Analysing Security Breach in Telstra
VerifiedAdded on 2022/11/07
|10
|3218
|450
AI Summary
This report focuses on the security breach that occurred in Telstra, one of the most popular telecommunication organizations in Australia. It discusses the necessity, significance, benefits, risks, and maintenance of IT systems in Telstra.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Higher-Education Faculty
Assignment Cover Sheet
Subject
Subject Code and
Group ____________ Group1□ Group 2 □ Group3 □ Group 4
□
Lecturer
Assignment Title
Due date
Submission Date
Contact details Student’s name
Telephone No
Student Email:
STUDENT/S PLEASE NOTE: I/We certify that:
1. This assignment is my/our work. I/we acknowledged and disclosed fully any assistance
received in its preparation and cited any sources from which I/we used data, ideas,
words, either quoted directly or paraphrased.
2. This assignment was prepared by me/us specifically and only for this subject.
3. This assignment has successfully been submitted to the FINAL CHECK via
SafeAssign/Blackboard and the SafeAssign report is attached to this assignment.
►Student name: __________________ Signature: ____________________
4. This assignment is identical with the work submitted via SafeAssign/Blackboard.
Student name/s Student number Signature
This cover sheet and the SafeAssign Paper Information must both be
attached to your assignment.
-------------------------------Cut off here and keep submission receipt------------------------------
Date: Staff Name Signature
Subject:
Subject Code:
Student name/s Student number Signature
Assignment Cover Sheet
Subject
Subject Code and
Group ____________ Group1□ Group 2 □ Group3 □ Group 4
□
Lecturer
Assignment Title
Due date
Submission Date
Contact details Student’s name
Telephone No
Student Email:
STUDENT/S PLEASE NOTE: I/We certify that:
1. This assignment is my/our work. I/we acknowledged and disclosed fully any assistance
received in its preparation and cited any sources from which I/we used data, ideas,
words, either quoted directly or paraphrased.
2. This assignment was prepared by me/us specifically and only for this subject.
3. This assignment has successfully been submitted to the FINAL CHECK via
SafeAssign/Blackboard and the SafeAssign report is attached to this assignment.
►Student name: __________________ Signature: ____________________
4. This assignment is identical with the work submitted via SafeAssign/Blackboard.
Student name/s Student number Signature
This cover sheet and the SafeAssign Paper Information must both be
attached to your assignment.
-------------------------------Cut off here and keep submission receipt------------------------------
Date: Staff Name Signature
Subject:
Subject Code:
Student name/s Student number Signature
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ANALYSING SECURITY BREACH IN TELSTRA
Melbourne - 185 Spring Street, Melbourne Australia 3000, Telephone: +61 3 9662 2055, Facsimile: +61 3 9662 2083
Sydney - Level 6, 91 York Street, Sydney Australia 2000, Telephone: + 61 2 9299 1400, Facsimile: +61 2 9299 0211
Holmes Commercial Colleges (Melbourne) Ltd ABN 50 005 085 585 Email: info@holmes.edu.au Website: www.holmes.edu.au
Melbourne - 185 Spring Street, Melbourne Australia 3000, Telephone: +61 3 9662 2055, Facsimile: +61 3 9662 2083
Sydney - Level 6, 91 York Street, Sydney Australia 2000, Telephone: + 61 2 9299 1400, Facsimile: +61 2 9299 0211
Holmes Commercial Colleges (Melbourne) Ltd ABN 50 005 085 585 Email: info@holmes.edu.au Website: www.holmes.edu.au
2ANALYSING SECURITY BREACH IN TELSTRA
Executive Summary
Security breaches usually results in financial loss and reputational loss in global
commercial organizations. Incorporation of IT systems can be very much useful in this
organization as it can help them to achieve minimise the inaccuracies of the existing
business processes. Different categories of stakeholders associated with the business can
be benefited from the use of the IT systems. Flexibility in business can be the other
significant contribution of the IT systems. This report shall be very much significant to
understand the risks associated with the incorporation of IT system in telecommunication
organizations like Telstra. The significance of maintaining and monitoring IT systems can
also be identified from the discussions of this report.
