SlideShare a Scribd company logo
1 of 9
Possible cyber threats for
restaurant networks and
solutions
Group-7-
Bhavesh rao
Chanchal Chaudhary
Charul Bagdiya
Deepak Lund
Harsh Kulkarni
Introduction
 In the world of manufacturing, generally, the most
critical point of risk often comes at the level of the
industrial control systems (ICS). This is where both
manufacturing data breaches and shutdowns can occur.
 One reason food processing is a target is because of
outdated legacy ICS. Another problem is that managers
often leave these systems to people who are experts in
food manufacturing, but not in cybersecurity.
Incorrect or lackluster software and firmware patching
can cause openings in ICS systems, leading to zero-day
holes just waiting for an attacker to come along and
exploit them.
 Food can go bad and needs to be cooled or handled in
special ways. Because of this, the entire chain needs
to proceed quickly and without interruption.
Production and manufacturing shutdowns can damage or
destroy the business, ruin the product and make it
unsafe for consumers. That harms cascades down to
partners and suppliers.
1.Hackers:
 These highly skilled computer experts use their knowledge to exploit
or break into connected devices and computer systems. They target
restaurants due to the abundance of poorly secured systems. Once
they find a vulnerability and get into the network, they go after the
POS systems. Due to the POS doing the simple job of processing
transactions, the typical alarm bells of a desktop computer hack
would not be seen by a user, for example, ransomware messages,
degraded performance, etc.
Solution:
 Maintain a strong firewall.
 Conduct regular scans of your network.
 Limit remote access. Firewalls left open by managers
working remotely or through regular maintenance on
systems can put your network at risk. Regularly
change passwords and do not use default codes to
help keep your network safe.
 Ensure all credit card data is encrypted. Some older
point of service (POS) equipment sends and stores
raw credit card data, rather than encrypting the
data as soon as the card is swiped. Make sure your
Wi-Fi, security cameras, and digital menu boards run
on a separate network from your POS equipment.
 Keep your software updated.
2.Ransomware:
 Imagine logging into your back-office system only to
be greeted with a frozen screen. You cannot access
your files and then see a ransomware message: Pay
$15,000 to access encrypted files. There’s nothing
that can be done at that point. Ransomware prevents
users from accessing their system until a ransom is
paid to get a decryption key of some kind.
Ransomware attacks are on the rise and there is no
end in sight.
Solution:
 Embrace zero trust network access and multi-factor
authentication.
 Prioritize vulnerabilities that matter and patch
operating system and application software
frequently.
 Consider endpoint protection solutions that not only
detect and act against suspicious behavior but can
actually prevent malware from executing.
 Isolate guest Wi-Fi from your main network. This
will protect against accidental installation of
ransomware malware by drive-by infection (accessing
an internet site that uses that connection to infect
your network).
 Further segment your restaurant networks to isolate
POS systems, back-office PCs, and file servers,
helping to prevent spread of malware in the event of
Wi-Fi Security
 Many restaurant owners set up a firewall as a basic
security measure and believe their networks will be
sufficiently protected. In today’s cyber world,
firewalls can’t just be set up and run on their own.
While a network firewall is a fundamental security
component, it must be actively monitored, managed,
and updated to be effective.
 Even still, a managed firewall cannot defend every
threat vector. Attack and breach prevention requires
a new approach, and many products and service
providers simply do not have the ability to stop
cybercriminals before they do legitimate damage.
Solution:
 Utilize wireless protected access (WPA). WPA or
WPA2 (preferred) are types of wireless encryption
technologies that provide data protection. For most
routers, simply log in to the settings to update
your security mode to the safer options.
 Turn on your firewall. Firewalls protect your
business network from outside attacks, and depending
on the make and model of your router, it may come
with one built in. Ensure it is already turned on
and enabled through your router’s settings.
 Partner with a security vendor that offers managed
network services. This service helps you control the
performance and security of your business networks
with 24/7 management, change control, monitoring and
network operations support.
Thank you

More Related Content

Similar to hotel management

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxdanhaley45372
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdfKavitaDubey18
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxkris harden
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesSymantec
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Lana Sorrels
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsColorTokens Inc
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionHTS Hosting
 
Discuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docxDiscuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docxstandfordabbot
 

Similar to hotel management (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docx
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdf
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
NAC_p3.pptx
NAC_p3.pptxNAC_p3.pptx
NAC_p3.pptx
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Discuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docxDiscuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docx
 

Recently uploaded

Pesticide Calculation Review 2013 post.pptx
Pesticide Calculation Review 2013 post.pptxPesticide Calculation Review 2013 post.pptx
Pesticide Calculation Review 2013 post.pptxalfordglenn
 
