Technology / Internal And External Security

Internal And External Security

Autor:  Greek  31 March 2012
Words: 1564   |   Pages: 7
Views: 1319

Internal and External Security

The risk that the hospitality industry faces with respect to personal information is not only a function of the volume of information. It’s also a function of the attractiveness of that information to cybercriminals (Griffin, 2011). Threats to the security of hotel assets can come from both internal and external sources. To protect assets adequately, programs must be in place to guard against these threats. This paper will identify the possible privacy issues for users both internal, such as malicious users, and external, like viruses or hackers, of an organization using word processing applications. It will distinguish between internal and external threats to the physical plant where the resources are located and to the virtual resources accessible electronically. Finally, the paper will discuss three resources or procedures that are available to protect these resources and how Human Resources’ responsibilities help define and distinguish internal and external threats.

Privacy Issues

More and more features are being added to word processing applications and there an increased danger of exposing information with other users who receive the document electronically. Information such as who worked on the document, who commented the document, and email headers is ready available for anyone to use. Internally this can be an issue in the sense that one may not want others to know that they made comments or had concerns about certain things outlined in documents such as memos or other type of correspondence created using a word processing application.

Typically in the hospitality industry more than one user shares a computer with someone else because they work in a multi-user environment, such as the front desk, where it is possible for others on the network to gain access to the hard drive. Privacy issues that arise when using a word processing application are that one or more persons are not intended to have access or knowledge of information contained in certain documents created using word processing software. Documents such as invoices, memos, customer logs, etc. can contain private information that if in the wrong hands can cause problems. It is important that users in this environment use password protection on any private documents that contain sensitive information.

Sometimes, information is collected from individuals for one purpose but is used for another, secondary purpose without authorization from the individuals. E ...