Executive Summary
Security breaches usually results in financial loss and reputational loss in global
commercial organizations. Incorporation of IT systems can be very much useful in this
organization as it can help them to achieve minimise the inaccuracies of the existing
business processes. Different categories of stakeholders associated with the business can
be benefited from the use of the IT systems. Flexibility in business can be the other
significant contribution of the IT systems. This report shall be very much significant to
understand the risks associated with the incorporation of IT system in telecommunication
organizations like Telstra. The significance of maintaining and monitoring IT systems can
also be identified from the discussions of this report.
3ANALYSING SECURITY BREACH IN TELSTRA
Table of Contents
1. Introduction........................................................................................................................3
2. Necessity of IT in Telstra...................................................................................................3
3. Significance of IT for business survival.............................................................................3
4. Requirement to apply IT....................................................................................................4
5. Use of IT.............................................................................................................................4
6. Benefits of deploying IT.....................................................................................................4
7. Risks of IT..........................................................................................................................5
8. Maintaining and monitoring of IT.......................................................................................6
9. Conclusion.........................................................................................................................6
10. Recommendations...........................................................................................................6
11. Reference.........................................................................................................................7
Table of Contents
1. Introduction........................................................................................................................3
2. Necessity of IT in Telstra...................................................................................................3
3. Significance of IT for business survival.............................................................................3
4. Requirement to apply IT....................................................................................................4
5. Use of IT.............................................................................................................................4
6. Benefits of deploying IT.....................................................................................................4
7. Risks of IT..........................................................................................................................5
8. Maintaining and monitoring of IT.......................................................................................6
9. Conclusion.........................................................................................................................6
10. Recommendations...........................................................................................................6
11. Reference.........................................................................................................................7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4ANALYSING SECURITY BREACH IN TELSTRA
1. Introduction
Security breaches and data breaches are a source of concern in both commercial
establishments as well as in our society. More than 4.5 billion records are exposed in the
first 7 months of 2019, and it is estimated that by the end of the year the amount of records
may cross 10 billion (Telstra Exchange 2019). There are diverse categories of security
breaches and it is classified on the basis of the platforms which are used to conduct these
attacks such as DDoS and spyware. Australian Privacy Principles are mostly unable to
stop these security breaches as the social engineers who are involved in these security
breaches are trying out innovation technologies and procedures in each security attacks.
The global organizations are mostly vulnerable to these security breaches as there are
many areas of exposure in global organizations. Global organizations are very much
vulnerable to the security breaches as it has threats from both inside and outside the
organizations. There are many new laws which are associated with the security breaches
but there are loopholes in each of those laws, as a result the security breaches cannot be
contained under any given circumstances.
The notable determination of this report is to focus on the security breach which
occurred in Telstra which ids one of the most popular telecommunication organization in
Australia. This security breach occurred on 30th July 2018, when the name, business name
and all the other personal details of the consumers of this organization were exposed by
the social engineers from the organizational portal of Telstra (Telstra.com.au 2019). Data
of 18 consumers were exposed after the security breach (Chen 2019). There are different
categories of tools which are associated with the organizational portal of Telstra, each of
these tools are thought to be the root cause of these security breaches as this tools are
connected to numerous subsidiary organizations. This security breach had a negative
impact on the business reputation of Telstra.
Information Technology (IT) had a huge role to play in order to deal with the security
breaches which occurred in Telstra. As discussed by (), concept of IT can be very much
useful from both the perspective of the social engineers as well as the victims of these
security breaches (Skorin-Kapov et al. 2016). Concepts of IT are used by the social
engineers in order to conduct these security breaches and the victims of the security
breaches can use IT base security systems in order to prevent the future security
breaches.
