Cisco's Assurance System Farah Al-Turki 201002577 Sabreen Magladi 200800225 Hanadi Al-Habboubi 200901730 Introduction to Information Assurance MISY3321 Sec.201 Dr.Muhammad Rafiq
Introduction What is Information Assurance? "information Assurance (IA) refers to the steps involved in protecting information systems, like computer systems and networks“ Cisco information assurance policy. lose of misuse of its information. Recommendations. Farah
About Cisco Cisco Systems, Inc. is a world's leading supplier of computer networking products, systems, and services; Cisco is short for San Francisco. Cisco’s Products. Sandy Lerner and Len Bosack. Market Service. Large organizations. Service providers. Small and medium sized businesses. Internet services devices remote access devices network management software Hanadi
Cisco's Information Assurance Policy Integrity Availability Confidentiality Privacy Assurance Policy. Making A security Policy.
Cisco's Assurance Policy " we continue to build security into our own networks, help our customers protect theirs, and support efforts to strengthen critical public infrastructure" Cisco ISR Web Security with Cisco ScanSafe Data Sheet Ensure router security
Cisco's Assurance Policy Cisco Identity Services Engine This device is a virtual machine that applies Cisco ISE. To enforce security policy on all devices that attempt to gain access to network infrastructure.
Cisco's Assurance Policy Cisco ASA 5500 Series Next Generation Firewalls. This system was designed to balance security with productivity. combines the industry's most deployed stateful inspection firewall with comprehensive next-generation network security services. Cisco Cloud Web Security. Social Networks Chats Online Forms Laptops PC’s Tablets Smart Phones Mobile
Lose or Misuse of Cisco's Information Philip Gabriel Pettersson. Interwork Operating Software (Cisco IOS). "Stakkato“ Damages Consequences.
Recommendations Cisco should pay more attention on how to protect its system rather than only providing protection services and products. The designers of the system should rise up the specifications of the new system so they can build a more protected system. Should use and add more layers of security hardware and software as new threats and ways to hack systems are found. It should be tested by a third party. sabreen
Conclusion Thank You