SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Managing andSecuring theInformation System Chapter 5
“Over 60% of the people who have a security breach, have a breach on systems that they aren't actively managing. If we would just take the time to understand where our critical information is, and then manage those systems properly, the risk reduction would be enormous.”Dorian Cougias, Network Frontiers
Computer Dependence How important are computers to hospitality organizations?  Turn the computer system off during a rush period and observe the consequences. Keeping computer downtime to a minimum in guest related areas (e.g., reservations and front desk) is critical.
Mission-Critical Systems Mission-critical systems are systems that whose reliable performance is crucial to the successful performance of the organization in which it is used. For a hotel, mission critical systems are central reservation system (CRS) and property management system (PMS).  For a restaurant, mission critical system is Point of Sale system (POS).
Maintaining the Systems To make sure that these systems are up and running, there needs to be a systematic approach to maintain them. Enterprise Level Unit level (restaurant or hotel) User level (remote access- guest or staff)
All businesses are subject to business disruptions The reasons may be different such as  Fire Flood Earthquakes Vandalism Stealing Human error Utility disruptions (such as power outages) Malicious threats from outsiders or misuse of systems.
Disaster Contingency RecoveryPlan Although a DCRP is vital, it is primarily a reactive approach (i.e., a corrective control) and not a comprehensive plan for risk management. In contrast, a business continuity plan (BCP) seeks to eliminate or reduce the impact of a disaster condition before the condition occurs.
Business Continuity Plan Business Continuity Planning (BCP) is an interdisciplinary concept used  to create and validate a practiced logistical plan for how an organization will recover and  restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption.
Common Causes of System Failure Operator Error Hardware Failure Power Problems Software Bug System Overload Virus Spyware Apple Ad Keylogger Hardware
Operator Error Various operator errors can cause system failure  Common errors include improper handling of lengthy processing routines (e.g., end-of-day audit), database maintenance (e.g., changing and deleting data), and hardware (e.g., moving a hard disk without parking the read/write head).  Providing thorough training and establishing careful procedures reduce operator mistakes
Hardware Failure
Hardware Failure Five basic measures reduce hardware malfunctions: Keep the temperature and relative humidity at the appropriate levels Keep equipment clean Keep magnets away from computers Keep Water and corrosive agents away from computers Establish a preventative maintenance program
Fault-Tolerant A fault-tolerant computer is equipped with a backup system enabling it to function despite the failure of certain internal hardware components such as a hard drive or disk controller card.
Storage Area Network A storage area network (SAN) is an architecture to attach remote computer storage devices such as disk arrays to servers in such a way that, to the operating system, the devices appear as locally attached
Redundant Array of Independent Disks
Redundant Array of Independent Disks (RAID)
Internet Security Challenges
Power Problems Power line trouble causes 70 percent of hardware and software failures.  Symptoms include burned components, garbled transactions, memory loss, corrupted data, lost data, and unexplained intermittent problems.
Power Problems To avoid power disturbances, the following measures should be implemented. Surge protection Proper wiring and grounding Uninterruptible Power Supply (UPS)
UPS A user level surge protection
Software Bug A bug is a logic error in the program preventing it from working properly For example, one hospitality accounting program aborts if the user forgets to turn on the printer before printing a financial statement
System Overload Placing too many demands on a computer can greatly diminish its performance and may  cause system failure. Causes of system overloads include: Insufficient Central Processing Unit (CPU) Clock Speed. Inadequate Random Access Memory (RAM) Slow Mechanical Components File Fragmentation Inadequate Disk Storage
External hard drive that can be connected to computer by USB or Firewire
Virus Virus spreads by copying itself from one  program to the next, changing or destroying each program that it infects without the user knowing it. The carrier of a virus is a program that appears legitimate called a TROJAN HORSE
What to do in a Virus Attack Isolate and disconnect Remove the virus Restore your data Reinstall programs Scan for viruses Restore files Document the process Prevent future infection Learn from your mistakes
Restaurant Network Security A computer security study was conducted among restaurant managers  24 % of the restaurant networks had a computer network attack within the last 12 months.  On average, the restaurants received 1-5 network attacks within the last 12 months
Attack Types Virus Attack (71.4%) Insider Abuse of Net Access (57.1%)  Laptop Theft (42.9%) Spoofing (39.3%) (using someone else's resources for spam or illegal activity).
Protection from Attacks The most used protection tool is anti-virus software (86.2%), hardware firewall (79.3%) and physical security (75.9%). The least used network security tools are honeypots (7.7%) and biometrics (14.8%).
Spyware Spyware is computer software that is installed secretly on a computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent
Backup Strategies Backup Frequency Backup Method Rotation of Secondary Storage Media Hardcopy
Computer Security Security violation examples include: Salespeople copying the hotel client list onto a USB drive and selling it to a competitor Front-desk clerks receiving cash to settle guest folios, but instead pocketing the cash and transferring the outstanding balance to a bogus city ledger account or “black hole” account. Employees gaining access to payroll records and changing wage rates. Servers voiding entree items off guest checks after collecting cash.
Security Problems The keyboard Using obvious passwords Not regularly changing passwords Hackers Communication Line Internet Physical Access
Most Common Passwords
Encryption In the case of transmitting data over the Internet protocol, using a secure, encrypted way of  communication is also a key to secure data transmission.  Computer encryption is based on the science of cryptography, which has been used throughout history. Vidoe: Encryption of Credit Card Data
Encryption
Phishing Phishing is a technique used by strangers to "fish" for information about you, information that you would not normally disclose to a stranger, such as your bank account number, PIN, and other personal identifiers such as your National Insurance number. These messages often contain company/bank logos that look legitimate and use flowery or legalistic language about improving security by confirming your identity details.
Phishingexample
IT Compliance Keeping IT systems in line with local, state, national and international level laws, regulations, standards, and policies. The Payment Card Industry Council is a consortium of credit card issuing brands: Visa, Incorporated; American Express, MasterCard Worldwide, Discover Financial Services and JCB International
PCI DSS PCI Council have formed this consortium to improve the security of the global payment system by protecting consumers, merchants and banks from frauds and hacks.  The consortium has created a set of Data Security Standards governing the protection of all sensitive cardholder data stored electronically or on paper. Video: PCI DSS Explained Website: PCI DSS
PCI DSS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across  open, public networks
PCI DSS Requirement 5: Use and regularly update anti-virus software Requirement 6: Develop and maintain secure systems and applications Requirement 7: Restrict access to cardholder data by business need to-know Requirement 8: Assign a unique ID to each person with computer access
PCI DSS Requirement 9: Restrict physical access to cardholder data. Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes Requirement 12: Maintain a policy that addresses information security