2. Necessity of IT in Telstra
The sensitive data of Telstra should have been stored and monitored from the cloud
services which is one of the most significant IT innovation in the last 10 years. The
incorporation of other IT concepts such as data hiding and data authentication, data
encapsulation and data encryption can be very much required in Telstra in order to prevent
future security breaches.
3. Significance of IT for business survival
The incorporation of IT technologies and IT concepts can be very much useful in
the telecommunication business such as Telstra. Innovation can be one of the most
significant contributions regarding the incorporation of IT based security systems
(Selvadurai, Kisswani and Khalaileh 2019). The financial planning can be done in an
organized manner using the IT based security systems. The production records of global
organizations like Telstra can be managed in a more systemized manner using IT-based
systems such as the Management Information System.
1. Introduction
Security breaches and data breaches are a source of concern in both commercial
establishments as well as in our society. More than 4.5 billion records are exposed in the
first 7 months of 2019, and it is estimated that by the end of the year the amount of records
may cross 10 billion (Telstra Exchange 2019). There are diverse categories of security
breaches and it is classified on the basis of the platforms which are used to conduct these
attacks such as DDoS and spyware. Australian Privacy Principles are mostly unable to
stop these security breaches as the social engineers who are involved in these security
breaches are trying out innovation technologies and procedures in each security attacks.
The global organizations are mostly vulnerable to these security breaches as there are
many areas of exposure in global organizations. Global organizations are very much
vulnerable to the security breaches as it has threats from both inside and outside the
organizations. There are many new laws which are associated with the security breaches
but there are loopholes in each of those laws, as a result the security breaches cannot be
contained under any given circumstances.
The notable determination of this report is to focus on the security breach which
occurred in Telstra which ids one of the most popular telecommunication organization in
Australia. This security breach occurred on 30th July 2018, when the name, business name
and all the other personal details of the consumers of this organization were exposed by
the social engineers from the organizational portal of Telstra (Telstra.com.au 2019). Data
of 18 consumers were exposed after the security breach (Chen 2019). There are different
categories of tools which are associated with the organizational portal of Telstra, each of
these tools are thought to be the root cause of these security breaches as this tools are
connected to numerous subsidiary organizations. This security breach had a negative
impact on the business reputation of Telstra.
Information Technology (IT) had a huge role to play in order to deal with the security
breaches which occurred in Telstra. As discussed by (), concept of IT can be very much
useful from both the perspective of the social engineers as well as the victims of these
security breaches (Skorin-Kapov et al. 2016). Concepts of IT are used by the social
engineers in order to conduct these security breaches and the victims of the security
breaches can use IT base security systems in order to prevent the future security
breaches.
2. Necessity of IT in Telstra
The sensitive data of Telstra should have been stored and monitored from the cloud
services which is one of the most significant IT innovation in the last 10 years. The
incorporation of other IT concepts such as data hiding and data authentication, data
encapsulation and data encryption can be very much required in Telstra in order to prevent
future security breaches.
3. Significance of IT for business survival
The incorporation of IT technologies and IT concepts can be very much useful in
the telecommunication business such as Telstra. Innovation can be one of the most
significant contributions regarding the incorporation of IT based security systems
(Selvadurai, Kisswani and Khalaileh 2019). The financial planning can be done in an
organized manner using the IT based security systems. The production records of global
organizations like Telstra can be managed in a more systemized manner using IT-based
systems such as the Management Information System.
5ANALYSING SECURITY BREACH IN TELSTRA
4. Requirement to apply IT
There are different criteria which has to be fulfilled in the first place in order to apply
IT in the business. Descriptions of each of those criteria’s shall be described in this section
of this report
Cost: There are diver categories of financial investments which are required from
the steering committee or the primary stakeholders of the organization of this
telecommunication. There are different categories overhead and maintenance cost which
are associated with the incorporation of the IT systems which has to be kept in mind during
the creation of the cost management plan (Porcedda 2018). Cost Benefit analysis can be
very much in order to predict the financial benefits of the use of IT systems.
