Sei sulla pagina 1di 4

1.

3 COMPANY BACKGROUND : HYATT HOTEL

Hyatt Hotels Corporation, incorporated on August four, 2004, is a global hospitality company.
The company develops, owns, operates, manages, franchises, licenses or perhaps provides
services to a portfolio of properties, consisting of full service hotels, select service hotels, other
properties and resorts, including timeshare, other and fractional types of residential and
vacation properties. The company operates through 4 segments: owned and leased hotels;
Americas management and franchising (Americas); ASPAC management and franchising
(ASPAC), and EAME/SW Asia management and franchising (EAME/SW Asia). The owned
and leased hotels segment consists of its owned and leased full service and select service
hotels. The Americas segment consists of its franchising and management of properties
located in the United States, Latin America, Canada and the Caribbean. The ASPAC segment
consists of its franchising and management of properties located in Southeast Asia, and
China, South Korea, Australia, Micronesia and Japan. The EAME/SW Asia segment consists
of its franchising and management of properties located in Europe, Africa, the Middle East,
Nepal and India.

As of 31ST December 2014 Hyatt Corporation's global portfolio consisted of 587 properties.On
September one, 2011, Hyatt acquired Hotel Sierra, which has 18 properties in ten states.
Along with Hyatt Summerfield Suites hotels, a number of these properties were rebranded as
Hyatt house in January 2012.

Hyatt Hotels Corporation operates a number of chains. The Human Rights C aign (HRC)
awarded the company 100 % in the HRC Equality Index for 8 consecutive years. The Hyatt
Regency brand may be the earliest brand in the company, with the Grand Hyatt and Park
Hyatt brands being introduced in 1980. Several of these're styled as "resort" properties, and
may have spas or any other recreational facilities. Some other brands include Hyatt Place,
created as a small service offering for business travelers. An extended stay chain,
Summerfield Suites, was acquired by Hyatt in 2005, and was renamed Hyatt House in January
2012. Hyatt launched the Andaz brand in April 2007.The first Andaz hotel was the great
Eastern Hotel in London, followed by hotels in San Diego, West Hollywood, New York City
and shanghai (Andaz Wall Street &; Andaz 5th Avenue).

On November 2013 Hyatt introduced their first all inclusive resort brands, Hyatt Zilara and
Ziva. As of 2015, Hyatt Ziva and Hyatt Zilara offer all inclusive accommodations in Cancun,
Puerto Vallarta, Los Cabos and Rose Hall, Montego Bay, Jamaica. On October 28, 2015,
Hyatt announced they had been in advanced talks to acquire Starwood Hotels in the coming
weeks in a cash and stock transaction. The transaction wasn't completed, and Starwood was
acquired by Marriott International instead.

On November 14, 2016, Hyatt and Bahria Town Group signed an agreement for construction
of 4 properties in Pakistan, combined worth US1dolar1 600 million.Properties include the
Grand Hyatt Golf Resort on Murree Expressway in Islamabad, Hyatt Regency Golf Resort in
Bahria Town Karachi, Hyatt Regency in Lahore, and Hyatt Regency in Bahria Town
Rawalpindi.The Hyatt Regency Karachi will feature Pakistan's first night lit 36 hole golf.

In a statement Hyatt Hotels Corporation president of operations Chuck Floyd said the
organization has "discovered symptoms of then resolved unauthorized entry to payment card
information" from cards keyed in physically or perhaps swiped at the front desk of some Hyatt
hotels between March 18, 2017 and July 2, 2017. In total, 41 hotels are affected, nearly half
of that are in China. Irregular action has likewise been recognized in Hyatt hotels in Brazil,
Puerto Rico, Mexico, Japan, Indonsesia, India, Guam, Columbia, South Hawaii and Korea in
United States. Upon finding the unauthorized access, Hyatt launched an investigation
alongside "third party experts", payment card networks and also the authorities. The study
discovered that the data breach may be traced back again to "an insertion of malicious
software code from a third party onto specific hotel IT systems."
2.0 CYBERSECURITY DISASTER

