Reader small image

You're reading from  CISA – Certified Information Systems Auditor Study Guide - Second Edition

Product typeBook
Published inJun 2023
PublisherPackt
ISBN-139781803248158
Edition2nd Edition
Right arrow
Author (1)
Hemang Doshi
Hemang Doshi
author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Right arrow

Network Security and Control

Network security and control is an important aspect of an IS audit. In this chapter, you will explore various components of the network, the OSI layer, and other security aspects of networking. You will learn about the functions of each type of firewall. This chapter also deals with the Virtual Private Network (VPN) and Voice over Internet Protocol (VoIP).

The following topics will be covered in this chapter:

  • Network and endpoint devices
  • Firewall types and implementation
  • VPN
  • VoIP
  • Wireless networks
  • Email security

By the end of this chapter, you will be able to understand and evaluate various risks and controls related to networking.

Network and Endpoint Devices

The hardening and configuration of network and endpoint devices are very important from the perspective of information security. An IS auditor should therefore be aware of the basic functioning and capability of network devices to evaluate the risk and control associated with them. In this section, we will identify the risks associated with network security and related controls.

Open System Interconnection (OSI) Layers

The OSI model explains the layered steps of the network. In an OSI model, there are seven layers, and each layer is defined according to a specific function to be performed. All these layers collaborate to transmit the data from one layer to another. The following table shows the functions of each layer:

Firewall Types and Implementation

A firewall is a network security system designed to prevent unauthorized access to networks. It monitors and controls incoming and outgoing network traffic as per the defined rules. A firewall can be implemented either in software or hardware form.

The prime objective of a firewall is to allow only authorized uses of the system and network and thereby restrict unauthorized access.

The CISA Review Manual covers the following types and implementations of firewalls:

Layer

Name

Description

1st

Physical layer

The physical layer...

...

VPN

A VPN is used to extend a private network through the use of the internet in a secure manner. It provides a platform for remote users to get connected to the organization’s private network.

The prime objective of VPN technology is to enable remote users and branch offices to access applications and resources available in private networks of organizations. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or tunneling protocols.

VPN technology, if properly configured, will reduce the risk associated with sensitive data traveling in an open public network.

Types of VPN

The following are some of the VPN connection types:

Types of Firewall

Types of Firewall Implementation

Packet Filtering Router

Dual-Homed Firewall

Stateful Inspection

Screened-Host Firewall

Circuit Level

Screened-Subnet Firewall

Application-Level

Voice over Internet Protocol (VoIP)

VoIP is the transmission of voice and other content over IP networks. It is also known as IP telephony or internet telephony. It is made possible by digitalizing sounds into IP packets and transmitting them through a network layer where they are again decoded to sound. VoIP is a cost-effective solution for long-distance calls. VoIP can be operated from IP infrastructure and very little additional telephony infrastructure is required.

A CISA aspirant is required to understand the following aspects of VoIP:

  • It is very important to consider a backup arrangement for a VoIP system as data traffic normally has less reliability. A backup arrangement is required to ensure that communication is not interrupted in case of an undesirable event impacting the network service.
  • Bandwidth capacity should be determined for voice traffic to ensure the quality of the service.
  • VoIP infrastructure should be designed in consideration of laws and regulations...

Wireless Networks

A network connection not involving the use of a cable or wire is known as a wireless network. A wireless network is a computer network that uses wireless data connections between communication endpoints (nodes). Cell phone networks and wireless local area networks are examples of wireless networks.

CISA aspirants should be aware of the following controls regarding the protection of wireless (Wi-Fi) security:

  • Enabling MAC filtering
  • Enabling encryption
  • Disabling SSID
  • Disabling DHCP

Enabling MAC Filtering

Each system/PC/laptop/mobile has a unique identification number, which is known as the MAC address. This control allows access to only selected and authorized devices. Hence, the router restricts other unauthorized devices from accessing the network. Blacklist features can be used to specifically reject some MAC addresses.

A router has the option to enable MAC filtering, as indicated in the following screenshot:

Figure 10.7: MAC filtering ...

Email Security

In this digital world, email is a widely used mode of official communication for both internal and external stakeholders. A lot of critical and sensitive information is shared through email. It is very important to secure email communication.

The following are some email-related risks and controls:

  • Relying only on SMTP is not relatively secure as email security requires an end-to-end method, such as the use of digital signatures or the use of integrity checks at the transport level.
  • Social engineering attacks such as phishing and spear phishing can be addressed through security awareness training of employees.
  • Email attachments should be scanned by anti-malware software.
  • Users should be trained on the security aspect of using email.
  • Mail servers should be properly hardened and configured as per the organization’s security policy and guidelines.
  • The implementation of encryption technologies to protect user authentication and mail...

Summary

In this chapter, you learned about the identification of network-related risks and pertinent controls. You explored different components of the network, including repeaters, hubs, switches, routers, and firewalls. You also learned about the basic structure of OSI layers and network physical media.

The following are some important topics you covered in this chapter:

  • Optical fiber is a thin and flexible piece of fiber made of glass or plastic. Fiber-optic cables are considered to be more secure than copper wire. Fiber optics is the preferred choice for managing long-distance networks and handling high volumes of data. They are not impacted or affected by EMI and have very marginal transmission loss.
  • The most stringent and robust configuration setting in firewall rules is “deny all traffic and allow specific traffic” (as opposed to “allow all traffic and deny specific traffic”). This restricts unknown traffic from entering critical systems...

Chapter Review Questions

Before you proceed to Chapter 11, Public Key Cryptography and Other Emerging Technologies, it is recommended that you solve the practice questions from this chapter first. These chapter review questions have been carefully crafted to reinforce the knowledge you have gained throughout this chapter. By engaging with these questions, you will solidify your understanding of key topics, identify areas that require further study, and build your confidence before moving on to new concepts in the next chapter.

Note

A few of the questions may not be directly related to the topics in the chapter. They aim to test your general understanding of information systems concepts instead.

The following image shows an example of the practice questions interface.

Figure 10.9: CISA practice questions interface

Figure 10.9: CISA practice questions interface

To access the end-of-chapter questions from this chapter, follow these steps:

  1. Open your web browser and go to https://packt...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
CISA – Certified Information Systems Auditor Study Guide - Second Edition
Published in: Jun 2023Publisher: PacktISBN-13: 9781803248158
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Author (1)

author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Type

Description

A remote access VPN

Through a remote VPN, authorized users can connect to the corporate network from anywhere.

A VPN ensures that information...