This report is based on the control of information security services within Telstra. The Telstra Corporation Ltd. Is one of the largest telecommunications company within Australia. The company is mainly dedicated towards building and operation of the vast networks of telecommunication within the markets based on several areas such as mobile, access to internet, voice and various other services and products (Pathan, 2014).
Telstra believes that their customers should have high connectivity to various forms of information and have solutions based on content that would be simple and would easy to use. This would help in developing a fast and larger mobile network based in Australia. As Telstra is one of the leading Information Services and Telecommunication Company, it is much dedicated to help their customers in improving their ways of living and forms of working with the help of high level of connections (Bifulco et al., 2013).
With the higher level of the form of network communications within the company, Telstra would have to think of securing the services within the information systems (IS). Security within the IS would be highly essential as with the embracement of digital transformation and the upcoming opportunities, it would be highly essential to consider the mitigation of the vulnerabilities to the security systems.
Each organization makes use of General Management Controls (GMC) in order to manage the potential risks that might impact the security of any organization. The controls within the managerial position are widely used by the employees and managers for the purpose of accomplishing the prime objectives within the organization. The various controls within the management of the organization would be helpful in enabling of the proceedings of the work as per the expectation of the organization (Jagadeesan & Krishnamachari, 2015). Most of these controls are mainly classifies as detective or preventive. The detective controls are mainly designed for identifying the various errors or any form of irregularity after their occurrence. The preventive controls are specifically designed for discouraging irregularities or any form of errors.
The GMC framework within Telstra helps in providing the structure through which the objectives of business and strategy of the organization would be set, performance would be monitored and thus the risks would be managed. It would also include a proper framework for the making of decisions and thus enhancing the accountability within the business processes. The GMC would also be able to provide guidance based on the behavioural standards (Romney et al., 2013).
The GMC within Telstra also focuses on the understanding and management of risks that are often associated with the part of the work. This would help in meeting the strategy and the objectives of the business. The regulatory obligations and the legal framework would also be need to be met. These would be helpful for understanding the various forms of potential risks within the system and also for informing about the decisions of the business (Arora, Kalro & Sharma, 2015).
One of the major components of the framework of GMC is the process of management of risks against the various forms of threats. This is possible with a thorough process of the evaluation of risks and the best possible solutions. With the eminent process of the process of risk management, the GMC would be able to identify, monitor and thus report on the various form of risks in order to achieve the objectives and plans of the organization.
There are several kinds of computer based applications such as the online systems of learning, payroll systems and other form of business applications that are meant in order to enhance the growth of the organization. An assessment of the applications, which would be able to identify the various risks within an organization would be helpful in order to identify the degree of vulnerability from several unauthorized applications (Allen, 2017).
Telstra also makes a high use of various forms of cloud based applications. They should gain a proper visibility over all the unauthorized applications that are used within the business and the staff members who would be using them. There should be a proper form of assessment of the risk factors that are posed on the sensitive corporate data of the organization. Hence the company would have to think of proper measures to secure the data from theft, compliance breaches and loss. In order to avoid the loss of business data, the organization would be able to recommend several form of alternative cloud applications, which would be helpful in keeping the safety of the data (Sanaei et al., 2014).
The different types of ACs that are used by Telstra are secure and they have a personalized portal that would be helpful in managing the accounts of Telstra within a single place for the ease of usage and simplicity. With the help of the applications provided by Telstra, users would be able to view invoices, place and track their orders, manage their personalized accounts, manage the services of the network and thus analyse the usage of services and trends (Pallegedara & Warren, 2016). A single log in within the account of Telstra would allow the users to access most of the online tools, which are offered by Telstra. One of the applications that is provided by Telstra is the option of Live Chat for their customers. The customers would be able to get support from the service providers.
The other different kinds of Application Controls, which are meant to control the computerized applications that would include mobile ordering and management tools, telephony service tools, fixed broadband tools, cloud services tools and also other form of tools related to services and networks (Campbell, 2017).
