CompTIA Security+

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/280

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

281 Terms

1
New cards

CompTIA

Computing Technology Industry Association

2
New cards

Security controls vid 2

3
New cards

Securirty controls

Security risks are out there

-many categoris/types

assets are also varied

-data, physical property, computer systems

prevent security events, minimize the impact, and limit damage

-security controls

4
New cards

Control categories

technical controls

-controls implemented using systems

-OS system controls

-firewalls, anti-virus

managerial controls

-administrative controls associated with security design and implementation

-security policies, standard operating procedure

operational controls

-controls implemented by people instead of systems

-security guards, awareness programs

physical controls

-limit physical access

-gaurd shack

-fences locks

-badges

5
New cards

preventive control types

preventive

-block access to a resource

-you shall not pass

prevent access

-firewall rules

-follow security policy

-gaurd shack checks all identification

-enable door locks

6
New cards

deterrent control type

deterrent

-discourage an intrusion attempt

-deos not directly prevent access

make an attack think twice

-application splash screens

-threat of demotion

-front reception desk

-post warning signs

7
New cards

detective control types

detective

- identify and log an intrusion attempt

- may not prevent access

find the issue

-Collect and review system logs

-review login reports

-regularly patrol the property

-enable motion detectors

8
New cards

corrective control types

Corrective

-Apply a control after an event has been detected

-Reverse the impact of an event

-Continue operating with minimal downtime

Correct the problem

-Restoring from backups can mitigate a ransomware infection

-Create policies for reporting security issues

-Contact law enforcement to manage criminal activity

-Use a fire extinguisher

9
New cards

compensating control type

compensating

-control using other means

-existing controls aren't sufficient

-may be temporary

prevent the exploitation of a weakness

-firewall blocks a specific application instead of patching the app

-implement a separation of duties

-require simultaneous guard duties

-generator used after power outage

10
New cards

directive control type

directive

-direct a subject towards security compliance

-a relatively weak security control

do this, please

-store all sensitive files in a protected folder

-create compliance policies and procedures

-train users on proper security policy

-post a sign for "authorized personnel only"

11
New cards

managing security controls

these are not inclusive lists

-there are many categories of control

-some organizations will combine types

There are multiple security controls for each category and type

- Some security controls may exist in multiple types or categories

-new security controls are created as systems and processes evolve

-your organization may use very different controls

12
New cards

CIA triad vid 3

13
New cards

The CIA Triad

Combination of principles

- the fundamentals of security

-aka AIC triad

confidentiality

-prevent disclosure of information to unauthorized individuals or systems

integrity

-messages can't be modified without detection

availability

-systems and networks must be up and running

14
New cards

confidentiality

certain information should only be known to certain people

-prevent unauthorized information disclosure

encryption

-encode messages so only certain people can read it

access controls

-seletively restrict access to a resource

two-factor authentication

-additional confirmation before information is disclosed

15
New cards

integrity

data is stored and transferred as intended

-any modification to the data would be identified

hashing

-map data of an arbirtrary length to data of a fixed length

digital signatures

-mathematical scheme to verify the integrity of data

certificates

-combine with a digital signature to verify an individual

non-repudiation

-provides proof of integrity, can be asserted to be genuine

16
New cards

availability

information is accessible to authorized users

-always at your fingertips

redundancy

-build services that will always be available

fault tolerance

-system will continue to run, even when a failure occurs

patching

-stability

-close security holes

17
New cards

Non-repudiation VID 4

18
New cards

non-repudiation

you can't deny what you've said

-there's no taking it back

sign a contract

-your signature adds non-repudiation

-you really did sign the contract

-others can see your signature

adds a different perspective for cryptography

-proof of integrity

-proof of origin, with high assurance of authenticity

19
New cards

proof of integrity

Verify data does not change

-The data remains accurate and consistent

In cryptography, we use a hash

-Represent data as a short string of text

-A message digest, a fingerprint

If the data changes, the hash changes

-If the person changes, you get a different fingerprint

Doesn't necessarily associate data with an individual

-Only tells you if the data has changed

20
New cards

Hashing

if the hash is different from an original, something has changed

-the data integrity has been compromised

21
New cards

proof of origin

• Prove the message was not changed

- Integrity

• Prove the source of the message

- Authentication

• Make sure the signature isn't fake

- Non-repudiation

• Sign with the private key

- The message doesn't need to be encrypted

- Nobody else can sign this (obviously)