Planning: Technology plan is very much required before the installation of the IT
based services in telecommunication organizations like Telstra. Clear picture of the
activities which is desired from the IT systems are the prime advantages regarding the
enactment of the IT services. Management procedure of the business risks of the IT
systems and role of the stakeholders has to be the prime contents of the plan (Patil et al.
2018). The factors affecting the installation of the IT systems such as the legal regulations
from the governments and the internal resistances also has to be considered in the
planning phase.
Designing: The design of the systems has to be compatible with the existing
business practices and the existing technologies which are already being used in this
organization such as Artificial Intelligence.
Equipment: There are different categories of equipment which are associated with
the installation of the IT systems such as the network servers and sensors (Nivetha et al.
2016). These equipment has to be tested and tried so that the installation procedure of the
IT systems is conducted in a systemized manner.
Installation: The installation procedure of the IT systems must be done in a
professional manner so that there are very less inconsistencies associated with the
installation procedure.
5. Use of IT
There are different categories of stakeholders which are associated with Telstra in
terms of the internal stakeholders like the employees working in the organization and
external stakeholders like the consumers and the suppliers. Enhanced productivity and
identification of the inaccuracies are the most significant benefits regarding the
incorporation of the IT systems (Findley 2018). Whereas the customers of this business
can use IT systems as a communication devices, latest updates about the service
provided by this organization can be notified to the consumers via the IT systems. The
suppliers of this organization can also be gets improved after the installation of the IT
systems in Telstra.
6. Benefits of deploying IT
Revenue: Income of the business can be enhanced in the first place after the
installation of the IT systems. Productivity of the employees can also be enhanced using
the IT systems. The net profitability of this organization can also be improved as
transparency of the business can be hugely improved after the installation of the IT
services.
4. Requirement to apply IT
There are different criteria which has to be fulfilled in the first place in order to apply
IT in the business. Descriptions of each of those criteria’s shall be described in this section
of this report
Cost: There are diver categories of financial investments which are required from
the steering committee or the primary stakeholders of the organization of this
telecommunication. There are different categories overhead and maintenance cost which
are associated with the incorporation of the IT systems which has to be kept in mind during
the creation of the cost management plan (Porcedda 2018). Cost Benefit analysis can be
very much in order to predict the financial benefits of the use of IT systems.
Planning: Technology plan is very much required before the installation of the IT
based services in telecommunication organizations like Telstra. Clear picture of the
activities which is desired from the IT systems are the prime advantages regarding the
enactment of the IT services. Management procedure of the business risks of the IT
systems and role of the stakeholders has to be the prime contents of the plan (Patil et al.
2018). The factors affecting the installation of the IT systems such as the legal regulations
from the governments and the internal resistances also has to be considered in the
planning phase.
Designing: The design of the systems has to be compatible with the existing
business practices and the existing technologies which are already being used in this
organization such as Artificial Intelligence.
Equipment: There are different categories of equipment which are associated with
the installation of the IT systems such as the network servers and sensors (Nivetha et al.
2016). These equipment has to be tested and tried so that the installation procedure of the
IT systems is conducted in a systemized manner.
Installation: The installation procedure of the IT systems must be done in a
professional manner so that there are very less inconsistencies associated with the
installation procedure.
5. Use of IT
There are different categories of stakeholders which are associated with Telstra in
terms of the internal stakeholders like the employees working in the organization and
external stakeholders like the consumers and the suppliers. Enhanced productivity and
identification of the inaccuracies are the most significant benefits regarding the
incorporation of the IT systems (Findley 2018). Whereas the customers of this business
can use IT systems as a communication devices, latest updates about the service
provided by this organization can be notified to the consumers via the IT systems. The
suppliers of this organization can also be gets improved after the installation of the IT
systems in Telstra.
