IT Examiner School, Palm Springs, CA

Technology Overview • Networks require appropriate security – Virus/Malware/Spyware protection – Segregation of key segments, e.g. DMZ, etc. – Remote access, e.g. VPN, etc. – Data encryption as per risk assessment and data classification(s) • Must protect: – Key devices, e.g. Firewalls, Routers, etc. • Networks handle key functions within an FI – Used for daily IT activities, e.g., email, etc. – Store Customer/FI data, e.g. databases, etc. – Link FI with Core Processor – Provide access to various applications, e.g., word, excel, etc. • Topologies take many forms and some are more complex than others • If you need assistance, contact an IT Specialist

Made with FlippingBook - professional solution for displaying marketing and sales documents online