Interim Report on Security Increase of Just Relax Inc. Case Study

Exclusively available on Available only on IvyPanda® Made by Human No AI

Security is paramount for any organization or a company. Lack of security may lead to loss of customers and goodwill. This essay summarizes some important ideas that can be implemented to improve the security of Just Relax Inc.

Since the operations of the company are to be computerized, a high level of information security should be maintained. The digital devices replacing the ID/credit cards should be enabled with the General Packet Radio Service (GPRS). With the GPRS, management can monitor the device holders and all the transactions made by the guests on the devices. Security management information systems should be installed and operated with maximum care and caution.

These systems should be operated by authorized people only. Information software should be updated regularly by the company’s software or information technology engineer. The information systems should be supported and maintained by a trusted supplier to ensure that operations are not interrupted.

All communications between the guests and any other party should be recorded and a database maintained. All data transmitted through digital devices should be encrypted with codes that only management can decrypt. Encryption of data protects the system from hackers who may fraud the company. The operators of all the management information systems should work in shifts to avoid human errors caused by working for too long hours.

The company should create a strong firewall on the management systems to prevent intrusion by unknown networks. The systems should be linked with the available financial institutions to access the finances of the visiting guests. The guests should be able to access their banks via digital devices. This security step ensures that clients cannot fraud the company.

In conclusion, Just Relax Inc. should invest heavily in information security. Adequate data security discourages intruders and malicious guests who may fraud the organization. The information system keeps a database of the transactions that help in proper control.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, March 3). Interim Report on Security Increase of Just Relax Inc. https://ivypanda.com/essays/interim-report-on-security-increase-of-just-relax-inc/

Work Cited

"Interim Report on Security Increase of Just Relax Inc." IvyPanda, 3 Mar. 2021, ivypanda.com/essays/interim-report-on-security-increase-of-just-relax-inc/.

References

IvyPanda. (2021) 'Interim Report on Security Increase of Just Relax Inc'. 3 March.

References

IvyPanda. 2021. "Interim Report on Security Increase of Just Relax Inc." March 3, 2021. https://ivypanda.com/essays/interim-report-on-security-increase-of-just-relax-inc/.

1. IvyPanda. "Interim Report on Security Increase of Just Relax Inc." March 3, 2021. https://ivypanda.com/essays/interim-report-on-security-increase-of-just-relax-inc/.


Bibliography


IvyPanda. "Interim Report on Security Increase of Just Relax Inc." March 3, 2021. https://ivypanda.com/essays/interim-report-on-security-increase-of-just-relax-inc/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1