• Verify with the public key

- Any change in the message will invalidate the signature

22
New cards

creating a digital signature

- hashing algorithm creates hash

- encrypt the hash with private key

- send encrypted hash along side the plain text

- attach the digital signature to the message

23
New cards

verifying a digital signature

-send message with digital signature

-use public key to examine and decrypt signature

-now we have original hash of text message

-now we see if the hash that just got decrypted is the same as the one that comes from running a hash function on the message

24
New cards

Vid 5 - Authentication, Authorization, and Accounting

25
New cards

AAA Framework

Identification

-this is who you claim to be

-usually your username

authentication

-prove that you are who you say you are

-password and other auithentication factors

authorization

-based on your identication and authentication, what access do you have?

accounting

-resoruces used: login time, data sent and received, logout time

26
New cards

Authenticating people

-client on internet loging into VPN concentrator

- concentrator gives request to AAA server, asking if the username and password provided matches info in the data base

-concetrator knows that we are who we claim to be, and allows acces to file server

27
New cards

authenticating systems

You have to manage many devices

-often devices that you'll never see

A system can't type a password

-and you may not want to store one

How can you truly authenticate a device?

-Put a digitally signed ceriticate on the device

Other businesses process rely on the certificate

-access to the VPN from authorized devices

-Management software can validate the end device

28
New cards

certificate authentication

an organization has a trusted Certificate Authority (CA)

-most organizations maintain their own CAs

The organization creates a certificate for a devices

-and digitally signs the certificate with the organizations CA

The certificate can now be included on a device as an authentication factor

-The CA's digital signature is used to validate the certificate

29
New cards

authorization models

the user or device has now authenticated

-to what do they now have access

time to apply an authorization model

Users and services -> data and applications

-associating individual users to access rights does not scale

put an authorization model in the middle

-define by roles, organizations, attributes, etc

30
New cards

no authorization model

a simple relationship

-user -> resource

some issues with this method

-difficult to understand why an authorization may exist

-does not scale

31
New cards

using an authorization model

Add an abstracton

-reduce complexity

-create a clear relationship between the user and the resource

administration is streamlined

-easy to understand the autbhorizations

-support any number of users or resources

32
New cards

Vid 6 - Gap analyisis

33
New cards

Gap analysis

Where you are compared with where you want to be

-the "gap" between the two

This may require extensive research

-there's lots to consider

This can take weeks or months

-an extensive study with numerous participants

-get ready for emails, data gathering, and technical research

34
New cards

choosing the framework

Work towards a known baseline

-this may be an internal set of goals

-some orgainizations should use formal standards

determine the end goal

-NIST special publication 800-171 revision 2, Protecting controlled unclassified information in nonfederal systems and organizations

-ISO/IEC 27001, information security management systems

35
New cards

Evaluate people and processes

Get a baseline of employees

-formal exp[erience

-current training

-knowledge of security policies and procedures

examine the current processes

-research exisiting IT systems

-evaluate existing security policies

36
New cards

Compare and contrast

the comparison

-evaluate existing systems

identify weaknesses

-alng witht the most effective proccesses

a detailed analysis

-examine broad security categories

-break those into smaller segments

37
New cards

the analysis and report

the final comparison

-detailed baseline objectives

-a clear view of the current state

need a path to get from the current security to the goal

-this will almost certainly include money, and lots of change control

time to create the gap analysis report

- a formal description of the current state

-reccomendations for meeting the baseline

38
New cards

Vid 7 Zero Trust

39
New cards

Zero Trust

Many networks are relatively open on the inside

-once you're in the firewall, there are few security controls

zero trust is a holistic approach to network secutiy

-covers every device, every process, every person

everything must be verified

-nothing is inherently trusted

-multi-factor authentication, encryption, system permissions, additional firewalls, monitoring and analyisis, etc.

