Telstra is regarded as one of the leading telecommunication carrier and one of the largest single user based information technology (IT) sector within Australia. The IT systems form at the core of the operations and business systems at Telstra. These information systems form the main part of the business operations. They are very much crucial for meeting with the needs of the customers and meeting up to the expectations of the business (Alonso et al. 2013). Telstra has a wide range of IT specialists who are who hold the responsibility of building of world-class IT based solutions in the telecommunication sector. The IT specialists help in supporting the organisation for supporting the technological systems, facilities and network based support. Telstra has a wide range of business operations that are available in several cities of Australia that includes Melbourne, Canberra, Perth, Brisbane, Adelaide and Townsville. Telstra also extends their operation scaling in Australia and also on a global basis. They offer several chances of various kinds of innovative technologies and also provides a wide range of career based options across their sector of IT (Beltrán 2013). Telstra also focuses on resolving of day-to-day issues that arise within the installation of various kinds of innovative software products, installing of server and thus also helps in resolving of various kinds of issues related to support.
With the evolvement of technological platforms, Telstra has been able to create a radical shift within the operations of the business. With the rise in the technological prospects, there are various kinds of loopholes, which have risen in the field of IT services in the business organizations of Telstra (Dalkir 2013). With the help of the information security systems within Telstra, the people associated within the business operations of the organization are able to connect with each other and gain information in various formats. With the rise of internet based technologies, the use of internet is could be used for the purpose of virtualization, compliance with the ethical standards and the cloud computing technologies. With the rise in these kinds of technologies based on cloud computing and other forms, there have been major form of challenges that have also risen and has posed a serious form of threat within the information systems of the organization (DeLone and McLean 2016). The IT experts at Telstra are much more dedicated to meet the challenges within the business aspects of Telstra and reduce the level of vulnerabilities within the systems with the implementation of several kinds of tools within the sector.
The use of high level of expertise for cyber security, implementation of security strategies, regulatory of governance and measures of compliance should be used for meeting up to the challenges of the rapidly changing environment of IT and mitigating the vulnerabilities within the systems of Telstra (Smith 2018).
Integrated form of telecom operating companies such as Telstra have a wide range of business and information systems related assets. Some of the wide form of assets for the organization include real estate assets. These include the buildings and land acquisitions across telephone exchanges, satellite stations, data centers, offices, depots and warehouses (Poynton 2016). Another kind of assets that are owned by Telstra are passive form of telecom equipment such as fixed-line ducts, conduits, wireless towers and computing systems. Other kind of assets for Telstra are the active form of telecom equipment and various kinds of metals such as copper cabling (Quiggin 2013).
The assets form a vital part for the organization of Telstra. The telecom sector of Telstra have been majorly been considered as a vast of business based infrastructure sector in which the owning of such large kind of assets are extremely crucial for delivery of high form of service. The business operations of Telstra have understood the importance of owning of assets have hence optimized the use of these kinds of assets. However, with the rapid rise of vast form of loopholes within the IT sector of Telstra, it has been extremely crucial for protecting the IT systems of the organization (Dale 2014). Implementing high form of business solutions for the organization would be extremely vital for securing the assets within the organization.
Telstra follows a series of risk management techniques that have been majorly adopted for the purpose of protecting the valuable assets of the organization. These kind of risk management techniques have been majorly been adopted for ensuring the confidentiality, reliability, integrity, security and availability of information. Evaluation of the risk management techniques would be extremely vital for securing the IT systems of the organisation (Coleman 2016).
The security services provided by Telstra help in providing a complete view of the business environment of the organisation. They are able to offer a wide range of complementary services, which would prove to be helpful for the protection of every assets of the organization. The multi-layered form of approach that are adopted by the organisation helps in securing the IT environment within the organisation (Yigitbasioglu 2015). This form of approach is able to span over a local and wide form of area networks to the offered services of the cloud across Australia and all over the world.
