CompTIA Security+ (SY0-701)
CompTIA Security+ (SY0-701)
Introduction
● Introduction
○ CompTIA Security+ (SY0-701) certification is considered an intermediate level
information technology certification and an entry level cyber security certification that
focuses on your ability to assess the security posture of an enterprise environment
○ This certification is designed for information technology professionals or aspiring
cybersecurity professionals who have already earned their CompTIA A+ and Network+
certifications, but this is a recommendation from CompTIA and not a strict requirement
■ If you have the equivalent of 1-2 years of working with hardware, software, and
networks, then you will do fine in this course
○ This course is designed as a full textbook replacement, but if you would like to get a
textbook to study from as well, we recommend the official CompTIA Security+ Student
Guide available directly from CompTIA
○ CompTIA Security+ (SY0-701) certification exam consists of five domains or areas of
knowledge
■ 12% of General Security Concepts
■ 22% of Threats, Vulnerabilities, and Mitigations
■ 18% of Security Architecture
■ 28% of Security Operations
1
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
2
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Exam Tips
○ There will be no trick questions
■ Always be on the lookout for distractors or red herrings
■ At least one of the four listed possible answer choices that are written to try and
distract you from the correct answer
○ Pay close attention to words in bold, italics, or all uppercase
○ Answer the questions based on CompTIA Security+ knowledge
■ In cybersecurity, there really is no 100% correct answers in the real world
because everything is situational
■ When in doubt, choose the answer that is correct for the highest number of
situations
○ Understand the key concepts of the test questions
○ Do not memorize the terms word for word, try to understand them instead
○ During the exam, the answers will be from multiple-choice style questions
3
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Fundamentals of Security
Objectives:
● 1.1 - Compare and contrast various types of security controls
● 1.2 - Summarize fundamental security concepts
● Fundamentals of Security
○ Information Security
■ Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction
○ Information Systems Security
■ Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data
○ CIA Triad
■ Confidentiality
● Ensures information is accessible only to authorized personnel (e.g.,
encryption)
■ Integrity
● Ensures data remains accurate and unaltered (e.g., checksums)
■ Availability
● Ensures information and resources are accessible when needed (e.g.,
redundancy measures)
○ Non-Repudiation
■ Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)
4
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ CIANA Pentagon
■ An extension of the CIA triad with the addition of non-repudiation and
authentication
○ Triple A’s of Security
■ Authentication
● Verifying the identity of a user or system (e.g., password checks)
■ Authorization
● Determining actions or resources an authenticated user can access (e.g.,
permissions)
■ Accounting
● Tracking user activities and resource usage for audit or billing purposes
○ Security Control Categories
■ Technical
■ Managerial
■ Operational
■ Physical
○ Security Control Types
■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive
○ Zero Trust Model
■ Operates on the principle that no one should be trusted by default
5
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ To achieve zero trust, we use the control plane and the data plane
● Control Plane
○ Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones
● Data Plane
○ Subject/system, policy engine, policy administrator, and
establishing policy enforcement points
6
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Where threats and vulnerabilities intersect, that is where the risk to your enterprise
systems and networks lies
■ If you have a threat, but there is no matching vulnerability to it, then you have no
risk
■ The same holds true that if you have a vulnerability but there’s no threat against
it, there would be no risk
○ Risk Management
■ Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome
● Confidentiality
○ Confidentiality
■ Refers to the protection of information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes
○ Confidentiality is important for 3 main reasons
■ To protect personal privacy
■ To maintain a business advantage
■ To achieve regulatory compliance
○ To ensure confidentiality, we use five basic methods
■ Encryption
● Process of converting data into a code to prevent unauthorized access
