IT Examiner School, Palm Springs, CA

Module Key Points (cont.)

Vulnerability Assessments  and Penetration Tests should  be performed annually

• Used for daily IT activities, e.g., email, etc. • Store Customer/FI data, e.g. databases, etc. • Link FI with Core Processor • Provide access to various applications, e.g., word, excel, etc.

Networks handle key  functions within an FI

Topologies take many forms  & some are more complex  than others

If you need assistance,  contact an IT Specialist

Summary

Network topologies  should be updated  regularly or when  changes to the  network occur.

Risk assessments for  networks should be  performed annually

Vulnerability  Assessments and Pen  Tests should be  performed annually

Appropriate  monitoring deployed

Made with FlippingBook - professional solution for displaying marketing and sales documents online