Study shows hotels' Internet connections unsafe

Oct 01, 2008 By George Lowery

(PhysOrg.com) -- Travelers who use a hotel's Internet network risk the possibility of data theft, concludes a new study from Cornell's School of Hotel Administration.

The analysis of the networks in 46 hotels and a survey of 147 U.S. hotels found that a majority of the hotels do not use all available tools to maintain network security.

For example, about 20 percent of the hotels surveyed still use simple hub-type systems, which are most vulnerable to hacking. The findings of the firsthand analysis of 46 hotels were no more encouraging.

"Even with hotels that required authentication, I found helpful employees who got me past that barrier," said Josh Ogle '08, a Cornell Hotel School graduate, president of TriVesta LLC. and a co-author of the study. "So, authentication is not as effective as we think, and then I found that of the 39 hotels that offered WiFi connections, only six used encryption to help protect the system."

Added co-author Erica L. Wagner, assistant professor of information systems at the Hotel School: "On balance, we were forced to conclude that guests' data transmissions are often at risk when they use a hotel's network. However, we did find hotels that were paying attention to the security of their guests' data. I should point out that improving security does not have to be costly."

The report concludes with a case study of the W Dallas - Victory Hotel, which has taken a security step not used by most hotels. "What the W Dallas has done is to set up each node on its network as a virtual local area network, or VLAN," explained co-author Mark P. Talbert, a Hotel School senior lecturer in information systems. "By using these VLANs, the hotel has separated each guest's computer in a way that should protect against stolen data. It also gives the hotel greater control over the guest side of the network."

Provided by Cornell University

Explore further: 5G mobile networks will support an internet that's so good you can feel it

add to favorites email to friend print save as pdf

Related Stories

Wildlife 'WikiLeaks' targets Africa poaching elite

Aug 25, 2014

Poachers slaughtering Africa's elephants and rhinos with impunity are often shielded from police by powerful connections, but a group of conservationists has turned to the anonymity of tip-offs to try to ...

Molecular shuttle speeds up hydrogen production

Aug 14, 2014

An LMU team affiliated with the Nanosystems Initiative Munich (NIM) has achieved a breakthrough in light-driven generation of hydrogen with semiconductor nanocrystals by using a novel molecular shuttle to ...

Recommended for you

The New York Times to cut 100 newsroom jobs

4 minutes ago

The New York Times Co. says it is cutting about 100 newsroom jobs through buyouts and layoffs in an effort to trim costs and focus more on its digital efforts.

Minimally invasive surgery with hydraulic assistance

46 minutes ago

Endoscopic surgery requires great manual dexterity on the part of the operating surgeon. Future endoscopic instruments equipped with a hydraulic control system will provide added support during minimally ...

Engineering new vehicle powertrains

1 hour ago

Car engines – whether driven by gasoline, diesel, or electricity – waste an abundance of energy. Researchers are working on ways to stem this wastefulness. Ultramodern test facilities are helping them ...

Analyzing gold and steel – rapidly and precisely

2 hours ago

Optical emission spectrometers are widely used in the steel industry but the instruments currently employed are relatively large and bulky. A novel sensor makes it possible to significantly reduce their size ...

More efficient transformer materials

2 hours ago

Almost every electronic device contains a transformer. An important material used in their construction is electrical steel. Researchers have found a way to improve the performance of electrical steel and ...

Sensor network tracks down illegal bomb-making

2 hours ago

Terrorists can manufacture bombs with relative ease, few aids and easily accessible materials such as synthetic fertilizer. Not always do security forces succeed in preventing the attacks and tracking down ...

User comments : 0