logo

IT Audit Report for Telecommunication Industry

   

Added on  2022-11-19

13 Pages2808 Words107 Views
Running Head: IT Audit 0
IT Audit
Report
Student name

IT Audit 1
Table of Contents
Introduction......................................................................................................................................2
Administrative Protection:...............................................................................................................5
Physical Protection:.........................................................................................................................6
Technical Protection:.......................................................................................................................7
Incident handling:........................................................................................................................7
Public-key infrastructure (PKI)...................................................................................................8
Summary..........................................................................................................................................9
References......................................................................................................................................11

IT Audit 2
Introduction
ABC Company is a well-known company in the field of telecommunication from the last
two decades. Therefore, it is necessary to make a good image in the marketplace. There are many
threats in a network, which is making a huge impact on the organization in term of damage to
reputation and financial losses (Jadoun, 2018). In addition, those threats make a huge impact on
the organization for a long time. Therefore, the organization should maintain proper security
policies and arrangement too secure all the business process and its data and information from
the attacker (Security-trails, 2018).
In addition, most of the common reason of security breach is computer viruses in the
system because of human mistakes. According to many surveys and research, various types of
computer viruses affect more than 33 % of computer systems. Therefore, it is necessary to secure
computer systems first then a secure network and other devices from malware. Trojan horse is
another reason of security losses. It is a program that id hiding behind a program as well. Those
malicious programs can theft passwords, and any data from computer systems.
A denial-of-service attack is a common thing in computer and telecommunication sector
in which all the services will stop by a program. There is much another attack on the computer
system, which is phishing; rootkit, SQL Injection, and man-in-the-middle attack are common in
this industry.
There are some physical threats that make a huge impact on the financial conditions of an
organization. These can be divided into parts, which areas:
Internal threats: Power supply issue, fire, humidity, and others
External threats: earthquakes, floods, and lightning, and many others
Human mistakes: vandalism, theft, accidental issues, hardware disruption, and
more
Moreover, security issues have arisen in the telecommunication industry because of
various other reasons, such as hacking of PBX, adware, spyware, and many other malfunctions.
In addition, phone hacking, H.323 toll fraud, and Session Initiation Protocol (SIP) make a huge
loss, which is not affordable by an organization. All those frauds make a huge cost, which is not
good for all those organizations. It makes an impact on their financial and reputation factor,
which is direct, affects their business and growth in the market (Vyopta, 2018).

IT Audit 3
Besides, many other internal and external issue of the company can create threats for the
company, such as change management, lack of monitoring, older hardware, and software. All
these things make a huge impact on the organization working.
Source: (Ben-Shimol, 2016)
As shown in the above figure, the telecom industry has more affected from various issues
as compared to fortune 1000 companies, such as cyber terrorism, loss of data, reputation risk,
error, and malfunction, and many others.
Technologies are continuously updated and it is good and bad as well, such as the
Internet of Things (IoT). IoT provides many good services to the systems, but all the IoT devices
require physical and technical security from various types of threats. There are various mistakes
happened because of lack of knowledge about the losses and technologies. Therefore, the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Issues in Networking
|6
|1229
|54

Cybersecurity | Information System Control and Auditing
|7
|1217
|15

Cyber Security Concepts Document
|5
|976
|16

Cybercrime: Types of Scams, Laws, and Penalties
|8
|1753
|341

Security of Network Report 2022
|22
|5061
|22

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375