TITLE

Five Security Issues

AUTHOR(S)
D.^Ilori, Tia
PUB. DATE
April 2011
SOURCE
Hospitality Upgrade;Spring2011, p130
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses security issues facing the hospitality industry which include remote access, network security, and password management and offers tips to address them. It notes that remote management applications (RMAs) are used by many hotel operators and franchisors and mentions strategies to help limit that risk of RMA including the configuration of RMA. It cites security practices which can provide network security including the installation and maintenance of a firewall.
ACCESSION #
59999958

 

Related Articles

  • Protecting Against Threats to Enterprise Network Security. Gellis, Harold C. // Software World;Mar2006, Vol. 37 Issue 2, p14 

    The article discusses threats to the security of computer networks and protection against them. Computer networks and the Internet has revolutionized the way vital sectors of the economy conduct their business. The advent of wireless and mobile devices has created a mobile society but the...

  • Telcos plot path to desktop. Chee Sing Chan // Telecom Asia;Dec2006, Vol. 17 Issue 12, p44 

    The article focuses on the growth of the market for managed services in Hong Kong, China and Singapore. Adoption of managed security offerings like managed intrusion detection and prevention, firewalls, email and compliance are increasing in Hong Kong. Furthermore, managed mobility is attracting...

  • Securing the Next-Generation Network.  // Public CIO;Q3 Special Issue, Issue Q3, p28 

    The article offers suggestions on controls to secure next-generation networks which include firewalls and virtual private network services, intrusion prevention systems, and network access control protocols. It states that the difficulty in securing the network is in the multiple access points,...

  • Still secure?  // Communications News;Mar2005, Vol. 42 Issue 3, p9 

    This section presents the findings of a study conducted by StillSecure regarding network security in the U.S. as of March 2005. Enterprises are expected to increase adoption of newer security technologies now that most have implemented antivirus, firewall and virtual private network solutions....

  • Remote Access Strategies for Process Control / SCADA Networks. Nicholson, Todd // Remote Site & Equipment Management;Feb/Mar2008, Vol. 8 Issue 1, p16 

    The article presents a case which demonstrated the successful deployment of a security solution using Industrial Defender Inc. technology to support a Remote Access Solution in a converging corporate IT and process control/SCADA network. A DMZ was integrated by using an Industrial Defender Guard...

  • Longhorn Server Features. Otey, Michael // Windows IT Pro;Jan2007, Vol. 13 Issue 1, p63 

    A list of the top 10 most important features and enhancements of the Longhorn Server is presented. The hypervisor-based virtualization of the server gives improved performance for virtual machines. The server also features an updated Windows Firewall that allows user to filter both incoming and...

  • Personal Responsibility. LAWHORN, RICK // Information Security;Sep2009, Vol. 11 Issue 8, p6 

    The article focuses on who is to blame with regards to security issues in the hospitality industry. According to the author, there are two distinct parts that need to be examined, namely the hotel network that processes payments, stores personal information about guests and conducts routine...

  • Applying Basic-Elements and the Extension Theory to Alert-centric Event Correlation for Unified Network Security Management. Hui Xu; Chunzhi Wang; Hongwei Chen; Zhiwei Ye // International Journal of Security & Its Applications;May2013, Vol. 7 Issue 3, p99 

    With increasing requirements of network users for intelligent security management, unified network security management has become a fashion, and a remarkable development trend is the adoption of an alert-centric event correlation manner. This paper then introduces Extenics into the study on...

  • Remote Command.  // Database & Network Journal;Aug2005, Vol. 35 Issue 4, p18 

    This article reports on the launch of MythicSoft's RemoteCommand, a remote access solution offering the same level of security as a virtual private network, but without the costs associated with installing such complex technology.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics