Security Fundamentals for Certification Exam

Sep 15, 2024

Security Plus Exam Cram Series 2024 Edition - Domain 1 Notes

Overview of Domain 1

  • Focus on general security concepts.
  • Key topics include: security controls, change management, cryptographic solutions.
  • Builds foundational knowledge for the Security Plus syllabus.

Resources for Exam Preparation

  • PDF of presentation available for download.
  • Official study guide from Cybex recommended.
    • 500 practice questions, 100 flashcards, two practice exams.
    • Companion practice test manual with 1,000 additional questions.

Section 1.1: Security Controls

Categories of Security Controls

  • Technical: Hardware/software mechanisms (e.g. encryption, firewalls).
  • Physical: Protection for facilities and objects (e.g. guards, locks).
  • Managerial: Policies and procedures.
  • Operational: Day-to-day operations compliance.

Types of Security Controls

  • Preventive: Stop unwanted activity (e.g. locks, biometrics).
  • Deterrent: Discourage policy violations (e.g. security cameras).
  • Detective: Discover activities (e.g. audit trails).
  • Corrective: Restore systems (e.g. backups, patching).
  • Compensating: Support other controls (e.g. monitoring, policies).
  • Directive: Direct actions (e.g. procedures, signage).

Section 1.2: Fundamental Security Concepts

CIA Triad

  • Confidentiality: Only authorized access.
  • Integrity: Data/system accuracy.
  • Availability: Access within a reasonable time.

Non-repudiation & AAA

  • Prevents denial of actions (digital signatures).
  • Authentication, Authorization, Accounting (tracks user activities).

Security Models

  • Non-discretionary Access Control: Role-based.
  • Discretionary Access Control: User-managed.
  • Mandatory Access Control: Label-based.
  • Role/Rule-Based Access Control: Policy-centric.
  • Attribute-Based Access Control: Based on attributes like department.

Zero Trust Architecture

  • Principles: Assume breach, verify explicitly, least privilege.
  • Components: Policy enforcement/decision points.
  • Framework: Control and data plane elements based on NIST.

Physical Security

  • Importance: Essential for overall security.
  • Controls: Bollards, vestibules, fences, surveillance, lighting, guards.

Deception Technologies

  • Honeypots & Honeynets: Lure attackers, observe actions.
  • Honey Files/Tokens: Decoy files/records.

Section 1.3: Change Management

Processes

  • Approval: Management review of changes.
  • Testing: Validate changes in a safe environment.
  • Back-out Plans: Restore systems if changes fail.
  • Maintenance Windows: Schedule changes to minimize disruption.

Technical Implications

  • Firewall rules, downtime expectations, legacy app compatibility.
  • Importance of documentation and version control.

Section 1.4: Cryptographic Solutions

Public Key Infrastructure (PKI)

  • Components: Certificate Authorities, CRLs, OCSP.
  • Certificate Types: User, root, wildcard, code signing, self-signed.
  • Trust Models: Hierarchical, bridge, hybrid, mesh.

Encryption Types

  • Symmetric vs Asymmetric: Key sharing differences.
  • Common Algorithms: AES (symmetric), RSA, ECC (asymmetric).

Scope of Encryption

  • File, Volume, Disk Encryption: Different levels of data protection.
  • Data in Transit and Use: TLS for transit, encrypted memory states.

Cryptographic Tools

  • TPM & HSM: Secure key storage.
  • Key Management Systems: Centralized secret management.

Obfuscation Techniques

  • Steganography, Tokenization, Pseudonymization, Anonymization.

Hashing and Salting

  • Protects password integrity and authenticity.
  • Salting prevents rainbow table attacks.

Blockchain & Open Ledger Technologies

  • Blockchain: Distributed ledger.
  • Open Public Ledger: Centralized authority.

Limitations & Use Cases

  • Considerations: Power, latency, resiliency, device compatibility.

These notes provide a condensed summary of important concepts covered in Domain 1 for the Security Plus Exam Cram Series 2024 Edition, emphasizing the essential components and tools for security professionals.