Call Girls Junnar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Junnar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Junnar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Junnar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
The Billo Photo Gallery - Cultivated Cuisine T1
The Billo Photo Gallery - Cultivated Cuisine T1The Billo Photo Gallery - Cultivated Cuisine T1
The Billo Photo Gallery - Cultivated Cuisine T1davew9
 
Ho Sexy Call Girl in Mira Road Bhayandar | ₹,7500 With Free Delivery, Kashimi...
Ho Sexy Call Girl in Mira Road Bhayandar | ₹,7500 With Free Delivery, Kashimi...Ho Sexy Call Girl in Mira Road Bhayandar | ₹,7500 With Free Delivery, Kashimi...
Ho Sexy Call Girl in Mira Road Bhayandar | ₹,7500 With Free Delivery, Kashimi...Pooja Nehwal
 
VVIP Pune Call Girls Viman Nagar (7001035870) Pune Escorts Nearby with Comple...
VVIP Pune Call Girls Viman Nagar (7001035870) Pune Escorts Nearby with Comple...VVIP Pune Call Girls Viman Nagar (7001035870) Pune Escorts Nearby with Comple...
VVIP Pune Call Girls Viman Nagar (7001035870) Pune Escorts Nearby with Comple...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
(MAYA) Baner Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MAYA) Baner Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MAYA) Baner Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MAYA) Baner Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls In Singar Nagar ( Lucknow ) 🔝 8923113531 🔝 Cash Payment Avai...
VIP Call Girls In Singar Nagar ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment Avai...VIP Call Girls In Singar Nagar ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment Avai...
VIP Call Girls In Singar Nagar ( Lucknow ) 🔝 8923113531 🔝 Cash Payment Avai...anilsa9823
 
VIP Call Girl Bikaner Aashi 8250192130 Independent Escort Service Bikaner
VIP Call Girl Bikaner Aashi 8250192130 Independent Escort Service BikanerVIP Call Girl Bikaner Aashi 8250192130 Independent Escort Service Bikaner
VIP Call Girl Bikaner Aashi 8250192130 Independent Escort Service BikanerSuhani Kapoor
 
VIP Kolkata Call Girl Jadavpur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jadavpur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jadavpur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jadavpur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Service Secunderabad Hyderabad Call +91-8250192130
VIP Call Girls Service Secunderabad Hyderabad Call +91-8250192130VIP Call Girls Service Secunderabad Hyderabad Call +91-8250192130
VIP Call Girls Service Secunderabad Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Russian Call Girls in Cuttack Deepika 8250192130 Independent Escort Servi...
VIP Russian Call Girls in Cuttack Deepika 8250192130 Independent Escort Servi...VIP Russian Call Girls in Cuttack Deepika 8250192130 Independent Escort Servi...
VIP Russian Call Girls in Cuttack Deepika 8250192130 Independent Escort Servi...Suhani Kapoor
 
Call Girls Dubai &ubble O525547819 Call Girls In Dubai Blastcum
Call Girls Dubai &ubble O525547819 Call Girls In Dubai BlastcumCall Girls Dubai &ubble O525547819 Call Girls In Dubai Blastcum
Call Girls Dubai &ubble O525547819 Call Girls In Dubai Blastcumkojalkojal131
 
Russian Call Girls in Nagpur Devyani Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Devyani Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Devyani Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Devyani Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Russian Call Girls in Noida Deepika 8250192130 Independent Escort Service...
VIP Russian Call Girls in Noida Deepika 8250192130 Independent Escort Service...VIP Russian Call Girls in Noida Deepika 8250192130 Independent Escort Service...
VIP Russian Call Girls in Noida Deepika 8250192130 Independent Escort Service...Suhani Kapoor
 
Top Rated Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...
Top Rated  Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...Top Rated  Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...
Top Rated Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...ranjana rawat
 
ΦΑΓΗΤΟ ΤΕΛΕΙΟ ΞΞΞΞΞΞΞ ΞΞΞΞΞΞ ΞΞΞΞ ΞΞΞΞ Ξ
ΦΑΓΗΤΟ ΤΕΛΕΙΟ ΞΞΞΞΞΞΞ ΞΞΞΞΞΞ ΞΞΞΞ ΞΞΞΞ ΞΦΑΓΗΤΟ ΤΕΛΕΙΟ ΞΞΞΞΞΞΞ ΞΞΞΞΞΞ ΞΞΞΞ ΞΞΞΞ Ξ
ΦΑΓΗΤΟ ΤΕΛΕΙΟ ΞΞΞΞΞΞΞ ΞΞΞΞΞΞ ΞΞΞΞ ΞΞΞΞ Ξlialiaskou00
 