■ Access Controls
● By setting up strong user permissions, you ensure that only authorized
personnel can access certain types data
7
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Data Masking
● Method that involves obscuring specific data within a database to make it
inaccessible for unauthorized users while retaining the real data's
authenticity and use for authorized users
■ Physical Security Measures
● Ensure confidentiality for both physical types of data, such as paper
records stored in a filing cabinet, and for digital information contained on
servers and workstations
■ Training and Awareness
● Conduct regular training on the security awareness best practices that
employees can use to protect their organization’s sensitive data
● Integrity
○ Integrity
■ Helps ensure that information and data remain accurate and unchanged from its
original state unless intentionally modified by an authorized individual
■ Verifies the accuracy and trustworthiness of data over the entire lifecycle
○ Integrity is important for three main reasons
■ To ensure data accuracy
■ To maintain trust
■ To ensure system operability
○ To help us maintain the integrity of our data, systems, and networks, we usually utilize
five methods
■ Hashing
● Process of converting data into a fixed-size value
8
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Digital Signatures
● Ensure both integrity and authenticity
■ Checksums
● Method to verify the integrity of data during transmission
■ Access Controls
● Ensure that only authorized individuals can modify data and this reduces
the risk of unintentional or malicious alterations
■ Regular Audits
● Involve systematically reviewing logs and operations to ensure that only
authorized changes have been made, and any discrepancies are
immediately addressed
● Availability
○ Availability
■ Ensure that information, systems, and resources are accessible and operational
when needed by authorized users
○ As cybersecurity professionals, we value availability since it can help us with the
following
■ Ensuring Business Continuity
■ Maintaining Customer Trust
■ Upholding an Organization's Reputation
○ To overcome the challenges associated with maintaining availability, the best strategy is
to use redundancy in your systems and network designs
■ Redundancy
● Duplication of critical components or functions of a system with the
9
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Non-repudiation
○ Non-repudiation
■ Focused on providing undeniable proof in the world of digital transactions
■ Security measure that ensures individuals or entities involved in a
communication or transaction cannot deny their participation or the authenticity
of their actions
○ Digital Signatures
■ Considered to be unique to each user who is operating within the digital domain
■ Created by first hashing a particular message or communication that you want to
digitally sign, and then it encrypts that hash digest with the user’s private key
using asymmetric encryption
10
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Authentication
○ Authentication
■ Security measure that ensures individuals or entities are who they claim to be
during a communication or transaction
○ 5 commonly used authentication methods
■ Something you know (Knowledge Factor)
● Relies on information that a user can recall
■ Something you have (Possession Factor)
● Relies on the user presenting a physical item to authenticate themselves
■ Something you are (Inherence Factor)
● Relies on the user providing a unique physical or behavioral characteristic
of the person to validate that they are who they claim to be
■ Something you do (Action Factor)
● Relies on the user conducting a unique action to prove who they are
■ Somewhere you are (Location Factor)
● Relies on the user being in a certain geographic location before access is
granted
○ Multi-Factor Authentication System (MFA)
■ Security process that requires users to provide multiple methods of identification
to verify their identity
11
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Authorization
○ Authorization
■ Pertains to the permissions and privileges granted to users or entities after they
have been authenticated
○ Authorization mechanisms are important to help us with the following
■ To protect sensitive data
■ To maintain the system integrity in our organizations
■ To create a more streamlined user experience
● Accounting
○ Accounting
■ Security measure that ensures all user activities during a communication or
transaction are properly tracked and recorded
○ Your organization should use a robust accounting system so that you can create the
following