40
New cards

Planes of operation

split the network into functional planes

-applies to physical, virtual, and cloud components

data plane

-process the frames, packets, and network data

-processing, forwarding, trunking, encrypting, NAT

control plane

-manages all the actions in the data plane

-define policies and rules

-determines how packets should be forwarded

-routing tables, session tables, NAT tables

41
New cards

Controlling trust

Adaptive identity

-consider the source and requested resources

-multiple risk indicators - relationship to the organization, physical location, type of connection, IP address, etc

-make the authrentication stronger, if needed

threat scope reduction

-decrease the number of possible entry points

policy-driven access control

-combine the adaptive identity with a pre-defined set of rules

42
New cards

security zones

security is more than a one=to-one relationship

-broad categorizations provide a securiyt-related foundation

where are you coming from and where are you going?

-trusted, untrusted

-internal/external network

-VPN 1, VPN 5, VPN 11

-marketing, IT, accounting, HR

Using the zones may be enough by itself to deny access

-for example, untrusted to trusted zone traffic

some zones are implicitly tursted

-for example, trusted to internal zone traffic

43
New cards

Policy enforcement point

knowt flashcard image
44
New cards

Applying trust in planes

knowt flashcard image
45
New cards

zero trust across planes

knowt flashcard image
46
New cards

Vid 8 - physical security

47
New cards

Barricades/bollards

knowt flashcard image
48
New cards

Access control vestibule

knowt flashcard image
49
New cards

Fencing

knowt flashcard image
50
New cards

Video Survailance

CCTV (closed circuit television)

-can replace physical gaurds

camera features are important

-motion recognition can alarm and alert when something moves

-object detection can identify a license plate or person’s face

often many different cameras

-networked together and recorded over time

51
New cards

guards and access badges

knowt flashcard image
52
New cards

Lighting

knowt flashcard image
53
New cards

Sensors

knowt flashcard image
54
New cards

Vid 9 - Deception and disrutpion

55
New cards

Honeypots

knowt flashcard image
56
New cards

HoneyNet

knowt flashcard image
57
New cards

Honeyfiles

knowt flashcard image
58
New cards

Honeytoken

knowt flashcard image
59
New cards

Vid 10 - Change management

60
New cards

Change management

knowt flashcard image
61
New cards

Change approval process

knowt flashcard image
62
New cards

Ownership

knowt flashcard image
63
New cards

Stakeholders

knowt flashcard image
64
New cards

Impact analysis

knowt flashcard image
65
New cards

Test results

knowt flashcard image
66
New cards

backout plan

knowt flashcard image
67
New cards

Maintenance window

knowt flashcard image
68
New cards

Standard operating procedure

knowt flashcard image
69
New cards

Vid 11 - Technical change management

70
New cards

Technical change management

knowt flashcard image
71
New cards

Allow/deny list

knowt flashcard image
72
New cards

Restricted activities

knowt flashcard image
73
New cards

downtime

knowt flashcard image
74
New cards

restarts

knowt flashcard image
75
New cards

Legacy applications

knowt flashcard image
76
New cards

dependencies

knowt flashcard image
77
New cards

Documentation

knowt flashcard image
78
New cards

Version Control

knowt flashcard image
79
New cards

Vid 12 - public key infrastructure

80
New cards

Public Key infrastructure (PKI)

knowt flashcard image
81
New cards

Symmetric encryption

-encrypting/decrypting with the same key

<p>-encrypting/decrypting with the same key</p><p></p>
82
New cards

Asymmetric encryption

knowt flashcard image
83
New cards

The key pair

knowt flashcard image
84
New cards

Key escrow

knowt flashcard image
85
New cards

Vid 13 - Encrypting data

86
New cards

Encrypting stored data

knowt flashcard image
87
New cards

Database encryption

knowt flashcard image
88
New cards

Transport encryption

knowt flashcard image
89
New cards

Encryption algorithms

knowt flashcard image
90
New cards

Cryptographic keys

knowt flashcard image
91
New cards

Key lengths

knowt flashcard image
92
New cards

key stretching

knowt flashcard image
93
New cards

Vid 14- key exchange

94
New cards

Key exchange

knowt flashcard image
95
New cards

Real-time encryption/decryption

knowt flashcard image
96
New cards

symmetric key from asymmetric keys

knowt flashcard image
97
New cards

Encryption Technologies - vid 15

98
New cards
99
New cards

Trusted platform Module (TPM)

knowt flashcard image
100
New cards

Hardware Security Module (HSM)

knowt flashcard image