logo

IS Security and Risk Management: Doc

   

Added on  2021-06-16

16 Pages3835 Words67 Views
Running head: IS SECURITY AND RISK MANAGEMENTIS Security and Risk Management: TelstraName of the StudentName of the UniversityAuthor’s Note:
IS Security and Risk Management: Doc_1
1IS SECURITY AND RISK MANAGEMENTTable of ContentsIntroduction................................................................................................................................2Discussion..................................................................................................................................31. Most Common Malware Affecting Organizational Operations.........................................32. Three Types of Network Devices Used by Telstra............................................................43. Reliability and Availability of Web Service......................................................................54. Ensuring Confidentiality and Integrity for Staff Email......................................................65. Prioritization of Threats, Malware Types and Security Issues..........................................76. Two Approaches for Improving Availability of Web and Email Servers.........................77. Impact of Organizational Issues and Human Factors on IS Management.........................98. Illustration of Log Records..............................................................................................109. Utilization of Audit Log Records for Email and Web Server Issues...............................1010. Five types of Network Security Devices for Controlling Security................................11Conclusions and Recommendations........................................................................................11References................................................................................................................................13
IS Security and Risk Management: Doc_2
2IS SECURITY AND RISK MANAGEMENTIntroductionAn IS or information system is the specific organized system that is utilized for thepurposes of collection, organization, communication, storing and finally manipulation of dataor information (Laudon & Laudon, 2016). It is the proper collection of variouscomplementary networks, which any organization or individual utilizes to filter, create,process, collect and distribute information. This particular group of elements interact witheach other for properly producing information. The internal information is mainly focusedwith this information system and not the external information. This software is used forrunning a fully computerized database or any computer system. All types of data operationsare much easier with IS or information system (Bajdor & Grabara, 2014). The overallmanagement, business operations and decision making process is supported with informationsystem and it is the subset of information and communications technology. The following report outlines a brief discussion on the entire concept of informationsystem for the popular Australian telecommunications organization, Telstra Corporation Ltd.This organization is eventually responsible for building as well as operating severaltelecommunication networks, internet access, mobile, television services, entertainmentservices, products and many more. It is considered as the largest organization oftelecommunications in Australia. It provides information system services to its employeesand customers. This report will be demonstrating on the various threats and malware thataffect the operations of this organization. Moreover, the various network devices and relevantdetails will be eventually provided here. Various recommendations will also be provided inthis report.
IS Security and Risk Management: Doc_3
3IS SECURITY AND RISK MANAGEMENTDiscussion1. Most Common Malware Affecting Organizational OperationsMalware or malicious software can be defined as the variety of several intrusivesoftware or hostile forms (Gallagher & Sixsmith, 2014). The basic types of intrusive softwareare computer viruses, Trojan horses, spyware, ransom ware and many more. It is consideredas one of the most dangerous software that causes problems for the business operations. Thistype of malicious activity could easily task up the form of executable code or scripts. Itcomprises of malicious intent that are eventually acting against any type of requirement forthe computer users. Malware is vulnerable to all types of organizations and Telstra is one ofthem (Arvidsson, Holmström & Lyytinen, 2014). The basic malware threats thatsubsequently affect the information system as well as organizational operations of Telstra areas follows:i) Adware: The first and the foremost type of malware that is dangerous for theorganizational operations of Telstra Corporation Ltd. is adware. It is the short form ofadvertising supported software. This typical software is responsible for automaticallydelivering advertisements (Klukas, Chen & Pape, 2014). The most significant examples ofthis adware mainly include several pop up ads that come on the websites or advertisements,which are displayed by the software. For the added capabilities of the spyware, the bundlesare extremely dangerous than this adware. The organizational operations of Telstra are highlyaffected by this malware.ii) Bots: The second important malware type is bot. These are specific softwareprograms that are eventually created for performing significant operations. Although, fewbots are created for harmless purposes like internet auctions or video gaming, most of them
IS Security and Risk Management: Doc_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IS Security and Risk Management : Assignment
|16
|3847
|48

Information System Security and Risk Management
|15
|3898
|364

Security and Risk Management: Amcor
|15
|3379
|242

IS Security and Risk Management: Telstra Corporation Ltd
|17
|3798
|88

Security of Information System and Risk Management in MetaSoft System
|17
|3475
|84

Malware and Threads Detection, Security and Risk Management (Atlassian)
|14
|2580
|335