You are on page 1of 4

THE MANAGEMENT

DALLAS PREMIER HOTEL


KISII.
Att: Madam Lydia.
19-4-2024

HOTEL SYSTEMS AUDIT REPORT

Preliminary systems audit was carried out on the 15th of April 2024 for Dallas Premier Hotel,
herein after, been referred to as the hotel.

HOTEL SYSTEMS

The hotel has the following number of systems in active operation:


1. CCTV security system: this consists of Network Video Recorders (NVR’s), IP cameras
and cabling integrated into the LAN network’s PoE switches found on each floor.

2. Telephony system: This are IP Handsets used in the hotel’s guest rooms managed by
a linux OS server and cabling integrated into the LAN network’s PoE switches found
on each floor.

3. Wifi System: this are Ubiquiti Access Points (AP’s) providing seamless wireless
connections to wifi devices, within the premises of the hotel and cabling integrated
into the LAN network’s PoE switches found on each floor, A unifi controller network
application is installed for secure management of the Ap’s in the front office
computer, a voucher wifi system is also in place alongside the unifi controller to
provide the users of the wifi with restricted use for the purposes of proper internet
bandwidth control.

4. Hotel Management System: this is a networked software application used for all of
the hotels financial transactions including inventory and point of sale that extends
ease of billing to the hotel’s guests. The system also supports user level management,
restricting users to certain rights of use and accessibility.
5. Hotel Locks Management System: the hotel is equipped with Mifare Rf locks in all
the rooms for restricted use and access to the rooms by Mifare cards,a software
application installed in the front office computer provides the management of the
hotel locks by means of key cards, the system also logs the users for various activities
including logs to key cards creation – check in’s and check out’s of guests, the system
also supports user level management restricting users to certain rights of use and
accessibility.

6. DSTV and SMART TV’S: a coaxial cabling infrastructure to tv’s has been laid out to
each guest room including common areas such as the restaurant and the reception,
the Smart Tv’s are also installed in every guest room for extra guest experience by use
of the Wifi in Tv’s.

7. LAN NETWORK System: a restricted server room is in place where protected network
devices such as Routers, PoE switches, Dstv switch, Cctv Nvr’s, are all mounted on a
42U cabinet the LAN cabling terminates there, the server room is also equipped with
air condition to protect the devices from overheating.

8. SYSTEMS LOGINS : a list of all systems admin’s logins user names and passwords has
been created and forwarded to the management for safe keeping.

INTERNET CONNECTIVITY
Safaricom - a reputable ISP in Kenya has provided a secure dedicated end to end fiber internet
connectivity to the hotel. The connection is a reliable all round the clock with stable bandwidth
of 20mbps upload and download.

SECURE LAN MANAGEMENT


Subnetworks have been created within the LAN -Local Area Networking of the hotel, to provide
restricted protection between the guest’s Wifi Network and the Back office including the Front
office and the security surveillance system. This segregation of the LAN has provided a secure
access to services and areas virtually.
RECOMMENDATIONS
Following the above systems preliminary audit the following has been recommended to the
hotels management and Directors: -
1. Detailed equipment scrutiny and inventory is necessary as follows:
(i) A proper record of the number of devices, model numbers, serial numbers
and their locations within the hotel premises.
(ii) The capacity, capability, durability, effectiveness including projected
lifespan of each device and equipment to be determined.

2. Cctv surveillance scrutiny and inventory as follows:


(i) Arrangement of cameras view on tv screen at security room
(ii) Positioning and repositioning of camera’s locations to eliminate blind
spots.
(iii) Installation of additional cameras where necessary.
(iv) To determine the capabilities and effectiveness of each camera’s
daytime and night time clarity and view range.
(v) The storage of cctv Nvr’s should be established to determine the length
of storage including doing proper configurations on the same. The
capacity and the durability of the Nvrs should be scrutinized including
projected life span of each NVR.

3. Computers software licensing is hereby recommended as follows:


(i) All front office and back-office computers to have genuine Microsoft
windows OS licenses.
(ii) All front office and back-office computers to have genuine Microsoft
office package licenses.
(iii) Genuine antivirus software utilities to be installed in the computers to
enhance online protection.

4. Genuine supplies to computers , printers and all other equipments


This including parts replacements, thermal rolls, tonners and inks are highly
recommended to enhance effectiveness and durability of such devices.
5. Preventive maintenance - all equipments and devices to have regular and
scheduled time for servicing and diagnosis to prevent sudden breakdowns and
disruption of services.
6. Replacement of 3rd floor Pcb – it is recommended that third floor locks to have
their pcbs replaced so as to have one hotel lock management system and cards
instead of the current two different software applications.
7. Access points positioning – the position of the AP’s should be re-examined to
avoid weak areas of Wifi transmission to guest rooms.

FURTHER RECOMMENDATION
For the sole purposes of identifying the actual locations of all the devices and
equipments, it is important to engage the services of an experienced interior
designer to create 3D layouts for all the existing floor plans, corridors and gypsum
ceilings to the entire Hotel Premises. The 3D layouts will go a long way into helping
systems administrators and security personnel to plan ahead and secure sensitive
areas more effectively.

REGARDS,

PATRICK K. MWANGI
IT – Team Leader (For Dallas Premier Hotel)

You might also like