Cyber Security Threats and Countermeasures in Hotels

Verified

Added on  2022/11/19

|10
|2069
|74
Report
AI Summary
This research report provides a detailed analysis of cybersecurity in the hospitality industry, focusing on threats and countermeasures. The report examines various cyber challenges and risks, including phishing attacks, ransomware, DDoS attacks, and POS attacks. It also explores real-life examples of cyberattacks in hotels and discusses IS techniques and tools for securing computer networks. The study highlights the importance of IT security for protecting customer data and maintaining business operations. The report concludes with recommendations for improving cybersecurity practices, such as hiring IT experts, adhering to IS regulations, and implementing advanced security measures like firewalls and anti-malware software. The report emphasizes the need for proactive measures to prevent data breaches and protect sensitive information.
Document Page
Running Head: IT Write Up
0
IT Security
A STUDY OF CYBER SECURITY IN HOSPITALITY INDUSTRY THREATS AND COUNTERMEASURES:
CASE STUDY INRENO, NEVADA)
(Student Details: )
9/24/2019
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT Write Up
1
Contents
Research Report: IT Security.....................................................................................................2
Introduction................................................................................................................................2
Case Study Analysis...................................................................................................................2
Cyber Challenges and Risks in Hospitality Industry.............................................................3
IS techniques and Tools.........................................................................................................3
IT security threats to hotels....................................................................................................3
Phishing attacks..................................................................................................................4
Ransomware.......................................................................................................................4
DDoS..................................................................................................................................4
POS attacks........................................................................................................................4
Customer identity or data theft...........................................................................................4
DarkHotel hacking.............................................................................................................4
Real-life examples of Cyber-attacks in hotels.......................................................................4
Cyber risks and cyber-attacks prevention techniques............................................................5
Conclusion..................................................................................................................................5
Future Recommendations...........................................................................................................6
References..................................................................................................................................7
Srikanth Velma (42781)
Document Page
IT Write Up
2
Research Report: IT Security
Introduction
This research report is based on studying cyber security along with security practices while
analysing in detail. The study is mainly focused on the hospitality industry because an
analysis of cyber security practices of electronic info and networks while covering network
threats as well as different security techniques for preventing cyber-attacks in hotels will be
conducted. The purpose of this research report or case study is to help IT directors and CIO
(Chief information officers) so that they can advance policies for IT security of electronic
info in hospitality industry 1. In addition, the report will provide some useful suggestions
with IT security tools and techniques for securing computer networks in modern hotels. The
research study has been found wholly qualitative as the interviews have conducted in 5 hotels
in Nevada, Reno and United States 2. At the end of the research report, a summary will be
provided to help the readers inclosing IT experts and CIOs for updating their knowledge
regarding IT security practices in hospitality industry.
Srikanth Velma (42781)
Document Page
IT Write Up
3
Case Study Analysis
In general, information technology is the science and thereby technology behind using
computer systems and other kinds of electronics for saving as well as transmitting
information worldwide. Such information may contain variety of data and information like
market, sales, customers, shares, stocks, booking, airplane tickets and accounts 3. It has been
found that hospitality firms that use IT require handling as well as administrator electronic
info securely and safely. Hotels’ administrative managers are mainly responsible for the
protection of the hotels’ information and assets 4.
The research study is depicting that IT systems working under hospitality industry comprise
hardware and software. Besides, the main software into a hotel contains the PMS (property
management system, CAS (call accounting system), POS (point of sale system) as well as
accounting system. On the other hand, hardware into a hotel includes POS terminals, front
desk computers, printers, switches, routers, back-office computers, network cables and
firewalls 5. In addition to that, the back office and front office computer, printers with POS
terminals are usually connected to switches, routers with network cables that allow
communication amid different devices. While routers connect the whole network of the hotel
with rest of the networks as well as the internet, the firewalls help to protect the firm’s
network from all outside attacks. Moreover, local area network of the hotel consists of
devices available on the hotel premises 6.
Cyber Challenges and Risks in the Hospitality Industry
There are many cyber challenges and risks which are present in the hotels, and hence
information security (IS) is necessary for maximizing the total revenue of the hotelier firms
as well as investments with the help of reducing the total damage which could be caused by
the IS attacks 7. It is worth knowing that IS systems offer 3 major services include:
Availability
Integrity
Confidentiality 8.
IS techniques and Tools
In this context, IS always aims to protect valuable assets from damage or disclosure. The IS
protection can be ensured with the help of non-technological and technological techniques
such as:
Srikanth Velma (42781)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT Write Up
4
Authentication and identification
Physical security of assets
Firewalls
Biometrics 7.
Apart from this, some more IS techniques and tools for the hospitality industry can be
explained as follows:
Validating digital IDs
Intrusion Detection System
Encryption 9.
Access control
Vulnerability assessment scan
IT security threats to hotels
Based on the given case study, there are some cyber-security threats which impact hotels
critically, they are as follows:
Phishing attacks