Weitere ähnliche Inhalte

Was ist angesagt?

Information Technology
Information TechnologyInformation Technology
Information Technologyhari_2u1986
 
TID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyTID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyWanBK Leo
 
Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1Ranz
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionSnowfairy007
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1MuhammedTalha7
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers TheoryMakaha Rutendo
 
Duties & Responsibilities of IT Department Staff
Duties & Responsibilities of IT Department StaffDuties & Responsibilities of IT Department Staff
Duties & Responsibilities of IT Department StaffMakaha Rutendo
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMSaraswathiRamalingam
 
Using Information Technology Ch 1
Using Information Technology Ch 1Using Information Technology Ch 1
Using Information Technology Ch 1Mazhar Masood
 
01 introduction to information technology
01 introduction to information technology01 introduction to information technology
01 introduction to information technologyDinesh Gunathilaka
 
Chapter 14: Information Technology
Chapter 14: Information TechnologyChapter 14: Information Technology
Chapter 14: Information Technologydmeyeravc
 
Computer application in business
Computer application in businessComputer application in business
Computer application in businessshashank singh
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyAman Purohit
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computersMuhammad Faisal
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course IntroKaushik Panta
 

Was ist angesagt? (20)

Information Technology
Information TechnologyInformation Technology
Information Technology
 
TID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyTID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information Technology
 
Ics1 Chapter1
Ics1   Chapter1Ics1   Chapter1
Ics1 Chapter1
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 Revision
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
Duties & Responsibilities of IT Department Staff
Duties & Responsibilities of IT Department StaffDuties & Responsibilities of IT Department Staff
Duties & Responsibilities of IT Department Staff
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
 
Information Technology Basics
Information Technology BasicsInformation Technology Basics
Information Technology Basics
 
