Overview of Security Plus Exam Concepts

Sep 15, 2024

Security Plus Exam Cram Series 2024 Edition: Domain 1 Overview

Introduction

  • Focus: General security concepts.
  • Covers types of security controls, change management, cryptographic solutions.
  • Foundation for Security Plus syllabus.
  • PDF available for deeper study.

Security Controls

Categories of Security Controls

  • Technical: Hardware/software mechanisms (encryption, smart cards, passwords).
  • Physical: Protect physical facilities (guards, fences, cameras).
  • Managerial: Policies/procedures (security training, risk assessments).
  • Operational: Day-to-day operations compliance.

Types of Security Controls

  • Preventive: Stop unwanted activity (fences, locks).
  • Deterrent: Discourage policy violations (locks, fences, cameras).
  • Detective: Discover unwanted activity (audit trails, intrusion detection).
  • Compensating: Support other controls (monitoring, security policies).
  • Corrective: Restore systems post-incident (backups, patching).
  • Directive: Control subject actions (policies, signage).

Fundamental Security Concepts

CIA Triad

  • Confidentiality: Only authorized access.
  • Integrity: Prevent unauthorized data modification.
  • Availability: Ensure resource access.

Non-repudiation

  • Digital signatures verify transactions.

AAA Framework

  • Authentication: Verify identity.
  • Authorization: Grant access based on identity.
  • Accounting: Log activity.

Authorization Models

  • Non-discretionary: System-wide restrictions.
  • Discretionary (DAC): Owner-based permissions.
  • Role-based (RBAC): Role-based permissions.
  • Rule-based: Global rules for access.
  • Mandatory (MAC): Label-based access.
  • Attribute-based: Attribute-defined access.

Zero Trust

  • Principles: Assume breach, verify explicitly, least privilege.
  • Policy Decision Point (PDP): Access decisions.
  • Policy Enforcement Point (PEP): Enforce access control.
  • Control Plane & Data Plane: Manage identity, enforce policies.

Physical Security

  • Importance: No security without controlling physical access.
  • Controls: Bollards, access control vestibules, fences, video surveillance, guards, lighting.

Change Management

Processes Impacting Security

  • Approval, Ownership, Stakeholder Analysis, Impact Analysis.
  • Testing & Back-out Plans: Ensure changes don't compromise security.
  • Documentation & Version Control: Track system changes, support security.

Technical Considerations

  • Allow/deny lists, restricted activities, downtime management.
  • Legacy Systems: Special considerations due to outdated tech.

Cryptographic Solutions

Public Key Infrastructure (PKI)

  • Key Management: Securely store, distribute, and manage keys.
  • Certificate Types: User, Root, Domain Validation, Extended Validation, etc.

Encryption Levels

  • File, Volume, Disk: Different levels of data protection.

Symmetric vs. Asymmetric Encryption

  • Symmetric: Shared key, fast for bulk.
  • Asymmetric: Public/private keys, good for secure key distribution.

Cryptographic Tools

  • TPM, HSM, Hardware Root of Trust: Secure key storage.

Obfuscation Techniques

  • Steganography, Tokenization, Pseudonymization, Anonymization.

Other Concepts

  • Hashing & Salting: Ensuring integrity, preventing common password attacks.
  • Digital Signatures: Verify identity, ensure transaction integrity.
  • Blockchain & Public Ledgers: Decentralized data management.

Conclusion

  • Effective use of security controls and cryptographic solutions is crucial for protecting systems.
  • Continuous learning and adaptation to new security challenges is essential.