Call Girls Sb Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sb Road Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sb Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sb Road Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Week 5 Dessert Accompaniments (Cookery 9)
Week 5 Dessert Accompaniments (Cookery 9)Week 5 Dessert Accompaniments (Cookery 9)
Week 5 Dessert Accompaniments (Cookery 9)MAARLENEVIDENA
 

Recently uploaded (20)

Pesticide Calculation Review 2013 post.pptx
Pesticide Calculation Review 2013 post.pptxPesticide Calculation Review 2013 post.pptx
Pesticide Calculation Review 2013 post.pptx
 
Call Girls Junnar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Junnar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Junnar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Junnar Call Me 7737669865 Budget Friendly No Advance Booking
 
The Billo Photo Gallery - Cultivated Cuisine T1
The Billo Photo Gallery - Cultivated Cuisine T1The Billo Photo Gallery - Cultivated Cuisine T1
The Billo Photo Gallery - Cultivated Cuisine T1
 
Ho Sexy Call Girl in Mira Road Bhayandar | ₹,7500 With Free Delivery, Kashimi...
Ho Sexy Call Girl in Mira Road Bhayandar | ₹,7500 With Free Delivery, Kashimi...Ho Sexy Call Girl in Mira Road Bhayandar | ₹,7500 With Free Delivery, Kashimi...
Ho Sexy Call Girl in Mira Road Bhayandar | ₹,7500 With Free Delivery, Kashimi...
 
VVIP Pune Call Girls Viman Nagar (7001035870) Pune Escorts Nearby with Comple...
VVIP Pune Call Girls Viman Nagar (7001035870) Pune Escorts Nearby with Comple...VVIP Pune Call Girls Viman Nagar (7001035870) Pune Escorts Nearby with Comple...
VVIP Pune Call Girls Viman Nagar (7001035870) Pune Escorts Nearby with Comple...
 
Top Rated Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls JM road ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
(MAYA) Baner Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MAYA) Baner Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MAYA) Baner Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MAYA) Baner Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls In Singar Nagar ( Lucknow ) 🔝 8923113531 🔝 Cash Payment Avai...
VIP Call Girls In Singar Nagar ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment Avai...VIP Call Girls In Singar Nagar ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment Avai...
VIP Call Girls In Singar Nagar ( Lucknow ) 🔝 8923113531 🔝 Cash Payment Avai...
 
VIP Call Girl Bikaner Aashi 8250192130 Independent Escort Service Bikaner
VIP Call Girl Bikaner Aashi 8250192130 Independent Escort Service BikanerVIP Call Girl Bikaner Aashi 8250192130 Independent Escort Service Bikaner
VIP Call Girl Bikaner Aashi 8250192130 Independent Escort Service Bikaner
 
VIP Kolkata Call Girl Jadavpur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jadavpur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jadavpur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jadavpur 👉 8250192130 Available With Room
 
VIP Call Girls Service Secunderabad Hyderabad Call +91-8250192130
VIP Call Girls Service Secunderabad Hyderabad Call +91-8250192130VIP Call Girls Service Secunderabad Hyderabad Call +91-8250192130
VIP Call Girls Service Secunderabad Hyderabad Call +91-8250192130
 
VIP Russian Call Girls in Cuttack Deepika 8250192130 Independent Escort Servi...
VIP Russian Call Girls in Cuttack Deepika 8250192130 Independent Escort Servi...VIP Russian Call Girls in Cuttack Deepika 8250192130 Independent Escort Servi...
VIP Russian Call Girls in Cuttack Deepika 8250192130 Independent Escort Servi...
 
Call Girls Dubai &ubble O525547819 Call Girls In Dubai Blastcum
Call Girls Dubai &ubble O525547819 Call Girls In Dubai BlastcumCall Girls Dubai &ubble O525547819 Call Girls In Dubai Blastcum
Call Girls Dubai &ubble O525547819 Call Girls In Dubai Blastcum
 
Russian Call Girls in Nagpur Devyani Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Devyani Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Devyani Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Devyani Call 7001035870 Meet With Nagpur Escorts
 
VIP Russian Call Girls in Noida Deepika 8250192130 Independent Escort Service...
VIP Russian Call Girls in Noida Deepika 8250192130 Independent Escort Service...VIP Russian Call Girls in Noida Deepika 8250192130 Independent Escort Service...
VIP Russian Call Girls in Noida Deepika 8250192130 Independent Escort Service...
 
Top Rated Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...
Top Rated  Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...Top Rated  Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...
Top Rated Pune Call Girls Yashwant Nagar ⟟ 6297143586 ⟟ Call Me For Genuine ...
 
The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Tingre Nagar 8250192130 Will You Miss Thi...
 
