Security+ Long Study 1

1.0 General Security Concepts (12%)

1.0 General Security Concepts (12%)

  • 1.1 Compare and contrast various types of security controls

  • 1.2 Summarize fundamental security concepts

  • 1.3 Explain the importance of change management processes and the impact to security

  • 1.4 Explain the importance of using appropriate cryptographic solutions

1.0 General Security Concepts

1.1 Compare and contrast various types of security controls


🟠 Categories:

1. Technical Controls → Implemented through technology, focusing on securing systems, networks, and data.

⚪ Examples: Firewalls, encryption, access controls

2. Managerial Controls → Policies, procedures, and guidelines to manage security efforts.

⚪ Examples: Security policies, risk management frameworks

3. Operational Controls → Day-to-day operational activities ensuring security measures are properly implemented.

⚪ Examples: Security audits, system monitoring

4. Physical Controls → Measures to protect physical assets and facilities.

⚪ Examples: Locks, biometric access controls, surveillance cameras


🟠 Control Types:

1. Preventive Controls → Stop security incidents by preventing unauthorized access or activities.

⚪ Examples: Firewalls, encryption, authentication

2. Deterrent Controls → Discourage attackers by increasing perceived risk or difficulty.

⚪ Examples: Warning signs, security cameras

3. Detective Controls → Identify security incidents after they occur.

⚪ Examples: Intrusion detection systems, security audits

4. Corrective Controls → Mitigate impact of security incidents and restore affected systems.

⚪ Examples: Incident response plans, data backups

5. Compensating Controls → Address security requirements when primary controls are ineffective.

⚪ Examples: Risk acceptance, business continuity planning

6. Directive Controls → Provide guidance on compliance with security policies and standards.

⚪ Examples: Security policies, training


1.2 Summarize fundamental security concepts


🟠 Confidentiality, Integrity, and Availability (CIA)

• Fundamental principles of information security ensuring data is kept confidential, accurate, and available when needed.


🟠 Non-repudiation

• Assurance that a sender cannot deny the authenticity or integrity of a message or transaction.


🟠 Authentication, Authorization, and Accounting (AAA)

• Authenticating people → Verifying the identity of users

• Authenticating systems → Confirming the identity of devices or systems

• Authorization models → Determining what resources users or systems can access


🟠 Gap analysis

• Assessment of the differences between current security measures and desired security objectives.


🟠 Zero Trust

🔹 Control Plane:

• Adaptive identity → Dynamic authentication based on context

• Threat scope reduction → Limiting the potential impact of security breaches

• Policy-driven access control → Access decisions based on defined policies

• Policy Administrator → Management of access control policies

• Policy Engine → Enforcement of access control policies


🔹 Data Plane:

• Implicit trust zones → Segmentation of network based on trust levels

• Subject/System → Entity accessing or being accessed

• Policy Enforcement Point → Mechanism enforcing access control policies


🟠 Physical Security

• Bollards → Posts used to block vehicular access

• Access control vestibule → Enclosed area controlling entry into a secure facility

• Fencing → Barrier to prevent unauthorized access

• Video surveillance → Monitoring system using cameras

• Security guard → Personnel providing physical security

• Access badge → Credential granting entry to a secured area

• Lighting → Illumination to enhance visibility and deter intruders

• Sensors:

⚪ Infrared → Detects heat signatures

⚪ Pressure → Detects physical pressure changes

⚪ Microwave → Emits microwaves to detect motion

⚪ Ultrasonic → Uses sound waves to detect motion


🟠 Deception and Disruption Technology

• Honeypot → Decoy system designed to attract attackers and gather information

• Honeynet → Network of honeypots used for monitoring and analysis

• Honeyfile → Fictitious file used to detect unauthorized access

• Honeytoken → Decoy credential or data item used to detect unauthorized access


1.3 Explain the importance of change management processes and the impact to security


🟠 Business Processes Impacting Security Operations

• Approval Process → Procedure for obtaining authorization for security-related actions or changes

• Ownership → Assignment of responsibility for security tasks or assets to specific individuals or teams

• Stakeholders → Individuals or groups with an interest or involvement in security-related decisions or activities

• Impact Analysis → Assessment of the potential effects of security incidents or changes on business operations

