Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Network Security

Welcome to the Network Security topic!

Collaborate, contribute, consume and create knowledge around topics that include prevention and monitoring of unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
626 Members
2 Online
9013 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 36 total

Must be a Topic member to contribute
View All »
Hello - Should a VOIP/SIP provider be responsible for providing a Service Organizations Control (SOC) report?
Casey760 | 6/9/2017 5:50:31 PM | COMMENTS(0)
Looking for some guidance on developing an audit program for a large audit of telephony infrastructure. What are the key risks in this area? Focusing on intenal telephony, VOIP and excluding mobile. Interested in hacking of telephone lines and denial of s...
Phil Doyle | 2/16/2017 12:14:06 PM | COMMENTS(1)
Hello. In the next month or two, I am going to do a review of our IT Department’s processes and procedures around network auditing. I want to learn more about what they’re doing in regards to vulnerability scanning, port scanning, penetration testing, ...
Alan S | 1/28/2017 9:48:07 PM | COMMENTS(4)
Hi all, I am looking for an in-depth comparison of remote desktop software from the information security perspective -- any hints where I can find current research results? Kind regards, Christian
Christian Focke | 1/28/2017 9:32:15 PM | COMMENTS(2)
Based on your work experience what are the best tools/softwarein each section?AuditEnterprise Security ManagementIT ForensicsPenetration Testing. VulnerabilityAssessment. Risk Assessmentencryption toolsRisk ManagementSecurity Event Managementthe recommend...
Elsayed | 1/28/2017 9:26:55 PM | COMMENTS(3)
Hi all, I am trying to create a Network Security Awareness Training for a team of Network administrators. Would appreciate your inputs on:If any one has a template available?What are the topics to be covered?Links to source materials? - I am getting a lot...
Jayesh | 3/10/2016 12:39:17 AM | COMMENTS(0)

Documents & Publications: 18 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 520 days ago
Books
Posted by ISACA 527 days ago
Books
Posted by ISACA 922 days ago
shiny security tools with the latest bells and whistles mesmerize people. Too many companies deploy these tools without analyzing how the technology will be used or integrated with their security management structure
Posted by nooruddin 1036 days ago
Books
Posted by ISACA 1109 days ago

Events & Online Learning: 4 total

Journal Articles: 9 total

Volume 1, 2017
by Tatu Ylonen
Secure Shell (SSH), also known as Secure Socket Shell, is a cryptographic network protocol for operating network services securely over an unsecured network.
Volume 1, 2017
by Ravid Circus
Enterprises need to think of their entire network infrastructure—physical, virtual and cloud—in the same way that attackers do: a very large, diverse and geographically dispersed attack surface...
Volume 4, 2016
by Tony Wang
The growth in connected devices that could reside anywhere in the world has increased the complexity and difficulty of managing them and the related network traffic.
Volume 4, 2016
by Trevor J. Dildy, CCNA
Network access control (NAC) is the technique for network management and security that enforces policy, compliance and management of access control to a network.
Volume 4, 2016
by Nikesh Dubey, CISA, CISM, CRISC, CCISO, CISSP
SDN refers to all of the protocols and technologies that work in synchrony to create a global view of the network and provide a centralized, intelligence-based network service, delivery and control.
Volume 6, 2015
by Norman Fenton and Martin Neil | Reviewed by Andrew Richardson, CISA, CISM, CRISC, MBCS, MCMI
For those looking to begin working with Bayesian networks, this book serves as an excellent starting point and provides guidance for readers on how to develop and run a Bayesian network model for risk assessment and decision making.

Wikis: 2 total

Blog Posts: 8 total

For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 1 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Based on recent Research with overseas Commercial Partners, and two Academic Institutions, some significant discoveries were made relating to Cyber Security Vulnerabilities which are being made public later in 2012, which will reveal issues relating to th...
Posted By : John379 | 0 comments
Organization as a best practice, conduct penetration testing on any new development that are being move to live.  However in actual life, the time taken by the vendor to close the application level vulnerability that are identified by the penetration te...
Posted By : Parthasarathy | 0 comments
Slowly are organization have started using web as a service delivery platform.   Various study reveals that the web as the most economical platform and branches / office being the most expensive platform for the delivery of service to customer. Further w...
Posted By : Parthasarathy | 0 comments