IS Security and Risk Management: Telstra Corporation Ltd

   

Added on  2023-06-04

15 Pages3784 Words409 Views
Running head: IS SECURITY AND RISK MANAGEMENT
IS Security and Risk Management: Telstra Corporation Ltd
Name of the Student
Name of the University
Author’s Note:
IS Security and Risk Management: Telstra Corporation Ltd_1
1
IS SECURITY AND RISK MANAGEMENT
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................3
1. Products and Services of Telstra and Proper Use of Information System.........................3
2. General Management Controls of Telstra Corporation......................................................4
3. Application Controls of Telstra Corporation.....................................................................5
4. Comparison of ACs and GMCs for Information System...................................................6
5. Evaluation of Few Techniques for Risk Management.......................................................6
6. Audit Plan and Audit Process in Telstra Corporation........................................................8
Conclusion................................................................................................................................10
References................................................................................................................................12
IS Security and Risk Management: Telstra Corporation Ltd_2
2
IS SECURITY AND RISK MANAGEMENT
Introduction
The information system can be defined as the structured structure that helps to
assemble, systematize, accumulate and correspond with the confidential data (Laudon &
Laudon, 2016). It is the amalgamation of various complementary networks, which
organizations and people utilize for the major purposes of collection, filtering, processing,
creating as well as distributing the data. The information system is the major component that
helps to interact for the successful production of information (Bajdor & Grabara, 2014).
Various software, hardware, business procedures, functionalities and data that could be
utilized for increasing the efficiency and management of any particular organization are
present within the information system. This information system is completely automatic and
hence could be used without any type of manual working procedure. It comprises of a
computerized database and has restricted sensors that help in easy information storage. The
various operations, decision making and management of the confidential data are much easier
with the presence of information system (Demir & Krajewski, 2013). Moreover, information
system has the interrelation with the data systems and could easily complete the activities in
lesser time.
The following report provides a brief discussion on the risk and security management
on the popular and significant organization of telecommunications within Australia, namely,
Telstra Corporation Ltd. This organization provides various telecommunication and
broadband services for its customers and information system services for the employees. The
report even explains the proper ideology of general management controls and application
controls with several techniques of risk management, used by them.
IS Security and Risk Management: Telstra Corporation Ltd_3
3
IS SECURITY AND RISK MANAGEMENT
Discussion
1. Products and Services of Telstra and Proper Use of Information System
Telstra Corporation Limited or Telstra is considered as the largest
telecommunications organization within Australia that could easily build as well as operate
the networks of telecommunications and the mobile services, internet access, broadband
services, pay television, market voices and several other products or services (Telstra., 2018).
This particular organization was founded 43 years ago and it has its headquarters in
Melbourne, Australia. Since, this is an important and popular organization, Telstra has
numerous customers worldwide. This particular organization is following several unique
strategies within the business. A complete range of the communication services is provided
by this organization and hence they are competing in each and every telecommunication
market. In Australia, they are providing retail mobile services to 17.7 million customers,
retail fixed broadband services to 3.6 million clients as well as fixed voice services to 4.9
million clients (Telstra., 2018). They have kept customers’ choices on top priority and this is
another important strategy of this organization.
Due to the business processes of the Telstra Corporation Ltd are extremely unique in
respect to the other telecommunication organization (Telstra., 2018). Thus, the result of the
business procedures is bringing several asset values within the business. A brilliant connected
future is the ultimate goal of this company. The services of broadband and Internet are
improvised with the help of this system. The marketing department of this organization is
doing their work perfectly and hence they have implemented information system and thus the
departments could easily be connected with one another (Kushniruk et al., 2013). The
transaction processing system is the major requirement in the organization of Telstra
Corporation Limited. The accounting and production departments are perfectly controlled by
IS Security and Risk Management: Telstra Corporation Ltd_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IS Security and Risk Management: Telstra Corporation
|12
|2941
|57

Business Information System: Telstra Organization
|12
|2986
|184

Information System: Telstra Telecommunications
|12
|3176
|332

IS Security and Risk Management : Assignment
|16
|3847
|48

IS Security and Risk Management: Doc
|16
|3835
|67

Risk Management and IT Auditing at Telstra
|14
|3199
|205