Page
3 of
4 Security assessment report detailing vulnerabilities, risks, and recommendations for enhancing the security posture of the cloud-based ERP hotel management system.
Customized security policies, procedures, and guidelines tailored to the specific requirements of hotel management systems and regulatory compliance standards. Implementation plan outlining the deployment
of technical controls, encryption mechanisms, and monitoring solutions. Training materials and awareness programs for hotel staff to promote cybersecurity awareness and best practices. Ongoing support and maintenance services to ensure the continuous effectiveness of
implemented security measures. Timeline: Phase 1: Security Assessment and Requirements Gathering (2 months) Phase 2: Policy Development and Implementation Planning (1 month) Phase 3: Technical Implementation and Deployment (3 months) Phase 4: Training and Awareness Programs (1 month) Phase 5: Ongoing Support and Maintenance (Continuous)
Project Topic Approval Approved by the Supervisor: Approved / Not Approved Supervisor’s Signature Date of Approval 30/03/2024 Student’s Signature