Secplus_8e_Mod02_PPT

Module Overview

  • Title: CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition

  • Author: Mark Ciampa

  • Focus: Understanding pervasive attack surfaces and controls in network security

Module Objectives

  • By the end of the module, you should be able to:

    • Define social engineering and list types of attacks.

    • List different types of physical defenses.

    • Describe controls for protecting data.

Social Engineering Attacks

  • Definition: A method used to elicit information or convince a user to act in a way that compromises security.

    • Always involves deception and manipulation.

    • Utilizes human vectors as the attack surface.

Human Manipulation Techniques

  • Relies heavily on human psychology to gain trust:

    • Provide a compelling reason.

    • Project confidence.

    • Employ evasion and diversion.

    • Use humor to disarm.

Types of Social Engineering Attacks

Phishing Attacks

  • Phishing: Sending deceptive emails or web announcements to trick users.

    • Variations include:

      • Spear Phishing: Targeting specific individuals.

      • Whaling: Targeting senior executives.

      • Vishing: Voice phishing via phone calls.

      • Smishing: Phishing through SMS.

Business Email Compromise (BEC)

  • A phishing variant where requests for funds appear legitimate.

  • Considered a major cyber threat to organizations and consumers.

Impersonation and Redirection

  • Impersonation: Masquerading as a legitimate character to gain user trust.

    • Brand Impersonation: Using recognized brands to gain immediate trust.

  • Redirection: Directing users to fraudulent lookalike websites for profit.

    • Includes type squatting and pharming for traffic generation.

Misinformation and Misinformation Tactics

  • Misinformation: False information, while disinformation is false information with malicious intent.

    • Watering Hole Attacks: Targeting specific individuals by infecting common websites they visit.

    • Using methods like dumpster diving, Google dorking, and shoulder surfing to gather sensitive information.

Perimeter Defenses

  • Organizations may employ industrial camouflage to obscure buildings.

  • Essential components of perimeter defenses include:

    • Barriers (fences, bollards).

    • Security guards (two-person integrity for higher protection).

    • Sensors (infrared, microwave, ultrasonic).

    • Security buffers (mantraps, reception areas).

    • Locks (e.g., electronic locks).

Barriers

  • Fencing: A tall structure keeping out unauthorized personnel.

  • Bollards: Short posts preventing vehicle intrusion.

Security Guards

  • Patrol defined areas, monitor activities, and utilize video surveillance.

  • Drones (UAVs): Increasingly used for surveillance tasks.

Sensors

  • IR Sensors: Detect infrared; useful for property protection.

  • Microwave Sensors: Monitor larger areas like warehouses.

  • Ultrasonic Sensors: Measure object distance; less affected by airborne particles.

Security Buffers

  • Definition: Additional barriers to control access.

    • Mantrap: A controlled entrance area requiring credential checks.

Data Leakage Prevention

  • Measures to prevent sensitive data from escaping include:

    • Faraday Cage: Blocks electromagnetic signals from escaping.

    • Protected cable distribution systems.

Data Classifications

  • Types of Data:

    • Confidential: Highest sensitivity; restricted access.

    • Private: Medium confidentiality; need-to-know access.

    • Sensitive: Could cause harm if disclosed; restrictive access.

    • Critical: Essential for operations; stringent protection needed.

    • Public: No sensitivity; open for public access.

    • Restricted: Needs caution for usage in emails; not public.

Types of Data

  • Regulated Data: Governed by external rules.

  • Intellectual Property (IP): Protects creative works.

  • Trade Secret: Undisclosed enterprise data.

  • Financial Information: Pertains to monetary transactions.

Protecting Data

  • Factors for data management:

    • States of Data: In processing, in transit, at rest.

    • Geolocation: Identifies physical data location.

    • Data Sovereignty: Laws applicable to data based on collection location.

Data Security Methods

  • Techniques include:

    • Data Minimization: Limit data collection to essentials.

    • Data Masking: Concealing sensitive information.

    • Tokenization: Substituting sensitive data with non-sensitive equivalents.

    • Restrictions: Access limitations based on user roles.

    • Segmentation: Isolating sensitive data for better security.

Conclusion

  • Understanding social engineering, physical defenses, and data protection is crucial for network security competence.

robot