Comptia Security+ Domain 4

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/158

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

159 Terms

1
New cards

Secure baselines

  • The security of an app environment should be well defined

  • Integrity measurements check for the secure baseline

2
New cards

Establishing baselines

  • Create a series of baselines

  • Security baselines are often available from the manufacturer

    • App dev

    • OS manufacturer

    • Appliance manufacturer

  • Many OS’s have extensive options

3
New cards

Deploying baselines

  • Have established detailed security baselines

  • Deploy the baselines

  • May require multiple deployment mechanisms

  • Automations is key

4
New cards

Maintaining baselines

  • Many of these are best practices

  • Other baselines may require ongoing updates

  • Test and measure to avoid conflicts

5
New cards

Hardening targets

  • No system is secure with default configs

  • Hardening guides are specific to software or platform

6
New cards

Mobile device hardening

  • Updates are critical

  • Segmentation can protect data

  • Control with an MDM (Mobile Device Manager)

7
New cards

Workstations hardening

  • User desktops and laptops

  • Constant monitoring and updates

  • Automate monthly patches

  • Connect to a policy management system

    • Active directory

  • Remove unnecessary software

8
New cards

Network infrastructure hardening

  • Switches, routers, etc.

  • Purpose-built devices

    • Embedded OS, etc.

  • Configure authentication

    • Don’t use defaults

  • Check with manufacturer

9
New cards

Cloud infrastructure hardening

  • Least privilege

  • Configure Endpoint Detection and Response (EDR)

  • Always have backups

    • Cloud to Cloud (C2C0

10
New cards

Server hardening

  • Many and varied

  • Updates

  • User accounts

  • Network access and security

  • Monitor and secure

11
New cards

SCADA/ICS hardening

  • PC manages equipment

  • Requires extensive segmentation

12
New cards

Embedded systems hardening

  • Can be difficult to upgrade

  • Correct vulnerabilities

  • Segment and firewall

13
New cards

RTOS (Real-Time OS) hardening

  • Isolate the system

  • Run with minimum services

  • Use secure communication

14
New cards

IoT device hardening

  • Weak defaults

  • Deploy updates quickly

  • Segmentation

15
New cards

Site surveys

  • Determine existing wireless landscape

  • Identify existing access points

  • Work around existing frequencies

  • Plan for ongoing site surveys

  • Heat maps

    • Identify wireless signal strengths

16
New cards

Wireless survey tools

  • Signal coverage

  • Potential interference

  • Built-in tools

  • 3rd-party tools

  • Spectrum analyzer

17
New cards

MDM (Mobile Device Manager)

  • Manage company-owned and user-owned mobile devices

  • Centralized management of the mobile devices

  • Set policies on apps, data, camera, etc.

  • Manage access control

18
New cards

BYOD

  • Bring own device

  • Employee owns the device

  • Difficult to secure

19
New cards

COPE

  • Corporate owned, personally enabled

  • Organization keeps full control of the device

  • Info is protected using corporate policies

  • CYOD (Choose your own device)

20
New cards

Cellular networks

  • Mobile devices

  • Separate land into “cells”

  • Security concerns

    • Traffic monitoring

    • Location tracking

    • Worldwide access to a mobile device

21
New cards

Wi-Fi

  • Local network access

  • Same security concerns as other Wi-Fi devices

  • Data capture

  • On-path attack

  • Denial of service

22
New cards

Bluetooth

  • High-speed communication

  • Connects our mobile devices

  • Don’t connect to unknown Bluetooth devices

23
New cards

Securing a wireless network

  • An organization’s wireless network can contain confidential info

  • Authenticate users before granting access

  • Ensure all communication is confidential

  • Verify the integrity of all communication

    • Message Integrity Check (MIC)

24
New cards

WPA2 PSK problem

  • Has a brute-force problem

    • Listen to 4-way handshake

    • Capture the hash

  • With hash, attackers can brute force the pre-shared key (PSK)