6. Benefits of deploying IT
Revenue: Income of the business can be enhanced in the first place after the
installation of the IT systems. Productivity of the employees can also be enhanced using
the IT systems. The net profitability of this organization can also be improved as
transparency of the business can be hugely improved after the installation of the IT
services.
6ANALYSING SECURITY BREACH IN TELSTRA
Flexibility: Flexibility of the business can also be enhanced after the installation of
the IT systems. Flexibility in the market place can be enhanced in the first place after the
incorporation of the IT systems (Moshki and Barki 2016). Competitiveness among the
workers can also be improved after the installation of the IT systems. The
telecommunication obligations of this organization can also be addressed in an organized
manner using the IT systems.
Reduction in cost: There are different categories of costs which are associated
with the installation of the IT systems. Each phase of the project in terms of the
documentation, designing and building phase has to be calculated in the first place
(Goldberg et al. 2016). At the same time, it can also be said that that fixed cost of the
business, indirect cost of the business, period costs, service cost and the overhead costs
can be reduced after the installation of the IT systems in Telstra (Arcuri, Brogi and
Gandolfi 2017). There are numerous sunk costs which are associated with this
telecommunication organization which can also be minimised in the first place after the
introduction of the IT systems.
7. Risks of IT
There are different risks which are associated with the incorporation of the IT
systems in Telstra. Each of these risks has to be managed in a systemized manner so that
the efficiency of the IT systems is maintained. The role of the project manager will be very
much significant on order to contain each of those risks. The three prime risks which are
associated with the installation of IT systems in Telstra are the security risks, privacy
issues and the confidentiality of the business data of this organization.
Security Risks: There are different categories of security risks which can have a
direct negative impact on the growth as well as the business reputation of Telstra. These
security risks includes the DDoS attack, system vulnerabilities of the entire organizational
network which is maintained by Telstra. The other security risks of this business comes
from the employees working in this organization as they may expose the vulnerable points
of this tele-communication organization (Mills and Harclerode 2017). There are more than
160 subsidiary organizations which are directly associated with this organization, each one
of them can be the root cause of the security problems which are faced by Telstra.
Privacy issues: Installation of the IT systems can have devastating impact on the
business growth of this global telecommunication organization. Theft of the intellectual
property can be one of the most significant privacy issues which is associated with the
incorporation of the IT systems in Telstra (Jeong, Lee and Lim 2019). Loss of data is the
other privacy issues which are associated with the installation of the IT based systems
which are supposed to protect the reliability sand integrity of the business statements and
business reports of this organization. System disruption is the other privacy issues which
have can have a very harmful effect on the growth of this telecommunication business.
Confidentiality of data: There are numerous categories of data which are
associated with this global telecommunication organization such as the raw data, financial
data, open data, employee data, and data of the payments done by the consumers of the
business, real time data, and machine data (Laybats and Tredinnick 2016). Each of these
diverse categories of data contributes to the growth of this telecommunication business
and the incorporation of a dedicated IT systems can have an impact of each of these
diverse categories of data. Thus, an efficient data protection policy must be framed in
Telstra before the installation of the IT systems.
Flexibility: Flexibility of the business can also be enhanced after the installation of
the IT systems. Flexibility in the market place can be enhanced in the first place after the
incorporation of the IT systems (Moshki and Barki 2016). Competitiveness among the
workers can also be improved after the installation of the IT systems. The
telecommunication obligations of this organization can also be addressed in an organized
manner using the IT systems.
Reduction in cost: There are different categories of costs which are associated
with the installation of the IT systems. Each phase of the project in terms of the
documentation, designing and building phase has to be calculated in the first place
(Goldberg et al. 2016). At the same time, it can also be said that that fixed cost of the
business, indirect cost of the business, period costs, service cost and the overhead costs
can be reduced after the installation of the IT systems in Telstra (Arcuri, Brogi and
Gandolfi 2017). There are numerous sunk costs which are associated with this
telecommunication organization which can also be minimised in the first place after the
introduction of the IT systems.