Using Information Technology Ch 1
Using Information Technology Ch 1Using Information Technology Ch 1
Using Information Technology Ch 1
 
01 introduction to information technology
01 introduction to information technology01 introduction to information technology
01 introduction to information technology
 
Chapter 14: Information Technology
Chapter 14: Information TechnologyChapter 14: Information Technology
Chapter 14: Information Technology
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
Learning activity 1
Learning activity 1Learning activity 1
Learning activity 1
 
TAMUC LO 1
TAMUC LO 1TAMUC LO 1
TAMUC LO 1
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course Intro
 

Andere mochten auch

Exploring Computers and Their Uses
Exploring Computers and Their UsesExploring Computers and Their Uses
Exploring Computers and Their UsesPagal Bacha
 
Chapter 3 front office pratice
Chapter 3 front office praticeChapter 3 front office pratice
Chapter 3 front office praticeUUM
 
Advance peripheral devices
Advance peripheral devicesAdvance peripheral devices
Advance peripheral devicesRohit Jain
 
How Computers Work Presentation
How Computers Work PresentationHow Computers Work Presentation
How Computers Work Presentationmrtheodisthorne2
 
Computer usage in hotel and foodservice management education
Computer usage in hotel and foodservice management educationComputer usage in hotel and foodservice management education
Computer usage in hotel and foodservice management educationRobbinson Willis
 
Computer application in hotel industry
Computer application in hotel industryComputer application in hotel industry
Computer application in hotel industryAnjiyaa
 
Presentation on computer
Presentation on computerPresentation on computer
Presentation on computerWaseem Abbas
 
Important aspects of Training in hotel industry
Important aspects of Training in hotel industryImportant aspects of Training in hotel industry
Important aspects of Training in hotel industryRasika Salodkar
 
Impact of information tech on hospitality industry
Impact of information tech on hospitality industryImpact of information tech on hospitality industry
Impact of information tech on hospitality industryPranav Juwatkar
 
role of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industryrole of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industryVinay Kumar
 
Chapter01Introducing Hardware
Chapter01Introducing HardwareChapter01Introducing Hardware
Chapter01Introducing HardwarePatty Ramsey
 
Hotel management or reservation system document
Hotel management or reservation system document Hotel management or reservation system document
Hotel management or reservation system document prabhat kumar
 

Andere mochten auch (15)

Exploring Computers and Their Uses
Exploring Computers and Their UsesExploring Computers and Their Uses
Exploring Computers and Their Uses
 
Chapter 3 front office pratice
Chapter 3 front office praticeChapter 3 front office pratice
Chapter 3 front office pratice
 
Advance peripheral devices
Advance peripheral devicesAdvance peripheral devices
Advance peripheral devices
 
How Computers Work Presentation
How Computers Work PresentationHow Computers Work Presentation
How Computers Work Presentation
 
Computer usage in hotel and foodservice management education
Computer usage in hotel and foodservice management educationComputer usage in hotel and foodservice management education
Computer usage in hotel and foodservice management education
 
Ppt on eco hotels
Ppt on eco hotelsPpt on eco hotels
Ppt on eco hotels
 
Computer application in hotel industry
Computer application in hotel industryComputer application in hotel industry
Computer application in hotel industry
 
Presentation on computer
Presentation on computerPresentation on computer
Presentation on computer
 
Important aspects of Training in hotel industry
Important aspects of Training in hotel industryImportant aspects of Training in hotel industry
Important aspects of Training in hotel industry
 
Impact of information tech on hospitality industry
Impact of information tech on hospitality industryImpact of information tech on hospitality industry
Impact of information tech on hospitality industry
 
role of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industryrole of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industry
 
Chapter01Introducing Hardware
Chapter01Introducing HardwareChapter01Introducing Hardware
Chapter01Introducing Hardware
 
Hotel Training Guide 2015
Hotel Training Guide 2015Hotel Training Guide 2015
Hotel Training Guide 2015
 
Training ppt
Training pptTraining ppt
Training ppt
 
Hotel management or reservation system document
Hotel management or reservation system document Hotel management or reservation system document
Hotel management or reservation system document
 