■ Create an audit trail
● Provides a chronological record of all user activities that can be used to
trace changes, unauthorized access, or anomalies back to a source or
point in time
■ Maintain regulatory compliance
● Maintains a comprehensive record of all users’ activities
12
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
13
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Managerial Controls
● Sometimes also referred to as administrative controls
● Involve the strategic planning and governance side of security
■ Operational Controls
● Procedures and measures that are designed to protect data on a
day-to-day basis
● Are mainly governed by internal processes and human actions
■ Physical Controls
● Tangible, real-world measures taken to protect assets
14
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
shortly thereafter
■ Corrective Controls
● Mitigate any potential damage and restore our systems to their normal
state
■ Compensating Controls
● Alternative measures that are implemented when primary security
controls are not feasible or effective
■ Directive Controls
● Guide, inform, or mandate actions
● Often rooted in policy or documentation and set the standards for
behavior within an organization
● Gap Analysis
○ Gap Analysis
■ Process of evaluating the differences between an organization's current
performance and its desired performance
○ Conducting a gap analysis can be a valuable tool for organizations looking to improve
their operations, processes, performance, or overall security posture
○ There are several steps involved in conducting a gap analysis
■ Define the scope of the analysis
■ Gather data on the current state of the organization
■ Analyze the data to identify any areas where the organization's current
performance falls short of its desired performance
■ Develop a plan to bridge the gap
15
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Zero Trust
○ Zero Trust demands verification for every device, user, and transaction within the
network, regardless of its origin
○ To create a zero trust architecture, we need to use two different planes
■ Control Plane
● Refers to the overarching framework and set of components responsible
for defining, managing, and enforcing the policies related to user and
system access within an organization
● Control Plane typically encompasses several key elements
○ Adaptive Identity
■ Relies on real-time validation that takes into account the
user's behavior, device, location, and more
16
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
17
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Threat Actors
Objectives:
● 1.2 - Summarize fundamental security concepts
● 2.1 - Compare and contrast common threat actors and motivations
● 2.2 - Explain common threat vectors and attack surfaces
● Threat Actors
○ Threat Actor Motivations
■ Data Exfiltration
■ Blackmail
■ Espionage
■ Service Disruption
■ Financial Gain,
■ Philosophical/Political Beliefs
■ Ethical Reasons
■ Revenge
■ Disruption/Chaos
■ War
○ Threat Actor Attributes
■ Internal vs. External Threat Actors
■ Differences in resources and funding
■ Level of sophistication
○ Types of Threat Actors
■ Unskilled Attackers
● Limited technical expertise, use readily available tools
18
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Hacktivists
● Driven by political, social, or environmental ideologies
■ Organized Crime
● Execute cyberattacks for financial gain (e.g., ransomware, identity theft)
■ Nation-state Actor
● Highly skilled attackers sponsored by governments for cyber espionage or
warfare
■ Insider Threats
● Security threats originating from within the organization
○ Shadow IT
■ IT systems, devices, software, or services managed without explicit organizational
approval
○ Threat Vectors and Attack Surfaces
■ Message-based
■ Image-based
■ File-based
■ Voice Calls
■ Removable Devices
■ Unsecured Networks
○ Deception and Disruption Technologies
■ Honeypots
● Decoy systems to attract and deceive attackers
■ Honeynets
● Network of decoy systems for observing complex attacks
■ Honeyfiles
● Decoy files to detect unauthorized access or data breaches
19
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Honeytokens
● Fake data to alert administrators when accessed or used
20
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
21
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Unskilled Attackers
○ Unskilled Attacker (Script Kiddie)
■ Individual who lacks the technical knowledge to develop their own hacking tools
or exploits
■ These low-skilled threat actors need to rely on scripts and programs that have
been developed by others
○ How do these unskilled attackers cause damage?