Based on the proper understanding of the use of GMCs and ACs within Telstra, there could be a comparison of the various services, which are provided by general management and application control systems. The various forms of threats within the management systems would be controlled with the help of the several application control softwares that are used by Telstra. The general management team would be able to manage the various forms of threats based on the applications of proper form of strategies and applications within the telecommunication networks (Takacs, Bellagamba & Wilke, 2013). The team of general management also shares the information of their various stakeholders who help in the successful development of powerful networks. The GMC also holds responsibility for approving the decisions of strategy within the corporate plan and the ACs would be responsible for monitoring the vital implementation of the taken strategy. The ACs are also dedicated towards the monitoring of the ethical standards of the company, which would be highly essential for governance of the factors of risk.
There are several form of risks that are faced within the Information Systems of Telstra. The various forms of risks, which are faced by Telstra are environmental risks, operational risks, market risks and compliance risks. The IT related risks are mainly considered to be a major component of operational risks. This would mainly affect the reliability, availability, confidentiality, security and the integrity of the processes within the business of the organization (Third, Forrest-Lawrence & Collier, 2014).
The proper management of the risks is an extremely important component and the responsibility of the organization. The IT systems within the organization should identify the severity of the risks, assess the kinds of risks, which might affect the system and thus develop proper measures in order to control the risks. The various forms of techniques, which are adopted by Telstra in order to ensure the security within the business sector.
Risk Avoidance – Avoidance from the risks should be a major concern for the organization. The organization has the option of refraining from the activities that would hold major form of unacceptable risks. Avoidance from the risks means the process of exiting from the activities that are considered as a major threat to the process of the organization. There are efficient systems of IT based within the systems, which hold the responsibility of detecting the possible risks that might affect the systems. The risk avoidance strategies that are implemented by Telstra include the relocation of their data centre from a certain region from where they might get certain threats on their systems. They also avoid the potential risks by declining a certain project, which might be the possibility of risk factor to the organization (Coleman, 2016).
Risk Reduction – Telstra responds to the risks based on thefts of data within the organization by the installation of several form of secure systems within their devices. The main challenge for the organization is to ensure that there should be a correlation within the potential losses from theft and the effectiveness of cost within the systems of security.
There is another process of reducing the amount of posed risks with the adoption of certain form of practices. The softwares that are developed by Telstra should be delivered incrementally such that their performance could be tested before planning on the next phase (Young & Jones, 2013).
Risk Transfer – Telstra applies the technique of transfer of risks through contracts. Hedging strategies, derivatives and future contracts are various other methods of transferring the financial risks. The several risks could also be pooled and then they would be collectively transferred or could be avoided.
Risk Retention – This is one of the most viable approach in which the mitigation costs is greater than the sustained losses. All of the risks, which could not be transferred or avoided are mainly retained as default.
The Management of Telstra is mainly responsible for the preparation, integrity and presentation of financial statements and IS services of Telstra. The audit plan within Telstra includes the reviews based on exposure of risks within the organization and thus also reviews the emerging trends of business within the organization. The audit process within Telstra also includes a severe process of check of the compliance based on the strategies undertaken by Telstra (Goodwin & Wu, 2014). The process of audit within Telstra considers some of the major factors, which are highly essential for securing the data networks and communication process. The audit within the communication is essential for gathering information about the facts that who would be responsible for accessing the data of the organization, the proper transmission of the data within the networks and the location of the vital data, the concerned authority who would be responsible for the protection of data and the strong measures that are taken to protect and secure the data within the organization.
Conclusion
Based on the discussion from the above report, it could be concluded that high form of telecommunication services such as Telstra should be able to develop newer and advanced form of systems. The security of the systems within Telstra is a matter of high concern and hence proper form of strategies should be developed in order to maintain the efficiency of the network. The network of communication should be reviewed carefully for the purpose of transmitting vital information. There should be several considerations based on the importance of good form of telecommunication services for the purpose of economic development within the regions that face poor form of services from the company.