Ähnlich wie Chapter 5

What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017Atef Yassin
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetLumension
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxRichardSugbo
 
Information system availibility control
Information system availibility controlInformation system availibility control
Information system availibility controlShashwat Shriparv
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comPrescottLunt384
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfBahaa Abdul Hussein
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 

Ähnlich wie Chapter 5 (20)

What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Information system availibility control
Information system availibility controlInformation system availibility control
Information system availibility control
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
Wizard intro
Wizard introWizard intro
Wizard intro
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
 
ProjectReport_Finalversion
ProjectReport_FinalversionProjectReport_Finalversion
ProjectReport_Finalversion
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
How a Data Center Works.pdf
How a Data Center Works.pdfHow a Data Center Works.pdf
How a Data Center Works.pdf
 
hotel management
hotel managementhotel management
hotel management
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 

Mehr von Anil Bilgihan

Mehr von Anil Bilgihan (7)

The Internet
The InternetThe Internet
The Internet
 
Social media in hospitality
Social media in hospitalitySocial media in hospitality
Social media in hospitality
 
Restaurant Management Systems
Restaurant Management SystemsRestaurant Management Systems
Restaurant Management Systems
 
Property Management Systems
Property Management SystemsProperty Management Systems
Property Management Systems
 
E commerce in Tourism
E commerce in TourismE commerce in Tourism
E commerce in Tourism
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Restaurant GPS
Restaurant GPSRestaurant GPS
Restaurant GPS
 