  • Has become easier as technology improves

  • Once you have the PSK, you have everyone’s wireless key

25
New cards

WPA3 and GCMP

  • GCMP block cipher mode

  • GCMP security services

    • Data confidentiality with AES

    • MIC with GMAC

26
New cards

SAE

  • WPA3 changes the PSK authentication process

    • Creates a shared session key without sending key across the network

  • Simultaneous Authentication of Equals

    • A Diffie-Hellman derived key exchange with an authentication component

    • An IEEE standard - the dragonfly handshake

27
New cards

Wireless authentication methods

  • Credentials

    • PSK

    • Centralized authentication (802.1X)

  • Configuration

28
New cards

Open System

No authentication password is required

29
New cards

WPA3-Personal / WPA3-PSK

  • WPA2 or WPA3 with a pre-shared key

  • Everyone uses the same 256-bit key

30
New cards

WPA3-Enterprise / WPA3-802.1X

Authenticates users individually with an authentication server (i.e., RADIUS)

31
New cards

AAA Framework

  • Identification - Who you claim to be (username)

  • Authentication - Prove you are who you say you are (password)

  • Authorization - What access you have

  • Accounting - Resources used

32
New cards

RADIUS (Remote Authentication Dian-in User Service)

  • One of the more common AAA protocols

  • Centralize authentication for users

  • Available on almost any server OS

33
New cards

IEEE 802.1X

  • Port-based Network Access Server (NAC)

  • Used in conjunction with an access database

    • RADIUS, LDAP, TACACS+

34
New cards

EAP (Extensible Authentication Protocol)

  • Many different ways to authenticate based on RFC standards

  • Integrates with 802.1X

35
New cards

Secure coding concepts

  • A balance between time and quality

  • Testing

  • Vulnerabilities will eventually be found

36
New cards

Input validation

  • What the expected input is

  • Document all input methods

  • Check and correct all input (normalization)

  • Fuzzers will find what you missed

37
New cards

Secure cookies

  • Info stored on your computer by the browser

  • Used for tracking, personalization, session management

  • Have a secure attribute set

  • Sensitive info should not be saved in a cookie

38
New cards

Static code analysis

  • Many security vulnerabilities found easily

  • Not everything can be analyzed through this

  • Still have to verify each finding

39
New cards

Code signing

  • An app is deployed

  • Questions:

    • Has app been modified?

    • App was written by a specific dev?

  • The app code can be digitally signed by the dev

    • Asymmetric encryption

    • Trusted CA signs dev’s public key

    • Dev signs the code with their private key

    • For internal app, use own CA

40
New cards

Sandboxing

  • Apps can’t access unrelated sources

  • Commonly used in development

  • Used in many different deployments

    • VMs

    • Mobiles devices

    • Browser iframes (inline frames)

    • Windows User Account Control (UAC)

41
New cards

Acquisition/procurement process

  • Purchasing process

  • Start with request from the user

  • Negotiate with suppliers

  • Purchase, invoice, and payment

42
New cards

Assignment/accounting

  • A central tracking system

  • Ownership

    • Associate a person with an asset

  • Classification

    • Type of asset

    • Hardware (capital expenditure)

    • Software (operating expenditure)

43
New cards

Monitoring/asset tracking

  • Inventory every asset

  • Associate a support ticket with a device make and model

  • Enumeration

    • List all parts of an asset

  • Add an asset tag

44
New cards

Media sanitization

  • System disposal or decommissioning

  • Different use cases

    • Clean hard drive for future use

    • Permanently delete a single file

  • One-way trip

  • Reuse the storage media

45
New cards

Physical destruction

  • Shredder/pulverizer

  • Drill/Hammer

  • Electromagnetic (degaussing)

  • Incineration

46
New cards

Certificate of destruction

  • Destruction is often done by 3rd party

  • Need confirmation that data is destroyed

  • A paper trail of broken data

47
New cards

Data retention

  • Backup your data

  • Regulatory compliance

  • Operational needs

    • Accidental deletion

    • Disaster recovery

  • Differentiate by type and application

48
New cards

Vulnerability scanning

  • Usually minimally invasive

  • Port scan

  • Identify systems

  • Test from outside and inside

  • Gather as much info as possible

49
New cards

Dynamic analysis (fuzzing)