The organisation follows a certain process of Risk Management Framework that is able to provide the foundations of the protection against risks. With the aid of risk management processes, the company would be able to identify, monitor and thus report the points of risks in order to achieve the set plans and objectives. Proper form of understanding and the management of risks related to the assets within the IT sector would prove to be helpful for meeting the objectives of the business and also be able to abide by the legal and regulatory obligations. These would also be able to make better forms of decisions and thus act in an ethical manner. The framework that has been adopted by Telstra follows the ISO 31000:2009 based on the International Standards for the purpose of managing the various kinds of risks (Adams 2016). The risk management framework comprises of a vast set of components, which would be meant for implementing, designing, reviewing, monitoring and continuously improvement of the management of risks within Telstra. The IT experts at Telstra are much more dedicated to meet the challenges within the business aspects of Telstra and reduce the level of vulnerabilities within the systems with the implementation of several kinds of tools within the sector. The primary form of objective based on risk management would be embedded within their levels of governance, strategic methods of making of decisions, activities of their business, culture and operations. This kind of risk management framework is mainly designed, implemented and then reviewed with the help of ‘Three Lines of Defence’ based on the accountability model (Butavicius et al. 2016). The primary form of three lines includes:
The core components of the risk management framework is the process of management of risks. This would be able to provide the business of Telstra with the wide form of process for the assessment of risks. With the aid of risk management processes, the company would be able to identify, monitor and thus report the points of risks in order to achieve the set plans and objectives (McCann 2014). This form of risk management process would include the various kinds of risks based on internal and external sources. They also include financial, operational, sustainability and regulatory risks.
There are a wide range of tools and techniques that are being adopted by Telstra, which are able to provide integrated and complementary form of services. These kind of high range of services would be able to offer protection of the assets of the organisation in every possible ways. The IT services within Telstra help in proactively defending against various kinds of external and internal threats. These services would also be able to provide effective and quick form of response and recovery mechanisms (Lou and Dai 2014). The IT services have adopted such kind of techniques, which are able to assess the different kinds of vulnerabilities and also would be able to recommend the most form of measures based on defense. The internal information systems within Telstra help in offering of Managed Security Services. They also offer end-point solutions to the computing systems in order to protect the forms of IT infrastructure and retrieval of vital information with the help of the internet. The various kinds of IT related services could be purchased in a separate manner that would be able to offer a bundled form of solutions. They can also be used for complementing the efforts of the IT team (England 2013).
The different kinds of techniques of risk management that are offered by Telstra in order to identify, assess and control of the risks on the assets include:
Intrusion Prevention Service – This form of service that are offered by the organisation help in supplementing the protection of firewalls with the help of using the inbuilt security intelligence softwares. These kind of softwares are able to monitor the servers and traffic. They also look for any kind of suspicious activities and thus help in stopping the different kinds of attacks, which are already kept under progress (Pranggono et al. 2014).
Managed Firewall – The IT systems within Telstra help in building security based on developing of high form of intelligence based on taking proactive measures based on protection of important assets of the organization (Minoli and Kouns 2016). These form of high kinds of intelligence based softwares help in protecting the IT systems of the organization in real-time management of firewall. The managed firewall systems also help in countering the various kinds of rising form of threats based on unauthorized intrusions and misuse of the accessed networks. The services offered by managed firewall systems help in delivering customized, cost-effective and 24/7 protection services for the purpose of protection of the vital information assets that are mainly spread over hosts, networks, databases and the shared applications (Butavicius et al. 2016).
IP Gateway – The different kinds of features based on enterprise grade of security based on the IP MAN and IP WAN kinds of services of the network. These are able to provide the users with the vast form of infrastructure of robust security in order to connect with the internet, other kinds of similar organizations and also within the Telstra network and their offered services of cloud (Chang, Srirama and Buyya 2018).
Internet Protection – Telstra also keeps a vast form of expertise based on security and various kinds of intrusion detecting softwares. They have a wide range of antivirus softwares, which are updated on a regular minute basis. These kinds of softwares are highly useful for the detection of vast form of attacks on the systems that includes Trojans and other forms of internet related threats (Witzleb 2017).
Email Protection – Protecting the computer systems from the scam against email based contents is a major form of challenge for Telstra. They have a continuous evaluation and monitoring software that would be able to filter the incoming emails based on their safety measurement (Ter 2013).
Denial of Service (DoS) Protection – These form of DoS protection service offers both the global and domestic form of defense in order to maintain the proper form of availability of the online environment (Hudaib 2014).
With the aid of these kinds of services provided by Telstra, they are able to identify the upcoming risks, assess and thus gain control over them. The high form of security aspects within the organization helps in mitigating the various kinds of threats and thus secure the valuable assets of Telstra.
Conclusion
Based on the discussion from the above report, it could be concluded that Telstra has a wide range of assets, which are extremely vital for performing the various kinds of business related operations. Hence, there is a broader need for protecting the IT systems of the organization. Telstra takes a wide advantage of expert based advice in order to secure the assets of the information systems based on a high level of breach of security and upcoming threats on the IT systems. The telecommunication service platform possess very experiences security specialists who are responsible for choosing the appropriate kinds of architecture, business strategy, solutions and services that would meet the requirements of the business. Telstra perform a holistic view of the entire IT environment. With the help of this kind of strategy, they would be able to simplify the choices of security that could be approached and would also be able to provide valuable form of advice on the best form of security measure, which would provide the better forms of returns according to the investments. The IT consultants within Telstra help in drawing the best form of practical experiences based on solving of critical kinds of environments. This would be helpful for offering and thus gain valuable kinds of insights for effective and economical based protection within the organizational sector.
