Discussion
Discuss about the Dynamic Risk Assessment Methodology For Maintenance Decision.
The following report reflects on the Australian post office which was started in the year of 1809. Isaac Nichols founded the post office in the area of south wales (Daunton, 2015). The business of Australian post office has changed a lot in last few years. Australian letters have reached the highest value in the last few years. Australian post office is planning to shift to digital communication and various kinds of online transaction which has affected a lot. Along with this it has created many kinds of opportunities. Various people round the globe are selling and buying their goods online by focusing on the fact that the parcels are not delivered. As a result of this various kinds of interaction can be made for making that interaction secure, fast and lastly convenient (Wisbauer, 2018). Working as Australian postal corporation it is considered as one of the most trusted brand. It mainly operates Australia and along with this it has some branches and operating more than 34,000 people. Corporation is considered to be self-funded as it can easily make use of large number of assets and resources which can be used for earning profit and along with this delivering of various kinds of community services.
In the coming pages of the report an idea has been provided regarding the context of the organization that is its background. Various kinds of products and services offered by Australian post has been discussed in details. After that various kinds of stakeholders of Australian post has been discussed in details. An analysis has been done regarding impact of criteria of Australia post office. In the end a risk assessment matrix has been prepared which consist of all the necessary parameters.
Background |
Australian post is well known government owned organization which is owned by commonwealth of Australia (Ginsburg, 2017). It also provides portal services which is works both locally and internationally. It was founded on 25th April 1809. The headquarter of Australian post is located in Melbourne, Victoria, Australia. It comes up with 4,429 outlets in metropolitan. While it comes up with 2561 outlets in rural and remote areas. |
Recent corporate and strategic decision |
For increasing the marketing Australian post service is looking for digital world where one needs to establish connection with various business and government by making use of large number of challenges for both digital and in- person (Robertson, 2016). The organization is focusing to create unique kind of relevance by making use of network by making use of design solution for large number of solution in abilities, ages, regions and different ages of people. Australian post is much focused to develop creative people, fostering innovation and making acceleration of various kinds of products and services which are offered (Brotchie et al., 2017). It is redeveloped the system in such a way that it can easily improve convenience for the customer. It has also certain number of products and services for our system and experts with new kind of bill payment option. |
Risk Level |
Risk Description |
High |
Loss of CIA that is confidentiality, integrity or availability will have severe catastrophic kind of damage in the near future on Australian post services. |
Moderate |
Loss of CIA will have severe kind of damage on operation of Australian post services. |
Low |
Loss of CIA will have adverse effect on the operation of this organization that is Australian post services. |
Products |
Australian post service is more focused to increase the basic rate of postage. It is also much focused to provide customer service (Topping and Wolfendale, 2017). Providing optimization of network. Along with it much focused on building capability for delivering network. |
Services |
Australian post has come up with large number of services like ü MyPost Digital Mailbox ü Multi-channel marketing ü Providing help to business for managing inbound communication. ü Financial, identity and commercial services. ü Merchandise Services ü Providing customers with better kind of access to services. ü Modernizing the provided infrastructure. ü Lastly investing the license network of post office. |
Internal |
External |
Employees of post office Management Contractor Management Risk services and cyber security Various stakeholders |
Various kinds of supply chain partners Customers Various kinds of government bodies like emergency services like AFP, CERT, ACSC and regulatory of Attorney general, privacy commission along with issuer, Union and media. The main stakeholders include a large number of people or person which can be used by customer and broader community. |
The business of Australian post tends to face continuous kinds of challenges due to digitization. So as a result the organization is addressing for the reduction of demand for various kinds of physical services (Tadros et al., 2014). Competitive environment mainly focuses on the fact of power of new kinds of website along with customers. It mainly focuses on the fact of ensuring the fact that of delivering the thing in the required way or mechanism. But with the passage of time (Kueppers and Cooke, 2015) Australian post is addressing a large number of issues which have arisen from disrupts of various kinds of industry.
Risk Classification
Australian post is working hard for improving the parcel delivery system and minimizing the carding rate from 15.5 to 10.7 percent (Heesch, Giles-Corti and Turrell, 2014). Australian post has also invested in Customer contact centre. It has also invested in My post business for large number of small business customer. The parcel business result in increased in size in various domestic and international platform (Metcalfe, 2018). But at present it is addressing a large number of issues at present market. Another kind of issue encountered in Australian post is that customer will have to wait for longer time. So it can be easily concluded that more kind of resources are mainly required.
Australian post is mainly committed for providing certain number of environmental services which is committed for providing for acting like iconic status in some of leading Australia organization (Hassanli, 2015). It mainly deals with some of the direct impacts of its business on the environment. Australian post come across the need of managing the impact on various business resources. It will also help in reducing cost, proper management of risk, improvisations of customer value.
