section 1A

Topic 1A – Security Concepts (SY0‑701)

Below is your “micro‑lecture” plus study aids for Topic 1A: Security Concepts from the Official CompTIA Security+ Student Guide. All page numbers refer to the PDF.

1. Learning objectives

By the end, you should be able to 

#

You can …

Why the exam cares

1

Define the CIA triad and non‑repudiation

Core of every security question

2

Map tasks to the NIST CSF five functions

“Which function is this?” appears constantly

3

Explain gap‑analysis purpose & output

Frequent scenario in performance‑based items

4

Describe the AAA/IAM process flow

Foundation for Identity & Access domains

2. Key terms in plain English

Term

1‑Sentence “ELI5”

Book ref.

Confidentiality

Only the people you picked get to read it.

p. 2

Integrity

What’s stored/ sent is exactly what you meant.

p. 2

Availability

It’s there when the good guys need it.

p. 2

Non‑repudiation

“You can’t say you didn’t do that.” Digital receipts & signatures prove it.

p. 2

NIST CSF

5‑step lifecycle—Identify, Protect, Detect, Respond, Recover.

p. 3

Gap analysis

Spreadsheet of “what we have” vs “what the framework says we need.”

p. 4

AAA (IAM)

Identify → Authenticate → Authorize → Account

p. 5‑6

Mnemonic aids

  • CIA → “Secret‑Real‑Here” (secret = C, real = I, here = A)

  • IP DRR song for CSF (“🎵 I‑P‑D‑R‑R”).

  • IAAA like saying “Yah!” four times.

3. Walk‑through of the concepts

  1. CIA + Non‑repudiation

    • Think of a bank vault: C – only key‑holders enter; I – each stack of bills is numbered & sealed; A – the vault opens during business hours even if one lock jams. A CCTV recording of who opened which box adds non‑repudiation.

  2. NIST Cybersecurity Framework (CSF)

    • Identify assets & risks → Protect with controls → Detect bad stuff → Respond to stop the bleeding → Recover to normal.

    • Exam trick: many tasks feel like “protection” but are actually identify (e.g., asset inventory) or detect (e.g., log review).

  3. Gap analysis

    • Picture a scorecard: rows = CSF categories, columns = implemented controls, cells = ✓/✗. Missing ✓ are the “gaps.” Prioritize by CIA impact and set target dates. Expect a performance‑based simulation where you must pick which gap to fix first (tip: choose the one with highest likelihood × impact).

  4. IAM & the AAA flow

Stage

Real‑world analogy

Typical tech

Identification

Showing your driver’s licence at reception

Username, device UUID

Authentication

Proving the licence is yours

Password, smart‑card, OTP

Authorization

Security guard checks the door list

ACLs, roles, claims

Accounting

Lobby camera + sign‑in sheet

Logs, SIEM alerts

* You’ll later map factors (what you know/are/have) and models (RBAC, ABAC, etc.) to this flow.

4. Quick “white‑board” diagram (re‑draw in your notes)

           [Assets]          ┌────────────────────────┐

              ↓              │      IDENTIFY          │

        ┌───────────────┐    └────────┬───────────────┘

        │    THREATS    │ protect   │ detect ─┐

        └──────┬────────┘             ▼          │

               │             ┌────────────────────────┐

               └────────────│      PROTECT           │

                             └────────────────────────┘

(continue arrow through Detect → Respond → Recover)

Re‑sketching cements memory!

5. Mini‑lab (20 min) – “See CIA on the wire”

  1. Boot your Ubuntu VM & install Wireshark.

  2. Capture traffic while logging into an HTTP site you host locally; note the plaintext credentials—confidentiality broken.

  3. Switch to HTTPS (self‑signed cert). Repeat capture: contents are encrypted—C preserved.

  4. Yank the network cable mid‑transfer: observe TCP retransmissions & browser error—A broken. Discuss I scenarios (corrupted packet flags).

6. Flash‑card set (sample 10 of 20)

Q

A

List the five NIST CSF functions.

Identify, Protect, Detect, Respond, Recover

What property does hashing support in the CIA triad?

Integrity

Which AAA stage decides “what you can see”?

Authorization

(Full CSV deck sent separately on request.)

7. Review‑Activity answers (p. 17)

  1. Confidentiality, Integrity, Availability.

  2. Non‑repudiation.

  3. Gap analysis report to a regulator.

  4. Accounting.

  5. AuthN proves identity; AuthZ grants specific rights.

  6. Logs create an evidence trail that binds an action to a subject.

8. Self‑test (write answers before peeking)

  1. Match each: Asset inventory, Encryption at rest, SIEM alert, Hot‑site fail‑over → which CSF function?

  2. You enable Windows logon‑auditing. Which AAA component does that satisfy?

  3. Give one business benefit of performing a gap analysis besides “better security.”

Answers: 1) Identify / Protect / Detect / Recover. 2) Accounting. 3) Demonstrates regulatory compliance, aids budgeting, etc.

9. What’s next?

Tomorrow’s AM block → Topic 1B (Security Controls) + hands‑on AAA log parsing.

If any point above felt shaky, DM me and we’ll schedule a 10‑minute clarifier.

Keep the momentum—14‑day sprint means mastery by repetition and labs. Let’s crush Topic 1B next!