Cornell University
Library
Cornell UniversityLibrary

eCommons

Help
Log In(current)
  1. Home
  2. Cornell Peter and Stephanie Nolan School of Hotel Administration
  3. Centers and Institutes
  4. The Center for Hospitality Research (CHR)
  5. Center for Hospitality Research Publications
  6. Hotel Network Security: A Study of Computer Networks in U.S. Hotels

Hotel Network Security: A Study of Computer Networks in U.S. Hotels

File(s)
Ogle_202008_20Hotel_20network.pdf (732.53 KB)
Permanent Link(s)
https://hdl.handle.net/1813/71107
Collections
Center for Hospitality Research Publications
Author
Ogle, Josh
Wagner, Erica L.
Talbert, Mark P.
Abstract

A study of 147 U.S. hotels finds a mixed picture with regard to the security of guests’ connections to the hotels’ network, whether by cable or Wi-Fi. Since many business travelers connect remotely to continue working while on the road, the potential for theft of corporate information exists. Some hotels still rely on relatively rudimentary hub technology for their networks, and these are particularly subject to hacking. Others have upgraded to more secure switches or routers. Even better is encryption for Wi-Fi connections, but that still does not prevent malicious users from intercepting guests’ transmissions. An example of a best practice is presented in the case of the W Dallas Hotel—Victory, which has set up virtual local area networks (VLANs) for all of its users. The VLAN inhibits attackers from using their computer to imitate the hotel’s main server, which is the mechanism most would use to intercept other people’s data. Given that the technology exists to increase a hotel network’s security, a hotel could potentially be considered at fault for not taking the necessary precautions to protect their guests from hackers.

Date Issued
2008-09-01
Keywords
hotels
•
computer networks
•
Wi-Fi
•
network security
Rights
Required Publisher Statement: © Cornell University. This report may not be reproduced or distributed without the express permission of the publisher
Type
article

Site Statistics | Help

About eCommons | Policies | Terms of use | Contact Us

copyright © 2002-2026 Cornell University Library | Privacy | Web Accessibility Assistance