Cybersecurity – Part 4: Communications and Network security
|CPD Hours:||Attendance at this seminar will secure 1.5 hour/s verifiable CPD points including other professional bodies (SAICA, SAIBA, ACCA, IACSA, IRBA & etc)|
Network security is often described as the cornerstone of IT security. The network is a central asset, if not the most central, in most IT environments. Loss of network assurance (the combined properties of confidentiality, integrity, availability, authentication, and non-repudiation) on any level can have devastating consequences, while control of the network provides an easy and consistent venue of attack. Organizations are increasingly looking up to their auditors to provide independent assurance whether risks to the enterprise are managed well and advise thereon. With information technology becoming an inherent critical success factor for every business and the emerging threat landscape, there is significant urgency on auditors to equip themselves on IT audit essentials.
This series focuses on IT audit approaches relevant to auditors and the processes underlying risk-based IT audits.
• Ports and Protocols • Securing Desktops, Notebooks, Servers and Mobile Devices • Secure IOS-based Routers using automated features • Anti-spoofing and logging • Good Network Administration and securing • Switches and Routers • Firewalls • Multilayer Protocols • Securing Communication channels • Network attacks