Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Network Security

Welcome to the Network Security topic!

Collaborate, contribute, consume and create knowledge around topics that include prevention and monitoring of unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
693 Members
0 Online
9743 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 44 total

Must be a Topic member to contribute
View All »
ISACA is launching a new platform to host our Online Discussion Forums soon. We are very excited for everyone to experience the new Engage portal that will include faster load times, better search features, more networking capabilities and so much more. W...
Daniel362 | 8/14/2018 7:52:35 AM | COMMENTS(0)
Hello, New punchclock installed. Shall communicate punchtimes directly/online to Service Provider. Service Provider provides data on how to enable Firewall opening. But not possible for dynamic IP. How to Approach?
Karin007 | 6/26/2018 7:36:39 AM | COMMENTS(2)
Hi there,  Is anyone aware of any resources that provides guidance on setting minimum standards for network security, VPN configuration etc?  Whilst i can and have been self generating minimum standards for my company of 1000 staff, i know colleagues with...
Jagdeep397 | 6/25/2018 2:02:36 PM | COMMENTS(2)
Dear Team, I have been in the security field for 5 years and in the IT industry for 12 years in total, can i be granted the CISA certification credential with my security experience? Kind Regards Benjie
Benjamin Bvalani | 4/29/2018 1:30:41 PM | COMMENTS(0)
Can anyone recommend some good sources of annotated (labeled) datasets for network security tests and ML?
Dragan Pleskonjic | 4/19/2018 4:29:20 AM | COMMENTS(3)
Looking for some guidance on developing an audit program for a large audit of telephony infrastructure. What are the key risks in this area? Focusing on intenal telephony, VOIP and excluding mobile. Interested in hacking of telephone lines and denial of s...
Phil Doyle | 1/25/2018 10:37:25 AM | COMMENTS(3)

Documents & Publications: 16 total

Must be a Topic member to contribute
View All »
Posted by ISACA 941 days ago
Posted by ISACA 948 days ago
Posted by ISACA 1343 days ago
shiny security tools with the latest bells and whistles mesmerize people. Too many companies deploy these tools without analyzing how the technology will be used or integrated with their security management structure
Posted by nooruddin 1456 days ago
Posted by ISACA 1530 days ago

Events & Online Learning: 2 total

14 Mar 2016
ISACA International Event
Miami, FL, USA
7 May 2018
ISACA International Event
Philadelphia, PA, USA

Journal Articles: 11 total

Volume 3, 2018
by Charles Hale, CCNA, CISSP, MCSE
With the aggressive pace at which data have grown and the need for constant real-time access becoming the norm, paying increased attention to securing networks and data has become critical.
Volume 6, 2017
by Marcin Jekot, CISSO, ISO 27001 LA, SSP and Yiannis Pavlosoglou, Ph.D., CISSP
Never has such an abstract concept of “things” taken to the consumer market so quickly. From printers to thermostats to washing machines and cars, devices are being rushed and fitted with wireless interfaces.
Volume 1, 2017
by Ravid Circus
Enterprises need to think of their entire network infrastructure—physical, virtual and cloud—in the same way that attackers do: a very large, diverse and geographically dispersed attack surface...
Volume 1, 2017
by Tatu Ylonen
Secure Shell (SSH), also known as Secure Socket Shell, is a cryptographic network protocol for operating network services securely over an unsecured network.
Volume 4, 2016
by Tony Wang
The growth in connected devices that could reside anywhere in the world has increased the complexity and difficulty of managing them and the related network traffic.
Volume 4, 2016
by Trevor J. Dildy, CCNA
Network access control (NAC) is the technique for network management and security that enforces policy, compliance and management of access control to a network.

Wikis: 2 total

Blog Posts: 13 total

Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 5 comments
16 Jan 2018
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions has been built to harness the ‘wisdom of crowds’....
Posted By : Dragan Pleskonjic | 3 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
Liechtensteins Teilnahme an der 'European Cybersecurity Challenge' in DüsseldorfEdit articleUm was geht es genau?Die European Cybersecurity Challenge ist ein Wettbewerb für Nachwuchskräfte aus dem Bereich IT / InfoSec die sich für Cybersecurity interessie...
Posted By : Peter Huerlimann | 0 comments
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 1 comments