■ One way is to launch a DDoS attack
22
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ An unskilled attacker can simply enter in the IP address of the system they want
to target, and then click a button to launch an attacker against that target
● Hacktivists
○ Hacktivists
■ Individuals or groups that use their technical skills to promote a cause or drive
social change instead of for personal gain
○ Hacktivism
■ Activities in which the use of hacking and other cyber techniques is used to
promote or advance a political or social cause
○ To accomplish their objectives, hacktivists use a wide range of techniques to achieve
their goals
■ Website Defacement
● Form of electronic graffiti and is usually treated as an act of vandalism
■ Distributed Denial of Service (DDoS) Attacks
● Attempting to overwhelm the victim's systems or networks so that they
cannot be accessed by the organization's legitimate users
■ Doxing
● Involves the public release of private information about an individual or
organization
23
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Organized Crime
○ Organized cybercrime groups are groups or syndicates that have banded together to
conduct criminal activities in the digital world
■ Sophisticated and well structured
■ Use resources and technical skills for illicit gain
○ In terms of their technical capabilities, organized crime groups possess a very high level
of technical capability and they often employ advanced hacking techniques and tools
■ Custom Malware
■ Ransomware
■ Sophisticated Phishing Campaigns
○ These criminal groups will engage in a variety of illicit activities to generate revenue for
their members
■ Data Breaches
■ Identity Theft
■ Online Fraud
■ Ransomware Attacks
○ Unlike hacktivists or nation state actors, organized cybercrime groups are not typically
driven by ideological or political objectives
■ These groups may be hired by other entities, including governments, to conduct
cyber operations and attacks on their behalf
24
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Money, not other motivations is the objective of their attacks even if the attack
takes place in the political sphere
● Nation-state Actor
○ Nation-state Actor
■ Groups or individuals that are sponsored by a government to conduct cyber
operations against other nations, organizations, or individuals
○ Sometimes, these threat actors attempt what is known as a false flag attack
■ False Flag Attack
● Attack that is orchestrated in such a way that it appears to originate from
a different source or group than the actual perpetrators, with the intent
to mislead investigators and attribute the attack to someone else
○ Nation-state actors possess advanced technical skills and extensive resources, and they
are capable of conducting complex, coordinated cyber operations that employ a variety
of techniques such as
■ Creating custom malware
■ Using zero-day exploits
■ Becoming an advanced persistent threats
○ Advanced Persistent Threat (APT)
■ Term that used to be used synonymously with a nation-state actor because of
their long-term persistence and stealth
■ A prolonged and targeted cyberattack in which an intruder gains unauthorized
access to a network and remains undetected for an extended period while trying
to steal data or monitor network activities rather than cause immediate damage
■ These advanced persistent threats are often sponsored by a nation-state or its
proxies, like organized cybercrime groups
25
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Insider Threats
○ Insider Threats
■ Cybersecurity threats that originate from within the organization
■ Will have varying levels of capabilities
○ Insider threats can take various forms
■ Data Theft
■ Sabotage
■ Misuse of access privileges
○ Each insider threat is driven by different motivations
■ Some are driven by financial gain and they want to profit from the sale of
sensitive organizational data to others
■ Some may be motivated by revenge and are aiming to harm the organization due
to some kind of perceived wrong levied against the insider
■ Some may take actions as a result of carelessness or a lack of awareness of
cybersecurity best practices
○ Remember
■ Insider threat refers to the potential risk posed by individuals within an
organization who have access to sensitive information and systems, and who may
misuse this access for malicious or unintended purposes
■ To mitigate the risk of an insider threat being successful, organizations should
implement the following
● Zero-trust architecture
26
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Shadow IT
○ Shadow IT
■ Use of information technology systems, devices, software, applications, and
services without explicit organizational approval
■ IT-related projects that are managed outside of, and without the knowledge of,
the IT department
○ Why does Shadow IT exist?
