logo

Information Security: Holiday Inn Australia

This is an individual assessment to research and analyze hot topics related to information security, and develop a basic security policy for a specific organization in Australia.

11 Pages3103 Words1 Views
   

Added on  2023-01-05

About This Document

The main aim of this report is to know about importance and implementation of information security in one of the most popular hotel brands of IHG, Holiday Inn. The primary focus of this information security is being given to the balanced security of CIA or confidentiality, integrity and availability of data during maintenance of a focus over effective implementation of policy, without even hampering the productivity of a specific organization.

Information Security: Holiday Inn Australia

This is an individual assessment to research and analyze hot topics related to information security, and develop a basic security policy for a specific organization in Australia.

   Added on 2023-01-05

ShareRelated Documents
Running head: INFORMATION SECURITY
Information Security: Holiday Inn Australia
Name of the Student
Name of the University
Author’s Note:
Information Security: Holiday Inn Australia_1
1
INFORMATION SECURITY
Executive Summary
The main aim of this report is to know about importance and implementation of information
security in one of the most popular hotel brands of IHG, Holiday Inn. The primary focus of
this information security is being given to the balanced security of CIA or confidentiality,
integrity and availability of data during maintenance of a focus over effective implementation
of policy, without even hampering the productivity of a specific organization. It is mainly
achieved by a multi-step procedure of risk management, which eventually identifies the
several vulnerabilities, assets, and possible controls, sources of threats and potential impacts
with assessment of risk management plan. The unauthorized users are prevented from making
any type of modification to program and data as well as unauthorized or improper
modifications for maintenance of external and internal programs or data consistency. This
report has provided a detailed strategic security policy for Holiday Inn with relevant details.
Moreover, major threats and vulnerabilities to the organizational network and systems are
also identified in this report and proper mitigation strategies are provided for them.
Information Security: Holiday Inn Australia_2
2
INFORMATION SECURITY
Table of Contents
1. Introduction............................................................................................................................3
2. Discussion..............................................................................................................................3
2.1 Researching, Formulation, Development and Documentation of a Strategic Security
Policy for Holiday Inn on the basis of its Nature and Stakeholders......................................3
2.2 Proper Identification and Assessment of Potential Threats and Vulnerabilities of
Organizational Network and Discussion for Mitigation of these Threats and Vulnerabilities
On the basis of Security Policy Developed............................................................................5
3. Conclusion..............................................................................................................................7
References..................................................................................................................................9
Information Security: Holiday Inn Australia_3
3
INFORMATION SECURITY
1. Introduction
Information security or InfoSec can be referred to as the core practice to prevent any
type of unauthorized utilization, inspection, disruption, access, recording, destruction and
disclosure of information (Von Solms and Van Niekerk 2013). This information or data
might undertake any form like physical or electronic. Basic guidance as well as policies are
being considered for encryption software, passwords, firewalls, user administrator training
standards. The following report outlines a brief discussion on information security for
Holiday Inn. A proper strategic security policy on the basis of nature and stakeholders for this
organization would be provided here. Moreover, a proper identification as well as assessment
of the potential threats or vulnerabilities of organizational network will also be done in this
report with significant mitigation techniques for Holiday Inn.
2. Discussion
2.1 Researching, Formulation, Development and Documentation of a
Strategic Security Policy for Holiday Inn on the basis of its Nature and
Stakeholders
IHG or Intercontinental Hotel Group is one of the most popular and significant multi
national hospitality organizations that has its head quarters in Denham, Buckinghamshire,
England. This particular organization has more than 830000 guest rooms as well as 5600
hotels in the entire world across more than one hundred countries. Intercontinental Hotel
Group involves some of the most popular brands like Holiday Inn, Hotel Indigo, Kimpton
Hotels and Resorts, Staybridge Suites, Even Hotels, Voco Hotels and many more.
Intercontinental Hotel Group comprises of several stakeholders and they majorly focus on
customers’ security and privacy. They try to keep their data confidential and maintain
integrity so that confidentiality of their customers’ data are not lost or compromised under
any circumstance. Intercontinental Hotel Group has opened their business in Australia few
years back and since then, there had been various profit share margins in the business.
Holiday Inn is one of the most popular and significant hotel brands under IHG. In spite of
having such distinctive and significant security and privacy, often it is being observed that
data could be hacked or breached by hackers or competitors due to high competition and
wrong intentions (Crossler et al. 2013). For this purpose, it is extremely important and
Information Security: Holiday Inn Australia_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security: The Royal Children's Hospital
|11
|3171
|107

What is information security? Definition
|11
|3066
|18

Information Security: Shangri-La Hotel
|11
|3046
|27

ISY3006 Information Security Report 2022
|12
|2628
|23

Information Security in Woolworths Supermarket, Australia
|11
|3130
|129

Developing a Strategic Cyber Security Policy for Commonwealth Bank
|10
|2476
|175