2.1 LITERATURE REVIEW

2.1.2 INFORMATION SYSTEM IN HOTEL INDUSTRY

Information technology (IT) is the science and technology of using other electronics and
computers to save and also transmit information (Cobanoglu, & ; Demicco, 2007). This info
can include variety of data, like sales, customers, market, shares and stocks, accounts,
airplane tickets, and booking (Cobanoglu, & ; Demicco, 2007). Organizations that use IT have
to tackle and administer electronic info securely and safely (Daler et al., 1989). The
organization 's administrative managers are to blame for the protection of the organization 's
information and assets (Cobanoglu, &; Demicco, 2007).

Like any other organizations, IT systems in hotels comprise of both hardware and software.
The basic software in a hotel consists of the property management system (PMS), point of
sale system (POS), call accounting system (CAS), as well as accounting system. The
standard hardware in a hotel include front desk computers, POS terminals, back office
computers, printers, routers, switches, firewalls, and network cables (Cobanoglu, & Demicco,
2007). The front and back office printers, POS terminals, and computers are hooked up to
switches and routers with network cables that allow communication between these devices
(Cobanoglu, &; Demicco, 2007). Routers also connect the hotel network with the Internet and
other networks (Cobanoglu, & Demicco, 2007). The firewalls protect the hotel system from
outside attacks (Cobanoglu, & Demicco, 2007). The hotel 's local area network (LAN) typically
consists of devices within the hotel 's premises (Cobanoglu, & Demicco, 2007)

Most of the computing systems are connecty computer networks to enable variety of uses ,
like database sharing and shared storage (Cobanoglu, & ; Demicco, 2007). The hospitality
industry uses the computer networks to manage reservations while staying away from duplex
reservations for exactly the same time and date (Cobanoglu, & Demicco, 2007). The
hospitality industry uses 2 primary kinds of computer networks: local area network (Wide area
and lan) network (WAN) (Collins et al., 2003)
2.1.2 COMPUTER NETWORK AND INFORMATION SECURITY

Information security aims at maximizing the revenue of investments and organizations by


minimizing the harm which may be brought on by security attacks (Computer Fraud &;
Security, 2002). The majority of the info security systems provide 3 main services:
confidentiality, availability and integrity (ISO, 2000). Organizations using it are susceptible to
various security threats and attacks. Probably the most common threats include viruses, inside
attackers for network access, spoofing, laptop theft, unauthorized insider access,
unauthorized outside attack, and denial of service attacks (Cobanoglu, &; Demicco, 2007).

Computer crimes is there after the introduction of computers, nonetheless, the nature of
attacks varies as the technology evolves (Beaulier Law Office, 2003). For instance, hacking
or perhaps cracking is the crime of connecting to a computer system with no permission
(Cobanoglu, & Demicco, 2007). Most of the hacking attacks are aimed at obtaining confidential
info (e.g., financial info of banking accounts, user accounts info) without authorization
(Cobanoglu, & Demicco, 2007). Theft of technology occurs when an attacker consciously
connects to a personal computer with intentions to steal technological secrets or information
(Cobanoglu, & Demicco, 2007). Fraud occurs when an attacker consciously connects to a
computer with intentions of fraud or perhaps masquerades a legitimate user of the computer
system (Cobanoglu, & ; Demicco, 2007). Hacking, theft of technology, and frauds would be
the most common security attacks whereas other security attacks can also be possible
(Cobanoglu, & Demicco, 2007)

2.2 HYATT HOTEL CYBERATTACK

Hyatt Hotel is a big company hotel in the world . Thus , they never out of cyber attack issue .
Based on Chuck Floyd (Global President of Operations). ………….. if you need assistant ,
kindly whatsapp me at +60173346402

Potrebbero piacerti anche