OCTAVE that is Operational Critical Threat, Assets and Vulnerability can be defined as a well-known practice for risk management methodology (Hassanli, 2015). It can be easily defined as a well-known tool which is used for evaluation of large number of risk. Various kinds of security practices and technology are used for mitigation of large number of risk. The ultimate goal of this approach is considered to be more strategical instead of tactical one. Australian post has some kind of risk and this particular methodology can be used for accessing the risk. OCTAVA methodology is required by Australian post for learning and making use of in-house kind of security consultant which is used for running large number of security consultant (Clifford et al., 2015). Various kinds of vendors make use of products under risk management tools when understanding the vulnerability of management tools. Vulnerability management is mainly used for identifying various kinds of holes (Chemweno et al., 2017). Risk management is considered to be much different kind of tool. Risk management can be considered to be much different in comparison to vulnerability management.
Confidentiality |
It mainly checks the fact information is managed and is unavailable from any unauthorized kinds of use (Rathore, Thakkar and Jha, 2017). |
Integrity |
It mainly ensures accuracy of assets and completeness. |
Availability |
Information which is available is mainly required by certain number of entities (Ronco et al., 2015). |
Group of Risk management framework mainly checks certain number of core strategies and business process which can effectively manage various kinds of risk along with providing clear roles and responsibility (Poirier, 2015). This roles and responsibility are mainly used for managing various kinds of risk. GRMF and board of appetite statement has been developed by making use of principles in various kinds of standards which is used for risk management (Kit et al., 2014). GRMF can be easily defined as integral kind of strategic planning processes and various kinds of decision making (Hill, 2015). Board is mainly focused in mainly responsible for providing direct kind of insight and monitoring of risk management processes and various kinds of associated strategies. In a culture of risk assessment GRMF is mainly fully integrated and various areas of business are mainly accountable for identifying and analysing risk associated along with various kinds of activities and busines
Products and Services
Information |
Business operations |
Financial |
Reputation |
|
Insignificant |
Loss in CIA ( Confidentiality, Integrity, Authorization) |
Negligible amount of interruption in various kinds of systems. |
Under 30 k dollars Covered by government |
No involvement of media No kind of damage to brand |
Minor |
Loss of CIA creates an impact on information assets) |
Very minor kind of implementation in the system for more than two hours. |
30-80k dollars covered by government |
Coverage by state media. |
Moderate |
Loss of CIA will result minimum damage |
Moderate kind of customer dissatisfaction |
80-150k dollars Application of insurance |
National media coverage |
Major |
Loss in CIA result in high value on information assets. |
Critical system of Australian post interrupted for single day. |
150-170k dollars Application of insurance |
Coverage by global media. |
Severe |
Loss of CIA results in High value assets of information Multiple value of asset of Australian post impacted. |
Delay in delivery of parcels for more than three days. |
Over 1 M Insurance application |
Insignificant |
Minor |
Moderate |
Major |
Severe |
|
Almost certain |
Medium |
High |
High |
Extreme |
Extreme |
Likely |
Medium |
Medium |
High |
High |
Extreme |
Possible |
Low |
Medium |
Medium |
High |
High |
Unlikely |
Low |
Medium |
Medium |
High |
High |
Rare |
Low |
Low |
Low |
Medium |
High |
Risk rating description |
|
Low |
Accepting various kinds of risk No new kinds of application is needed |
Medium |
Accepted value of risk Requirement of new kinds of application. |
High |
Likely to damage New kinds of application required |
Extreme |
Unacceptable value of risk New kinds of measures are required. Immediate kinds of action are required for causing damage |
Information of details of customer parcel |
High |
Critical kinds of system in Australia post office like POS, Backup, SAP payroll |
Medium |
Cyber security risk assessment |
High |
Various kinds of network switches |
Low |
Application of large number of software |
High |
External information which has been stored. |
High |
Vulnerability |
Threat |
Risk |
Controls |
Risk Rating |
Mitigation process |
Application software not being dispatched for this Australian post office |
Attacks can easily damage various kinds of unpatched system, and compromising of data centre (Powell and Hendricks, 2014). Injecting attack of SQL may result in backend information |
Loss of CIA (confidentiality, integrity, availability) related to parcel of various customers |
Patch released from various kinds of vendors of Australian post office in one month |
High |
Patch of data centre of Australian post office within 48 hours of release. |
Low supply chain (data of customers ) |
Attacks to data centre that is unauthorized kind of access and compromising of data and system along with various kinds of weakness |
Loss of confidentiality which is nothing but availability of various kinds of important data. |
Agreement signed by supply chain for availability and confidentiality of service level agreement |
Extreme |
Signing of agreement with various kinds of external providers (Rogers, Saintilan and Copeland, 2014). Making of request from various kinds information assurance |
High sensitive kind of information |
Attacks made to the data centre of Australian post from any kind of unauthorized access. It mainly focus on various kinds of vendors of service provider by the help of cloud chain |
Loss of CIA that is confidentiality, integrity, availability. |
No kind of assessment of information as per the cloud strategy |
Extreme |
Review of existing cloud storage and development of cloud strategy and |
Weak internal control |
Theft of various kinds of information by malicious insiders (Deo, Wen and Qi, 2016). |
Loss of CIA |
Low level of security governance, no kind of segregation of duties lies between various application |
Extreme |
Screening of employees for current kinds of risk for large number of IT employees. |
Social engineering |
Making use of social engineering from various kinds of open source |
Loss of confidentiality integrity and availability |
Policy of social networking which mainly affects various codes of ethics and conducts. |
Medium |
Overcoming information of network and blacklist of malicious kind of domains of IP. |
Conclusion
From the above discussion it can be concluded that this report is all about Australian Post. With the development of internet, smartphones and other kind of developing technology are creating an adverse kind of effect on the letter service. It also provides greater number of services for individual. With the help of developing technology various kinds of businessman through online mode. Australian post is securing future by realising part of tomorrow strategy. This technology comes with upgradation of Australian post technology. It is mainly focused for delivering large number of services for large number of community. It mainly focuses on safety and cultural priorities for large number of people. It mainly focuses happy for people result and ultimately satisfying various kinds of satisfaction for happy stakeholders and large number of community. It mainly focuses on ensuring of the way in which people feel or tend to get support and have easily access to provided technology. In the above pages of the report various context of the organization that is Australian post has been discussed in detail. After that various kinds of products and services of Australian post has been provided. Various kinds of stakeholders of Australian that is internal and external has been provided in details. After that various kinds of internal and external issues of Australian post. After scope of Australian post is discussed in details. A proper kind of definition of risk criteria has been provided and a matrix is created for that. The matrix comprises of list of parameters. An analysis has been done on impact criteria for checking various kinds of issues in Australian post office. In the end a list of risk assessment has been done by the help of matrix which has been created taking account of various kinds of parameter.
