Download presentation
Presentation is loading. Please wait.
1
Cisco's Assurance System
Farah Al-Turki Sabreen Magladi Hanadi Al-Habboubi Introduction to Information Assurance MISY3321 Sec.201 Dr.Muhammad Rafiq
2
Introduction What is Information Assurance?
"information Assurance (IA) refers to the steps involved in protecting information systems, like computer systems and networks“ Cisco information assurance policy. lose of misuse of its information. Recommendations. Farah
3
About Cisco Cisco Systems, Inc. is a world's leading supplier of computer networking products, systems, and services; Cisco is short for San Francisco. Cisco’s Products. Sandy Lerner and Len Bosack. Market Service. Large organizations. Service providers. Small and medium sized businesses. Internet services devices remote access devices network management software Hanadi
4
Cisco's Information Assurance Policy
Integrity Availability Confidentiality Privacy Assurance Policy. Making A security Policy.
5
Cisco's Assurance Policy
" we continue to build security into our own networks, help our customers protect theirs, and support efforts to strengthen critical public infrastructure" Cisco ISR Web Security with Cisco ScanSafe Data Sheet Ensure router security
6
Cisco's Assurance Policy
Cisco Identity Services Engine This device is a virtual machine that applies Cisco ISE. To enforce security policy on all devices that attempt to gain access to network infrastructure.
7
Cisco's Assurance Policy
Cisco ASA 5500 Series Next Generation Firewalls. This system was designed to balance security with productivity. combines the industry's most deployed stateful inspection firewall with comprehensive next-generation network security services. Cisco Cloud Web Security. Social Networks Chats Online Forms Laptops PC’s Tablets Smart Phones Mobile
8
Lose or Misuse of Cisco's Information
Philip Gabriel Pettersson. Interwork Operating Software (Cisco IOS). "Stakkato“ Damages Consequences.
9
Recommendations Cisco should pay more attention on how to protect its system rather than only providing protection services and products. The designers of the system should rise up the specifications of the new system so they can build a more protected system. Should use and add more layers of security hardware and software as new threats and ways to hack systems are found. It should be tested by a third party. sabreen
10
Conclusion Thank You
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.