The hardening and configuration of network and endpoint devices is very important from the perspective of information security. An IS auditor should therefore be aware of the basic functioning and capability of network devices to evaluate the risk and control related to such devices. Hence, in this section, we will identify the risks associated with network security and related controls.
Open system interconnection (OSI) layers
The OSI model explains the layered steps for the network. In an OSI model, each layer is defined according to a specific function to perform. All seven layers work in a collaborative manner to transmit the data from one layer to another. The following table shows the functions of each layer:
Layer | Name | Descriptions |
1st | Physical Layer |
|
2... |