ICS2 Flashcards
IS and Data Mgmt
SOC 2
System and Organization Controls engagements that examination of service orgs system of internal controls as it relates to the AICPA’s five Trust Service Criteria.
Trust Service Criteria
Security, availability, processing integrity, confidentiality, and privacy
Network infrastructure
refers to hardware, software, layout, topology of network resources that enable connectivity and communciation between devices
Modem
Connects network to internet service provider network through cable connection - receives analog signals and translates those into digital signals. Each modem has a public IP address.
Router
Manager network traffic by connecting devices to form a network.
Read source and destination fields in information packet headers to determine the best path for the packet to travel.
Act as a link between modem and switches or if no switches a user’s device.
Switches
similar to routers they can connect and divide devices w/in a network - turns one network jack into many so mulitple device can share one network connection.
does not assign IP.
Gateways
a computer/device acts as an intermediary between different networks.
Transforms data from one protocol into another so info can flow between networks.
Gateways interpret protocols and coverts the them into the right format to facilitate network movement, usually between company network and internet.
Protocol
Rule, or set of rules, that governs the way in which information is transmitted
TCP/IP
type of protocol used by internet- transmission control protocol/internet protocol.
Edge-enabled devices
allow computing, storage and networking functions closer to devices where data/system request originates - makes for faster response time.
Servers
physical/virtual machines that coordinate computers, programs, and data that are part of a network.
Client/server model - client sends request to server and it provides a response to executes an action.
Firewall
Software or hardware that protect a person or network traffic by filtering it through security protocols w/ rules.
Designed to prevent unauthorized access and downloading of malicious programs or access restricted sights
can be set up to only allow trusted sources
Circuit level gateway firewall
verifies source of packet and meets rules/policies set by security team
application level gateway
inspects packet itself - resource intensive and may slow performance
network address translation firewall
assigns internal network address to specific, approve external sources so those sources are approved
stateful multilayer inspection firewall
combines packet filtering and network address translation
next-gen firewall
assigns different firewall rule to different applications as well as users.
Bus Topology
- linear or tree form with each node connected to a single line or cable.
-Any node can send data at same time and cause interference so cables must be terminated at each end.
-Downside if central line is compromised- entire network offline
Mesh Topology
- there are numerous connections between nodes, with all nodes begin connected in a full mesh and some in a partial mesh.
-Common for wireless networks - Allows for high levels of traffic and promotes network stability if node is damaged.
-Costly
DIAMOND shaped
Ring Topology
- nodes connected in circular path, data must go through all devices between source and destination.
- Can be uni or multi directional
-Advantage is data transmission collision is minimized or eliminated, but can result in slow performance.
Star Topology
- Data passes through central hub that acts as a switch or server then transmits to peripheral device that act as client
- Can be mulitple hubs so if one fails on some nodes be affected
-Easier to ID damaged cables.
Network Infrastructure Protocols
governs the way data is transmitted based on method used (cable, port).
Open System Interconnection model
- Developed by ISO and explains how protocols work and how devices communicate w/ each other.
-Segregates network functions into 7 layers, each responsible for specific data exchange function
Open System Interconnection model layers
Encapsulation
Decapsulation
Data flows through each later through encapsulation which adds a header/footer to the data point received from the previous layer. Starts at application layer with a message down to the physical layer. There decapsulation begins moving up to application
- Application
- Presentation
- Session
- Transport
- Network
- Data Link
- Physical - actual network device use to transmit message