Security Plus Exam Cram Series 2024 Edition - Domain 1 Notes
Overview of Domain 1
- Focus on general security concepts.
- Key topics include: security controls, change management, cryptographic solutions.
- Builds foundational knowledge for the Security Plus syllabus.
Resources for Exam Preparation
- PDF of presentation available for download.
- Official study guide from Cybex recommended.
- 500 practice questions, 100 flashcards, two practice exams.
- Companion practice test manual with 1,000 additional questions.
Section 1.1: Security Controls
Categories of Security Controls
- Technical: Hardware/software mechanisms (e.g. encryption, firewalls).
- Physical: Protection for facilities and objects (e.g. guards, locks).
- Managerial: Policies and procedures.
- Operational: Day-to-day operations compliance.
Types of Security Controls
- Preventive: Stop unwanted activity (e.g. locks, biometrics).
- Deterrent: Discourage policy violations (e.g. security cameras).
- Detective: Discover activities (e.g. audit trails).
- Corrective: Restore systems (e.g. backups, patching).
- Compensating: Support other controls (e.g. monitoring, policies).
- Directive: Direct actions (e.g. procedures, signage).
Section 1.2: Fundamental Security Concepts
CIA Triad
- Confidentiality: Only authorized access.
- Integrity: Data/system accuracy.
- Availability: Access within a reasonable time.
Non-repudiation & AAA
- Prevents denial of actions (digital signatures).
- Authentication, Authorization, Accounting (tracks user activities).
Security Models
- Non-discretionary Access Control: Role-based.
- Discretionary Access Control: User-managed.
- Mandatory Access Control: Label-based.
- Role/Rule-Based Access Control: Policy-centric.
- Attribute-Based Access Control: Based on attributes like department.
Zero Trust Architecture
- Principles: Assume breach, verify explicitly, least privilege.
- Components: Policy enforcement/decision points.
- Framework: Control and data plane elements based on NIST.
Physical Security
- Importance: Essential for overall security.
- Controls: Bollards, vestibules, fences, surveillance, lighting, guards.
Deception Technologies
- Honeypots & Honeynets: Lure attackers, observe actions.
- Honey Files/Tokens: Decoy files/records.
Section 1.3: Change Management
Processes
- Approval: Management review of changes.
- Testing: Validate changes in a safe environment.
- Back-out Plans: Restore systems if changes fail.
- Maintenance Windows: Schedule changes to minimize disruption.
Technical Implications
- Firewall rules, downtime expectations, legacy app compatibility.
- Importance of documentation and version control.
Section 1.4: Cryptographic Solutions
Public Key Infrastructure (PKI)
- Components: Certificate Authorities, CRLs, OCSP.
- Certificate Types: User, root, wildcard, code signing, self-signed.
- Trust Models: Hierarchical, bridge, hybrid, mesh.
Encryption Types
- Symmetric vs Asymmetric: Key sharing differences.
- Common Algorithms: AES (symmetric), RSA, ECC (asymmetric).
Scope of Encryption
- File, Volume, Disk Encryption: Different levels of data protection.
- Data in Transit and Use: TLS for transit, encrypted memory states.
Cryptographic Tools
- TPM & HSM: Secure key storage.
- Key Management Systems: Centralized secret management.
Obfuscation Techniques
- Steganography, Tokenization, Pseudonymization, Anonymization.
Hashing and Salting
- Protects password integrity and authenticity.
- Salting prevents rainbow table attacks.
Blockchain & Open Ledger Technologies
- Blockchain: Distributed ledger.
- Open Public Ledger: Centralized authority.
Limitations & Use Cases
- Considerations: Power, latency, resiliency, device compatibility.
These notes provide a condensed summary of important concepts covered in Domain 1 for the Security Plus Exam Cram Series 2024 Edition, emphasizing the essential components and tools for security professionals.