We're Open
+44 7340 9595 39
+44 20 3239 6980

Security Management at the Tower

Information



  • Post Date 2021-04-21T09:31:02+00:00
  • Post Category Research Paper Queries

No Plagiarism Guarantee - 100% Custom Written

Order Details

Security Management at the Tower

The Tower is a prominent tourist attraction site with a pool, several hotels, and lounges. Like any other facility, security is paramount. The Casino ought to ensure that they are secure from any cyber attacks. They need to protect their information, records, and customer details. According to the investigation, they organization has its security divided into two sections, which are the Gaming Surveillance and general security. However, there

are several issues concerning their IT security system, which threatens their safety and that of their clients (Dhillon, 2007).

Lack of upgrading systems is one of their major problems. For instance, they used a password set by an employee, terminated several years ago. The management did not care to change or know the password, which resulted in the inaccessibility of certain documents. In addition, the use of a password set, but a person who was no longer part of the organization exposes them to unauthorized access to files and information (Dhillon, 2007). The second cyber security issue concerns the presence of viruses in the network system. The institution lacks a properly installed firewall and anti-virus. Viruses are examples of cyber threats that lead to the deletion, corruption, or alteration of information. Lastly, the hotel lacked an appropriate access criterion. From the investigation, IT had total access to record during holidays and weekends, which resulted in the leaking of information to other employees. Lack of access restrictions exposes information to unauthorized persons, which is dangerous if it falls into the wrong hands (Dhillon, 2007).

The overall function of the management is to plan, control, coordinate and organize activities at the workplace (Alavi, Islam & Mouratidis, 2014). In the case scenario, there are several recommendations that the management could implement in order to handle the situation within the organization. The first recommendation involves resolving the conflict between the IT and Security departments. The top management could sit down with both groups and brainstorm on some of the common interest shared by both groups and focus on

 

 

 

them. Secondly, the organization’s top leaders need to improve the flow of information within the hotel (Dhillon, 2007). For instance, if there were proper communication between both departments, the hotel could promptly upgrade its systems. Lastly, the firm should commence IT and security training programs that would enhance compatibility in both units (Wu& Al-Dubai, 2014). In addition, it should prioritize the upgrading of the entire network to eradicate virus issues (Adane & Sathe, 2010).

It is true to say that most of the issue originates from the improper structuring of functions and planning. Functional structuring is an essential activity in every company. From the resulting findings, it is apparent that there was a conflict between the functions of

the IT and security department. Both teams felt that the other was intruding in their work. For example, the IT manager felt that the security department was incompetent and should not work as an independent unit. In contrast, the security manager felt that the IT department intruded with the operations and confidentiality of his department. In an attempt to upgrade the hotel’s security system and technology, the IT director gave informed all departments that only he had the authority to permit the purchase of new software and hardware. Nonetheless, the communication breakdown between the two departments only made the situation worse for both units. In one instance, the IT department assigned one technician, who would learn

the security system. However, that created problems when she, Jane, went on maternity leave. Therefore, lack of coordination and organization


Price: £ 99

100% Plagiarism Free & Custom Written, Tailored to your instructions