Internet/Web Access Management
Thegrowing use of the internet and other network platforms in thebusiness environment prompts constant change and conformity to thechanges to ensure the business enterprise remains competitive andrelevant in its industry. The hospitality industry, in particular,requires an updated system of networking where clients and members ofthe staff can collaborate in time and ensure high-quality services tothe customers. It is essential that company 9 have a presence on theinternet so clients all over the world can access the services andbook their place within their suitable environment. On the otherhand, it is essential that members of staff can access office filesfrom anywhere, to improve service delivery and save resources for theteam members (De, 2016). For instance, Dr. Moore wishes to accessfiles and documents from home during the winter, which would improveservice delivery and avoid risking his health in the poor weathercondition. However, such as system requires some monitoring and highprofile security detailing to ensure the files and documents of thestaff, the firm, and its clients are safe from third party access.
Thesystem shall cater to the needs and desires of both the clients andthe members of staff as far as service delivery are concerned. Thesystem shall post all available services and departmental heads sothe customers can easily access the service and book for their placeat the hotel. They will also have a space to create their profilethat will monitor their needs with the company with ease. Thedatabase will be useful for the departmental heads to ensure theclients receive the service they require and deserve. The databasecenter will also include profile sections for the members of staffthat will enable them to access all their documents, files andpremium access to the system that will allow them to communicate withother members from any place (Lewis, 2015). Therefore, the systemwill have two separate sections for the members and clients servingdifferent purposes. The communication will be departmental as well asprivate in the sense that the corporate communication will direct allmessages to all members of the department while the personalcommunication will be addressed to an individual staff (Ray, et al.,2015).
Thesystem will need to undergo several network penetrations from severallevels to test for vulnerabilities, compiling an analysis of networkand physical security, as well as ensure that the system is compliantwith the ISO 27000 of business continuity and disaster recoverymethods. The testing will also enable the implementation team tocompile a comprehensive report that will indicate the potentialsecurity exposures and provide the recommendations for improvements.Further, the management shall ensure an IT management team is presentto ensure their safety infrastructure remains efficient and compliantwith the security code of ethics.
Thereshall be two major classifications of data the desires of clients,and the members of staff. The desires of customers will be capturedfrom their preferences and profiles. The security detail required inthis section will be to ensure a safeguard of the information of thecustomers from third party access. Only authorized people will haveaccess and will have to adhere to the code of ethics to not share theclient details or use the detailed information in any other way otherthan the authorized (Eid, 2013). On the other hand, the members ofstaff will be subdivided into various departments to ensure efficientcommunication and chain of command. Additionally, the members willhave a platform for communication for collaboration purposes. Theywill also have premium access to the system files and documents toenable them to work from different points besides from their offices.Firewalls and other online security infrastructures will be essentialto ensure a secure and efficient system.
ReferencesTopof FormTop of Form
De,S. M. (2016). Internetof things and business.Place of publication not identified: Routledge.
Eid,R. (2013). Managingcustomer trust, satisfaction, and loyalty through informationcommunication technologies.
Lewis,T. G. (2015). Criticalinfrastructure protection in homeland security: Defending a networkednation,Hoboken, New Jersey : John Wiley & Sons.
Ray,N., Das, D. K., Chaudhuri, S., & Ghosh, A. (2015). Strategicinfrastructure development for economic growth and social change.
No related posts.