We're Open
+44 7340 9595 39
+44 20 3239 6980

Security Management at the Tower

  100% Pass and No Plagiarism Guaranteed

Security Management at the Tower

The Tower is a prominent tourist attraction site with a pool, several hotels, and lounges. Like any other facility, security is paramount. The Casino ought to ensure that they are secure from any cyber attacks. They need to protect their information, records, and customer details. According to the investigation, they organization has its security divided into two sections, which are the Gaming Surveillance and general security. However, there

are several issues concerning their IT security system, which threatens their safety and that of their clients (Dhillon, 2007).

Lack of upgrading systems is one of their major problems. For instance, they used a password set by an employee, terminated several years ago. The management did not care to change or know the password, which resulted in the inaccessibility of certain documents. In addition, the use of a password set, but a person who was no longer part of the organization exposes them to unauthorized access to files and information (Dhillon, 2007). The second cyber security issue concerns the presence of viruses in the network system. The institution lacks a properly installed firewall and anti-virus. Viruses are examples of cyber threats that lead to the deletion, corruption, or alteration of information. Lastly, the hotel lacked an appropriate access criterion. From the investigation, IT had total access to record during holidays and weekends, which resulted in the leaking of information to other employees. Lack of access restrictions exposes information to unauthorized persons, which is dangerous if it falls into the wrong hands (Dhillon, 2007).

The overall function of the management is to plan, control, coordinate and organize activities at the workplace (Alavi, Islam & Mouratidis, 2014). In the case scenario, there are several recommendations that the management could implement in order to handle the situation within the organization. The first recommendation involves resolving the conflict between the IT and Security departments. The top management could sit down with both groups and brainstorm on some of the common interest shared by both groups and focus on




them. Secondly, the organization’s top leaders need to improve the flow of information within the hotel (Dhillon, 2007). For instance, if there were proper communication between both departments, the hotel could promptly upgrade its systems. Lastly, the firm should commence IT and security training programs that would enhance compatibility in both units (Wu& Al-Dubai, 2014). In addition, it should prioritize the upgrading of the entire network to eradicate virus issues (Adane & Sathe, 2010).

It is true to say that most of the issue originates from the improper structuring of functions and planning. Functional structuring is an essential activity in every company. From the resulting findings, it is apparent that there was a conflict between the functions of

the IT and security department. Both teams felt that the other was intruding in their work. For example, the IT manager felt that the security department was incompetent and should not work as an independent unit. In contrast, the security manager felt that the IT department intruded with the operations and confidentiality of his department. In an attempt to upgrade the hotel’s security system and technology, the IT director gave informed all departments that only he had the authority to permit the purchase of new software and hardware. Nonetheless, the communication breakdown between the two departments only made the situation worse for both units. In one instance, the IT department assigned one technician, who would learn

the security system. However, that created problems when she, Jane, went on maternity leave. Therefore, lack of coordination and organization

100% Plagiarism Free & Custom Written,
Tailored to your instructions

International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120

100% Pass Guarantee


View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates


  • Title: Security Management at the Tower
  • Price: £ 99
  • Post Date: 2021-04-21T09:31:02+00:00
  • Category: Research Paper Queries
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

Security Management at the Tower Security Management at the Tower
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I had wasted so much money for poor quality work on other sites that I became despair to find a reliable one. I landed on Insta Research and finally, I am fully satisfied after ages from their quality of the work and instant response. Also, the rates are handy. Great going guys!
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

My writer did a small error in my work but it was fixed by him shortly. The work is admirable and I have submitted it. Now hoping for the best results. I would inform you soon.