We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Modified over 5 years ago
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
© 2003, Educational Institute 1 Competencies for Systems and Security Maintenance 1.Identify environmental threats to information systems and describe security precautions to take against them. 2.Identify electronic threats to information systems and describe security precautions to take against them. 3.Identify operational threats to information systems and describe security precautions to take against them. 4.Explain procedures related to system and data backups. (continued)
© 2003, Educational Institute 2 Competencies for Systems and Security Maintenance 5.Describe the system documentation that should be kept covering hardware, software, and network equipment. 6.Explain the function of an information systems security audit. 7.Outline areas covered by manual operations plans in the event of the failure of a property management system. (continued)
© 2003, Educational Institute 3 Environmental Threats to Information Systems Fire Flood Power failure Network connections
© 2003, Educational Institute 4 Electronic Threats and Precautions Electronic threats Computer viruses Hacker attacks Malicious acts spread electronically Precautions Anti-virus software Firewalls Security patches No local modems on individual workstation
© 2003, Educational Institute 5 Restricted Access and Written Policies Restricted access “Read only” capability “Modify” capability Written policies Standard software Use of personal floppies or CDs E-mail and Internet use Passwords Computer room security
© 2003, Educational Institute 6 Downtime Reports—General In-house guest list Room availability Arrivals Guest ledger Guests paying cash Expected departures Guest messages Room availability forecast (at least one month out)
© 2003, Educational Institute 7 Downtime Reports—Housekeeping Late check-outs Room change report Early departures Departures not checked out Rooms status
© 2003, Educational Institute 8 System Documentation System description summary sheet Software license sites Equipment service and calls Equipment maintenance activities Physical schematic of hardware items Software schematic of application interactions
© 2003, Educational Institute 9 System Audit—Computer Room Location Quiet area, not against outside wall Self-closing, self-locking door Access restriction Separate air conditioning unit Working fire alarm/smoke detector Separate electrical circuit UPS battery backup (continued)
© 2003, Educational Institute 10 System Audit—Computer Room Surge-suppressing power strips Preventive maintenance Routine maintenance Inventory of hardware/software Interface descriptions Disaster recovery plan (continued)
© 2003, Educational Institute 11 System Audit—Information Security Backup system Log Off-site storage Verification Run schedule for downtime reports Redundancy for critical systems Support contacts posted by all equipment Accessible equipment trouble logs Written procedures for manual operations posted in appropriate locations
© 2003, Educational Institute 12 System Audit—Network Security User passwords Routinely changed Departed employees denied access Match of current password list with personnel list Up-to-date system patches/fixes Network-wide anti-virus program up to date Management of outside connections to network Firewall
© 2003, Educational Institute 13 System Audit—Employee Security New employees sign a written policy regarding computer usage and abuse. Written procedures and policies for: Access to the Internet E-mail Browsing Written procedures for securing systems when an employee is terminated
© 2003, Educational Institute 14 Downtime Quick Response Checklist Alert managers. Turn off all equipment immediately. Distribute most recent downtime reports. Destroy prior downtime reports. Designate a rack clerk. Designate a posting clerk. Room charges taken to front desk for manual posting. (continued)
© 2003, Educational Institute 15 Downtime Quick Response Checklist (continued) Arrange alternate communication with central reservation system. Inform all in-house guests and arrivals. Issue battery-operated radios to key personnel.
© 2003, Educational Institute 16 Manual Front Desk Forms Manual room rack Cash guest report House count sheet Registration cards Guest folios Reservation forms Most recent downtime reports from system
© 2003, Educational Institute 17 Manual Front Desk Personnel Posting clerk—responsible for posting all charges to guest folios Rack clerk—responsible for maintaining room inventory and current status Runners—responsible for: Communicating between departments Ensuring departments are passing information correctly Ensuring everyone follows manual operating procedures
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
GCSE ICT Networks & Security..
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Jump to first page Business Continuity Planning The evolution of Disaster Recovery Planning.
D1.HFO.CL2.04 Slide 1. Introduction Maintain guests’ financial records: Classroom schedule Trainer contact details Assessments Resources: Calculator,
7 Chapter 7 The University Lab: Conceptual Design Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Crime and Security in the Networked Economy Part 4.
Copyright © 2007 by John Wiley & Sons, Inc. All rights reserved Effective Interdepartmental Communications.
Hospitality Information Systems and Technology Back Office Systems Systems Security & Maintenance Downtime.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
The Night Audit Chapter 13.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Rooms Management and Guest Accounting Applications
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Brian Bradley. Data is any type of stored digital information. Security is about the protection of assets. Prevention: measures taken to protect.
© 2020 SlidePlayer.com Inc. All rights reserved.