  • Send a random input to an application

  • Looking for something out of the ordinary

50
New cards

Fuzzing engines and frameworks

  • Very time and processor resource heavy

  • Carnegie Mellon Computer Emergency Response Team (CERT)

51
New cards

Package monitoring

  • Some apps are distributed in a package

  • Confirm the package is legitimate

  • Confirm a safe package before deployment

52
New cards

OSINT (Open-source intelligence)

  • Open-source

  • Internet

  • Government data

  • Commercial data

53
New cards

Proprietary/3rd-party intelligence

  • Someone else already compiled the threat info

  • Threat intelligence services

  • Constant threat monitoring

54
New cards

Info-sharing organization

  • Public threat intelligence

  • Private threat intelligence

  • Need to share critical security details

  • Cyber Threat Alliance (CTA)

55
New cards

Dark web intelligence

  • Hacking groups and services

  • Monitor forums for activity

56
New cards

CVSS

  • National Vulnerability Database

  • Common Vulnerability Scoring System

  • Industry collaboration

57
New cards

CVE

  • Vulnerabilities can be cross-referenced online

  • Some vulnerabilities can’t be definitively identified

58
New cards

Exposure factor

  • Loss of value or business activity if the vulnerability is exploited

  • A small DDoS may limit access to a service

  • A buffer overflow may completely disable a service

  • A consideration when prioritizing

59
New cards

Environmental variables

  • Prioritization and patching frequency

  • Every environment is different

60
New cards

Risk tolerance

Amount of risk acceptable to an organization

61
New cards

Patching

  • Most common mitigation technique

  • Scheduled vulnerability / patch notices

  • Unscheduled patches

    • Zero-day

  • Ongoing process

62
New cards

Insurance

  • Cybersecurity insurance coverage

  • Doesn’t cover everything

    • Intentional acts, fund transfers, etc.

  • Ransomware has increased popularity of cybersecurity liability insurance

63
New cards

Segmentation

  • Limit scope of exploit

  • A breach would have limited scope

  • Can’t patch?

    • Disconnect from the world

    • Air gaps may be required

  • Use internal NGFWs

64
New cards

Compensating controls

  • Optimal security methods may not be available

  • Disable problematic service

  • Revoke access to the app

  • Limit external access

  • Modify internal security controls and software firewalls

  • Provide coverage until a patch is deployed

65
New cards

Exceptions and exemptions

  • Removing vulnerability is optimal

  • A balancing act

  • Not all vulnerabilities share the same severity

66
New cards

Validation of remediation

  • Rescanning

  • Audit

  • Verification

67
New cards

Reporting

  • Ongoing checks required

  • Difficult (or impossible) to manage without automation

  • Continuous reporting

    • # of identified vulnerabilities

    • Systems patched vs unpatched

    • New threat notifications

    • Errors, exceptions, and exemptions

68
New cards

Monitoring computing resources

  • Systems

    • Authentication

    • Server monitoring

  • Apps

    • Availability

    • Data transfers

    • Security notifications

  • Infrastructure

    • Remote access systems

    • Firewall and IPS reports

69
New cards

Log aggregation

  • SIEM or SEM

  • Centralized reporting

  • Correlation between diverse systems

70
New cards

Archiving

  • Take an average of about 9 months for a company to identify and contain a breach

  • Access to data is critical

    • Archive over an extended period of time

  • May have a mandate

71
New cards

Alerting

  • Real-time notifications of security events

  • Actionable data

  • Notification methods: SMS/text, Email, SOC

72
New cards

Alert response and remediation

  • Quarantine

  • Alert tuning

  • Alert should be accurate

73
New cards

SCAP (Security Content Automation Protocol)

  • Many different security tools on the market

    • NGFWs, TPS, vulnerability scanners, etc.