7. Risks of IT
There are different risks which are associated with the incorporation of the IT
systems in Telstra. Each of these risks has to be managed in a systemized manner so that
the efficiency of the IT systems is maintained. The role of the project manager will be very
much significant on order to contain each of those risks. The three prime risks which are
associated with the installation of IT systems in Telstra are the security risks, privacy
issues and the confidentiality of the business data of this organization.
Security Risks: There are different categories of security risks which can have a
direct negative impact on the growth as well as the business reputation of Telstra. These
security risks includes the DDoS attack, system vulnerabilities of the entire organizational
network which is maintained by Telstra. The other security risks of this business comes
from the employees working in this organization as they may expose the vulnerable points
of this tele-communication organization (Mills and Harclerode 2017). There are more than
160 subsidiary organizations which are directly associated with this organization, each one
of them can be the root cause of the security problems which are faced by Telstra.
Privacy issues: Installation of the IT systems can have devastating impact on the
business growth of this global telecommunication organization. Theft of the intellectual
property can be one of the most significant privacy issues which is associated with the
incorporation of the IT systems in Telstra (Jeong, Lee and Lim 2019). Loss of data is the
other privacy issues which are associated with the installation of the IT based systems
which are supposed to protect the reliability sand integrity of the business statements and
business reports of this organization. System disruption is the other privacy issues which
have can have a very harmful effect on the growth of this telecommunication business.
Confidentiality of data: There are numerous categories of data which are
associated with this global telecommunication organization such as the raw data, financial
data, open data, employee data, and data of the payments done by the consumers of the
business, real time data, and machine data (Laybats and Tredinnick 2016). Each of these
diverse categories of data contributes to the growth of this telecommunication business
and the incorporation of a dedicated IT systems can have an impact of each of these
diverse categories of data. Thus, an efficient data protection policy must be framed in
Telstra before the installation of the IT systems.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7ANALYSING SECURITY BREACH IN TELSTRA
8. Maintaining and monitoring of IT
Maintaining the newly installed IT systems can be huge challenge in this
organization. Maintenance must be done after each and every data are saved in some
other reliable platforms such as the cloud servers. The peripherals which are associated
with the new IT systems must be checked frequently. Running the antivirus is very much
required to maintain security against external threats like malware attacks (Mallela and
Jonnalagadda 2018). The role of the stakeholders associated with the IT systems also be
monitored by the supervisors so that any sort of security issues are avoided. The hardware
problems of the IT systems also needs to be identified so that the future security breaches
are avoided in this organization.
9. Conclusion
Financial loss and the loss of business reputation are the most negative impacts of
security breaches in a global organization. The incorporation of IT innovations can
contribute hugely to protect the organizational data from security threats coming from both
inside or outside the organization. IT innovations like MIS is very much significant for
global organizations like Telstra in order to survive in this competitive telecommunication
market of Australia. Cost, planning, designing, equipment and the installation procedure
are the major areas which has to be focused before the installation of the IT systems.
Revenue of the business, as well as the enhanced flexibility, are the most learning lessons
which can be learned from this report. This report also helps in the identification of the
diverse categories of risks associated with Telstra, such as the theft of intellectual
properties. The significance of professional maintenance procedure can also be
understood from the discussions of this report.
10. Recommendations
The recommendations for Telstra reading the enactment of an IT systems which
can help them to deal with the security breaches are listed as followings:
Security of the existing technologies must be checked.
The vision of the new system has to be understood by each of the stakeholders of
the business.
The business uncertainties have to be removed.
