Security Policy

Improved Essays
What is security policy? we will talk about security policy and what's the mean, “What is security policy"? The policy is a form of documentation that is created to enforce the rules or specific regulations and keep the structure of the procedures. while “Security “is just the existing policy on actions revolving around security. and Security policy means to be a secure system and or organization or other entity. The organization that addresses the constraints on the behavior of its members as well as restrictions on the liabilities by mechanisms such as s door, locks, keys, and walls. System security policy deals with restrictions on access external system and liabilities including programs and access to data by people. Hotel security must …show more content…
for example, when you ride on the public transport you rely on the driver to obtain the rules of the road and keep safe and secure. These rules keep you in order and away from chaos of the traffic. In our project, The in hotel, there is one supervisor and several bosses that have different jobs so if any of them have problems they must send a report for boss. There will also be technology security which is online booking required data of customer who will book online and sensitive data such as visa card number. If any of them break the roles they will be responsible for that and they will take a punishment and pay a …show more content…
Organization as hotel should have policies for each department because being secure is important, so we should be sure that the security policy is enforced by strong mechanisms and organizational policy. So mechanisms are designed to prevent, detect or recover from attacks. For preventive we take measures to protect our asset like control access list, encryption, certificate, message authentication and digital signature. And for reactive we can either detect the damage to our asset or we can recover from damage to our asset. I consider firewall as a great protection to our asset if it’s used properly. There is program for the employees about: (The importance of a security)
• Education: Every employee must take security courses.
• Training: Every employee must training for new programs technology.
• Awareness: The manager must remind the employees about the security.

How do you respond to incidents?
Incidents can cost us a lot, and cause a damage perhaps we can’t recover from it, we should have an incidents plan, to protect ourselves from the power of surprise and reduce the damage. To successfully respond to incidents such as:

Related Documents

  • Improved Essays

    Project Part 1 Task 1: Outline Security Policy First World Bank Savings and Loan; a financial institution that offers banking services (loans and deposits). The bank would like to provide online banking services to the customers, which includes online credit card use for loan applications. Recommendations are based on such factors as: ownership total cost, scalability, and reliability. Decisions and recommendations made need to be appropriate from the CIA triad perspective.…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Within that case, you will find mentioned the second case: Nordmann v. National Hotel Company, 425 F.2d. 1103 (5th Cir. 1970). That case establishes the basis by which the court in Margreiter determined the level of duty the New Hotel Monteleone owed to Mr. Margreiter. It may help you with the remainder of this homework.…

    • 2168 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Saga Fly Fishing

    • 551 Words
    • 3 Pages

    No limitation of access control especially in the sensitive areas such as storekeeping, work centre and inventory control may endanger the company’s assets (inventory and cash especially) and information. Proper actions or measures need to be taken into consideration. For instance, implementation of the electronic sensor and alarm, identification badges, CCTV, security guards, backup schedule and so…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    When developing a security policy framework for XYZ Health Care Organization it’s important to understand guidelines needed to establish an effective policy. Such guidelines like Health Insurance Portability and Accountability Act (HIPPA), and The Sarbanes–Oxley Act (SOX) must be included and followed to the letter. This will eliminate nearly all guesswork and fill in the blanks where HIPAA and SOX do not. Finally, while following these set ground rules it is also important to understand that this framework must fit the description laid out by the Confidentiality, integrity and availability CIA triad. There is a growing need to fill gaps which are left by the guidelines from HIPAA, SOX and the CIA triad.…

    • 410 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Much of the required hotel codes in relation to guests’ and their rooms, evacuations and protections come straight from the MGM Grand Hotel in Las Vegas. The MGM Grand Hotel and Casino caught the eye of many different people and has changed hotels forever. The rate of damage and death rates had much to do with the involvement of “guests’ characters and behavior” in the incident (Bryan). There are so many studies that try to predict how each individual will react in the case of an emergency, but none of them can ever be completely actuate with their predictions. Every person has a different character and behavior that will infringe upon their safety when the emergency strikes.…