Chapter 5

  • 2. “Over 60% of the people who have a security breach, have a breach on systems that they aren't actively managing. If we would just take the time to understand where our critical information is, and then manage those systems properly, the risk reduction would be enormous.”Dorian Cougias, Network Frontiers
  • 3. Computer Dependence How important are computers to hospitality organizations? Turn the computer system off during a rush period and observe the consequences. Keeping computer downtime to a minimum in guest related areas (e.g., reservations and front desk) is critical.
  • 4. Mission-Critical Systems Mission-critical systems are systems that whose reliable performance is crucial to the successful performance of the organization in which it is used. For a hotel, mission critical systems are central reservation system (CRS) and property management system (PMS). For a restaurant, mission critical system is Point of Sale system (POS).
  • 5. Maintaining the Systems To make sure that these systems are up and running, there needs to be a systematic approach to maintain them. Enterprise Level Unit level (restaurant or hotel) User level (remote access- guest or staff)
  • 6. All businesses are subject to business disruptions The reasons may be different such as Fire Flood Earthquakes Vandalism Stealing Human error Utility disruptions (such as power outages) Malicious threats from outsiders or misuse of systems.
  • 7. Disaster Contingency RecoveryPlan Although a DCRP is vital, it is primarily a reactive approach (i.e., a corrective control) and not a comprehensive plan for risk management. In contrast, a business continuity plan (BCP) seeks to eliminate or reduce the impact of a disaster condition before the condition occurs.
  • 8. Business Continuity Plan Business Continuity Planning (BCP) is an interdisciplinary concept used to create and validate a practiced logistical plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption.
  • 9. Common Causes of System Failure Operator Error Hardware Failure Power Problems Software Bug System Overload Virus Spyware Apple Ad Keylogger Hardware
  • 10. Operator Error Various operator errors can cause system failure Common errors include improper handling of lengthy processing routines (e.g., end-of-day audit), database maintenance (e.g., changing and deleting data), and hardware (e.g., moving a hard disk without parking the read/write head). Providing thorough training and establishing careful procedures reduce operator mistakes
  • 12. Hardware Failure Five basic measures reduce hardware malfunctions: Keep the temperature and relative humidity at the appropriate levels Keep equipment clean Keep magnets away from computers Keep Water and corrosive agents away from computers Establish a preventative maintenance program
  • 13. Fault-Tolerant A fault-tolerant computer is equipped with a backup system enabling it to function despite the failure of certain internal hardware components such as a hard drive or disk controller card.
  • 14. Storage Area Network A storage area network (SAN) is an architecture to attach remote computer storage devices such as disk arrays to servers in such a way that, to the operating system, the devices appear as locally attached
  • 15. Redundant Array of Independent Disks
  • 16. Redundant Array of Independent Disks (RAID)
  • 18. Power Problems Power line trouble causes 70 percent of hardware and software failures. Symptoms include burned components, garbled transactions, memory loss, corrupted data, lost data, and unexplained intermittent problems.
  • 19. Power Problems To avoid power disturbances, the following measures should be implemented. Surge protection Proper wiring and grounding Uninterruptible Power Supply (UPS)
  • 20. UPS A user level surge protection
  • 21. Software Bug A bug is a logic error in the program preventing it from working properly For example, one hospitality accounting program aborts if the user forgets to turn on the printer before printing a financial statement
  • 22. System Overload Placing too many demands on a computer can greatly diminish its performance and may cause system failure. Causes of system overloads include: Insufficient Central Processing Unit (CPU) Clock Speed. Inadequate Random Access Memory (RAM) Slow Mechanical Components File Fragmentation Inadequate Disk Storage
  • 23. External hard drive that can be connected to computer by USB or Firewire
  • 24. Virus Virus spreads by copying itself from one program to the next, changing or destroying each program that it infects without the user knowing it. The carrier of a virus is a program that appears legitimate called a TROJAN HORSE
  • 25. What to do in a Virus Attack Isolate and disconnect Remove the virus Restore your data Reinstall programs Scan for viruses Restore files Document the process Prevent future infection Learn from your mistakes
  • 26. Restaurant Network Security A computer security study was conducted among restaurant managers 24 % of the restaurant networks had a computer network attack within the last 12 months. On average, the restaurants received 1-5 network attacks within the last 12 months
  • 27. Attack Types Virus Attack (71.4%) Insider Abuse of Net Access (57.1%) Laptop Theft (42.9%) Spoofing (39.3%) (using someone else's resources for spam or illegal activity).
  • 28.
  • 29. Protection from Attacks The most used protection tool is anti-virus software (86.2%), hardware firewall (79.3%) and physical security (75.9%). The least used network security tools are honeypots (7.7%) and biometrics (14.8%).
  • 30. Spyware Spyware is computer software that is installed secretly on a computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent
  • 31. Backup Strategies Backup Frequency Backup Method Rotation of Secondary Storage Media Hardcopy
  • 32. Computer Security Security violation examples include: Salespeople copying the hotel client list onto a USB drive and selling it to a competitor Front-desk clerks receiving cash to settle guest folios, but instead pocketing the cash and transferring the outstanding balance to a bogus city ledger account or “black hole” account. Employees gaining access to payroll records and changing wage rates. Servers voiding entree items off guest checks after collecting cash.
  • 33. Security Problems The keyboard Using obvious passwords Not regularly changing passwords Hackers Communication Line Internet Physical Access
  • 35. Encryption In the case of transmitting data over the Internet protocol, using a secure, encrypted way of communication is also a key to secure data transmission. Computer encryption is based on the science of cryptography, which has been used throughout history. Vidoe: Encryption of Credit Card Data
  • 37.
  • 38.
  • 39. Phishing Phishing is a technique used by strangers to "fish" for information about you, information that you would not normally disclose to a stranger, such as your bank account number, PIN, and other personal identifiers such as your National Insurance number. These messages often contain company/bank logos that look legitimate and use flowery or legalistic language about improving security by confirming your identity details.
  • 41. IT Compliance Keeping IT systems in line with local, state, national and international level laws, regulations, standards, and policies. The Payment Card Industry Council is a consortium of credit card issuing brands: Visa, Incorporated; American Express, MasterCard Worldwide, Discover Financial Services and JCB International
  • 42. PCI DSS PCI Council have formed this consortium to improve the security of the global payment system by protecting consumers, merchants and banks from frauds and hacks. The consortium has created a set of Data Security Standards governing the protection of all sensitive cardholder data stored electronically or on paper. Video: PCI DSS Explained Website: PCI DSS
  • 43.
  • 44. PCI DSS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks
  • 45. PCI DSS Requirement 5: Use and regularly update anti-virus software Requirement 6: Develop and maintain secure systems and applications Requirement 7: Restrict access to cardholder data by business need to-know Requirement 8: Assign a unique ID to each person with computer access
  • 46. PCI DSS Requirement 9: Restrict physical access to cardholder data. Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes Requirement 12: Maintain a policy that addresses information security