Based on the conclusions drawn from the above report, it could be recommended that although the telecommunication sector of Telstra is able to provide the best form of services based on the aspects of security, yet they should implement other form of security services in order to secure the assets of the organization (DeLone and McLean 2016). With the rise of technological advancements, there have been major form of threats that could affect the systems of the organisation. Hence the security experts within the organisation should focus on practical implications of improving of the levels of security. Better and improved form of services such as security compliance, vulnerability assessment in real time, disaster recovery and continuity of the business processes, defining of advanced policies based on security and scanning of vulnerability within the IT systems should be implemented within the systems of Telstra. This would help in understanding the upcoming kinds of threats within the system and thus would take proactive measures for resisting against those high form of threats. With the integrated form of protection based on network, the systems at Telstra would be able to obtain a complete view over the intelligence of the security aspects (Parsons et al. 2017). Hence they would be able to identify the vast kinds of threats based on the network before they would pose a major form of threat for the business.
References
Adams, J.M., 2016. Risk management in the construction of communication towers.
Alonso, J.M., Clifton, J., Díaz-Fuentes, D., Fernández-Gutiérrez, M. and Revuelta, J., 2013. The race for international markets: were privatized telecommunications incumbents more successful than their public counterparts?. International Review of Applied Economics, 27(2), pp.215-236.
Beltrán, F., 2013. Effectiveness and efficiency in the build-up of high-speed broadband platforms in Australia and New Zealand.
Butavicius, M., Parsons, K., Pattinson, M. and McCormac, A., 2016. Breaching the human firewall: Social engineering in phishing and spear-phishing emails. arXiv preprint arXiv:1606.00887.
Butavicius, M., Parsons, K., Pattinson, M. and McCormac, A., 2016. Breaching the human firewall: Social engineering in phishing and spear-phishing emails. arXiv preprint arXiv:1606.00887.
Chang, C., Srirama, S.N. and Buyya, R., 2018. Internet of Things (IoT) and New Computing Paradigms. Fog and Edge Computing: Principles and Paradigms.
Coleman, L., 2016. Risk strategies: Dialling up optimum firm risk. Routledge.
Dale, A., 2014. Trading Ecosystem Services Across the North. In Beyond the North-South Culture Wars (pp. 113-123). Springer, Cham.
Dalkir, K., 2013. Knowledge management in theory and practice. Routledge.
DeLone, W.H. and McLean, E.R., 2016. Information systems success measurement. Foundations and Trends® in Information Systems, 2(1), pp.1-116.
DeLone, W.H. and McLean, E.R., 2016. Information systems success measurement. Foundations and Trends® in Information Systems, 2(1), pp.1-116.
England, P., 2013. Too much too soon? On the rise and fall of Australia’s coastal climate change law. Environmental and Planning Law Journal, 30(5), p.390À402.
Hudaib, A.A.Z., 2014. DNS advanced attacks and analysis. International Journal of Computer Science and Security (IJCSS), 8(2), p.63.
Lou, C.X. and Dai, W., 2014. Optimal and stable supply chain services system: integrating management services with robust optimisation modelling. International Journal of High Performance Computing and Networking, 8(1), pp.71-80.
McCann, S., 2014. A public sector governance model for public private partnership: integrating partnership, risk and performance management in the operating phase.
Minoli, D. and Kouns, J., 2016. Security in an IPv6 environment. Auerbach Publications.
Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A. and Zwaans, T., 2017. The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, pp.40-51.
Poynton, F., 2016. Invest like the Future Fund. Equity, 30(8), p.10.
Pranggono, B., McLaughlin, K., Yang, Y. and Sezer, S., 2014. 5 Intrusion Detection Systems. The State of the Art in Intrusion Prevention and Detection, p.115.
Quiggin, J., 2013. Privatisation of Queensland electricity assets: An economic evaluation. Dissent, (41), p.13.
Smith, R., 2018. Crime in the digital age: Controlling telecommunications and cyberspace illegalities. Routledge.
Ter, K.L., 2013. Singapore’s personal data protection legislation: Business perspectives. Computer Law & Security Review, 29(3), pp.264-273.
Witzleb, N., 2017. ‘Personal Information’under the Privacy Act 1988 (Cth)-Privacy Commissioner v Telstra Corporation Ltd [2017] FCAFC 4.
Yigitbasioglu, O.M., 2015. External auditors’ perceptions of cloud computing adoption in Australia. International Journal of Accounting Information Systems, 18, pp.46-62.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download