In this chapter, we learned about the identification of network-related risks and pertinent controls. We discussed different components of the network, including repeaters, hubs, switches, routers, and firewalls. We also learned about the basic structure of OSI layers and network physical media.
In the next chapter, we will discuss cryptography and other emerging technologies, such as cloud computing, mobile computing, virtualization, and the Internet of Things. In cryptography, we will discuss the elements of public key infrastructure and the functions of symmetric as well as asymmetric keys.