Cisco defines network security

Assignment Help Computer Engineering
Reference no: EM131557403

Write review on this.

Cisco defines network security as "any activity designed to protect the usability and integrity of your network and data" (Cisco, 2016). In protecting the data that includes keep it private and confidential. The information security officer is in charge of implementing these things.

He should know his job and what is required and if he does not complete it properly then he should be led to see his errors. James tells us "if anyone, then, knows the good they ought to do and doesn't do it, it is sin for them" (4:17, NIV), and thus the information security officer needs to be wary and alert to the system.

A properly implemented network security plan should be like a strong tower for the data given to the network. So where data and information is stored and transfered for usage, it can remain safe and secure for those who are supposed to use it and protected against those that would be looking to act maliciously against the data.

Two verses come to mind in reference to the data being protected, the first is in Proverbs, "the name of the Lord is a fortified tower; the righteous run to it and are safe" (18:10, NIV), and the second is in Psalm, "for you are my safe refuge, a fortress where my enemies cannot reach me" (61:3, NLT).

We can continue this allusion of treating our networks like cities and our data and users like its inhabitants and educate our users to be more vigilant in their use of the network to help reinforce the privacy, security and confidentiality of the data and we can bring Psalm 122:7 as well, "may there be peace within your walls and security within your citadels" (NIV).

Of course it would be so much easier to secure data if more people were like Jesus and rather then having malicious intent or sinful desires, people could treat others as they would themselves like it is said in Matthew, "do to others whatever you would like them to do to you.

This is the essence of all that is taught in the law and the prophets" (7:12, NLT).

What Is Network Security? (2016, November 09).

Verified Expert

Thus, Cisco network security is all about, maintaining the data and the network with different secured standards. Information security officers are the responsible person to maintain the data security and the one who will improve and overcome from network errors.

Reference no: EM131557403

Questions Cloud

Review case of advertising television commercials : ADVERTISING-TELEVISION COMMERCIALS As part of a campaign to promote its annual clearance sale, Excelsior Company decided to buy television advertising time.
The inherent conflict a psychology professional : The inherent conflict a psychology professional in a corrections setting might experience by being in the dual role of a treatment provider and an evaluator.
Create homeless shelters : Analyze two major ways that each organization is addressing the social problem you have mentioned. For example, are they helping to create homeless shelters
How has classical been defined and redefined over centuries : How has "classical" been defined and redefined over the centuries? What the basic characteristics of the Classical Greek style in sculpture and architecture
Cisco defines network security : Write review on this - Cisco defines network security as any activity designed to protect the usability and integrity of your network and data.
What is the purpose of the specialized interview : The mock conclusions you arrived at about the employee's potential for showing violence, while explaining reasons for such conclusions.
What type of violence-based leisure activities do americans : What type of violence-based leisure activities do Americans participate in and/or support
Differences between the leadership styles of shawn and john : What are the differences between the leadership styles of Shawn and John? What are the pros and cons of each style?
How much should sharon invest in each type of fund : INVESTMENTS-ASSET ALLOCATION Sharon has a total of $200,000 to invest in three types of mutual funds: growth, balanced, and income funds.

Reviews

inf1557403

8/4/2017 6:04:52 AM

I can not thank you enough for the expert level this was taken care of. I hold your services in the most elevated respects and will allude future customers. I genuinely much obliged. The services gave were more than satisfactory and I am more than satisfied...

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd