Description
Network security refers to measures to protect a computer network from intrusions, attacks, and other malicious activities. These measures generally focus on ensuring the CIA triad: Confidentiality, Integrity, and Availability of data. This presentation dives into the different types of systems used to detect and prevent network intrusions.
This course is a part of IT Audit Bytes series. The other Segments of this series are:
- IT Audit Bytes – Access Control
- IT Audit Bytes – Backup and Recovery
- IT Audit Bytes – Change Management
- IT Audit Bytes – Cybersecurity
- IT Audit Bytes – Data Loss Prevention
- IT Audit Bytes – Disaster Recovery and BCP
- IT Audit Bytes – IT Control Frameworks
- IT Audit Bytes – Job Monitoring
- IT Audit Bytes – Logging and SEIM
- IT Audit Bytes – Network Security and Detection
- IT Audit Bytes – Password Management
- IT Audit Bytes – Physical Security
- IT Audit Bytes – Provisioning and Deprovisioning
- IT Audit Bytes – SDLC Controls
- IT Audit Bytes – Security Awareness Training
- IT Audit Bytes – Separation of Duties Controls
- IT Audit Bytes – SOC Reports
- IT Audit Bytes – Strategy and Governance
- IT Audit Bytes – Third-Party IT Risk Management (TPRM)