• Test Results → Findings from security testing activities such as penetration testing or vulnerability assessments

• Backout Plan → Contingency plan for reversing changes or mitigating risks if security measures fail or cause issues

• Maintenance Window → Scheduled timeframe during which security updates or maintenance tasks can be performed without disrupting business operations

• Standard Operating Procedure → Established protocol or guideline for carrying out security-related tasks or responding to security incidents


🟠 Technical Implications

• Allow Lists/Deny Lists → Lists of permitted or prohibited entities, actions, or resources within a system or network

• Restricted Activities → Actions or operations that are limited or prohibited due to security considerations

• Downtime → Period during which a system or service is unavailable due to maintenance, security updates, or security incidents

• Service Restart → Process of stopping and restarting a service to apply changes or address security issues

• Application Restart → Reloading or restarting an application to implement security changes or address issues

• Legacy Applications → Older software or systems with potential security vulnerabilities or compatibility issues

• Dependencies → Relationships or connections between systems, applications, or components that may impact security


🟠 Documentation

• Updating Diagrams → Updating visual representations of systems, networks, or processes to reflect changes or security configurations

• Updating Policies/Procedures → Revising written guidelines or protocols to align with changes in security practices or requirements

• Version Control → Managing and tracking changes to documents, policies, procedures, or software to ensure accuracy, accountability, and compliance


1.4 Explain the importance of using appropriate cryptographic solutions


🟠 Public Key Infrastructure (PKI)

• Public Key → A cryptographic key that is shared openly and used for encryption or verifying signatures

• Private Key → A secret key that is kept confidential and used for decrypting data or creating digital signatures

• Key Escrow → A process where cryptographic keys are stored by a trusted third party for emergency access


🟠 Encryption

Level → Various levels of encryption applied to different aspects of data storage and communication:

• Full-disk

• Partition

• File

• Volume

• Database

• Record

• Transport/Communication → Securing data during transmission between devices or networks


Types:

• Asymmetric Encryption → Encryption method using pairs of keys: public and private keys

• Symmetric Encryption → Encryption method using a single key for both encryption and decryption


Key Exchange → Process of securely sharing cryptographic keys between parties

Algorithms → Mathematical formulas used for encryption and decryption

Key Length → The size of the cryptographic key, influencing the strength of encryption


🟠 Tools

• Trusted Platform Module (TPM) → Hardware component for securely storing cryptographic keys and performing cryptographic operations

• Hardware Security Module (HSM) → Dedicated hardware device for managing, storing, and processing cryptographic keys securely

• Key Management System → Software or hardware solution for generating, storing, and distributing cryptographic keys

• Secure Enclave → Isolated hardware or software environment for secure processing of sensitive data


🟠 Obfuscation

• Steganography → Concealing data within other data to hide its existence

• Tokenization → Substituting sensitive data with non-sensitive placeholders

• Data Masking → Concealing or anonymizing specific data elements within a dataset


🟠 Hashing

• Generating a fixed-size, unique hash value from input data using cryptographic algorithms


🟠 Salting

• Adding random data to input before hashing to prevent identical inputs from producing the same hash


🟠 Digital Signatures

• Cryptographic signatures that verify the authenticity and integrity of digital messages or documents


🟠 Key Stretching

• Technique to increase the computational effort required to derive keys from passwords


🟠 Blockchain

• Distributed, decentralized ledger technology used for secure and transparent record-keeping

Open Public Ledger → Transparent and publicly accessible record of transactions or data entries


🟠 Certificates

• Digital documents used to authenticate the identity of users, devices, or organizations

Certificate Authorities → Entities that issue and manage digital certificates

Certificate Revocation Lists (CRLs) → Lists of revoked or compromised digital certificates

Online Certificate Status Protocol (OCSP) → Protocol for checking the revocation status of digital certificates in real-time

Self-signed → Digital certificates signed by their own issuer

Third-party → Digital certificates issued by a trusted third-party CA

Root of Trust → A trusted entity or component from which cryptographic operations and trust relationships originate

Certificate Signing Request (CSR) Generation → Process of requesting a digital certificate from a CA

Wildcard → A digital certificate that can secure multiple subdomains of a domain