    • 753 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Unified Command

    • 820 Words
    • 4 Pages

    The importance of Unified Command for an event such as this or any event in general is, bringing together the “Incident Commanders” of all major organizations involved in the event in order to coordinate an effective response while at the same time carrying out their own jurisdictional responsibilities. (UC) links together organizations and provides a forum for these entities to make agreeing decisions. The (UC) in this event is blending jurisdictions and agencies and non-government sections together throughout the operation to create an integrated team. When more than one agency shares responsibility for responding to, or participating in, the event this means that all agencies involved with contribute to the command process. This…

    • 820 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I learned a lot as an "emergency manager” by reviewing each lesson. I learned that National Incident Management System (NIMS) offers a steady nationwide guide to allow Federal, State, tribal, and local governments, nongovernmental organizations, and the private sector to work together to stop, safeguard against, react to, improve from, and alleviate the effects of incidents, irrespective of “cause, size, location, or complexity”. I learned how the National Response Framework (NRF) explains specific establishments and greatest practices for handling incidents that vary from the serious but only “local to large-scale terrorist attacks or catastrophic natural disasters”. The National Response Framework explains the values, tasks and accountabilities,…

    • 584 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The National Fire Protection Association (NFPA) is an organization that was founded on the base of creating a set of standards and codes that should be able to deal with certain concepts on fire prevention along with protection in relations to the overall scope of safety in society realm. In society this organization came up with the solution that assure the safety of someone who is working or involved in the surrounding areas of a construction in a building along with using any type of equipment/.machinery there must be guidelines enforced that even though a worker/employee use or any kind of construction building they would be safe without creating a fire threats in their worksite. The boundaries of and the life- saving…

    • 862 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Question: Question 12 Answer: Staff Policies and procedures are there to ensure staffâ€TMs health and welfare are protected and that there rights are supported. Some policies…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The outdated policies are still in use. Recommendation CCTV surveillance should be continuous for twenty four hours, and change of shifts for the security employees three times a day can help increase the work efficiency policy requiring more security personnel close to the fences can also work. The security light servicing should be a routine security department concern. 5. Assure competent public and personal health care workforce (CDC, March 2014).…

    • 1547 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Good information, Tiffany! The incident response team needs to advise and notify the proper departments within the organization so that all who should be included will do their parts. Incident response strategies ought to incorporate arrangements concerning incident reporting – at least, what must be accounted for to whom and what times (to include initial and frequent update notifications). The right incident notifications may different among organization, yet parties that are regularly advised include: Chief of Information Officer, System Owner, Human Resources, Public Relations, Head and Local Information Security Officer, Legal Department, Other incident response team within the organization, and other external incident response experts…

    • 186 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Additionally, Personnel Security, Risk Assessment, System and Services Acquisition, System and Communication Protection, System and Information Integrity, and policy exceptions. Hence, the policy is used to ensure that all users who conduct any business and use any technical or are privy to any sensitive information knows the rules, regulations, and policies before accessing any HHS resources. Further, every HHS department must categorize their information system level by assessing the impact that access can have on availability, integrity, and confidentiality of the systems. Thus, this process will ensure that everyone is granted the rights for the appropriate security levels. Moreover, the policies are also utilized to show the roles and responsibilities for key personnel, and details the mission of…

    • 631 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In order to understand the differences between a security policy and an acceptable use policy we must understand the how each one is define in our textbook. “Security policy consist of statement ranking information risks, identifying acceptable security goals, and identifying the mechanism for achieving these goals. Acceptable use police, defines the acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computer, wireless devices, telephones, and the Internet” (Laudon & Laudon, 2016, p. 323). A security policy stablishes rules and behaviors for users and administrators within an organization. It is a living document which continuously updates as technology and employee requirements change.…

    • 231 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    In the online Federal Emergency Management Agency (FEMA) course Introduction to the Incident Command System for Law Enforcement, it discusses the incident command system for first time users. It tells us, “The Incident Command System is a standardized approach to incident management that enables a coordinated response among various jurisdictions and agencies, establishes common processes for planning and managing resources and allows for the integration of facilities, equipment, personnel, procedures, and communications operating within a common organizational structure.” (training.fema.gov, n.d.) The Incident command System can be used on any scene or incident, even planned events.…

    • 493 Words
    • 2 Pages
    Decent Essays