need to share services resources and information but they still need to protect these from people who should not have access to them, while at the same time making those resources available to authorized users. Effective security achieves these goals. The greatest threat to computer systems and their information comes from humans, through actions that are either malicious or ignorant. When the action is malicious, some motivation or goal is generally behind the attack. For instance, the goal could be to disrupt normal business operations, thereby denying data availability and production. April 13, 2000, 3:55 P.M. Pacific time: The Web site for the Motion Pictures Association of America (MPAA) is suffering intermittent outages, and the organization suspects computer vandals are to blame. A source inside the organization, who asked not to be identified, said that the MPAA is currently “experiencing problems with their public Web site, and they suspect a denial-of-service......

Words: 5140 - Pages: 21

Free Essay

Food Security Issue

...instability. The inset shows the FAO Food Price Index from 1990 to 2011. (The figure is reproduced with permission from [1]). emerged because we figured out how to produce surplus food. We could feed artisans and scribes and warriors and kings. For the next 10 millennia, people built cities and civilizations, wore out the land, invaded their neighbors or abandoned the cities and civilizations, eventually rebuilding on fresh land [11]. It was often the fertility of the land that determined how long a civilization lasted. Plants extract nutrients from the soil and crop yields decline, making it harder and harder to produce enough food as the number of people grows [8]. Concern about access to sufficient food, today called “food security,” is as old as mankind. Thomas Malthus’ famous Essay on Population, published in 1798, crystallized the problem of balancing food and human population for the modern era [12]. Malthus believed that humanity was doomed to food insecurity because our numbers increased exponentially, while our ability to produce food could only increase linearly. Curiously, Malthus penned his essay at about the time that science began to play a major role in boosting agricultural productivity. Late eighteenth century milestones were Joseph Priestley’s discovery that plants emit oxygen and Nicholas-Théodore de Saussure’s definition of the chemical composition of plants [13, 14]. Malthus could not have envisioned the extraordinary increases in......

Words: 8979 - Pages: 36

Premium Essay

Impact and Issues of Physical Security

...Impact and Issues of Physical Security Security 6030 Wilmington University Table of Contents Introduction 3 Physical Security Countermeasures 4 Physical Security Program 5 Regulatory Compliance 7 Conclusion 9 References 10 Introduction Most people consider about locks, bars, alarms, and uniformed guards once they consider about protection. At the same time these countermeasures are certainly not the only precautions that have got to be viewed when trying to secure information system, they're a perfectly logical situation to start. Physical security is a vital part of any security plan and is fundamental to all safety efforts without it, information security, application security, user access security, and community safety are considerably more......

Words: 1812 - Pages: 8

Free Essay

Legal Issues in Information Security

... an external auditor certified CardSystems Solutions as Payment Card Industry Data Security Standards-(PCI DSS) compliant. What is your assessment of the auditor’s findings? I personally disagreed with the auditors findings. If CardSysytems Solutions per the report were indeed deemed compliant, proper IP firewalls and antivirus programs would have been active as PCI DSS requires a firewall and an up to date anti-virus which CardSystem Solutions did not. 3. Can CardSystems Solutions sue the auditor for not performing his or her tasks and deliverables with accuracy? Do you recommend that CardSystem Solutions pursue this avenue? No. In 2004 they were PCI DSS compliant. At the time of the attack in June of 2005, they were not certified compliant. 4. Who do you think is negligent in this case study and why? CardSystems Solutions have to be considered the negligent party in the case. CardSystems Solutions is a high profiled company that is expected to comply with the regulations and requirements for properly protecting and storing private and secure data. 5. Do the actions of CardSystems Solutions warrant an “unfair trade practice” designation as stated by the FTC? Yes I believe it should 6. What security policies do you recommend to help with monitoring, enforcing, and ensuring PCI DSS compliance? SNMP along with MAC filtering. 7. What security controls and security countermeasures do you recommend for CardSystems Solutions to be in compliance with...

Words: 437 - Pages: 2

Premium Essay

Cloud Security Issues

...See discussions, stats, and author profiles for this publication at: Cloud Computing Security Issues and Challenges ARTICLE · JANUARY 2011 CITATIONS READS 13 20,419 1 AUTHOR: Ibikunle Ayoleke Botswana International University of Science… 29 PUBLICATIONS 30 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. Available from: Ibikunle Ayoleke Retrieved on: 13 February 2016 Kuyoro S. O., Ibikunle F. & Awodele O. Cloud Computing Security Issues and Challenges Kuyoro S. O. Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Ibikunle F. Department of Computer Science Covenant University Otta, 240001, Nigeria Awodele O. Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Abstract Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model......

Words: 4240 - Pages: 17

Premium Essay

Air Cargo Security Issues

...Running Head: AIR CARGO SECURITY ISSUES Air Cargo Security Issues Following the 9/11 Act Abstract In August 2007, the Implementing the 9/11 Commission Recommendations Act of 2007 was signed into law requiring the Department of Homeland Security to establish more stringent procedures for the security screening of air cargo. The law required that by February 2009, 50 percent of all air cargo on passenger aircraft would be security screened, and by August 2010, all air cargo traveling on passenger aircraft must be 100 percent screened individually. The requirement presents numerous logistical, financial, and technological challenges to airlines and all entities involved in air cargo shipping. The Transportation Security Administration has lessened some of the burden by creating the Certified Cargo Screening Program, enabling the screening of cargo by certified shippers prior to aircraft delivery. On August 3, 2007, President Bush signed the Implementing Recommendations of the 9/11 Commission Act of 2007, commonly known as the 9/11 Act, into law. The Act required the Transportation Security Administration to establish a system for the 100 percent security screening of all cargo transported on passenger aircraft within three years. Additionally, the 9/11 Act required that 50 percent of air cargo would be screened on passenger aircraft by February, 2009. Air cargo handlers in all aspects of the logistical arena have responded well to the 50% mandate, but the 100%......

Words: 3343 - Pages: 14

Premium Essay

Challenges and Security Issues

...Unit 5 IP – Challenges and Security Issues American InterContinental University Abstract In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems. After the review of each case study, a set of questions will be answered to provide details on each study as to what was reviewed. Challenges and Security Issues (Case Studies) Introduction In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems. Case Study #1 When Antivirus Software Cripples Your Computers On April 21, 2010, McAfee crippled hundreds of thousands of McAfee equipped machines, by mistakenly sending an update to its users reclassifying svchost.exe as being a malicious file which was known as W32/wecorl.a virus (Humphries, 2010, para 1-2). The factors that were responsible for this software problem was that McAfee failed to send users a warning notifying them that svchost.exe was going to be either deleted or quarantined; instead they deleted the file completely. On the other hand, failure to detect this error was at the fault of McAfee’s automated quality assurance. Another reason this spread so quickly is because of the high demand for faster antivirus updates....

Words: 1227 - Pages: 5