Coconote
AI notes
AI voice & video notes
Export note
Try for free
Security Plus Exam Cram Series 2024 Edition: Domain 1
Jul 13, 2024
Security Plus Exam Cram Series 2024 Edition: Domain 1 – General Security Concepts
Overview
Focus
: General security concepts
Key Areas
: Security controls, change management, cryptography
Materials
: PDF of presentation, links to study guides and practice resources
Security Controls
Categories
Technical Controls:
Hardware/software mechanisms (e.g., encryption, firewalls, IDS)
Physical Controls:
Protection of facilities and objects (e.g., guards, locks, cameras)
Managerial Controls:
Policies/procedures defined by management (e.g., training, risk assessments)
Operational Controls:
Day-to-day activities ensuring compliance (e.g., awareness training, backup supervision)
Types
Preventive Controls:
Stop unwanted activity (e.g., firewalls, locks)
Deterrent Controls:
Discourage policy violations (e.g., cameras, guards)
Detective Controls:
Discover unwanted activity (e.g., IDS, audit logs)
Compensating Controls:
Support other controls (e.g., policies, procedures)
Corrective Controls:
Restore systems post-incident (e.g., backups, patch management)
Directive Controls:
Enforce compliance (e.g., policies, training)
Key Points
Examples
: Technical (encryption, firewalls); Physical (locks, cameras); Managerial (policies, training); Operational (backups)
Overlaps
: Single controls can map to multiple types
Keywords for Exam
: Deterrent (warning), Preventive (firewall), Directive (policy)
Fundamental Security Concepts (Section 1.2)
CIA Triad
Confidentiality
: Ensuring only authorized access to data
Integrity
: Ensuring data is not altered without authorization
Availability
: Ensuring data is accessible when needed
Non-repudiation
: Ensuring actions/transactions cannot be denied
AAA Model
Authentication
: Proving identity (username/password)
Authorization
: Granting access based on identity
Accounting
: Tracking user activity
Authorization Models
Non-Discretionary
: System-wide rules (e.g., Role-Based Access Control)
Discretionary
: Owners grant access (e.g., NTFS file system)
Role-Based
: Based on roles/groups
Rule-Based
: Applies rules globally (e.g., firewalls)
Mandatory
: Based on labels (e.g., military security)
Attribute-Based
: Based on account attributes (e.g., department)
Gap Analysis & Zero Trust
Gap Analysis
: Comparing current state vs. standards (e.g., ISO 27001)
Zero Trust
: No implicit trust, verify every access
Key Principles
: Assume breach, verify explicitly, least privilege access
Policy Enforcement & Decision Points
: Enforce policies, make access decisions
Control & Data Plane
: Adaptive identity, Threat scope reduction, Policy enforcement
Physical Security
Bollard
: Barrier against vehicle attacks
Access Control Vestibule
: Controls access one person at a time
Fences
: Security perimeter (varying efficacy based on height/composition)
Video Surveillance
: Cameras, motion detection
Security Guards
: Prevent unauthorized access
Lighting
: Deterrent, efficiency measures
Sensors
: Infrared, Pressure, Microwave, Ultrasonic
Deception & Disruption
Honeypot
: Lures attackers, isolates them
Honeynet
: Group of honeypots
Honeyfile
: Decoy file to attract attackers
Honeytoken
: Fake database record
Change Management (Section 1.3)
Approval
: Management reviews/approves changes
Ownership
: Assign responsible owner
Stakeholder Analysis
: Identify impacted individuals/groups
Impact Analysis
: Review potential side effects
Testing
: Validate in test environment
Back-out Plan
: Steps to revert change if issues arise
Maintenance Windows
: Schedule changes to minimize business impact
Technical Implications
Firewall Updates
: Allow/Deny lists
Downtime Considerations
: Plan for service interruptions
Application Restarts
: Manage security posture
Legacy Applications
: Compatibility concerns
Dependency Tracking
: Assess impact on other systems
Documentation & Version Control
Continuous Update
: Ensure accurate record of system state
Critical for Security
: Inaccurate documentation may leave vulnerabilities
Version Control
: Track current versions, common system is Git
Cryptographic Solutions (Section 1.4)
PKI Basics
Key Management
: Generation, storage, exchange, replacement
Certificate Authorities
: Issue/manage certificates
Certificate Revocation List
: Published list of revoked certificates
OCSP
: Real-time certificate status protocol
Certificate Types
User Certificate
: Represents user's digital identity
Root Certificate
: Trust anchor in PKI
Domain Validation
: Proves ownership of domain
Extended Validation
: High trust for entity authenticity
SAN Certificate
: Support multiple domains/IPs
Wildcard Certificate
: Multiple subdomains
Code Signing
: Ensure code origin
Self-signed
: Not recommended for production
Encryption Levels
File
: Individual file level
Volume
: Specific partition/volume
Disk
: Entire disk
Cloud Storage Encryption
: Managed by CSP
Transparent Data Encryption
: Real-time database encryption
Symmetric vs. Asymmetric
Symmetric
: Single shared key, fast, not scalable
Algorithms
: AES, Triple DES, Twofish
Asymmetric
: Public/private key pairs, scalable, non-repudiation
Algorithms
: RSA, ECC, Diffie-Hellman
Hashing & Salting
Hashing
: One-way function, integrity checks (SHA, MD5)
Salting
: Adds random data to hashes to prevent rainbow table attacks
Digital Signatures
Provides
: Authentication, non-repudiation, integrity
Standard
: Digital Signature Standard (DSS)
Key Stretching
Enhances
: Weak keys by making them longer, more random
Blockchain & Open Public Ledger
Blockchain
: Decentralized, immutable, and transparent
Open Public Ledger
: Centralized, mutable, relies on authority
Encryption Tools
Hardware-Based Tools
TPM
: Trusted Platform Module, key management, secure boot
HSM
: Hardware Security Module, key management/performance
Hardware Root of Trust
: Verifies keys match for secure boot
KMS
: Centralized storage for keys (e.g., Azure Key Vault)
Secure Enclave
: Isolated environment for sensitive processing
Obfuscation Techniques
Steganography
: Conceal data within other files
Tokenization
: Replace data with tokens
Pseudonymization
: Use artificial identifiers
Anonymization
: Remove identifiable data
Data Minimization
: Only collect necessary data
Data Masking
: Partially hide sensitive data (e.g., credit card numbers)
📄
Full transcript