IT Examiner School, Providence, RI
Module Key Points (cont.)
Vulnerability Assessments and Penetration Tests should be performed annually
• Used for daily IT activities, e.g., email, etc. • Store Customer/FI data, e.g. databases, etc. • Link FI with Core Processor • Provide access to various applications, e.g., word, excel, etc.
Networks handle key functions within an FI
Topologies take many forms & some are more complex than others
If you need assistance, contact an IT Specialist
Summary
Network topologies should be updated regularly or when changes to the network occur.
Risk assessments for networks should be performed annually
Vulnerability Assessments and Pen Tests should be performed annually
Appropriate monitoring deployed
Made with FlippingBook Annual report