logo

Network Security Policy

   

Added on  2023-06-03

4 Pages720 Words83 Views
 | 
 | 
 | 
Running head: Network Security Policy 1
Network Security Policy
Student’s Name
Institution
Network Security Policy_1

Network Security Policy 2
References
Comer, D. E. (2018). The Internet book: everything you need to know about computer
networking and how the Internet works. Chapman and Hall/CRC.
Douglas E. Comer is a renowned professor at the University of Purdue where he majors
in teaching courses in computer networking. This book is used by professionals around the world
to familiarize themselves about the internet in onsite presentations and at professional
conferences. In this book we come to familiarize ourselves with the concepts used in networking
and how the internet functions. It expounds more on the type of devices used in networking such
as the routers, firewalls, switches and wireless devices. It also states in broad, how the internet
relates with the network, how the networking devices provides the required security to devices
that want to access the internet. It relates clearly more on networking and internet and its best
suited to provide more knowledge coverage.
Kim, D. &. (2016). Fundamentals of information systems security. Jones & Bartlett Publishers.
This is a book that focusses on new, threats, vulnerabilities and risks in a digital world.
The need for information security has been brought about by the need to integrate the internet
and broadband communications. In addition to this, organizations are enforced to take into
account the compliance laws required to secure and protect privacy data and also reduce liability.
In this book, David Kim takes the readers through the fundamentals of the information security
adapted from the official (ISC) 2 SSCP CBK) Study Guide. It is also intended to all those
individuals who aspire to acquire a System Security Certified Professional certification which
enables users with the readers with more details in compliance laws, education, and careers. The
Network Security Policy_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents