Information Security: A Qwest Solution Analytical Essay

A look at various solutions to hackers, internal thieves, and cyber security officers with a focus on the company Qwest.
# 145749 | 3,418 words | 5 sources | APA | 2010 | US
Published on Nov 26, 2010 in Business (Companies) , Computer and Technology (Networks)


$19.95 $9.95 Buy and instantly download this paper now

Description:

Information security is an integral element in the evolution of software and database protection. This paper collectively explains, evaluates, and suggests different types of protective alternatives in order to further safeguard Qwest's business goals into the future. The strategic implications within this applied research project suggest effective and proven methods to exponentially secure the input and output of sensitive information into a database, the use of firewalls, various versions of antivirus and anti-spam alternatives, security precautions, as well as policies and ethical employee responsibilities. Being that Qwest is a premier business in the forefront of telecommunications; our the paper also presents tested and recommended virtual methods to establish a secured user friendly database system that ensures maximum confidentiality not only between Qwest and other businesses but also Qwest's customer transactions.

From the Paper:

"Since the inception of digital technology, companies collectively store, analyze, and access confidential information on customized databases. Although, these systems are exclusively password restricted, issues of theft internally by associates or externally by hackers have been a prevalent problem. Companies must be able to protect their information from unauthorized access, malicious code attacks, and inappropriate use of disclosure of information for personal or financial gain. In addition, housing massive amounts of hard copy files has to become too risky for unauthorized individuals to obtain. Virtually storing confidential information seems to be inevitable for businesses to function in today's high tech society. Universally, companies rely on networks and databases for not only storing information but for fast transference by email or peer-to-peer networks to other branches in different worldwide locations. Primarily, an information security system must be implemented in order to securely protect confidential documents or data. "

Sample of Sources Used:

  • AntiVirus Computer Security. (2008-2009). Antivirus computer security review. Retrieved December 08, 2009 from: http://www.antiviruscomputersecurity.com/
  • Best Price Computers. (Unknown). BPC, Articles and Glossary. Retrieved November, 15 2009, from BPC website: http://www.bestpricecomputers.co.uk/sitemap.htm
  • CPNI . (Unknown). Customer Proprietary Network Information. Retrieved December 09, 2009, from Epic Org website: http://epic.org/privacy/cpni/
  • Indiana University. (2003, May, 13). Knowledge Base. Retrieved November, 15 2009, from Indiana University website: http://kb.iu.edu/data/aoru.html
  • Liveoffice. (1999). Email Compliance, Compliance Regulation. Retrieved November, 15 2009, from Liveoffice website: http://www.liveoffice.com/regulations/gramm-leach-bliley.asp

Cite this Analytical Essay:

APA Format

Information Security: A Qwest Solution (2010, November 26) Retrieved April 04, 2020, from https://www.academon.com/analytical-essay/information-security-a-qwest-solution-145749/

MLA Format

"Information Security: A Qwest Solution" 26 November 2010. Web. 04 April. 2020. <https://www.academon.com/analytical-essay/information-security-a-qwest-solution-145749/>

Comments