O'Reilly logo

IT Auditing: Using Controls to Protect Information Assets by Kevin Wheeler, Mike Schiller, Chris Davis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5Auditing Routers, Switches, and Firewalls

The network is the fundamental backdrop of your IT operations infrastructure, allowing data to transverse between users, data storage, and data processing. Routers, switches, and firewalls work together to enable data transfer while protecting networks, data, and end users. This chapter discusses how to review these critical pieces of your infrastructure while helping you to do the following:

• Unravel the complexity of network equipment.

• Understand critical network controls.

• Review specific controls for routers, switches, and firewalls.

Background

Routers, switches, and firewalls join and protect our networks, but how did we end up with this interconnected network of devices?

It started ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required