  • Managed by the National Institute of Standards and Technology (NIST)

  • Allows tools to identify and act on the same criteria

74
New cards

Using SCAP

  • Can be shared between tools

  • Useful in large environments

  • The specification standard enables automation

75
New cards

Automation types

  • Ongoing maintenance

  • Notification and alerting

  • Remediation of noncompliant systems

76
New cards

Benchmarks

  • Apple security best-practices to everything

  • Example: mobile device

    • Disable screenshots, screen recordings, prevent voice calls when locked, etc.

  • Center for Internet Security (CIS)

77
New cards

Agents/agentless

  • Check to see if the device is in compliance

  • First one can usually provide more detail

  • Other one runs without a formal install

78
New cards

SIEM

  • Log collection of security alerts

  • Log aggregation and long-term storage

  • Data correlation

  • Forensic analysis

79
New cards

DLP (Data Loss Prevention)

  • Stop the data before the attacker gets it

  • So many sources, so many destinations

80
New cards

SNMP (Simple Network Management Protocol)

  • Database of data (MIB) - Management Info Base

  • Contains OIDs - Object Identifiers

  • Poll devices over UDP/161

  • Request stats from a device

  • Poll devices at fixed intervals

81
New cards

SNMP traps

  • Can be configured on the monitored device

    • Over UDP/162

  • Set a threshold for alerts

    • If number of CRC alerts increases by 5, send a trap

    • Monitoring station can react immediately

82
New cards

NetFlow

  • Gather traffic stats from all traffic flows

  • Probe and collector

  • Usually separate reporting app

83
New cards

Probe

Watches network communication

84
New cards

Collector

Summary records are sent to this

85
New cards

Screened subnet

Additional layer of security between you and the Internet

86
New cards

IPS rules

  • Signature-based

    • Look for a perfect match

  • Anomaly-based

    • Unusual traffic patterns are flagged

87
New cards

URL scanning

  • Allow or restrict based on URL

  • Managed by category

  • Can have limited control

  • Often integrated into an NGFW

88
New cards

Agent based

  • Install client software on the user’s device

  • Users can be located anywhere

  • Updates must be distributed to all agents

89
New cards

Reputation

  • Filter URLs based on perceived risk

  • Automated and manual setting

90
New cards

DNS filtering

  • Before connecting to a website, get the IP

  • DNS is updated with real-time threat intelligence

  • Harmful sites aren’t resolved

  • Works for any DNS lookup

91
New cards

Active Directory

  • A database of everything on the network

  • Windows-based

  • Manage authentication

  • Centralized access control

  • Commonly used by the help desk

92
New cards

Group policy

  • Manage computers or users with Group Policies

  • A central console

    • Login scripts

    • QoS

    • Security parameters

  • Comprehensive control

93
New cards

Security-Enhanced Linux (SELinux)

  • Security patches for the Linux kernel

    • Adds MAC to Linux

    • Linux traditionally uses DAC

  • Limits app access

    • Least privilege

94
New cards

Unencrypted network data

  • Telnet, FTP, SMTP, IMAP

  • Verify with a packet capture

95
New cards

802.11 Wireless

Open access point - No transport-level encryption

WPA3: All user data is encrypted

96
New cards

Mail gateway

  • Evaluates source of the inbound email messages

  • Blocks it at gateway before it reaches the user

  • On-site or cloud-based

97
New cards

SPF (Sender Policy Framework)

  • Server configures a list of all servers authorized to send emails for a domain

  • List of authorized mail servers are added to a DNS TXT record

98
New cards

DKIM (Domain Keys Identified Mail)

  • A mail server digitally signs all outgoing mail

    • Public key is in the DKIM TXT record

  • Signature is validated by the receiving mail servers

99
New cards

DMARC (Domain-based Message Authentication Reporting, and Conformance

  • Extension of SPF and DKIM

  • Domain owner decides what receiving email servers should do with emails not validating using SPF and DKIM

  • Compliance reports are sent to the email administrator

100
New cards

FIM (File Integrity Monitoring)

  • Some files change all the time

  • Monitor important OS and app files

  • Windows  SFC (System File Checker)

  • Linux - Tripwire

  • Many host-based IPS options