8. Maintaining and monitoring of IT
Maintaining the newly installed IT systems can be huge challenge in this
organization. Maintenance must be done after each and every data are saved in some
other reliable platforms such as the cloud servers. The peripherals which are associated
with the new IT systems must be checked frequently. Running the antivirus is very much
required to maintain security against external threats like malware attacks (Mallela and
Jonnalagadda 2018). The role of the stakeholders associated with the IT systems also be
monitored by the supervisors so that any sort of security issues are avoided. The hardware
problems of the IT systems also needs to be identified so that the future security breaches
are avoided in this organization.
9. Conclusion
Financial loss and the loss of business reputation are the most negative impacts of
security breaches in a global organization. The incorporation of IT innovations can
contribute hugely to protect the organizational data from security threats coming from both
inside or outside the organization. IT innovations like MIS is very much significant for
global organizations like Telstra in order to survive in this competitive telecommunication
market of Australia. Cost, planning, designing, equipment and the installation procedure
are the major areas which has to be focused before the installation of the IT systems.
Revenue of the business, as well as the enhanced flexibility, are the most learning lessons
which can be learned from this report. This report also helps in the identification of the
diverse categories of risks associated with Telstra, such as the theft of intellectual
properties. The significance of professional maintenance procedure can also be
understood from the discussions of this report.
10. Recommendations
The recommendations for Telstra reading the enactment of an IT systems which
can help them to deal with the security breaches are listed as followings:
Security of the existing technologies must be checked.
The vision of the new system has to be understood by each of the stakeholders of
the business.
The business uncertainties have to be removed.
8ANALYSING SECURITY BREACH IN TELSTRA
11. Reference
Arcuri, M.C., Brogi, M. and Gandolfi, G., 2017. How Does Cyber Crime Affect Firms? The
Effect of Information Security Breaches on Stock Returns. In ITASEC (pp. 175-193).
Chen, R., 2019. Data Breach on Consumer Behavior. International Journal of
Organizational and Collective Intelligence (IJOCI), 9(4), pp.1-17.
Findley, C., 2018. Cyber security: Secure'couture'. Ragtrader, (Jun 2018), p.16.
Goldberg, R.M., McHenry, G., Zambrano Ramos, L. and Chen, C., 2016. Trust in Internet
Privacy and Security and Online Activity. Available at SSRN 2757369.
Jeong, C.Y., Lee, S.Y.T. and Lim, J.H., 2019. Information security breaches and IT
security investments: Impacts on competitors. Information & Management, 56(5), pp.681-
695.
Laybats, C. and Tredinnick, L., 2016. Information security.
Mallela, S.S. and Jonnalagadda, S.K., 2018. Internet security—a brief review. In
Microelectronics, Electromagnetics and Telecommunications (pp. 889-894). Springer,
Singapore.
Mills, J.L. and Harclerode, K., 2017. Privacy, Mass Intrusion, and the Modern Data Breach.
Fla. L. Rev., 69, p.771.
Moshki, H. and Barki, H., 2016. Coping with Information Privacy Breaches: An Exploratory
Framework.
Nivetha, S., Elizabeth, N.E., Padmasha, T.P. and Gohulalakshmi, I., 2016, January.
Secure authentication process in smart cards. In 2016 10th International Conference on
Intelligent Systems and Control (ISCO) (pp. 1-5). IEEE.
Patil, P., Hash, L., White, J. and Tekeoglu, A., 2018. Security Challenges in SDN
Implementation (Doctoral dissertation).
Porcedda, M.G., 2018. Patching the patchwork: appraising the EU regulatory framework
on cyber security breaches. Computer law & security review, 34(5), pp.1077-1098.
Selvadurai, N., Kisswani, N. and Khalaileh, Y., 2019. Strengthening data privacy: the
obligation of organisations to notify affected individuals of data breaches. International
Review of Law, Computers & Technology, 33(3), pp.271-284.
Singh, I., 2019. Signaling Security in LTE Roaming.
Skorin-Kapov, N., Furdek, M., Zsigmond, S. and Wosinska, L., 2016. Physical-layer
security in evolving optical networks. IEEE Communications Magazine, 54(8), pp.110-117.
