One of the largest telecommunication networks is of Telstra, it is an Australian organisation that is a fully privatised company that focus on customer service by adapting to the changes. This report covers all the services that are provided by the organisation and some of the general management control and application controls that are used for maintain the security are discussed.
Telstra offers services like internet access, mobile marketing and other services. It is one of the largest telecommunication organisations in Australia. The organisation offer service to many private sectors that increases the information services by offering better network installation and maintenance of all services. Telstra in Australia improved the capacity of channels by securing the data packets and channels so that data transmission takes place securely (DeAngelo & Stulz, 2015). This organisation offers internet services to the corporate clients as well as to personal users with the help of IS providers. The customer services are improved due to wireless methods offered by the organisation.
The business operations are undertaken by an organisation by making sure that security is maintained. The security tools can be used to secure all the operations. Telstra offers electronic security solution that support business in securing their network and operations (Berry, Broadbent & Otley, 2016). They secure the data packet using intellectual solutions by preventing the data to get breached. The products are secured from all the threats by detecting them so that they do not penetrate in the system (Parsons, Calic, Pattinson, Butavicius, McCormac & Zwaans, 2017). They make use internet protection services like firewalls, virus detectors and security endpoints so that security is not breeched. IS providers make sure that no vulnerabilities hit the system, thus for this security architecture is deployed so that proper assessment could be undertaken (Berry, Broadbent & Otley, 2016).
General management controls are listed by every organisation so that they can work in an organised way. General management controls are set of activities and actions that assure that asserts and resources are used in an effective way (Vaidyanathan, Sampath & Azar, 2015). Similarly, Telstra have designed some general management controls so that relationship between the staff and can be built strongly and responsibilities can be structured is a particular manners so that overall performance is enhanced.
The general management control in an organisation covers the cost accounting system and basic management control that helps in achieving the objective. General management control helps in assigning role to every employee so that they can work towards the goals. They are used to make decisions and implement in the organisation so that employees follow them. They also include control measures so that culture conflicts in an organisation could be resolved (Udagepola, Xiang, Afzal, Ali & Robinson, 2015). The general management control looks at all the measure either technical or non-technical. The main aim of GMCs is to enhance the profit margin. The employees working in an organisation has entirely different perception and views thus GMCs help in managing the environment of workplace (Peltier, 2016). The general management controls make sure that all the operational goals are achieved smoothly without any conflicts. The general management control design strategies by offering rewards and so that performance could be improved and they met high standards (Senarathna, Wilkin, Warren, Yeoh & Salzman, 2018). General management control also measures the current performance of every individual so that action plans could be designed accordingly. GMC removes all the differences at the workplace and support Telstra to work on future goals.
The application control measures differ from the general management control. General management controls are used for the entire organisation whereas application control measures are used for a particular application or process (Lueg & Radlach, 2016). The different type of application controls are:
Application controls are very important for every organisation as these control measures adapt to changes automatically whenever there is a change in software or database (Jia, Munro & Buckby, 2016). Thus, every organisation can completely rely for security measures on application control. Even Telstra rely on application control for performing their operations as it takes less time as compared to others. There are some of the security controls measures that are inherited in the application control that make sure that all the software are updated regularly. It also take care that information is accessed only by valid user this could be attained by maintain an access control list. It assures that data remains confidential and are accessed by valid users.
The general management control policies assures that all the IS operations are done effectively. They maintain and work on the security measures of all the data centres so that security of network is maintained. There is a difference between both these terms as, general management control deals with concerns of who can access the data and how integrity could be maintained (Senarathna, Yeoh, Warren & Salzman, 2016). On the other hand, application control deals with security of particular software. The threats of applications are found and then risk assessment is carried out for that particular application. Application control has some pre-defined rules and regulations that control the input and output information of the system. All the IS operations are observed using application control. The aim of theses controls is provide security to the organisation. The only difference is general management control works on meeting the primary objective related to the workplace environment (Kerzner & Kerzner, 2017). They also deal with the concern of storing data; access the controls and developing the acquisition. The application control checks that the inputs are valid and can be processed accurately without any error.
While comparing both the controls, it was found in Telstra general management control are applied in all the areas wherein application control are applied in software were data transaction is carried (Bedford, Malmi & Sandelin, 2016). Application controls are applied to specific area of an organisation and general management controls are designed for entire group. It ensures that operations carried in Telstra will match the integrity, confidentiality and availability concepts (Aven, 2016).
The risk management techniques that are used by Telstra make sure that confidentiality, availability, reliability and integrity of data is maintained.
Security- Every organisation stores their sensitive data over the network, it is important to secure the data so that information is not breached (Bedford & Sandelin, 2015).