ΦΑΓΗΤΟ ΤΕΛΕΙΟ ΞΞΞΞΞΞΞ ΞΞΞΞΞΞ ΞΞΞΞ ΞΞΞΞ Ξ
ΦΑΓΗΤΟ ΤΕΛΕΙΟ ΞΞΞΞΞΞΞ ΞΞΞΞΞΞ ΞΞΞΞ ΞΞΞΞ ΞΦΑΓΗΤΟ ΤΕΛΕΙΟ ΞΞΞΞΞΞΞ ΞΞΞΞΞΞ ΞΞΞΞ ΞΞΞΞ Ξ
ΦΑΓΗΤΟ ΤΕΛΕΙΟ ΞΞΞΞΞΞΞ ΞΞΞΞΞΞ ΞΞΞΞ ΞΞΞΞ Ξ
 
Call Girls Sb Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sb Road Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sb Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sb Road Call Me 7737669865 Budget Friendly No Advance Booking
 
Week 5 Dessert Accompaniments (Cookery 9)
Week 5 Dessert Accompaniments (Cookery 9)Week 5 Dessert Accompaniments (Cookery 9)
Week 5 Dessert Accompaniments (Cookery 9)
 

hotel management

  • 1. Possible cyber threats for restaurant networks and solutions Group-7- Bhavesh rao Chanchal Chaudhary Charul Bagdiya Deepak Lund Harsh Kulkarni
  • 2. Introduction  In the world of manufacturing, generally, the most critical point of risk often comes at the level of the industrial control systems (ICS). This is where both manufacturing data breaches and shutdowns can occur.  One reason food processing is a target is because of outdated legacy ICS. Another problem is that managers often leave these systems to people who are experts in food manufacturing, but not in cybersecurity. Incorrect or lackluster software and firmware patching can cause openings in ICS systems, leading to zero-day holes just waiting for an attacker to come along and exploit them.  Food can go bad and needs to be cooled or handled in special ways. Because of this, the entire chain needs to proceed quickly and without interruption. Production and manufacturing shutdowns can damage or destroy the business, ruin the product and make it unsafe for consumers. That harms cascades down to partners and suppliers.
  • 3. 1.Hackers:  These highly skilled computer experts use their knowledge to exploit or break into connected devices and computer systems. They target restaurants due to the abundance of poorly secured systems. Once they find a vulnerability and get into the network, they go after the POS systems. Due to the POS doing the simple job of processing transactions, the typical alarm bells of a desktop computer hack would not be seen by a user, for example, ransomware messages, degraded performance, etc.
  • 4. Solution:  Maintain a strong firewall.  Conduct regular scans of your network.  Limit remote access. Firewalls left open by managers working remotely or through regular maintenance on systems can put your network at risk. Regularly change passwords and do not use default codes to help keep your network safe.  Ensure all credit card data is encrypted. Some older point of service (POS) equipment sends and stores raw credit card data, rather than encrypting the data as soon as the card is swiped. Make sure your Wi-Fi, security cameras, and digital menu boards run on a separate network from your POS equipment.  Keep your software updated.
  • 5. 2.Ransomware:  Imagine logging into your back-office system only to be greeted with a frozen screen. You cannot access your files and then see a ransomware message: Pay $15,000 to access encrypted files. There’s nothing that can be done at that point. Ransomware prevents users from accessing their system until a ransom is paid to get a decryption key of some kind. Ransomware attacks are on the rise and there is no end in sight.
  • 6. Solution:  Embrace zero trust network access and multi-factor authentication.  Prioritize vulnerabilities that matter and patch operating system and application software frequently.  Consider endpoint protection solutions that not only detect and act against suspicious behavior but can actually prevent malware from executing.  Isolate guest Wi-Fi from your main network. This will protect against accidental installation of ransomware malware by drive-by infection (accessing an internet site that uses that connection to infect your network).  Further segment your restaurant networks to isolate POS systems, back-office PCs, and file servers, helping to prevent spread of malware in the event of
  • 7. Wi-Fi Security  Many restaurant owners set up a firewall as a basic security measure and believe their networks will be sufficiently protected. In today’s cyber world, firewalls can’t just be set up and run on their own. While a network firewall is a fundamental security component, it must be actively monitored, managed, and updated to be effective.  Even still, a managed firewall cannot defend every threat vector. Attack and breach prevention requires a new approach, and many products and service providers simply do not have the ability to stop cybercriminals before they do legitimate damage.
  • 8. Solution:  Utilize wireless protected access (WPA). WPA or WPA2 (preferred) are types of wireless encryption technologies that provide data protection. For most routers, simply log in to the settings to update your security mode to the safer options.  Turn on your firewall. Firewalls protect your business network from outside attacks, and depending on the make and model of your router, it may come with one built in. Ensure it is already turned on and enabled through your router’s settings.  Partner with a security vendor that offers managed network services. This service helps you control the performance and security of your business networks with 24/7 management, change control, monitoring and network operations support.