0% found this document useful (0 votes)
17 views

Network Case Study

Hospitality and tourism management

Uploaded by

Hardiljeet
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Network Case Study

Hospitality and tourism management

Uploaded by

Hardiljeet
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

HOTL 9709 W24 - Networking Case Study

Name:Ramandeep Kaur Student #:4541169


Challenges in Order of Why is this a problem? Why and how should this be
Importance done in this particular order?
1. Front desk staff is giving too Front desk staff giving too much Implement employee network
much information over the information over the phone can policy For Front desk Staff -
phone lead to social engineering attacks, This is a high priority as it
where attackers use this establishes guidelines and
information to gain access to procedures for employees to
sensitive information or resources. follow regarding network
usage, data protection, and
security protocols. It helps
create a culture of
cybersecurity awareness and
ensures consistency in
safeguarding sensitive
information and reduce risk of
giving out too much
information over the phone
2. Computer room is unlocked An unlocked computer room can Install locks on computer
provide physical access to the room doors- This is a priority
network, allowing attackers to because it limits physical
install malware or steal data. access to the network. By
securing the computer room,
unauthorized access can be
prevented

3. Passwords do not need to be Passwords that do not need to be Implement a password policy
changed changed can be easily guessed or that requires regular changes -
cracked, providing attackers with This is a priority because it
unauthorized access to the helps prevent unauthorized
network. access to the network. Regular
password changes help ensure
that passwords are not easily
guessed or cracked.
4. Guests and employees use Guests and employees using the Separate guest and employee
the same network same network can increase the networks- This is a priority
risk of unauthorized access to because it minimizes the risk of
sensitive information or resources. unauthorized access to
sensitive information. By
separating the networks,
guests cannot access
employee-only resources, and
vice versa.
5. Employee and guest cell Employee and guest cell phones Develop and implement an
phones can access the hotel's accessing the hotel's wireless employee network policy -
wireless network network can increase the risk of This is a priority because it sets
malware infection or unauthorized the foundation for secure
access. network usage by employees.
It outlines what is and isn't
allowed on the network, and
provides guidelines for
password management,
software installation, and
other important security
measures.
6. Firewall software requires Firewall software that requires Implement automatic firewall
manual updates manual updates can lead to updates - This is a priority
outdated protection, leaving the because it ensures that the
network vulnerable to new network is protected against
threats. the latest threats. Automatic
updates help ensure that the
firewall is up-to-date, and can
block new threats as they
emerge.
7. No employee network policy No employee network policy can Develop and implement an
currently exists result in inconsistent security employee network policy -
practices, leaving the network This is a priority because it sets
vulnerable to attack. the foundation for secure
network usage by employees.
It outlines what is and isn't
allowed on the network, and
provides guidelines for
password management,
software installation, and
other important security
measures.
8. Business center computers do Business center computers that do Require passwords for
not require passwords not require passwords can be business center computers-
easily accessed by unauthorized Requiring passwords for
users, leading to data breaches or business center computers
malware infection. prevents unauthorized access
and protects sensitive
information. This ensures that
only authorized individuals can
use the computers and
reduces the risk of data theft.
9. Software installation is Software installation allowed on Implement software
allowed on all computers all computers can lead to restriction policies to prevent
unauthorized or malicious unauthorized software
software being installed on the installation - This is a priority
network. because it limits the risk of
malware infection. By
restricting software
installation, only authorized
software can be installed on
the network.
10. Ability to access the hotel's The ability to access the hotel's Implement firewall rules to
wireless across the street wireless network from across the restrict access - This is a
street can increase the risk of priority because it limits the
unauthorized access or ability of an attacker to gain
interference with the network. access to the network. By
restricting access to the
network, only authorized users
can connect.

You might also like