The importance of the improvement of telecommunication is a matter of high concern for Telstra and hence it is very essential to consider for the further growth of the business. Many aspects within the business such as the coverage of mobile telephone signals should be taken into higher consideration. Based on the services provided by Telstra, it has been observed that Telstra has been the dominant company, which has maintained their strong base within the market.
Based on the conclusions drawn from the above report, there could be some recommendations that could be provided for the growth of the organization (Wilson, 2014). Telstra should majorly collect information from their customers based on their reviews. This would be highly necessary in order to determine about the ways in which the organization would be able to improve their use of products and services, thus making them much more relevant. The data, which would be collected from the customers could also be used to detect the areas from where the data is used at a maximum rate and the areas where the congestion of network would occur. This would help in improving the network and thus help in serving the customers with the highest quality of network (Lustosa et al., 2015).
It would also be recommended that the company should not share the personal information of the customers or the information related to the product usage with any other businesses. This policy should be implemented within their Privacy Statement. The information gathered from thorough analysis of the customer reviews would be helpful for the purpose of analysis and research, advertising, marketing and other uses within the organisation.
References
Allen, M. (2017). Web 2.0: An argument against convergence. In Media Convergence and Deconvergence (pp. 177-196). Palgrave Macmillan, Cham.
Arora, S., Kalro, A. D., & Sharma, D. (2015). A comprehensive framework of brand name classification. Journal of Brand Management, 22(2), 79-116.
Bifulco, R., Dietz, T., Huici, F., Ahmed, M., Martins, J., Niccolini, S., & Kolbe, H. J. (2013, October). Rethinking access networks with high performance virtual software brases. In Software Defined Networks (EWSDN), 2013 Second European Workshop on (pp. 7-12). IEEE.
Campbell, I. (2017). 30 years after launch: Recalling the first four years of telecom’s cellular mobile service. Australian Journal of Telecommunications and the Digital Economy, 5(1), 4.
Coleman, L. (2016). Risk strategies: Dialling up optimum firm risk. Routledge.
Goodwin, J., & Wu, D. (2014). Is the effect of industry expertise on audit pricing an office-level or a partner-level phenomenon?. Review of Accounting Studies, 19(4), 1532-1578.
Jagadeesan, N. A., & Krishnamachari, B. (2015). Software-defined networking paradigms in wireless networks: A survey. ACM Computing Surveys (CSUR), 47(2), 27.
Lustosa, T. C., Loschi, H. J., Iano, Y., & Moretti, A. (2015, June). The importance of integrated network management and telecom service through time. In Telecommunications (IWT), 2015 International Workshop on (pp. 1-5). IEEE.
Pallegedara, D., & Warren, M. (2016). Unauthorised Disclosure of Organisational Information through Social Media: A Policy Perspective. IDIMC 2016, 86.
Pathan, M. (2014). Cloud?Based Content Delivery and Streaming. Advanced Content Delivery, Streaming, and Cloud Services, 1-31.
Romney, M. B., Steinbart, P. J., Mula, J. M., McNamara, R., & Tonkin, T. (2013). Accounting Information Systems [1st Australasian edition]. Pearson Australia.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.
Takacs, A., Bellagamba, E., & Wilke, J. (2013). Software-defined networking: the service provider perspective. Ericsson Review, 2, 2-8.
Third, A., Forrest-Lawrence, P., & Collier, A. (2014). Addressing the Cyber Safety Challenge: from risk to resilience.
Wilson, N. (2014). Australia’s National Broadband Network–A cybersecure critical infrastructure?. Computer Law & Security Review, 30(6), 699-709.
Young, C., & Jones, R. (2013). Smart futureS: VCCCar regional BuSineSS BreakfaSt roundtaBle Context PaPer.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download