References
Brotchie, J., Hall, P., Newton, P. and Nijkamp, P., 2017. The future of urban form: the impact of new technology. Routledge.
Chemweno, P., Pintelon, L., De Meyer, A.M., Muchiri, P.N., Van Horenbeek, A. and Wakiru, J., 2017. A Dynamic Risk Assessment Methodology for Maintenance Decision Support. Quality and Reliability Engineering International, 33(3), pp.551-564.
Clifford, A., McCalman, J., Bainbridge, R. and Tsey, K., 2015. Interventions to improve cultural competency in health care for Indigenous peoples of Australia, New Zealand, Canada and the USA: a systematic review. International Journal for Quality in Health Care, 27(2), pp.89-98.
Daunton, M.J., 2015. Royal mail: the post office since 1840. Bloomsbury Publishing.
Deo, R.C., Wen, X. and Qi, F., 2016. A wavelet-coupled support vector machine model for forecasting global incident solar radiation using limited meteorological dataset. Applied Energy, 168, pp.568-593.
Ginsburg, D., 2017. Applications of electrodynamics in theoretical physics and astrophysics. Routledge.
Hassanli, R., 2015. Behavior of unbonded post-tensioned masonry walls (Doctoral dissertation, University of South Australia).
Heesch, K.C., Giles-Corti, B. and Turrell, G., 2014. Cycling for transport and recreation: associations with socio-economic position, environmental perceptions, and psychological disposition. Preventive medicine, 63, pp.29-35.
Hill, E., 2015. The Great Australian Loneliness: A Classic Journey around and across Australia. ETT Imprint.
Kit, R.I.S., Allen, K., Mazzotti, F.J. and Briggs-Gonzalez, V., 2014. Risk Assessment Methodology.
Kueppers, V.B. and Cooke, C.T., 2015. 25I-NBOMe related death in Australia: a case report. Forensic science international, 249, pp.e15-e18.
Martin, G., 2015. Stop the boats! Moral panic in Australia over asylum seekers. Continuum, 29(3), pp.304-322.
Metcalfe, S. ed., 2018. Evolutionary theories of economic and technological change: present status and future prospects(Vol. 44). Routledge.
Poirier, J., 2015. The functions of intergovernmental agreements: post-devolution concordats in a comparative perspective.
Powell, J.L. and Hendricks, J., 2014. Welfare State in Post-industrial Society. Springer.
Rathore, R., Thakkar, J.J. and Jha, J.K., 2017. A quantitative risk assessment methodology and evaluation of food supply chain. The International Journal of Logistics Management, 28(4), pp.1272-1293.
Robertson, I.J. ed., 2016. Heritage from below. Routledge.
Rogers, K., Saintilan, N. and Copeland, C., 2014. Managed retreat of saline coastal wetlands: challenges and opportunities identified from the Hunter River Estuary, Australia. Estuaries and coasts, 37(1), pp.67-78.
Ronco, P., Bullo, M., Torresan, S., Critto, A., Olschewski, R., Zappa, M. and Marcomini, A., 2015. KULTURisk regional risk assessment methodology for water-related natural hazards–Part 2: Application to the Zurich case study. Hydrology & Earth System Sciences, 19(3).
Tadros, C.V., Hughes, C.E., Crawford, J., Hollins, S.E. and Chisari, R., 2014. Tritium in Australian precipitation: A 50 year record. Journal of hydrology, 513, pp.262-273.
Topping, K. and Wolfendale, S. eds., 2017. Parental involvement in children’s reading. Routledge.
Wisbauer, R., 2018. Foundations of module and ring theory. Routledge.