Coconote
AI notes
AI voice & video notes
Try for free
Overview of Security Plus Exam Concepts
Sep 15, 2024
Security Plus Exam Cram Series 2024 Edition: Domain 1 Overview
Introduction
Focus:
General security concepts.
Covers types of security controls, change management, cryptographic solutions.
Foundation for Security Plus syllabus.
PDF available for deeper study.
Security Controls
Categories of Security Controls
Technical:
Hardware/software mechanisms (encryption, smart cards, passwords).
Physical:
Protect physical facilities (guards, fences, cameras).
Managerial:
Policies/procedures (security training, risk assessments).
Operational:
Day-to-day operations compliance.
Types of Security Controls
Preventive:
Stop unwanted activity (fences, locks).
Deterrent:
Discourage policy violations (locks, fences, cameras).
Detective:
Discover unwanted activity (audit trails, intrusion detection).
Compensating:
Support other controls (monitoring, security policies).
Corrective:
Restore systems post-incident (backups, patching).
Directive:
Control subject actions (policies, signage).
Fundamental Security Concepts
CIA Triad
Confidentiality:
Only authorized access.
Integrity:
Prevent unauthorized data modification.
Availability:
Ensure resource access.
Non-repudiation
Digital signatures verify transactions.
AAA Framework
Authentication:
Verify identity.
Authorization:
Grant access based on identity.
Accounting:
Log activity.
Authorization Models
Non-discretionary:
System-wide restrictions.
Discretionary (DAC):
Owner-based permissions.
Role-based (RBAC):
Role-based permissions.
Rule-based:
Global rules for access.
Mandatory (MAC):
Label-based access.
Attribute-based:
Attribute-defined access.
Zero Trust
Principles:
Assume breach, verify explicitly, least privilege.
Policy Decision Point (PDP):
Access decisions.
Policy Enforcement Point (PEP):
Enforce access control.
Control Plane & Data Plane:
Manage identity, enforce policies.
Physical Security
Importance:
No security without controlling physical access.
Controls:
Bollards, access control vestibules, fences, video surveillance, guards, lighting.
Change Management
Processes Impacting Security
Approval, Ownership, Stakeholder Analysis, Impact Analysis.
Testing & Back-out Plans:
Ensure changes don't compromise security.
Documentation & Version Control:
Track system changes, support security.
Technical Considerations
Allow/deny lists, restricted activities, downtime management.
Legacy Systems:
Special considerations due to outdated tech.
Cryptographic Solutions
Public Key Infrastructure (PKI)
Key Management:
Securely store, distribute, and manage keys.
Certificate Types:
User, Root, Domain Validation, Extended Validation, etc.
Encryption Levels
File, Volume, Disk:
Different levels of data protection.
Symmetric vs. Asymmetric Encryption
Symmetric:
Shared key, fast for bulk.
Asymmetric:
Public/private keys, good for secure key distribution.
Cryptographic Tools
TPM, HSM, Hardware Root of Trust:
Secure key storage.
Obfuscation Techniques
Steganography, Tokenization, Pseudonymization, Anonymization.
Other Concepts
Hashing & Salting:
Ensuring integrity, preventing common password attacks.
Digital Signatures:
Verify identity, ensure transaction integrity.
Blockchain & Public Ledgers:
Decentralized data management.
Conclusion
Effective use of security controls and cryptographic solutions is crucial for protecting systems.
Continuous learning and adaptation to new security challenges is essential.
📄
Full transcript