Page 122 - Courses
P. 122

IT Essentials — Assessing Infrastructure and Networks

            Some versions of these protocols have an additional security through encryption, signified by the
            letter “S,” such as SFTP, FTP via Secure Shell connection (SSH), or HTTPS. It is important for an
            organization to understand the applicable secure protocol requirements in relation to regulations,
            policies, and governing standards (e.g., NIST, Payment Card Industry [PCI] Data Security Standard
            [DSS]).

            Many IT professionals often speak in terms of the protocols implementing the functions required by
            the layer. A list of some of the protocols used at each layer is also offered as “protocols (or media)
            implementing this layer.” The example protocols are not exhaustive, but may help identify
            information resources or equivalencies and provide context. The Open System Interconnection
            Model (OSI) Seven-layer Model shows some of the common protocols used at each layer.

            For example, web services are performed at the Hypertext Transfer protocol Secure (HTTP) layer
            (layer 7). In addition, when network components (described on the next screen) are discussed, they
            are often identified as “performing” at a specific layer.

            Network Defense

            To fully comprehend network security as it relates to a network’s components and architecture, the
            concept of layered defense or defense in depth must be understood. This concept focuses on the
            premise that no single point of failure should cause the total compromise of security.





























            Layered Defense In Depth
            Source: IIA GTAG: “IT Essentials for Internal Auditors”

            Layered Defense or Defense In Depth

            Network defense ensures there are multiple layers of controls before a potential intruder can access
            sensitive information. These layers of controls usually exist across a network, servers, applications,


            Copyright © 2020 by The Institute of Internal Auditors, Inc. All rights reserved.
   117   118   119   120   121   122   123   124   125   126   127