logo

IS Security and Risk Management : Assignment

16 Pages3847 Words48 Views
   

Added on  2021-06-17

IS Security and Risk Management : Assignment

   Added on 2021-06-17

ShareRelated Documents
Running head: IS SECURITY AND RISK MANAGEMENTIS Security and Risk Management: Telstra OrganizationName of the StudentName of the UniversityAuthor’s Note:
IS Security and Risk Management : Assignment_1
1IS SECURITY AND RISK MANAGEMENTTable of ContentsIntroduction................................................................................................................................2Discussion..................................................................................................................................31. Most Common Malware Affecting Organizational Operations.........................................32. Three Types of Network Devices Used by Telstra............................................................43. Reliability and Availability of Web Service......................................................................54. Ensuring Confidentiality and Integrity for Staff Email......................................................65. Prioritization of Threats, Malware Types and Security Issues..........................................76. Two Approaches for Improving Availability of Web and Email Servers.........................87. Impact of Organizational Issues and Human Factors on IS Management.........................98. Illustration of Log Records..............................................................................................109. Utilization of Audit Log Records for Email and Web Server Issues...............................1010. Five types of Network Security Devices for Controlling Security................................10Conclusions and Recommendations........................................................................................11References................................................................................................................................13
IS Security and Risk Management : Assignment_2
2IS SECURITY AND RISK MANAGEMENTIntroductionAn information system or simply IS can be defined as the significant organizedsystem, which is being used to properly collect, organize, store, interpret, manipulate andfinally communicate the confidential information or data (Cheminod, Durante & Valenzano,2013). This can be termed as the specific collection of several complementary networks thatan individual or an organization uses for filtering, creation, processing, collection and evenlydistributing information or data. Information system is considered as one of the mostimportant and vital requirements that help any organization to produce information perfectlyand accurately. All the internal information are majorly targeted with the IS or informationsystem and the external information is discarded. This particular software is being utilized toproperly run the completely computerized and systematic database or a specific computersystem (Hashizume et al., 2013). Each and every operation of data is extremely easy with thisinformation system or IS. The entire management, process of decision making and thevarious business operations are being supported by this information system and hence it istermed as the proper subset of ICT or information and communications technology.This report will be outlining a detailed description on the significant concept of IS orinformation system for the most popular organization of telecommunications in Australia,namely, Telstra Corporation Ltd. This particular company helps its clients or customers inoperating and building the various networks of telecommunication, entertainment services,entertainment products, access of the Internet, access of the mobile phones and many others.The organization of Telstra Corporation Ltd is the largest company of telecommunicationswithin Australia. This organization is responsible for providing services of informationsystem for the customers and employees. The following report would be depicting about theseveral threats or malware, which are dangerous for the organization.
IS Security and Risk Management : Assignment_3
3IS SECURITY AND RISK MANAGEMENTDiscussion1. Most Common Malware Affecting Organizational OperationsThe malicious software of malware is the specific variety of various hostile forms orintrusive software. There are various types of this intrusive software. They are Trojan horses,ransom ware, spyware, computer viruses and several others. Malware can be defined as themost threatening or dangerous software, which could cause problems or issues for anybusiness operation (Peltier, 2013). Any kind of malicious activities can take the form of theexecutable scripts or code. This malware consists of the malicious intent, which could besubsequently acting against the various kinds of requirements for any computer utilizations.Malware is extremely vulnerable for any organization or business and hence TelstraCorporation Ltd. has also faced this situation. The most dangerous malware threat, which canbe vulnerable to the IS or information system and also for the business operations of TelstraCorporation Ltd. are given below:i) Adware: This is the most dangerous kind of malware, which could be extremelydangerous for any organizational operation of Telstra Corporation Ltd. Adware is theabbreviation of advertising supported software. This particular software is solely responsibleto automatically providing advertisements (Willcocks, 2013). Various important examples ofthe adware malware are pop up advertisements, which come up on websites, displayed by thissoftware. The business operations or processes are dangerously affected with this particularmalware.ii) Bots: This is the second significant malware program dangerous for TelstraCorporation Ltd. Bots are certain software programs, which are made to perform the variousoperations (Crossler et al., 2014). Although, few bots are created for harmless purposes like
IS Security and Risk Management : Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IS Security and Risk Management: Doc
|16
|3835
|67

IS Security and Risk Management: Telstra Corporation Ltd
|17
|3798
|88

Information System Security and Risk Management
|15
|3898
|364

Malware and Threads Detection, Security and Risk Management (Atlassian)
|14
|2580
|335

Security and Risk Management: Amcor
|15
|3379
|242

IT Security and Risk Management: Threats, Malware, and Solutions
|17
|4012
|187