Information Security Report: Analysis of Gold Coast Tourism Security

Verified

Added on  2023/03/31

|10
|2048
|339
Report
AI Summary
This report provides a comprehensive analysis of information security within the Gold Coast tourism industry. It begins with an executive summary and introduction, highlighting the growing importance of security in the digital age, particularly within the tourism sector. The report identifies key stakeholders, including clients, guides, and tourism managers, and discusses the security concerns and vulnerabilities specific to the industry. It then outlines essential security policies, such as system encryption, access control, data protection, and remote access, while also addressing the importance of employee training and strong password protocols. The report further examines vulnerabilities, such as climate change, and threats like terrorism and political instability. It proposes a detailed mitigation strategy that includes risk identification, management planning, staff training, and improved communication. The report also recommends implementing strong security policies, employee training, and the use of robust passwords to safeguard sensitive data. Finally, it concludes by emphasizing the importance of proactive risk management for the future growth and sustainability of the tourism industry.
Document Page
Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the Student
[Student ID]
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY
Executive summary
With the growing technology it has been observed that the security issues have also increased.
This impacts the overall performance of the organization. This report will focus on describing
the security breaches that are likely to occur within the tourism industry. Tourism industry is
one of the largest industries in world. This offers a way to connect with the people from different
parts of world. Thus it becomes essential to understand the security issues and threats within the
tourism industry. The report will also describe the major stakeholders associated with the
organization and the nature possessed by the organization. Lastly the report will focus on
recommending ways to overcome the possible vulnerabilities.
Document Page
2INFORMATION SECURITY
Introduction
Information security is the major concern of every organization. proper security measures
will ensure better performance of the organization. The main reason behind implementing proper
security within the tourism industry is to ensure that proper safety is provided towards the data
stored within the system. The chosen industry for the report is Gold Coast tourism industry. The
report will identify the security breaches within the organization and will provide a complete
recommendation towards the breaches so that it becomes easy to overcome the issues faced. The
report willinclude measures to ensure better safety of Gold coast tourism industry along with
better risk mitigation strategies.
Stakeholders associated with Gold Coast tourism
While analyzing the gold coast tourism industryy it becomes essential to identify the
major stakeholders associated with the organisation. The organisation needs to identify the
potential security risks. The risks are needed to be identified effectively so that it can perform is
activities efficiently. The major stakeholders that are associated with the tourism industry
includes the client, the guide and the tourism manager. These are the major stakeholders apart
from this there are several other stakeholders that are important for tourism industry. The
different types of stakeholders associated with tourism industry includes the national
government, the local government, tourism enterprises, institution that is engaged in the tourism
project,Trade unions, age location and training centres for two days, local population and
communities and lastly the natural persons it that are taking the initiative for completing the
project.
Document Page
3INFORMATION SECURITY
Security in tourism industry
Tourism and travelling has become one of the largest industry in the world. The mainaim
behind developing an effective tourism industry is to Connect positive economical and social
influences. This also gives additional profit towards the state. Thus it becomes essential to ensure
an effective management team for providing better facilities to words the customers. The people
associated with tourism industry must have greater knowledge about the culture of that place and
about the history. The main aim of this paper is to describe the security concerns are that arises
with tourism industry.Gold Coast tourism industry has several key stakeholders that are
identified in the above part of the report. The factors that effects the performance of tourism
industry is the security factors. The main reason behind having a proper security plan is that it
helps in protecting the organisation from possible threats and also ensures that the data stored
within the organisation is safe from hackers. Thus it becomes essential to implement proper
security policy within an organisation. The security policy protects the system associated with
the organisation and ensures that the network is protected from vulnerabilities. As it becomes a
essentiall for the Gold Coast tourism industry to implement proper security policy that will help
in ensuring proper support to words the data that is stored within the organisation. The key
elements that are associated with a security policy includes security accountability, network
service policy, physical security, system policies , incident handling and responses, behaviour
and acceptable user policies and finally the security training. The Security Policy that are needed
to be implemented by the organisation Gold Coast tourism are described below:
The organisation must implement proper system encryption so that no one can gain
access over the data that are stored within the system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SECURITY
Only the authorised person should be given the access to what is the information so that it
can ensure proper safety of data.
The tourism industry includes data related to all the tourists including their address and
bank details. Thus it is essential to ensure that proper safety is provided towards the
tourists data.
The system should possess the capabilityTo control the performance of the users so that
they can have proper knowledge about the activities conducted by the users. This will
protect the data from further breeches and will also ensure that only authorised person got
the access over the data.
The Gold Coast tourism must have remote access. This ensures that better productivity
and flexibility is provided it towards it the users. Addition to this it will also provide
better security concerns among the employees of the organisation. The policies needs to
cover details associated with the network usage.
The employees should avoid using other private networks for the purpose of transferring
data. This can lead to data theft within the organisation.
The organisation must use strong authenticated passwords that will protect the data from
further access and will ensure that the data stored cannot be accessed by unauthorised
person.
Proper training about using strong passwords within devices needs to be done so that
every employee can be aware of the possible security breaches.