An act of sending or receiving of emails which usually appear to be from an authenticated
source, that is used to attack IS of the firm, is known as phishing attacks 10.
Ransomware
Usually, when a cyber-attack purposed to acquire financially through those who have paid the
demanded figure to free their systems or data, it is known as ransomware. Being a hotelier,
firms are at high-risk resulting from their cyber-security failings which allow such attacks to
occur in the information system 1.
DDoS
The distributed denial of service attacks is mainly concerned with the web. Systems like
sprinkler systems that are used to secure cameras are typically vulnerable to hijack through
DDoS attacks. Thus, hotels’ cyber-security must contain mitigation process in relation to
DDoS attack 11.
Srikanth Velma (42781)
Document Page
IT Write Up
5
POS attacks
This threat to the hospitality industry is a third-party crime as they attack the vendor. It has
been found that this attack results in users being out of money as well as the media getting
involved 12.
Customer identity or data theft
As we know that personal information of the hotel guests is in a hotel database and hence if
any data breach or IS breach occurs at hotel information system then it escalates customer
data as well as identity theft largely.
DarkHotel hacking
DarkHotel hacking attacks often utilize forged digital certificates for convincing victims that
downloading the software is completely safe. In this context, first instance of this information
hacking occurred in the year 2007, which was originated through spear-fishing scams and
peer-to-peer networks 13.
Real-life examples of Cyber-attacks in hotels
There are real-life examples of cyber-attacks that affected big hotels that have never occurred
in the history of the hospitality industry. Some of the examples are as follows:
1. Data breach at Brunswick Maine and Hotel affected 2600 guest information
2. Data breach at the Mandarin Oriental Hotels in the year 2015
3. Data breach at Hilton hotels in the year 2015-2015
4. Data breach at Starwood Hotel Group in the year 2015
5. Data breach at Hyatt Hotels in the year 2015
6. Data breach at Trump Hotel Collection in the year 2015 1.
Cyber risks and cyber-attacks prevention techniques
If we attempt to secure software and hardware with the help of IS tools as well as antivirus,
then it may cause issues like preventing hotel customers from accessing the info they might
require, hence hospitality firms must manage the risk in relation to cyber defense. In the
context of hotels information security, there could be three main steps as follows:
Advance preparation and protection
Defending and detection
Respond and recover 11.
Srikanth Velma (42781)
Document Page
IT Write Up
6
One should always encrypt payment card info
Hotel management should operate a training program for IS in order to maintain a
well-trained staff and employees
Hotel management can practice adhering to relevant regulations like PCI DSS.
Hotel management can conduct tests for firm’s cyber-security defenses during which
hackers’ behaviour is observed
Hotel management can use various cyber-security techniques like anti-malware,
firewalls, network monitoring, as well as traffic filtering for protection against severe,
IS threats 9.
Conclusion
In whole, this report has successfully researched and analysed the case study which is based
on highlighting the significance of information security into hospitality industry. It has been
found that case study has successfully discussed the tools along with IS techniques in the
context of hospitality sector in order to prevent almost every kind of cyber-attacks. In
addition to that, findings and results of the chosen case study suggest that not every hotel in
Reno, Nevada is having IT manager or IT expert who can handle computer networks and
information systems of hotelier business. Findings are suggesting that some of the hotels are
not having any contract with specific IT companies for referring whenever they face any
issue or challenge regarding information security systems. In this way, on the basis of results,
findings and data analysis available in the case study, it can be concluded that hospitality
sector’s information security is highly vulnerable and hence they need enhanced security for
their computer network and systems. Besides, hotels are found careless in the context of
paying attention to IT security which encourages cyber attackers and hackers for getting into
the hotels’ information system and hence access to personal information of the hotel guests.
In a nutshell, the public’s knowledge of information systems and security escalates so many
data or IS breaches and thereby personal information loses in hospitality industry.
Future Recommendations
As per the research conducted in this research report, some useful recommendations can
make hoteliers make their computer systems more secure, they are as follows:
Srikanth Velma (42781)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Write Up
7
Detailed research can be done in the field of cyber-crimes and computer networks’
security violation by the hospitality industry
Hotels should use advice from IT experts and also hire them for preventing cyber-
attacks as well as data breaches
Hotels must adhere to IS rules and regulations
Srikanth Velma (42781)
Document Page
IT Write Up
8
References
x
[1] N. Shabani, "A study of cyber security in hospitality industry-threats and
countermeasures: case study in Reno, Nevada," ArXiv, 2017.
[2] M.G. Bhavani, "Customer’s expectations of hospitality services–a study on five star
hotels in Hyderabad city," Journal of Management and Science, vol. 3, no. 4, pp. 16-22,
2013.
[3] C.P. Grobler, C. Louwrens, and S.H. von Solms, "A framework to guide the
implementation of proactive digital forensics in organisations," International conference
on availability, reliability and security, pp. 677-682, 2010.
[4] D. Buhalis and J. Crotts, Global alliances in tourism and hospitality management.
LOndon : Routledge, 2013.
[5] Nick Ismail. (2017) 7 nightmare cyber security threats to SMEs and how to secure
against them. [Online]. https://www.information-age.com/7-nightmare-cyber-security-
threats-smes-secure-123466495/
[6] D. Popescul and L. Genete, "Data security in smart cities: challenges and solutions,"
Informatica Ecomonica, vol. 20, no. 1, 2016.
[7] W. Stallings, L. Brown, M. Bauer, and A. Bhattacharjee, Computer security: principles
and practice. NJ: Pearson Education, 2012.
[8] The Economic Times. (2018) 5 simple tips to keep your business secure from
cyberattacks. [Online].
https://economictimes.indiatimes.com/small-biz/security-tech/security/5-simple-tips-to-
keep-your-business-secure-from-cyberattacks/articleshow/64568063.cms
[9] Q.J. Yeh and A.J.T. Chang, "Threats and countermeasures for information system
security: A cross-industry study," Information & Management, vol. 44, no. 5, pp. 480-
491, 2010.
[10] L. Mullins and P. Dossor, Hospitality Management and Organisational Behaviour, 5th
ed. UK: Pearson, 2013.
[11] J. Vacca, Computer and information security handbook. London: Newnes, 2012.
[12] D. Gollmann, "Computer Security," Wiley Interdisciplinary Reviews: Computational
Statistics, vol. 2, no. 5, pp. 544-554, 2010.
[13] J. Kizza, Guide to computer network security. London: Springer, 2009.
Srikanth Velma (42781)
Document Page
IT Write Up
9
x
Srikanth Velma (42781)
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]