Cuhel's Restaurant Case Study

Great Essays
Page
1
of 6

ZOOM

Intrusion FinalBy: Adam CuhelPart 1Organizational BackgroundPhysical Geography of BusinessThe purpose of this section is for the physical background of Cuhel’s Fine Dining Restaurant. Cuhel’s has four stations which include a Thermal printer in the kitchen, a computer in the main office for the management, two waitress/waiter stations one in the bar area and one in the kitchen area. The stations in the Cuhel’s restaurant are using a program called Toast. Which is a program for restaurant function. In the dining room there is free WiFi which is on a stand-alone system not connected to the business system. Cuhel’s also has two telephones’ one in the main office and one in the hostess station.Types of Worker’s
…show more content…
Security Camera Check for recording and function. This is important because you need to know what happens to your company during non-business hours. Was anyone there, and how did the employees close the place did anyone do anything illegal?2. Check the updates for the Toast program. This is critical because this is the main program basically running your system it must be functioning at its peak. If this program goes down, you potentially lose money.3. Check the computers for updated software and patches. You need your computers for email and ordering and your Toast program. This keeps track of payroll and inventory.4. Check the router for function and the fire-wall for functionality.5. Check logs for abnormalities. Go over your system make sure everything is in it’s “normal” state if it’s not you should be concerned, why?6. Make sure everything is functioning and up to date Again I put this on here to double check. Humans and machines are subject to errors. Go over the entire network to make sure everything is in working order and everything is accounted for. Are the logs up to date, OS updated, Toast functioning as it should, payroll and cash-registers as well.These are the main items it could be a lot more in a real situation.Acceptable Use PolicyBy logging on to Cuhel’s network, you are agreeing to the below terms. Please read them carefully. This is a binding contract between you the customer and Cuhel’s Fine Dining Restaurant. Using this …show more content…
We reserve the right to scan the Wi-Fi network and systems connected to it to assist in identifying and protecting against exploitable security vulnerabilities (e.g., viruses) and to preserve network integrity and availability of resources (e.g., sufficient bandwidth). Devices may be disconnected from the network until security issues have been resolved. Users may not scan hotel networks or computers that they do not own or officially administer.MisconductCuhel’s reserves the right to terminate access at any time to anyone whose use of its resources violates the law or threatens system or network security, performance, or integrity.The Other Company side system is not accessible for any reason by anyone other than the security team and the CEO of Cuhel’s. State and Federal Laws apply and anyone on the company system will sign a waiver to be authorized and subject to denial by the CEO. (boutique hotel, 2017)Works Cited(2017). Retrieved from Toast: https://pos.toasttab.com/boutique hotel. (2017, March 8th). Retrieved from same: http://www.boutiquehotelcollection.com/wifi-aup/Institute, S. (2014). sans.org. Retrieved from sans.org:

Related Documents

  • Great Essays

    If there is a need to replace the network equipment the data has been secured at an offsite location for data restore. The company IT Officer is the point man to ensure the IT office is aware of the situation and take steps outlined in documented procedures. Access Control Protocols IT Office Personnel in the IT Office has Super User permissions to log into any system on the network. They require for…

    • 1211 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    IT Internal Control System

    • 1001 Words
    • 5 Pages

    Every day, the companies have hundreds or thousands of business transactions with customers and vendors, and through these transactions, the data gets processed, collected and stored. The data collected and stored from transactions usually contains individual customer’s and vendors private and business information that must be protected and safeguarded by the company’s effective and efficient control systems. Incidents may happen to anyone, and data processed and collected from transaction may intentionally or unintentionally released to an untrusted environment and may cause more damage for the companies; therefore, these data needs to be safely and secure guarded against any data breach and must be controlled by effective and efficient IT…

    • 1001 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    It makes sure that files are secure even if they were stolen and confidentiality of patients and staff of the hospital are safe. The file server should not be on the internet often either. A firewall can be used to restrict access from outside the LAN. The file sever should constantly be updated and an active antivirus should be installed. It is important that the hospital stops the use of all unnecessary services and software.…

    • 2212 Words
    • 9 Pages
    Improved Essays
  • Superior Essays

    With the increased use of technology and Internet, it is very important to focus on the privacy policy at workplace. Internet and e-mail policy referred to the policy that controls the usage and Internet browsing behavior at workplace, which would also deter from malfeasance activity within the organizations. Corporate governance is needed in order to maintain and evaluate process and policies. The governance should include the include monitoring the activities through electronic monitoring system. This can be done with collaborative work of human resource and IT department, conducting surprise audit on a monthly or weekly basis to better control the Internet usage by the employees.…

    • 1760 Words
    • 8 Pages
    Superior Essays
  • Superior Essays

    "Amelia Earhart." History.com. A&E Television Networks, 2009. Web. 27 Oct. 2017.…

    • 1078 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Password Security Threats

    • 2482 Words
    • 10 Pages

    Password security is a very important topic with many counterparts. It is important to know the security risks involved with passwords. Complex passwords have become very popular for businesses in order to log into your office computer. Often times you are required to change that complex password on a regular basis as well, which can make remembering the password extremely difficult and will often times cause the user to write it down or store it somewhere. Often times employees may share their passwords with a co-worker and this can be for a logical reason should anyone need to access that information if the person is out sick.…

    • 2482 Words
    • 10 Pages
    Superior Essays
  • Improved Essays

    Once the buildings have reached business hours the guards will report to each receptionist to collect the visitor logs from the day before. When touring the buildings the guards will be looking for proper identification badges for everyone that is in the warehouse. If someone does not have their identification badge visible then the guards will ask to see it. All the information that is gathered will be reported in the guard’s activity report. The guard should also take their time to make sure that all problems are reported in a timely…

    • 1183 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    These policies are updated continuously as new security threats are detected. If there is inconsistency in network or security policies, it can open network to potential vulnerabilities and attacks. Currently, there is no protection from such misconfiguration of policies in Overflow. Another concern for the SDN is system level security. It should be able to provide network audit all the time (e.g.…

    • 710 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    An unadjusted trial balance is simply a list of the accounts with the credit and debit balances with totals. The totals from the two columns must match. If they do not mach there is an error somewhere that needs to be uncovered. In my experience, the trial balance is simply printed from a program and a bookkeeper reviews the totals to be sure they match the journal entries and that all transactions have been recorded then makes sure that the debits and credits match. If there are errors, the bookkeeper is the one who uncovers and corrects them.…

    • 971 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    2015). Charlie + Mary, (2015). AMSTERDAM – The ProudOtterCafe. [online] Charliemary.com. Available at: http://blog.charliemary.com/blog/2013/03/06/welcome-proudottercafe (Accessed 14 Mar.…

    • 1875 Words
    • 8 Pages
    Great Essays