Question

In: Operations Management

5.Contrast the level of security in a hotel that uses a hard-key system with that in...

5.Contrast the level of security in a hotel that uses a hard-key system with that in a hotel that uses an electronic key or smart card system.

Solutions

Expert Solution

A hard key system is a old time security feature in a hotel.However, it has a number of security flaws which include ease of duplicating the key by an employee, no record of entry, hassles faced if the key is lost or misplaced by the guest and no possibility of denial of access. On the other hand a smart card or electronic key based system has a benefit of password based access, centralised control, easy deactivation and access control from anywhere, record of every entry and exit and quick and easy replacement if a card / key is lost. As a result, even the staff does not have access to the rooms when they are not authorised to do so. Electronic key / card can be used only when intended, and this feature makes a room much more secure than the hard key, which can be misused, misplaced and can be used by anyone who is in possession of it. In contrast to the electronic key /card, there is no record of hard key operation, hence it can not be used to trace an incident or be helpful in an investigation in case of a theft or other crime. Managing a number of same ( duplicate ) keys for a room is also a hassle for the management, while a card can be configured within minutes, making it more convenient.


Related Solutions

A key role of penetration testing as used by IT security professionals is to identify system...
A key role of penetration testing as used by IT security professionals is to identify system weaknesses of various kinds. According, pen testing is an important method for protecting organizations from unwanted attacks or intrusions. Why is it important to understand the risks presented by weak physical security? How does defense in depth prevent attacks? What considerations inform decisions regarding which physical controls should be implemented and for what reasons?
Glitz hotel, a 500-room hotel, rents hotel rooms for $120/night. At the current sales level of...
Glitz hotel, a 500-room hotel, rents hotel rooms for $120/night. At the current sales level of 400 rooms per night, Glitz currently makes a profit of $30/room:                                         Per room Sales                                 $120 Costs                                     90 Profit                                    30 It costs Glitz $90/night to maintain a room ($60 in depreciation, $25 in variable maintenance and $5 in fixed booking costs). Glitz has been approached by Conventions2000.com to purchase a block of 300 rooms for $80/room per night. If this special...
Sector hotel, a 500-room hotel, rents hotel rooms for $120/night. At the current sales level of...
Sector hotel, a 500-room hotel, rents hotel rooms for $120/night. At the current sales level of 400 rooms per night, Glitz currently makes a profit of $30/room:                                    Per room Sales                          $120 Costs                              90 Profit                              30 It costs Sector $90/night to maintain a room ($60 in depreciation, $25 in variable maintenance and $5 in fixed booking costs). Sector has been approached by Conventions2000.com to purchase a block of 300 rooms for $80/room per night. If this special...
A house security system uses two devices, A and B. If an emergency happens, the probability...
A house security system uses two devices, A and B. If an emergency happens, the probability that it will be detected by device A is 0.78; and by device B, 0.86; and by either device A or device B or both, 0.96. Determine the probability that an emergency will be detected by device A given that it is detected by device A. Write your answer in percent with 2 decimal places.
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that...
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial of service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
Compare and contrast the key benefits for each system. Examples might be full customization, a cloud-based...
Compare and contrast the key benefits for each system. Examples might be full customization, a cloud-based model, scalability, strong support. Please provide answers based on the database management system.
The IBM System/370 architecture uses a two-level memory structure and refers to the
The IBM System/370 architecture uses a two-level memory structure and refers to the two levels as segments and pages, although the segmentation approach lacks many of the features described earlier in this chapter. For the basic 370 architecture, the page size may be either 2 Kbytes or 4 Kbytes, and the segment size is fixed at either 64 Kbytes or 1 Mbyte. For the 370/XA and 370/ESA architectures, the page size is 4 Kbytes and the segment size is 1...
Differences in Alpha Level as It Related to Hard and Soft Sciences Decisions about alpha level...
Differences in Alpha Level as It Related to Hard and Soft Sciences Decisions about alpha level may be different, especially as it relates from hard sciences to social sciences. For example, a medical trial for cancer treatments conducts their statistical tests at .0001 – so for every 1 out of 10,000 patients, there may be issues, sickness or even death. For social science, we use alpha .05. We are comfortable with performing research, for example, on students. So we are...
Develop 2 soft and 2 hard standards for any aspect of the service offered by hotel...
Develop 2 soft and 2 hard standards for any aspect of the service offered by hotel and restaurant? (Subject: service marketing)
Sam's Cat Hotel operates 52 weeks per? year, 5 days per? week, and uses a continuous...
Sam's Cat Hotel operates 52 weeks per? year, 5 days per? week, and uses a continuous review inventory system. It purchases kitty litter for ?$11.50 per bag. The following information is available about these bags. Refer to the standard normal table LOADING... for? z-values. Demand ?= 80 ?bags/week Order cost? = ?$58?/order Annual holding cost? = 30 percent of cost Desired ?cycle-service levelequals90 percent Lead time? = 2 ?week(s) ?(10 working? days) Standard deviation of weekly demand? = 16 bags...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT