text
stringlengths
10
4.77k
CompTIA Security + 701 Domain 1: General Security Concepts Learning Objectives By the end of this lesson, you will be able to: Identify security concepts to protect data, ensure availability, and mitigate cyber threats effectively Compare and contrast various types of security controls to optimize protection against cy...
Information security, often called InfoSec, is the practice of protecting information by mitigating information risks.
It is about safeguarding data from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information can be anything valuable, including customer data, financial records, intellectual property, personal details, and even classified government information.
Why Information Security?
With digital transformation and integration comes a heightened risk of cyber threats.
Cybersecurity is not just an IT issue; it is also a business and personal concern.
From identity theft to financial fraud, the repercussions of a security breach can be far reaching and devastating.
The advent of artificial intelligence and deepfakes has added fuel to the fire and worsened the situation.
Factors Impacting Information Security Nature of business Security culture Legal and regulatory compliance Management support Risk appetite Industry threats Cybersecurity Cybersecurity is the process of securing sensitive data and critical systems from cyber threats.
It refers to anything intended to protect enterprises from intentional attacks, breaches, incidents, and consequences.
It can also be defined as protecting information assets by addressing threats to information processed, stored, and transported by internetworked information systems.
Goal of Cybersecurity The primary objective of cybersecurity is to preserve the confidentiality, integrity, and availability of an organization's critical assets from attack, damage, or unauthorized access.
Why Is Cybersecurity Important?
Due to technological advancement, the rate of cybercrime is increasing.
As most of the business happens online, there is an increasing demand to protect this data.
The presence of crime syndicates, cyber armies, and financial frauds has also highlighted the importance of cybersecurity.
Difference Between Information Security and Cybersecurity Information Security Information security deals with information regardless of its format.
It encompasses paper documents, digital data, and intellectual property.
Cybersecurity Cybersecurity is a component of information security.
It can be defined as the protection of information assets by addressing threats to information processed, stored, and transported by internetworked information systems.
Risks of Security on Business Reputational and financial loss Legal action against company Business interruption loss Loss of customer confidence Intellectual property loss Data breach Terrifying Cybercrime Statistics Recent trends that make Cybersecurity more important: During 2023, 5 billion data breaches were report...
Google blocked over 2.8 million bad apps from entering the Play Store in 2023.
Ransomware attacks on the healthcare industry will quadruple.
Cybercrime is expected to cost 23.84 trillion by 2025.
There will be 350 billion passwords worldwide by 2025.
More than 60% of fraud originates from mobile devices.
Personal data sells for as little as $0.20.
90% of hackers use encryption.
Approaches to Cybersecurity Compliance based Ad hoc Relies on regulations or standards to determine security implementation Implements security with no rationale or criteria Risk based Relies on identifying the unique risk a particular organization faces and designing and implementing security controls to address that ...
Confidentiality CIA Integrity Availability CIA Triad: Confidentiality Confidentiality means private or confidential information should not be disclosed to unauthorized individuals.
Confidentiality CIA Integrity Availability CIA Triad: Confidentiality Intentional attacks Accidental leakage Man in the middle attack, packet sniffing, and hacking Untrained employees Threats to confidentiality Authentication and authorization failures Access to a least privileged entity Hardware or software failures I...
Confidentiality CIA Integrity Availability CIA Triad: Integrity Threats to integrity are: Intentional alteration (virus attack, database hack) Environmental factors (electromagnetic interference) System malfunction (improper software configuration) Accidental modifications (lack of input validation and training) CIA Tr...
Checksums can detect errors and reconstruct missing data.
Referential and entity integrity ensure logical consistency.
CIA Triad: Availability Availability means systems or information must be available on demand according to agreed upon parameters.
Confidentiality CIA Integrity Availability CIA Triad: Availability Threats to availability are: Malicious attackers (DDoS, ransomware) Device or system failures (system crash) Supply system failures (power outage, Internet downtime) Environmental issues (fire, earthquake, tornadoes) CIA Triad: Availability The followin...
Ensure data restoration after a disaster Prevent DoS/DDoS attacks by deploying intrusion prevention system (IPS) and web application firewall (WAF) Non Repudiation Non Repudiation Non repudiation, in the context of cryptography and information security, refers to a service that provides proof that a particular action o...
This prevents denial of actions, ensuring accountability and reliability in electronic transactions and communications.
Non repudiation ensures proof of the origin and integrity of data exchanged between parties.
Tools for Non Repudiation Digital signature: Utilizes Audit trail: Involves maintaining cryptographic identifiers to confirm the senders identity and ensure the integrity of the content chronological records of actions, which are crucial for tracing events and assigning accountability to the parties involved.
Secure timestamping: Involves a trusted third party service that creates a verifiable record of the exact time a digital record was created AAA (Authentication, Authorization, and Accounting) AAA In computer security, AAA stands for Authentication, Authorization, and Accounting.
Authentication It is a framework that controls user access to networks and resources, ensuring only authorized users can access specific resources and monitor their activities.
AAA Accounting Authorization Identification The process of an individual claiming or professing an identity is known as identification.
To begin the authentication, authorization, and accountability procedures, a subject must submit an identity to the system.
Authentication Authentication is the process of comparing one or more criteria to a database of legitimate identities such as user accounts, to validate the subject's identity.
An example of identification and authentication is a username and password.
Users identify themselves with usernames and authenticate with passwords.
Authorization Authorization is the process of granting access to an object after the subject has been properly identified and authenticated.
Example: CRUD operations include create, read, update, and delete Accounting Accounting is the ability of a system to associate users and processes with their actions.
Example: Keeping a record of user activity like time of login, IP address, activities performed, and so on AAA: Summary Identification Providing identity Authentication Verifying identity Authorization Granting access Accounting Tracking activity Multi Factor Authentication (MFA) Multi factor authentication is a type o...
Multi Factor Authentication (MFA) Based on the type of authentication, MFA can be categorized into: Something you know Something you have Something you are MFA: Types Two factor authentication Three factor authentication Uses a combination of any two of three authentication factors available Uses all three authenticati...
It essentially regulates who can access network resources (authentication), what they're allowed to do once they're in (authorization), and tracks their activity (accounting).
AAA protocols are typically implemented on a centralized server, which can manage access control for multiple network devices.
This simplifies administration and ensures consistent enforcement of security policies.
AAA AAA Protocols Radius TACACS+ RADIUS Remote Authentication Dial in User Service TACACS+ Terminal Access Controller Access Control System Plus Diameter Remote Authentication Dial in User Service (RADIUS) RADIUS is a networking protocol created in 1991 to offer centralized authentication, authorization, and accounting...
Remote Authentication Dial in User Service (RADIUS) It is a client or server protocol running in the application layer.
Encrypts only the password Uses UDP as the transport layer Attributes of RADIUS: Serves often as the backend choice for 802.1X authentication Uses TCP as the transport layer with TLS for security since 2012 Remote Authentication Dial In User Service (RADIUS) Remote user database (Authorization RADIUS protocol server) R...
Terminal Access Controller Access Control System Plus (TACACS+) It is a completely new protocol Intentional alteration (virus incompatible with TACACS and attack, database hack) XTACACS.
It separates the tasks of authentication, authorization, and accounting.
It also encrypts packets(improper sent and System malfunction received from the TACACS+ server.
software configuration) Accidental modifications (lack of It uses TCP to provide a high quality input validation, lack of training) connection.
Diameter It is a protocol that supports all forms of remote connectivity.
It uses 32 bits for the attribute value pair (AVP) field.
It uses TCP port 3868.
Diameter security uses existing encryption standards, including IPsec or TLS.
It is a peer based protocol.
The server or client initiates communication.
It has better error detection, correction, and failover functionality than RADIUS.
Benefits of AAA Intentional alteration (virus Centralized management attack, database hack) Improved security Accidental modifications (lack of Scalability input validation, lack of training) System malfunction (improper Auditing software configuration) Decentralized Access Control (DAC) DAC is a concept in cybersecuri...
Functional manager assigns access control rights to employees.
Changes can happen faster.
Conflict of interest possibility can arise.
It does not provide uniformity and fairness across the organization.
Certain actions can overlap.
Decentralized Access Control Site administrators are responsible for managing their sites independently.
A sample scenario is as follows: Site D Site C Site A Site B Gap Analysis Gap Analysis A security gap analysis systematically assesses the differences between an organization's current security posture and its desired state, evaluating practices against standards, regulations, and industry best practices.
Goals of Gap Analysis Assess compliance gaps with Intentional alteration (virus relevant security standards or attack, database hack) regulations Identify weaknesses and vulnerabilities in the existing security controls Develop a roadmap for addressing System malfunction (improper security gaps and improving the softwa...
Consider industry standards, regulations, and best practices that may be relevant.
Step 2: Evaluate the Security Controls This stage involves taking inventory of the existing security measures across different areas as follows: Network security Remote access capabilities Endpoint security Access controls Security awareness and training Incident response Data security Step 3: Identify Gaps and Vulnera...
This will reveal areas where the defenses are lacking or not aligned with the goals.
The following are some identified gaps: Weak password policies Unpatched systems Lack of multifactor authentication Unencrypted sensitive data Step 4: Assess Risk Analyze the potential impact and likelihood of exploiting identified vulnerabilities.
Prioritize the most critical gaps that pose the greatest risk to the organization.
Step 5: Develop an Action Plan Create a roadmap to address the identified security gaps.
This plan should include: Specific actions to be taken Resources required Timeline for implementation Benefits of Security Gap Analysis Improved security posture: By identifying and addressing gaps, you can significantly strengthen the overall security defenses Enhanced risk management: Prioritizing vulnerabilities all...
Every person and device accessing a private network must undergo identity verification, whether inside or outside the network perimeter.
Defense in Depth Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.
Policies, procedures, and awareness Physical Network Computer Application Device This multi layered strategy enhances overall system security and addresses various attack vectors.
Core Tenets of Zero Trust Architecture Least privilege Microsegmentation Data encryption Identity and access management Continuous verification Context aware authentication Multifactor authentication Zero Trust Control Planes These are parts of the network architecture responsible for routing and traffic control and pl...
The following are the components of control planes: Policy enforcement point Adaptive identity Threat scope reduction Policy engine Policy driven access control Adaptive Identity Adaptive identity is a crucial concept, moving beyond static verification and acknowledging that trust is not a one time occurrence.
Considers contextual factors like user location, device type, time of access, and behavior patterns Continuously monitors user activity and device health for suspicious behavior Threat Scope Reductions Zero trust security aims to reduce the impact of security threats by limiting the attack surface and blast radius.
The scope of potential threats is reduced by limiting the privileges of users, systems, and processes, minimizing points of attack.
This is achieved through least privilege access, microsegmentation, continuous verification, and deny all by default.
Policy Driven Access Control Access to network resources is granted or denied based on predefined policies that consider factors like user role, data type, and device security status.
This is achieved through centralized policy management, implementing the least privilege principle, dynamic access control, integration with adaptive identity, and reducing the attack surface.
Policy Engine The policy engine determines access to critical network resources on a per user basis.
It operates based on policies set by the organization's security team.
The engine uses context from SIEM data, threat intelligence, user attributes, and device information.
It communicates decisions to a policy administrator for execution.
Policy Enforcement Point The Policy Enforcement Point (PEP) is crucial in access control, ensuring security by implementing decisions and rules set by the Policy Engine: Acts as the gatekeeper, enforcing access control decisions made by the Policy Engine.