$19.95 $9.95 Buy and instantly download this paper now
Information security is an integral element in the evolution of software and database protection. This paper collectively explains, evaluates, and suggests different types of protective alternatives in order to further safeguard Qwest's business goals into the future. The strategic implications within this applied research project suggest effective and proven methods to exponentially secure the input and output of sensitive information into a database, the use of firewalls, various versions of antivirus and anti-spam alternatives, security precautions, as well as policies and ethical employee responsibilities. Being that Qwest is a premier business in the forefront of telecommunications; our the paper also presents tested and recommended virtual methods to establish a secured user friendly database system that ensures maximum confidentiality not only between Qwest and other businesses but also Qwest's customer transactions.
From the Paper:"Since the inception of digital technology, companies collectively store, analyze, and access confidential information on customized databases. Although, these systems are exclusively password restricted, issues of theft internally by associates or externally by hackers have been a prevalent problem. Companies must be able to protect their information from unauthorized access, malicious code attacks, and inappropriate use of disclosure of information for personal or financial gain. In addition, housing massive amounts of hard copy files has to become too risky for unauthorized individuals to obtain. Virtually storing confidential information seems to be inevitable for businesses to function in today's high tech society. Universally, companies rely on networks and databases for not only storing information but for fast transference by email or peer-to-peer networks to other branches in different worldwide locations. Primarily, an information security system must be implemented in order to securely protect confidential documents or data. "
Sample of Sources Used:
- AntiVirus Computer Security. (2008-2009). Antivirus computer security review. Retrieved December 08, 2009 from: http://www.antiviruscomputersecurity.com/
- Best Price Computers. (Unknown). BPC, Articles and Glossary. Retrieved November, 15 2009, from BPC website: http://www.bestpricecomputers.co.uk/sitemap.htm
- CPNI . (Unknown). Customer Proprietary Network Information. Retrieved December 09, 2009, from Epic Org website: http://epic.org/privacy/cpni/
- Indiana University. (2003, May, 13). Knowledge Base. Retrieved November, 15 2009, from Indiana University website: http://kb.iu.edu/data/aoru.html
- Liveoffice. (1999). Email Compliance, Compliance Regulation. Retrieved November, 15 2009, from Liveoffice website: http://www.liveoffice.com/regulations/gramm-leach-bliley.asp
Cite this Analytical Essay:
Information Security: A Qwest Solution (2010, November 26) Retrieved April 04, 2020, from https://www.academon.com/analytical-essay/information-security-a-qwest-solution-145749/
"Information Security: A Qwest Solution" 26 November 2010. Web. 04 April. 2020. <https://www.academon.com/analytical-essay/information-security-a-qwest-solution-145749/>