The organisation Gold coast tourism must have proper guides who can provide better
support towards the tourists. This will ensure better customer satisfaction.
Document Page
5INFORMATION SECURITY
The data shared by customers needs to be saved effectively so that no one can get the
access over those data.
Above are the list of security policies that are needed to be implemented within the gold
coast tourism organisation so that they can achieve better profits within this industry. The
industry has earned huge success over years and thus it has became one of the major profit
earning industry. Thus for maintaining a better control over the industry it is important to provide
better facility towards the customers. This can be achieved only by ensuring better security
policies within the organisation. Thus it is expected that with the help of this security policies it
will become easy to manage the data associated with each employee and will also help in gaining
better profit within the market.
Vulnerability associated with Gold Coast tourism
The vulnerabilities are mainly referred to the situations where the system gets impacted
by the external forces. The major vulnerability that is being identified with in the tourism
industry is related to the climate change. Climate change has the potential to impact the whole
performance of the tourism industry. Thus it becomes a sensual to ensure that proper planning is
being done based on the climatic changes.This becomes one of the major vulnerability associated
with this industry as it has the potential to impact the performance of the industry and possess the
potential of hampering the travellers. Thus it becomes essential to mitigate this vulnerability
effectively within the time.
Document Page
6INFORMATION SECURITY
Threats associated with gold coast tourism
The major risks that are associated with Gole Coast tourism organisation includes the
terrorism, war and political instability, crimes, health, cultural and language differences. With
the growing population it has been observed that the threats associated with tourism industry are
increasing day by day. Thus it becomes essential to implement proper measures that will protect
the organisation and people associated with the organisation from this major threats. Terrorism
has become one of the major factor that influences the performance of the organisation. This
causes huge impact over the people associated with the organisation and also impacts the
economy rate. Thus it becomes essential to implement proper measures that will protect the
organisation from this possible threats.
Mitigation strategy
With the growing demand of tourism industry it has observed that the threats and
vulnerabilities associated with the organisation has also increased. Thus it becomes essential to
implement proper measures that will help in mitigating the risks. The major reason behind
implementing proper risk mitigation strategy is that it will help in overcoming the issues that
may be faced by travellers in their trip. Effective risk mitigation strategy will ensure better
support towards the organisation and will also ensure better safety towards the travellers. The
mitigation strategy includes the following steps:
Identifying the risks at early stages
Determining the proper risks management strategy
Developing risk management plan for the tourism organisation
Training the staff about the mitigation plan
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION SECURITY
Engaging their stakeholders if actively with team in the organisation so that they can
deliver their work effectively
Improving the communication process so that it can provide better support to words the
organisation
Determining the possible effects associated with the travel
Implementing better continuation plan that will help the organisation after crisis
situations
Retrieving the business from crisis
Apart from this strategy there is a huge need for the organisation to have proper risk
avoidance strategy that will help the system of Gold coast tourism to avoid the possible risks.
This will ensure better performance of the system and will also support the organisation at
critical situations. Apart from this the organisation should also involve the major stakeholders
within the tourism plan so that they can contribute towards the organisation efficiently. In
addition to this it is highly recommended towards the organisation to maintain proper association
with airlines and transport company, with the hotel , tour operators and tourism safety oriented
centres.
Recommendation for gold coast tourism industry
After analysing this security factors associated with tourism industry it can be stated that
there is a huge needed to implement proper security factors that will help in enhancing the
tourism industry. With proper security sector it will become easy to manage the issues that are
faced by the industry. Thus in order to improve the security policies with in the tourism industry
recommendations are provided below:
Document Page
8INFORMATION SECURITY
The organisation needs to focus on training their employees about the proper security
policies.
The policies must be implemented strictly so that it can provide better benefits towards
the organisation
The employees must focus on using strong passwords rather than using weak ones.
Conclusion
Thus from the above report it can be stated that there are several risks associated with the
tourism industry that are needed to be mitigated effectively within time. This will ensure better
performance of the organization and will also provide better support towards the people
associated with the organization. The report has provided security policies associated with the
organization and the need for those policies. In addition to this the report has also included
measures for understanding the threats and vulnerabilities related to the organization. Finally the
report has provided the ways to mitigate this issues so that proper functionality can be obtained.
Thus with proper implementation of risk management plan it is expected that the tourist industry
will be able to achieve better growth in future.
Document Page
9INFORMATION SECURITY
Bibliography
Laszka, Aron, Mark Felegyhazi, and Levente Buttyan. "A survey of interdependent information
security games." ACM Computing Surveys (CSUR) 47, no. 2 (2015): 23.
Peltier, Thomas R. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications, 2016.
Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A. and Herawan, T., 2015.
Information security conscious care behaviour formation in organizations. Computers &
Security, 53, pp.65-78.
Safa, Nader Sohrabi, Rossouw Von Solms, and Lynn Futcher. "Human aspects of information
security in organisations." Computer Fraud & Security 2016, no. 2 (2016): 15-18.
Safa, Nader Sohrabi, Rossouw Von Solms, and Steven Furnell. "Information security policy
compliance model in organizations." Computers & Security 56 (2016): 70-82.
Shropshire, Jordan, Merrill Warkentin, and Shwadhin Sharma. "Personality, attitudes, and
intentions: Predicting initial adoption of information security behavior." Computers & Security
49 (2015): 177-191.
Soomro, Zahoor Ahmed, Mahmood Hussain Shah, and Javed Ahmed. "Information security
management needs more holistic approach: A literature review." International Journal of
Information Management 36, no. 2 (2016): 215-225.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]