Cisco defines network security

Assignment Help Computer Engineering
Reference no: EM131557403

Write review on this.

Cisco defines network security as "any activity designed to protect the usability and integrity of your network and data" (Cisco, 2016). In protecting the data that includes keep it private and confidential. The information security officer is in charge of implementing these things.

He should know his job and what is required and if he does not complete it properly then he should be led to see his errors. James tells us "if anyone, then, knows the good they ought to do and doesn't do it, it is sin for them" (4:17, NIV), and thus the information security officer needs to be wary and alert to the system.

A properly implemented network security plan should be like a strong tower for the data given to the network. So where data and information is stored and transfered for usage, it can remain safe and secure for those who are supposed to use it and protected against those that would be looking to act maliciously against the data.

Two verses come to mind in reference to the data being protected, the first is in Proverbs, "the name of the Lord is a fortified tower; the righteous run to it and are safe" (18:10, NIV), and the second is in Psalm, "for you are my safe refuge, a fortress where my enemies cannot reach me" (61:3, NLT).

We can continue this allusion of treating our networks like cities and our data and users like its inhabitants and educate our users to be more vigilant in their use of the network to help reinforce the privacy, security and confidentiality of the data and we can bring Psalm 122:7 as well, "may there be peace within your walls and security within your citadels" (NIV).

Of course it would be so much easier to secure data if more people were like Jesus and rather then having malicious intent or sinful desires, people could treat others as they would themselves like it is said in Matthew, "do to others whatever you would like them to do to you.

This is the essence of all that is taught in the law and the prophets" (7:12, NLT).

What Is Network Security? (2016, November 09).

Verified Expert

Thus, Cisco network security is all about, maintaining the data and the network with different secured standards. Information security officers are the responsible person to maintain the data security and the one who will improve and overcome from network errors.

Reference no: EM131557403

Questions Cloud

Review case of advertising television commercials : ADVERTISING-TELEVISION COMMERCIALS As part of a campaign to promote its annual clearance sale, Excelsior Company decided to buy television advertising time.
The inherent conflict a psychology professional : The inherent conflict a psychology professional in a corrections setting might experience by being in the dual role of a treatment provider and an evaluator.
Create homeless shelters : Analyze two major ways that each organization is addressing the social problem you have mentioned. For example, are they helping to create homeless shelters
How has classical been defined and redefined over centuries : How has "classical" been defined and redefined over the centuries? What the basic characteristics of the Classical Greek style in sculpture and architecture
Cisco defines network security : Write review on this - Cisco defines network security as any activity designed to protect the usability and integrity of your network and data.
What is the purpose of the specialized interview : The mock conclusions you arrived at about the employee's potential for showing violence, while explaining reasons for such conclusions.
What type of violence-based leisure activities do americans : What type of violence-based leisure activities do Americans participate in and/or support
Differences between the leadership styles of shawn and john : What are the differences between the leadership styles of Shawn and John? What are the pros and cons of each style?
How much should sharon invest in each type of fund : INVESTMENTS-ASSET ALLOCATION Sharon has a total of $200,000 to invest in three types of mutual funds: growth, balanced, and income funds.

Reviews

inf1557403

8/4/2017 6:04:52 AM

I can not thank you enough for the expert level this was taken care of. I hold your services in the most elevated respects and will allude future customers. I genuinely much obliged. The services gave were more than satisfactory and I am more than satisfied...

Write a Review

Computer Engineering Questions & Answers

  Express the concept of knowledge management

How data, information and knowledge are related to the concept of knowledge management? How are they different? Please define each one: data, information, knowledge and KM.

  Design an eight-input priority encoder

Design an eight-input priority encoder with inputs A7:0 and outputs Y2:0 and NONE should be 0. Give a simplified Boolean equation for each output.

  Use information from the modular background readings as

use information from the modular background readings as well as any good quality resource you can find. please cite

  The budget would be flexible with an upper limit but she

preparing a spreadsheet that helps one to plan custom vacation packages for families. the final outcome would be a nice

  What are two long term benefits of e-scm

What are two market trends occurring in SCM (Supply Chain Management) industry.

  What are the requirements you will include in your new line

Given the current state of technology and trends, what are the requirements you will include in your new line of processors?

  Computer games long terms effects are disastrous

Computer games as much as it can be argued that they are of benefit to the human race by educating them or helping them socialize, their long terms effects are disastrous. This is so since they can make the people strain later in life to see and m..

  Demonstrate a significant application of technical elements

Your final project in this class is required to be more extensive than the weekly lab projects. Your project should demonstrate a significant application of technical elements and also demonstrate originality and creativity.

  Explain how polymorphism could play a role

Draw and annotate a class hierarchy that represents various types of sales transactions in a store (cash, credit, etc.).

  Identify any one provision of the patriot act

Identify any one provision of the PATRIOT Act that is considered potentially unconstitutional. Explain the objection. Do you agree that the provision is unconstitutional Why or why not If you could modify the PATRIOT Act, what changes would you mak..

  Questiontvbca has just unavailable and old historic

questiontvbca has just unavailable and old historic building in downtown pittsburgh in which 15 employees will work.

  Is there the standard for drc

I would like to ask a question about Disaster Recovery Site Certification? Is there certification for DRSC for computers and application? Is there a standard for DRC.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd