COMPTIA Security + 601 5.0

0.0(0)
studied byStudied by 7 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/124

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

125 Terms

1
New cards

Managerial controls

Primarily administrative in function. They are typically documented in an organization’s security policy and focus on managing risk.

2
New cards

Operational Controls

Help ensure that day-to-day operations of an organization comply with the security policy. People implement them.

3
New cards

Technical Controls

Use technology such as hardware, software, and firmware to reduce vulnerabilities.

4
New cards

Preventive Controls

Attempt to prevent an incident from occurring.

5
New cards

Detective Controls

Attempt to detect incidents after they have occurred.

6
New cards

Corrective Controls

Attempt to reverse the impact of an incident.

7
New cards

Deterrent Controls

Attempt to discourage individuals from causing an incident.

8
New cards

Compensating Controls

Are Alternative controls used when a primary control is not feasible.

9
New cards

Physical Controls

Refer to controls you an physically touch.

10
New cards
Compliance
Meeting the standards oof laws, policies, and regulations. A healthy catalog of regulations and laws. Across many aspects of business and life. Many are industry-specific or situational
11
New cards
Penalties
Fines, incarceration, loss of employment
12
New cards
Scope
Covers national, territory, or state laws. Domestic and international requirements.
13
New cards

GDPR (General Data Protection Regulation)

European Union regulation

  • Data protection and privacy for individuals in the EU

  • Name, address, photo, email address, bank details, posts on social networking websites, medical information, a computer's IP address, etc. • Controls export of personal data

  • Users can decide where their data goes • Gives individuals control of their personal data

  • A right to be forgotten • Site privacy policy

  • Details all of the privacy rights for a user

14
New cards
PCI DSS (Payment Card Industry Data Security Standard)
A standard for protecting credit cards.
Six control objectives
- Build and maintain a secure network and systems,
- Protect cardholder data,
- Maintain a vulnerability management program,
- Implement strong access control measures,
- Regularly monitor and test networks,
- Maintain an information security policy.
15
New cards
CIS (Center for Internet Security)
Improve cyber defenses. Twenty key actions (the critical security controls). Categorized for different organization sizes. Designed for implementation. Written for IT professionals. Includes practical and actionable tasks.
16
New cards
NIST RMF (National Institute of Standards of Technology Risk Management Framework)
Mandatory for federal agencies and organizations that handle federal data.
Six Step Process:
Step 1: Categorize - Define the environment
Step 2: Select - Pick appropriate controls.
Step 3: Implement - Define proper implementation.
Step 4: Assess - Determine if controls are working
Step 5: Authorize - Make a decision ton authorize a system.
Step 6: Monitor - Check for ongoing compliance
17
New cards
NIST CSF ( National Institute of Standards and Technology Cybersecurity Framework)
A voluntary commercial framework.
Framework Core
- Identify, Protect, Detect, Respond, and Recover.
Framework Implementation Tiers
- An organization's view of cybersecurity risk and processes to manage the risk.
Framework Profile
- The alignment of standards, guidelines, and practices to the framework Core
18
New cards
ISO/IEC
International Organization for Standardization/International Electrotechnical Commission
19
New cards
ISO/IEC 27001
Standard for an Information Security Management System (ISMS)
20
New cards
ISO/IEC 27002
Code of practice for information security controls
21
New cards
ISO/IEC 27701
Privacy Information Management Systems (PIMS)
22
New cards
ISO 31000
International standards for risk management practices
23
New cards
SSAE SOC 2 Type I/II
• The American Institute of Certified Public Accountants
(AICPA) auditing standard Statement on Standards for
Attestation Engagements number 18 (SSAE 18)

• SOC 2 - Trust Services Criteria (security controls)
- Firewalls, intrusion detection, and multi-factor authentication

• Type I audit
- Tests controls in place at a particular point in time

• Type II
- Tests controls over a period of at least six consecutive months
24
New cards
CSA (Cloud Security Alliance)
Security in cloud computing - Not-for-profit organization. Cloud Controls Matrix (CCM) - Cloud-specific security controls.
Controls are mapped to standards, best practices, and regulations.
Enterprise Architecture
- Methodology and tools
- Assess internal IT groups and cloud providers
- Determine security capabilities
- Build a roadmap
25
New cards
Web Server Hardening
• Access a server with your browser
• The fundamental server on the Internet
• Microsoft Internet Information Server,
Apache HTTP Server, et al.
• Huge potential for access issues
• Data leaks, server access
• Secure configuration
• Information leakage: Banner information,
directory browsing
• Permissions: Run from a non-privileged account,
configure file permissions
• Configure SSL: Manage and install certificates
• Log files: Monitor access and error logs
26
New cards
operating system hardening
Many and varied
- Windows, Linux, iOS, Android, et al.
• Updates
- Operating system updates/service packs,
security patches
• User accounts
- Minimum password lengths and complexity
- Account limitations
• Network access and security
- Limit network access
• Monitor and secure
- Anti-virus, anti-malware
27
New cards
Application Server
• Programming languages, runtime libraries, etc.
• Usually between the web server and the database
• Middleware
• Very specific functionality
• Disable all unnecessary services
• Operating system updates
• Security patches
• File permissions and access controls
• Limit rights to what's required
• Limit access from other devices
28
New cards
Network Infrastructure Devices
• Switches, routers, firewalls, IPS, etc.
• You never see them, but they're always there
• Purpose-built devices
• Embedded OS, limited OS access
Configure authentication
- Don't use the defaults
• Check with the manufacturer
• Security updates
• Not usually updated frequently
• Updates are usually important
29
New cards
AUP Adventist Univ of Phil./ PUC-old name
What us acceptable use of company assets? Detailed documentation. May be documented in the Rules of Behavior. Covers many topics. Internal use, telephones, computers, mobile devices, etc. Used by an organization to limit legal liability. If someone is dismissed, these are the well - documented reasons why.
30
New cards
job rotation
Keep people moving between responsibilities. No one person maintains control for long periods of time.
31
New cards
Mandatory Vacations
- Rotate others through the job
- The longer the vacation, the better chance to identify fraud
- Especially important in high-security environments
32
New cards
Seperation of Duties
Split knowledge
No one person has all the details. Half of a safe combination.
- Dual control
- Two people must be present to perform the business function.
- Two keys open a safe (or launch a missile)
- Clean desk policy
- When you leave, nothing is on your desk.
- Limit the exposure of sensitive data to third-parties
33
New cards
Least Privilege
• Rights and permissions should be set
to the bare minimum
• You only get exactly what's needed to
complete your objective
• All user accounts must be limited
• Applications should run with minimal privileges
• Don't allow users to run with administrative privileges
• Limits the scope of malicious behavior
34
New cards
Background Checks
- Pre-employment screening
- Verify the applicant's claims
- Discover criminal history, workers compensation claims, etc.
- Legalities vary by country
35
New cards
Adverse actions
- An action that denies employment based on the
background check
- May require extensive documentation
- Can also include existing employees
36
New cards

NDA (Non-Disclosure Agreement)

Confidentiality agreement/ Legal contract. Prevents the use and dissemination of confidential information.

• Confidentiality agreement between parties

  • Information in the agreement should not be disclosed • Protects confidential information

  • Trade secrets, business activities

  • Anything else listed in the NDA • Unilateral or bilateral (or multilateral)

  • One-way NDA or mutual NDA • Formal contract - Signatures are usually required

37
New cards
Social Media Analysis
- Gather data from social media
- Facebook, Twitter, LinkedIn, Instagram
- Build a personal profile
- Another data point when making a hiring decision
38
New cards
On-boarding
• Bring a new person into the organization
- New hires or transfers
• IT agreements need to be signed
- May be part of the employee handbook or
a separate AUP
• Create accounts
- Associate the user with the proper groups
and departments
• Provide required IT hardware
- Laptops, tablets, etc. - Preconfigured and ready to go
39
New cards
Off-boarding
All good things... (But you knew this day would come)
• This process should be pre-planned
- You don't want to decide how to do things at this point
• What happens to the hardware and the data?
• Account information is usually deactivated
- But not always deleted
40
New cards
Gamification
Score points. Compete with others. Collect badges.
41
New cards
Capture the Flag
Security competition. Hack into a server to steal data (the flag). Can involve highly technique. A practical learning environment.
42
New cards
Phishing Simulations
Send simulated phishing emails. Make vishing calls. See which users are susceptible to phishing attacks without being a victim of phishing.
43
New cards
CBT (computer-based training)
Automated pre-built training. May include video, audio, and Q&A. Users all receive the same training experience.
44
New cards
Role-based security awareness training
• Before providing access, train your users
- Detailed security requirements

• Specialized training
- Each user role has unique security responsibilities

• Also applies to third-parties
- Contractors, partners, suppliers

• Detailed documentation and records
- Problems later can be severe for everyone
45
New cards
vendors
every organization works with these.
Payroll, customer relationship management, email marketing, travel, raw materials. Important company data is often shared. May be required for cloud-based services.
Perform a risk assessment. Categorize risk by vendor and manage the risk. Use contracts for clear understanding. Make sure everyone understands the expectations. Use the contract to enforce a secure environment.
46
New cards
supply chain
the system involved when creating a product. Involves organizations, people, activities, and resources.
Supply chain assessment
- Get a product or service from supplier to customer
- Evaluate coordination between groups
- Identify areas of improvement
- Assess the IT systems supporting the operation
- Document the business process changes
47
New cards
Business partners
Much closer to your data than a vendor. May require direct access. May be a larger security concern than an outside hacker. Often involves communication over a trusted connection. More difficult to identify malicious activity.
Partner risk management should be included. - Requirements for best practices, data handling, intellectual property. Include additional security between partners. - Firewalls and traffic filters.
48
New cards
Service Level Agreement (SLA)
Minimum terms for services provided
• Uptime, response time agreement, etc.
- Commonly used between customers and service providers.
49
New cards
MOU (memorandum of understanding)
- Both sides agree on the contents of the memorandum
- Usually includes statements of confidentiality
- Informal letter of intent
50
New cards
not a signed contract

51
New cards
Measurement System Analysis
Don't make decisions based on incorrect data!
Used with quality management systems, i.e., Six Sigma. Assess the measurement process. Calculate measurement uncertainty
52
New cards
Business Partnership Agreement (BPA)
Going into business together. Owner stake. Financial contract. Decision-making agreements. Prepare for contingencies.
53
New cards
EOL (end of life)
Manufacturer stops selling a product. May continue supporting the product. Important for security patches and updates.
54
New cards
End of Service Life (EOSL)
- Manufacturer stops selling a product
- Support is no longer available for the product
- No ongoing security patches or updates
- May have a premium-cost support option
55
New cards
Data governance
Rules, processes, and accountability associated with an organization's data. - Data is used in the right ways.
56
New cards
data steward
Manages the governance processes
- Responsible for data accuracy, privacy, and security
- Associates sensitivity labels to the data
- Ensures compliance with any applicable laws and
standards
57
New cards
Data Classification
Identify data types
- Personal, public, restricted, etc.
- Use and protect data efficiently
• Associate governance controls to the classification levels
- How the data class should be managed
• Data compliance
- Laws and regulations regarding certain types of data
- GDPR - General Data Protection Regulation
58
New cards
Data Retention
• Keep files that change frequently for version control
- Files change often
- Keep at least a week, perhaps more
• Recover from virus infection
- Infection may not be identified immediately
- May need to retain 30 days of backups
• Often legal requirements for data retention
- Email storage may be required over years
- Some industries must legally store certain data types
- Different data types have different
storage requirements
- Corporate tax information, customer PII, tape backups, etc.
59
New cards
Personnel accounts
• An account on a computer associated with
a specific person
- The computer associates the user with a specific
identification number
• Storage and files can be private to that user
- Even if another person is using the same computer
• No privileged access to the operating system
- Specifically not allowed on a user account
• This is the account type most people will use
- Your user community
60
New cards
Third-party accounts
• Access to external third-party systems
- Cloud platforms for payroll, enterprise resource
planning, etc.
• Third-party access to corporate systems
- Access can come from anywhere
• Add additional layers of security
- 2FA (two factor authentication)
- Audit the security posture of third-parties
• Don't allow account sharing
- All users should have their own account
61
New cards
Device Accounts
• Access to devices
- Mobile devices
• Local security
- Device certificate
- Require screen locks and unlocking standards
- Manage through a Mobile Device Manager (MDM)
• Add additional security
- Geography-based
- Include additional authentication factors
- Associate a device with a user
62
New cards
Service accounts
• Used exclusively by services running on a computer
- No interactive/user access (ideally)
- Web server, database server, etc.
• Access can be defined for a specific service
- Web server rights and permissions will be
different than a database server
• Commonly use usernames and passwords
- You'll need to determine the best policy for
password updates
63
New cards
Administrator/root accounts
• Elevated access to one or more systems
- Super user access
• Complete access to the system
- Often used to manage hardware, drivers, and
software installation
• This account should not be used for normal
administration
- User accounts should be used
• Needs to be highly secured
- Strong passwords, 2FA
- Scheduled password changes
64
New cards
Change Management
How to make a change. Upgrade software, change firewall configuration, modify switch ports. One of the most common risks in the enterprise. Occurs very frequently. Often overlooked or ignored. Did you feel that bite? Have clear policies. Frequency, duration, installation process, fallback procedures.
Sometimes extremely difficult to implement. It's hard to change corporate culture.
65
New cards
Change control
formal process for managing change to avoid downtime, confusion and mistakes. Nothing changes without the process. Determine the scope of the change. Analyze the risk associated with the change. Create a plan. Get end-user approval. Present the proposal tot he change control board. Have a backout plan if the change doesn't work. Document the changes.
66
New cards
asset managment
Identify and track computing assets. Usually an automated process. Respond faster to security problem. You know who, what, and where. Keep an eye on the most valuable assets. Both hardware and data. Track licenses. You know exactly how many you'll need. Verify that all devices are up to date. - Security patches, anti-malware signature updates, etc.
67
New cards
risk assessment
Identify assets that could be affected by an attack. Define the risk associated with each asset. Hardware, customer data, intellectual property. Identify threats - loss of data, disruption of services, etc. Determine the risk - High, medium, or low risk. Assess the total risk to the organization. Make future security plans.
68
New cards
External Threats
- Outside the organization
- Hacker groups, former employees
69
New cards
Internal Threats
- Employees and partners
- Disgruntled employees
70
New cards
Legacy systems
Outdated, older technologies. May not be supported by the manufacturer. May not have security updates. Depending on the age, may not be easily accessible.
71
New cards
Multiparty Risk
Breaches involving multiple parties. Often trusted business relationships. Events often involve many different parties.
72
New cards
Intellectual Property (IP) theft
- Theft of ideas, inventions, and creative expressions
- Human error, hacking, employees with access, etc.
- Identify and protect IP
- Educate employees and increase security
73
New cards
Software Compliance/Licensing
- Operational risk with too few licenses
- Financial risk with budgeting and over-allocated licenses
- Legal risk if proper licensing is not followed
74
New cards
Acceptance
A business decision we'll take the risk.
75
New cards
Risk Avoidance
stop participating in high-risk activity
76
New cards
Transference
Buy some cybersecurity insurance.
77
New cards
Mitigation
Decrease the risk level. Invest in security systems.
78
New cards
Risk Register
Every project has a plan, but also has risk. Identify and document the risk associated with each step. Apply possible solutions to the identified risks. Monitor the results.
79
New cards
Risk Matrix/ Risk Heat map
- View the results of the risk assessment
- Visually identify risk based on color
- Combines the likelihood of an event with the potential impact
- Assists with making strategic decisions
80
New cards
Inherent Risk
Impact + Likelihood. Risks that exists in the absence of controls
81
New cards
Residual Risk
Inherent Risk + Control effectiveness. Risks that exist after controls are considered.
82
New cards
Risk Appetite
The amount of risk an organization is willing to take
83
New cards
Risk Control Assessment
Risks have been determined, and Time to build cybersecurity requirements, Find the gap, Build and maintain security systems based on the requirements, and Determine if existing controls are compliant or non-compliant.
84
New cards
Risk awareness
A constantly changing battlefield (i.e, New risks, Emerging risks, A nearly overwhelming amount of information, Difficult to manage a defense). Knowledge is key (Part of every employee’s daily job role, Part of the onboarding process for employees and partners). Maintaining awareness (Ongoing group discussions, Presentations from law enforcement, Attend security conferences and programs)
85
New cards
Regulations that affect risk posture
Many of them, Regulations tend to regulate. Regulations directly associated with cybersecurity. HIPAA, GDPR
86
New cards
Regulations directly associated to cybersecurity
Protection of personal information, disclosure of information breaches. Requires a minimum level of information security.
87
New cards
HIPAA (Health Insurance Portability and Accountability Act)
Privacy of patient records. New storage requirements, and network security, protect against threats.
88
New cards
GDPR - General Data Protection Regulation
European Union data protection and privacy. Personal data must be protected and managed for privacy.
89
New cards
Qualitative risk assessment
Identify significant risk factors. Ask opinions about the significance. Display visually with a light grid or similar method.
90
New cards
Quantitative Risk Assessment
Likelihood

(Annualized Rate of Occurence (ARO), How likely is it that a hurricane will hit? In Montana? In Florida?, SLE (Single Loss Expectancy), What is the monetary loss if single event occurs? ALE (Annualized Loss Expectancy)
91
New cards
Annualized Rate of Occurrence (ARO)
Likelihood of an event occurring. How likely is it that a hurricane will hit? In Montana? In Florida?
92
New cards
SLE (Single Loss Expectancy)
What is the monetary loss if a single event occurs
93
New cards
ALE (Annualized Loss Expectancy)
ARO *SLE. Example: 7 Laptops stolen in a year (ARO)* \* $1000 (SLE) = $7000
94
New cards
Disaster types
Environmental threats, Person-made threats, Internal and external threats.
95
New cards
Environmental Threats
Tornado, hurricane, earthquake, severe weather
96
New cards
Person-made threats
Human intent, negligence, or error. Arson, crime, civil disorder, fires, riots, etc.
97
New cards
Internal and External
One is from employees. the others are from outside the organization.
98
New cards
Recovery Time Objective (RTO)
Describes how long it would take to get back up and running to a particular service level.
99
New cards
Recovery point objective (RPO)
We would set an objective to meet a certain set of minimum requirements to get a system up and running
100
New cards
Mean time to Repair (MTTR)
Time required to fix the issue