Understand the foundation of information security

Assignment Help Computer Network Security
Reference no: EM133320244

Discussion: In this day and age of technology, it is inevitable that people have multiple digital assets at their disposal. Digital assets refers to any digital content an organization (or person) owns or has acquired the right to use including text, graphics, audio, video and animations (Johnson & Easttom, 2021, p. 39).

In the case of Liberty University the digital assets that they posses is:

1) Introduction to Security Management Policy video. A video of which they made and own and which adds value to this course and as a result the University.

2) Security policies and implementation issues book. The textbook that is used for this course to help the students understand the foundation of Information security and that Liberty has gained the right to use.

These assets are important because they aid in the teaching and understanding of Information Security. Better student satisfaction with study materials yields better student results and as a result showcases the efficiency of Liberty University and their commitment to supplying the best educational experience possible. The Bible has a lot to say about stealing and thieves.

Proverbs 6:30-31 says: "Men do not despise a thief, if he steals to satisfy his soul when he is hungry; But if he be found, he shall restore sevenfold; he shall give all the substance of his house," this shows us that even in this fallen world the act of stealing, no matter the reason; valid or not, is a very serious crime and as a result will yield serious consequences when discovered. These laws and consequences we have mirror the ultimate law of God and the consequences He bestows on those who disobey them, "nor thieves nor the greedy nor drunkards nor slanderers nor swindlers will inherit the kingdom of God," (1 Cor 6:10, NIV).

References: Johnson, R., & Easttom, C. (2021). Security Policies and Implementation Issues (3rd ed., p. 39)

1 Corinthians 6 - NIV Bible - If any of you has a dispute with another, do you d... (n.d.). 

Theft and Thieves in the Bible. (n.d.). Nave's Topical Bible Concordance Online. Retrieved January 22, 2023.

Verified Expert

The response is on stealing and the analogy given between the fallen worlds of bible and the current digital age. The digital asset and proximity of the same for stealing and related discussion is presented. The discussion also provided references to the biblical verses, response given on the positing. Reference included.

Reference no: EM133320244

Questions Cloud

What are digital assets and what he has taken : What are Digital assets and what he has taken and add a fifth to what he took on the day that he realizes his guilt
What would be the disadvantage for the manufacturer : What would be the disadvantage for the manufacturer to only provide two standard lengths of drawer slides?A manufacturer of cupboard hardware is reviewing sales
Analyze each carrier option that rasgen presented : What issues should Litchee take into consideration in her assessment of transportation risks for RIot runners?Analyze each carrier option that Rasgen presented.
Interacting with the system developers : What kind of problems would the user group may raise from overly interacting with the system developers?
Understand the foundation of information security : Understand the foundation of Information security and that Liberty has gained the right to use and which they made and own and which adds value to this course
Discuss how the success of the project was measured : Critically examine the causes of the success of the project and discuss how the success of the project was measured.
Discuss interactive visualization applications in population : Summarize the key ideas discussed in the journal article Interactive Visualization Applications in Population Health and Health Services Research
Childhood program-culturally sensitive classroom : What would you see and hear in a culturally sensitive classroom? Why is this an important component of an early childhood program?
What is most product feature company will need to change : A food processing company is going to export their successful domestic baked goods, including flatbreads and a variety of crackers to the EU.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd