Professional Documents
Culture Documents
E - Tourism and Social Media 4.2
E - Tourism and Social Media 4.2
WHAT IS PHISHING?
Phishing threats are the method of delivering malicious messages from a reliable
source. It usually happens via email. The intention is to capture confidential data,
such as credit card and login details, or to insert malware on the computer of the
victim.
PREVENTIVE MEASURES
-Two Factor Authentication Involves two identity authentication methods — which
you know (i.e. password) and something that you have (i.e. Smartphone).
-Email filters Using machine learning and language processing to mark highly
risky email. The DMARC("Domain-based Message Authentication, Reporting &
Conformance") framework can also eliminate phishing of email.
- Augmented password logins using personal photos, identity cues, protection skins
etc.
E-Tourism and Social Media Mriganga Barman
PROTECTIVE MEASURES BY MARRIOTT TO PROTECT FROM CYBER THREATS
-No third party software is installed on guest computers by the Hotel. The mobile
application uses a data protection SANDBOX.
“A sandbox is a software that offers an additional safety layer which prevents malware
from damaging a device. It can store encrypted information if a client has no Wi-Fi
connectivity.”
- Marriott has collaborated with a security company to monitor and check the security
of its mobile app. It has also built suspicious activity detection software in its systems.
-A public bug bounty initiative has also been introduced with the HackerOne
technology organization that encourages ethical hackers to check their websites and
mobile applications for security issues.
- Cyber Safe Travel, operated by Strike Force Technologies, makes use of security
against login breaches and keystroke encryption. Tourists are especially prone to
hackers as they often sign up for Wi-Fi networks. Hackers can download spyware to
read anything they type on their devices to control their data.