Integrity- It is important to maintain integrity of data packets. This could be done by assuring that information is readable only by valid users.
Availability- The services and operations that are offered by the organisation should remain available all the time for the valid users (Bedford & Sandelin, 2015). If information is not available at the right time it can have negative effect between the relation of customer and organisation.
Confidentiality- It assures that information is accessed only by valid user and it is not made available to the unauthorised users. This can be attained by maintained an access control list so that privacy of information is not breached.
Reliability- It makes sure that even in case of failure the network continues to work. t make sure that consistency of operations are maintained.
Thus to make sure that security of organisation is not breached a risk control plan is developed. At first phase, all the bugs and errors are identified so that it they don’t penetrate in the system. The risk is accessed and the source of the risk is found so that control plan is developed for future security.
The auditing controls are used by an organisation to maintain the quality. It additionally helps in shielding the information quality by relieving all the conceivable dangers related with the association. These reviews help in making the business tasks straightforward by observing all the activities. Information security helps in distinguishing the exercises so deliberate of data could be discovered (Tesfamicael, Liu, Foo & Caelli, 2017). The IS reviewing is essential as it guarantees that information secrecy, respectability and accessibility is kept up. It shields the information bundles from being revealed to unapproved parties. These designs look at all the conceivable threats that could breach the privacy, confidentiality and accessibility of information bundles. The audit plans is a pre-characterized and particular rule is taken after directing a review. It causes an association to get adequate confirmations and furthermore dodges the misinterpretation. The review procedure is utilized to limit the time taken by a task. It covers arranging a gathering, declaring the choices and after that taking up a development or an input of its effect.
Conclusion
From this report, it can be summarised that security is important for every organisation as a lot of sensitive data is stored over the network. The general management control and application control that are undertaken by an organisation are discussed above. These control measures are used to maintain the security of the network. It is recommended that the audit plans that are developed for an organisation should be in a way that integrity, confidentiality and reliability is maintained. This can be attained by updating the software and keeping a backup plan so that system could be recovered in case of failure. The risk can also be managed by first identifying the threats, then assessing it by future developing an action plan.
References
Aven, T. (2016). Risk assessment and risk management: Review of recent advances on their foundation. European Journal of Operational Research, 253(1), 1-13.
Bedford, D. S., & Sandelin, M. (2015). Investigating management control configurations using qualitative comparative analysis: an overview and guidelines for application. Journal of management control, 26(1), 5-26.
Bedford, D. S., Malmi, T., & Sandelin, M. (2016). Management control effectiveness and strategy: An empirical analysis of packages and systems. Accounting, Organizations and Society, 51, 12-28.
Berry, A. J., Broadbent, J., & Otley, D. T. (Eds.). (2016). Management control: theories, issues and practices. Macmillan International Higher Education.
DeAngelo, H., & Stulz, R. M. (2015). Liquid-claim production, risk management, and bank capital structure: Why high leverage is optimal for banks. Journal of Financial Economics, 116(2), 219-236.
Jia, J., Munro, L., & Buckby, S. (2016). A finer-grained approach to assessing the “quality”(“quantity” and “richness”) of risk management disclosures. Managerial Auditing Journal, 31(8/9), 770-803.
Keogh, K., Gordon, C., & Marinovic, P. (2018). Cyber security: Global developments in cyber security law: is Australia keeping pace?. LSJ: Law Society of NSW Journal, (42), 82.
Kerzner, H., & Kerzner, H. R. (2017). Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons.
Lueg, R., & Radlach, R. (2016). Managing sustainable development with management control systems: A literature review. European Management Journal, 34(2), 158-171.
Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, 40-51.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.
Senarathna, I., Wilkin, C., Warren, M., Yeoh, W., & Salzman, S. (2018). Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs. Australasian Journal of Information Systems, 22.
Senarathna, I., Yeoh, W., Warren, M., & Salzman, S. (2016). Security and privacy concerns for australian smes cloud adoption: empirical study of metropolitan vs regional smes. Australasian Journal of Information Systems, 20.
Tesfamicael, A. D., Liu, V., Foo, E., & Caelli, W. (2017, December). Modeling for performance and security balanced trading communication systems in the cloud. In 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC) (pp. 1-7). IEEE.
Udagepola, K., Xiang, L., Afzal, N., Ali, M., & Robinson, M. (2015). Case Study: Cloud Computing Consumer Protocol in Australia. J. Appl. Environ. Biol. Sci, 5(9), 76-83.
Vaidyanathan, S., Sampath, S., & Azar, A. T. (2015). Global chaos synchronisation of identical chaotic systems via novel sliding mode control method and its application to Zhu system. International Journal of Modelling, Identification and Control, 23(1), 92-100.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download