Network and Endpoint Devices
The hardening and configuration of network and endpoint devices are very important from the perspective of information security. An IS auditor should therefore be aware of the basic functioning and capability of network devices to evaluate the risk and control associated with them. In this section, we will identify the risks associated with network security and related controls.
Open System Interconnection (OSI) Layers
The OSI model explains the layered steps of the network. In an OSI model, there are seven layers, and each layer is defined according to a specific function to be performed. All these layers collaborate to transmit the data from one layer to another. The following table shows the functions of each layer:
Layer |
Name |
Description |
1st |
Physical layer |
The physical layer... |