logo

The Meriton Suits : Security Policies, Threats, Vulnerabilities

   

Added on  2022-08-19

13 Pages2997 Words13 Views
 | 
 | 
 | 
Running Head: MERITON SUITS
Security Policy
Name of the Student
Name of the University
Author Note
The Meriton Suits : Security Policies, Threats, Vulnerabilities_1

MERITON SUITS
1
Executive Summary
The Meriton Suits is one of the famous hotel operator in Australia. Their hotels are well
equipped with all the amenities necessary for any comfortable stay. The customers of the hotel
have shared wonderful views about the hotel. The organization uses information system for all
the operation takes place in the hotel as well as the online websites is use for the bookings of the
rooms. The amount of security threats have increased in the hospitality industry, hence the
mitigating techniques are essential to undertake by the organization. Along with the security
policies are also essential to follow by the employees of the organization. The protection of the
customer’s information is most essential in this business.
The Meriton Suits : Security Policies, Threats, Vulnerabilities_2

MERITON SUITS
2
Table of Contents
Introduction......................................................................................................................................3
Security Policies..............................................................................................................................3
Potential threats and vulnerabilities.................................................................................................6
Mitigation techniques......................................................................................................................8
Conclusion.....................................................................................................................................10
Reference.......................................................................................................................................11
The Meriton Suits : Security Policies, Threats, Vulnerabilities_3

MERITON SUITS
3
Introduction
The Meriton Suits are the renowned hotel operator across Australia. The customers have
great views about the hotel. The hotels owned by this company are preferred by many hence they
are the pioneer in their business (Meriton Suites 2020). The operations of the organization is
totally on the online platform. Hence, the chances security threats and attacks are high with the
information and data security of the customers as well as the organization.
The report will discuss about the security policies, threats, vulnerabilities to the network
of the Meriton suits and the possible mitigation techniques.
Security Policies
The organization is the largest owner of hotel rooms at several locations of Australia and
they have around 4,953 suits which provides best experience to their guests. The hotels have
been owning recognition from several years and maintained their position with great decorum
(Gibson 2014). As the series of hotels are the greatest attraction to the customers as well as a
great competitors around the same industry, the security and safety of the organization is
important in order to maintain the name in the market.
Hence the security policies that can be present for the Meriton Suites are as follows:
Sl.
No.
Policy Description
1 Acceptable Use
Policy
The resources of the company are defined in this policy like the
server, mailing system, network, applications, etc. These are
protected from misuse, data breaches are prevented by the
implementation of this policy (Sommestad, Karlzén and Hallberg
The Meriton Suits : Security Policies, Threats, Vulnerabilities_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Meriton Hotels Australia
|6
|964
|473

Developing a Strategic Security Policy for Hyatt Regency Sydney
|10
|2573
|338

Developing Information Security Policies for Xero
|14
|4396
|167

Information Security: Holiday Inn Australia
|11
|3103
|1

MGMT6013 Managing Information System | Security Policy
|14
|4311
|36

Respective Roles and Responsibilities of Australian Government, Businesses, and Individuals in Maintaining Data Privacy
|9
|2002
|77