This report evaluates the vulnerabilities of the information system related to Telstra and how the vulnerabilities can be destructive. The vulnerabilities that the information systems of Telstra might face are discussed in detail. The reasons why the vulnerabilities associated with the information system can be destructive for the organization are also evaluated.