© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

GCSE ICT Networks & Security..
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Jump to first page Business Continuity Planning The evolution of Disaster Recovery Planning.
D1.HFO.CL2.04 Slide 1. Introduction Maintain guests’ financial records:  Classroom schedule  Trainer contact details  Assessments  Resources: Calculator,
7 Chapter 7 The University Lab: Conceptual Design Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Crime and Security in the Networked Economy Part 4.
Copyright © 2007 by John Wiley & Sons, Inc. All rights reserved Effective Interdepartmental Communications.
Hospitality Information Systems and Technology Back Office Systems Systems Security & Maintenance Downtime.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
The Night Audit Chapter 13.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Rooms Management and Guest Accounting Applications
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Chapter 13 Network Management and Operations. Agenda Objectives Scope Functions Software Security Physical Facility Staffing.
Specialized Hospitality Applications v Point of Sale (POS) - Computerized Cash Register and more – Micros, Aloha, Squirrel etc. v Menu Management Systems.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Initial Findings  Secure all contracts with third party vendors immediately  Develop a strong understanding of the ‘Flow of PHI’ within and outside of.
Managing a computerised PO Operating environment 1.
10 Essential Security Measures PA Turnpike Commission.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Protecting ICT Systems
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Concepts of Database Management Eighth Edition
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
© 2011, Educational Institute Chapter 18 Convention Billing and Postconvention Review Convention Management and Service Eighth Edition (478TXT or 478CIN)
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Chapter 13 Information Resource Management The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Chapter 2 Securing Network Server and User Workstations.
HalFILE 2.1 Network Protection & Disaster Recovery.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
FIT03.05 Explain features of network maintenance.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Santa Clara, CA (408)
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Information Systems Security
Unit 7 – Organisational Systems Security
Chapter 12 The Night Audit
County HIPAA Review All Rights Reserved 2002.
Understanding Back-End Systems
Presentation transcript:

© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)

© 2003, Educational Institute 1 Competencies for Systems and Security Maintenance 1.Identify environmental threats to information systems and describe security precautions to take against them. 2.Identify electronic threats to information systems and describe security precautions to take against them. 3.Identify operational threats to information systems and describe security precautions to take against them. 4.Explain procedures related to system and data backups. (continued)

© 2003, Educational Institute 2 Competencies for Systems and Security Maintenance 5.Describe the system documentation that should be kept covering hardware, software, and network equipment. 6.Explain the function of an information systems security audit. 7.Outline areas covered by manual operations plans in the event of the failure of a property management system. (continued)

© 2003, Educational Institute 3 Environmental Threats to Information Systems  Fire  Flood  Power failure  Network connections

© 2003, Educational Institute 4 Electronic Threats and Precautions Electronic threats  Computer viruses  Hacker attacks  Malicious acts spread electronically Precautions  Anti-virus software  Firewalls  Security patches  No local modems on individual workstation

© 2003, Educational Institute 5 Restricted Access and Written Policies Restricted access  “Read only” capability  “Modify” capability Written policies  Standard software  Use of personal floppies or CDs  and Internet use  Passwords  Computer room security

© 2003, Educational Institute 6 Downtime Reports—General  In-house guest list  Room availability  Arrivals  Guest ledger  Guests paying cash  Expected departures  Guest messages  Room availability forecast (at least one month out)

© 2003, Educational Institute 7 Downtime Reports—Housekeeping  Late check-outs  Room change report  Early departures  Departures not checked out  Rooms status

© 2003, Educational Institute 8 System Documentation  System description summary sheet  Software license sites  Equipment service and calls  Equipment maintenance activities  Physical schematic of hardware items  Software schematic of application interactions

© 2003, Educational Institute 9 System Audit—Computer Room Location  Quiet area, not against outside wall  Self-closing, self-locking door  Access restriction Separate air conditioning unit Working fire alarm/smoke detector  Separate electrical circuit  UPS battery backup (continued)

© 2003, Educational Institute 10 System Audit—Computer Room Surge-suppressing power strips Preventive maintenance Routine maintenance Inventory of hardware/software Interface descriptions Disaster recovery plan (continued)

© 2003, Educational Institute 11 System Audit—Information Security Backup system  Log  Off-site storage  Verification Run schedule for downtime reports Redundancy for critical systems Support contacts posted by all equipment Accessible equipment trouble logs Written procedures for manual operations posted in appropriate locations

© 2003, Educational Institute 12 System Audit—Network Security User passwords Routinely changed Departed employees denied access Match of current password list with personnel list Up-to-date system patches/fixes Network-wide anti-virus program up to date Management of outside connections to network Firewall

© 2003, Educational Institute 13 System Audit—Employee Security New employees sign a written policy regarding computer usage and abuse. Written procedures and policies for:  Access to the Internet   Browsing Written procedures for securing systems when an employee is terminated

© 2003, Educational Institute 14 Downtime Quick Response Checklist  Alert managers.  Turn off all equipment immediately.  Distribute most recent downtime reports.  Destroy prior downtime reports.  Designate a rack clerk.  Designate a posting clerk.  Room charges taken to front desk for manual posting. (continued)

© 2003, Educational Institute 15 Downtime Quick Response Checklist (continued)  Arrange alternate communication with central reservation system.  Inform all in-house guests and arrivals.  Issue battery-operated radios to key personnel.

© 2003, Educational Institute 16 Manual Front Desk Forms  Manual room rack  Cash guest report  House count sheet  Registration cards  Guest folios  Reservation forms  Most recent downtime reports from system

© 2003, Educational Institute 17 Manual Front Desk Personnel Posting clerk—responsible for posting all charges to guest folios Rack clerk—responsible for maintaining room inventory and current status Runners—responsible for:  Communicating between departments  Ensuring departments are passing information correctly  Ensuring everyone follows manual operating procedures