logo

Analysing Security Breach in Telstra

   

Added on  2022-11-07

10 Pages3218 Words450 Views
 | 
 | 
 | 
Higher-Education Faculty
Assignment Cover Sheet
Subject
Subject Code and
Group ____________ Group1 Group 2 Group3 Group 4

Lecturer
Assignment Title
Due date
Submission Date
Contact details Student’s name
Telephone No
Student Email:
STUDENT/S PLEASE NOTE: I/We certify that:
1. This assignment is my/our work. I/we acknowledged and disclosed fully any assistance
received in its preparation and cited any sources from which I/we used data, ideas,
words, either quoted directly or paraphrased.
2. This assignment was prepared by me/us specifically and only for this subject.
3. This assignment has successfully been submitted to the FINAL CHECK via
SafeAssign/Blackboard and the SafeAssign report is attached to this assignment.
Student name: __________________ Signature: ____________________
4. This assignment is identical with the work submitted via SafeAssign/Blackboard.
Student name/s Student number Signature
This cover sheet and the SafeAssign Paper Information must both be
attached to your assignment.
-------------------------------Cut off here and keep submission receipt------------------------------
Date: Staff Name Signature
Subject:
Subject Code:
Student name/s Student number Signature
Analysing Security Breach in Telstra_1

ANALYSING SECURITY BREACH IN TELSTRA
1
Melbourne - 185 Spring Street, Melbourne Australia 3000, Telephone: +61 3 9662 2055, Facsimile: +61 3 9662 2083
Sydney - Level 6, 91 York Street, Sydney Australia 2000, Telephone: + 61 2 9299 1400, Facsimile: +61 2 9299 0211
Holmes Commercial Colleges (Melbourne) Ltd ABN 50 005 085 585 Email: info@holmes.edu.au Website: www.holmes.edu.au
Analysing Security Breach in Telstra_2

ANALYSING SECURITY BREACH IN TELSTRA
2
Executive Summary
Security breaches usually results in financial loss and reputational loss in global
commercial organizations. Incorporation of IT systems can be very much useful in this
organization as it can help them to achieve minimise the inaccuracies of the existing
business processes. Different categories of stakeholders associated with the business can
be benefited from the use of the IT systems. Flexibility in business can be the other
significant contribution of the IT systems. This report shall be very much significant to
understand the risks associated with the incorporation of IT system in telecommunication
organizations like Telstra. The significance of maintaining and monitoring IT systems can
also be identified from the discussions of this report.
Analysing Security Breach in Telstra_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents