Skip to Main Content
IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition
book

IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

by Chris Davis, Mike Schiller, Kevin Wheeler
February 2011
Intermediate to advanced content levelIntermediate to advanced
512 pages
15h 37m
English
McGraw-Hill
Content preview from IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

CHAPTER 5Auditing Routers, Switches, and Firewalls

The network is the fundamental backdrop of your IT operations infrastructure, allowing data to transverse between users, data storage, and data processing. Routers, switches, and firewalls work together to enable data transfer while protecting networks, data, and end users. This chapter discusses how to review these critical pieces of your infrastructure while helping you to do the following:

• Unravel the complexity of network equipment.

• Understand critical network controls.

• Review specific controls for routers, switches, and firewalls.

Background

Routers, switches, and firewalls join and protect our networks, but how did we end up with this interconnected network of devices?

It started ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Legal and Privacy Issues in Information Security, 3rd Edition

Legal and Privacy Issues in Information Security, 3rd Edition

Joanna Lyn Grama
Auditing IT Infrastructures for Compliance, 3rd Edition

Auditing IT Infrastructures for Compliance, 3rd Edition

Robert Johnson, Marty Weiss, Michael G. Solomon

Publisher Resources

ISBN: 9780071742382