Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Network Security

Welcome to the Network Security topic!

Collaborate, contribute, consume and create knowledge around topics that include prevention and monitoring of unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
675 Members
0 Online
0 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 42 total

Must be a Topic member to contribute
View All »
Dear Team, I have been in the security field for 5 years and in the IT industry for 12 years in total, can i be granted the CISA certification credential with my security experience? Kind Regards Benjie
Benjamin Bvalani | 4/29/2018 1:30:41 PM | COMMENTS(0)
Hi there,  Is anyone aware of any resources that provides guidance on setting minimum standards for network security, VPN configuration etc?  Whilst i can and have been self generating minimum standards for my company of 1000 staff, i know colleagues with...
Jagdeep397 | 4/22/2018 1:53:25 PM | COMMENTS(0)
Can anyone recommend some good sources of annotated (labeled) datasets for network security tests and ML?
Dragan Pleskonjic | 4/19/2018 4:29:20 AM | COMMENTS(3)
Looking for some guidance on developing an audit program for a large audit of telephony infrastructure. What are the key risks in this area? Focusing on intenal telephony, VOIP and excluding mobile. Interested in hacking of telephone lines and denial of s...
Phil Doyle | 1/25/2018 10:37:25 AM | COMMENTS(3)
In 23 yrs as an IS Auditor I have done many technical tasks. In ISACA and other literature, I see NMAP listed as a free tool for network discovery/port scanning. I need to do an internal Network Administration and Security audit. I am hoping if you have u...
Chris A. Ward | 1/25/2018 10:25:49 AM | COMMENTS(2)
Understanding of Network & its changes is of utmost importance in a wide & dynamic environment. Can anyone recommend any automated agent less Network Discovery tools or solutions available in the market today for effective Network Visibility?
Ashish Paliwal | 1/14/2018 6:16:32 AM | COMMENTS(3)

Documents & Publications: 16 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 849 days ago
Books
Posted by ISACA 856 days ago
Books
Posted by ISACA 1251 days ago
shiny security tools with the latest bells and whistles mesmerize people. Too many companies deploy these tools without analyzing how the technology will be used or integrated with their security management structure
Posted by nooruddin 1364 days ago
Books
Posted by ISACA 1438 days ago

Events & Online Learning: 4 total

Journal Articles: 11 total

Volume 3, 2018
by Charles Hale, CCNA, CISSP, MCSE
With the aggressive pace at which data have grown and the need for constant real-time access becoming the norm, paying increased attention to securing networks and data has become critical.
Volume 6, 2017
by Marcin Jekot, CISSO, ISO 27001 LA, SSP and Yiannis Pavlosoglou, Ph.D., CISSP
Never has such an abstract concept of “things” taken to the consumer market so quickly. From printers to thermostats to washing machines and cars, devices are being rushed and fitted with wireless interfaces.
Volume 1, 2017
by Ravid Circus
Enterprises need to think of their entire network infrastructure—physical, virtual and cloud—in the same way that attackers do: a very large, diverse and geographically dispersed attack surface...
Volume 1, 2017
by Tatu Ylonen
Secure Shell (SSH), also known as Secure Socket Shell, is a cryptographic network protocol for operating network services securely over an unsecured network.
Volume 4, 2016
by Tony Wang
The growth in connected devices that could reside anywhere in the world has increased the complexity and difficulty of managing them and the related network traffic.
Volume 4, 2016
by Trevor J. Dildy, CCNA
Network access control (NAC) is the technique for network management and security that enforces policy, compliance and management of access control to a network.

Wikis: 2 total

Blog Posts: 13 total

Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: https://twitter.com/DPleskonjic/status/953608717399941120 It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 5 comments
16 Jan 2018
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’....
Posted By : Dragan Pleskonjic | 3 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: http://conwex.info/blog/. It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location http://www.dragan-pleskonjic.com/blog/. With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
Liechtensteins Teilnahme an der 'European Cybersecurity Challenge' in DüsseldorfEdit articleUm was geht es genau?Die European Cybersecurity Challenge ist ein Wettbewerb für Nachwuchskräfte aus dem Bereich IT / InfoSec die sich für Cybersecurity interessie...
Posted By : Peter Huerlimann | 0 comments
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 1 comments