Telstra Exchange. (2019). Breach expectation: the new mindset for cyber security success
| Telstra 2019 Security Report. [online] Available at:
https://exchange.telstra.com.au/breach-expectation-new-mindset-cyber-security-success/
[Accessed 16 Sep. 2019].
Telstra.com.au. (2019). Cyber security remains a top business priority as the estimated
number of undetected security breaches grows. [online] Available at:
https://www.telstra.com.au/aboutus/media/mediareleases/Cyber_security_remains_top_bu
11. Reference
Arcuri, M.C., Brogi, M. and Gandolfi, G., 2017. How Does Cyber Crime Affect Firms? The
Effect of Information Security Breaches on Stock Returns. In ITASEC (pp. 175-193).
Chen, R., 2019. Data Breach on Consumer Behavior. International Journal of
Organizational and Collective Intelligence (IJOCI), 9(4), pp.1-17.
Findley, C., 2018. Cyber security: Secure'couture'. Ragtrader, (Jun 2018), p.16.
Goldberg, R.M., McHenry, G., Zambrano Ramos, L. and Chen, C., 2016. Trust in Internet
Privacy and Security and Online Activity. Available at SSRN 2757369.
Jeong, C.Y., Lee, S.Y.T. and Lim, J.H., 2019. Information security breaches and IT
security investments: Impacts on competitors. Information & Management, 56(5), pp.681-
695.
Laybats, C. and Tredinnick, L., 2016. Information security.
Mallela, S.S. and Jonnalagadda, S.K., 2018. Internet security—a brief review. In
Microelectronics, Electromagnetics and Telecommunications (pp. 889-894). Springer,
Singapore.
Mills, J.L. and Harclerode, K., 2017. Privacy, Mass Intrusion, and the Modern Data Breach.
Fla. L. Rev., 69, p.771.
Moshki, H. and Barki, H., 2016. Coping with Information Privacy Breaches: An Exploratory
Framework.
Nivetha, S., Elizabeth, N.E., Padmasha, T.P. and Gohulalakshmi, I., 2016, January.
Secure authentication process in smart cards. In 2016 10th International Conference on
Intelligent Systems and Control (ISCO) (pp. 1-5). IEEE.
Patil, P., Hash, L., White, J. and Tekeoglu, A., 2018. Security Challenges in SDN
Implementation (Doctoral dissertation).
Porcedda, M.G., 2018. Patching the patchwork: appraising the EU regulatory framework
on cyber security breaches. Computer law & security review, 34(5), pp.1077-1098.
Selvadurai, N., Kisswani, N. and Khalaileh, Y., 2019. Strengthening data privacy: the
obligation of organisations to notify affected individuals of data breaches. International
Review of Law, Computers & Technology, 33(3), pp.271-284.
Singh, I., 2019. Signaling Security in LTE Roaming.
Skorin-Kapov, N., Furdek, M., Zsigmond, S. and Wosinska, L., 2016. Physical-layer
security in evolving optical networks. IEEE Communications Magazine, 54(8), pp.110-117.
Telstra Exchange. (2019). Breach expectation: the new mindset for cyber security success
| Telstra 2019 Security Report. [online] Available at:
https://exchange.telstra.com.au/breach-expectation-new-mindset-cyber-security-success/
[Accessed 16 Sep. 2019].
Telstra.com.au. (2019). Cyber security remains a top business priority as the estimated
number of undetected security breaches grows. [online] Available at:
https://www.telstra.com.au/aboutus/media/mediareleases/Cyber_security_remains_top_bu
9ANALYSING SECURITY BREACH IN TELSTRA
siness_priority_estimated_number_undetected_security_breaches_grows [Accessed 16
Sep. 2019].
siness_priority_estimated_number_undetected_security_breaches_grows [Accessed 16
Sep. 2019].
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.