Overview of Security Plus Exam Concepts

Sep 22, 2024

Security Plus Exam Cram: Domain 1 Overview

Introduction

  • Focus on General Security Concepts.
  • Covers categories and types of security controls, change management impact, and cryptographic solutions.
  • Foundation for Security Plus syllabus.

Resources

  • PDF copy of the presentation and clickable table of content available.
  • Recommended resources: Cybex official study guide with practice exams and questions.

Security Controls

Categories of Security Controls

  • Technical: Hardware/software mechanisms, e.g., encryption, firewalls.
  • Physical: Protect facilities and real-world objects, e.g., locks, cameras.
  • Managerial: Policies and procedures, e.g., risk assessments.
  • Operational: Day-to-day operations, enforced by people.

Types of Security Controls

  • Preventive: Stop unwanted activity, e.g., locks, passwords.
  • Deterrent: Discourage violations, e.g., security badges.
  • Detective: Discover unwanted activity, e.g., intrusion detection.
  • Corrective: Restore systems, e.g., backups, patching.
  • Compensating: Support other controls, e.g., supervision.
  • Directive: Encourage compliance, e.g., policies, guidelines.

Fundamental Security Concepts

CIA Triad

  • Confidentiality: Ensures only authorized access.
  • Integrity: Ensures data isn't modified without authorization.
  • Availability: Ensures timely access to resources.

Authentication, Authorization, and Accounting (AAA)

  • Authentication: Prove identity with credentials.
  • Authorization: Access based on permissions.
  • Accounting: Track user activity and resource access.

Authorization Models

  • Non-Discretionary: System-wide restrictions.
  • Discretionary: Owner grants access.
  • Role-Based: Uses roles/groups for permissions.
  • Rule-Based: Global rules apply to all subjects.
  • Mandatory: Based on predefined labels.
  • Attribute-Based: Restricts access based on attributes.

Change Management

Importance

  • Reduces risk of unauthorized changes and outages.
  • Involves request, approval, testing, and documentation.

Business Processes

  • Approval: Management reviews proposed changes.
  • Ownership: Clear responsibility for each change.
  • Stakeholder Analysis: Identify affected groups.
  • Impact Analysis: Review potential impacts.
  • Testing and Backout Plans: Validate changes and roll back if needed.

Cryptographic Solutions

Public Key Infrastructure (PKI)

  • Key Management: Manage generation, exchange, storage, and destruction of keys.
  • Certificate Authorities: Issue digital certificates.
  • CRL and OCSP: Manage certificate revocation status.

Encryption Levels

  • File Encryption: Individual files.
  • Volume Encryption: Specific volume or partition.
  • Disk Encryption: Entire disk.

Encryption Types

  • Symmetric: Shared secret key, fast for bulk encryption.
  • Asymmetric: Public/private key pairs, supports scalability and non-repudiation.

Tools and Concepts

  • TPM and HSM: Secure storage of keys.
  • Key Management Systems: Centralized storage and access for secrets.
  • Digital Signatures: Provide authentication, non-repudiation, and integrity.

Conclusion

  • Domain 1 provides a comprehensive foundation for the Security Plus exam, focusing on essential security concepts and controls.
  • Mastery of these topics is crucial for understanding more advanced security measures in subsequent domains.