■ An organization's security posture is actually set too high or is too complex for
business operations to occur without be negatively affected
○ Bring Your Own Devices (BYOD)
■ Involves the use of personal devices for work purposes
27
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
28
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Removable Devices
● One common technique used with removable devices is known as baiting
○ Baiting
■ Attacker might leave a malware-infected USB drive in a
location where their target might find it, such as in the
parking lot or the lobby of the targeted organization
■ Unsecure Networks
● Unsecure networks includes wireless, wired, and Bluetooth networks that
lack the appropriate security measures to protect these networks
● If wireless networks are not properly secured, unauthorized individuals
can intercept the wireless communications or gain access to the network
● Wired networks tend to be more secure than their wireless networks, but
they are still not immune to threats
○ Physical access to the network infrastructure can lead to various
attacks
■ MAC Address Cloning
■ VLAN Hopping
● By exploiting vulnerabilities in the Bluetooth protocol, an attacker can
carry out their attacks using techniques like the BlueBorne or BlueSmack
exploits
○ BlueBorne
■ Set of vulnerabilities in Bluetooth technology that can
allow an attacker to take over devices, spread malware, or
even establish an on-path attack to intercept
communications without any user interaction
29
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ BlueSmack
■ Type of Denial of Service attack that targets
Bluetooth-enabled devices by sending a specially crafted
Logical Link Control and Adaptation Protocol packet to a
target device
30
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Honeytokens
● Piece of data or a resource that has no legitimate value or use but is
monitored for access or use
○ Some disruption technologies and strategies to help secure our enterprise networks
■ Bogus DNS entries
● Fake Domain Name System entries introduced into your system's DNS
server
■ Creating decoy directories
● Fake folders and files placed within a system's storage
■ Dynamic page generation
● Effective against automated scraping tools or bots trying to index or steal
content from your organization's website
■ Use of port triggering to hide services
● Port Triggering
○ Security mechanism where specific services or ports on a network
device remain closed until a specific outbound traffic pattern is
detected
■ Spoofing fake telemetry data
● When a system detects a network scan is being attempted by an attacker,
it can be configured to respond by sending out fake telemetry or network
data
31
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Physical Security
Objectives:
● 1.2 - Summarize fundamental security concepts
● 2.4 - Analyze indicators of malicious activity
● Physical Security
○ Physical Security
■ Measures to protect tangible assets (buildings, equipment, people) from harm or
unauthorized access
○ Security Controls
■ Fencing and Bollards
● Bollards
○ Short, sturdy vertical posts controlling or preventing vehicle access
● Fences
○ Barriers made of posts and wire or boards to enclose or separate
areas
■ Brute Force Attacks
● Forcible entry
● Tampering with security devices
● Confronting security personnel
● Ramming a barrier with a vehicle
■ Surveillance Systems
● An organized strategy to observe and report activities
● Components
○ Video surveillance
32
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Security guards
○ Lighting
○ Sensors
■ Access Control Vestibules
● Double-door system electronically controlled to allow only one door open
at a time
● Prevents piggybacking and tailgating
■ Door Locks
● Padlocks
● Pin and tumbler locks
● Numeric locks
● Wireless locks
● Biometric locks
● Cipher locks
● Electronic access control systems
■ Access Badges
● Use of Radio Frequency Identification (RFID) or Near Field
Communication (NFC) for access
33
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
34
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Surveillance Systems
○ Surveillance System
■ Organized strategy or setup designed to observe and report activities in a given
area
○ Surveillance is often comprised of four main categories
■ Video Surveillance
● Can include the following
○ Motion detection
○ Night vision
○ Facial recognition
● Remote access
● Provides real-time visual feedback
● A wired solution security camera is physically cabled from the device back
to the central monitoring station
35
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● A wireless solution relies on Wi-Fi to send its signal back to the central
monitoring station
● Pan-Tilt-Zoom (PTZ) System
○ Can move the camera or its angle to better detect issues during an
intrusion
● Best places to have cameras
○ Data center
○ Telecommunications closets
○ Entrance or exit areas
● Cameras should be configured to record what they’re observing
■ Security Guards
● Flexible and adaptable forms of surveillance that organizations use
● Helps to reassure your staff or your customers that they are safe
■ Lighting
● Proper lighting is crucial for conducting effective surveillance using both
video and security guards
● If you create well-lit areas, this can deter criminals, reduce shadows and
hiding spots, and enhance the quality of your video recordings
■ Sensors
● Devices that detect and respond to external stimuli or changes in the
environment
● There are four categories of sensors
○ Infrared Sensors
■ Detect changes in infrared radiation that is often emitted
by warm bodies like humans or animals
36
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Pressure Sensors
■ Activated whenever a specified minimum amount of
weight is detected on the sensor that is embedded into the
floor or a mat
○ Microwave Sensors
■ Detect movement in an area by emitting microwave pulses
and measuring their reflection off moving objects
○ Ultrasonic Sensors
■ Measures the reflection of ultrasonic waves off moving
objects
37
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
38
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Door Locks
○ Door Locks
■ Critical physical security control measure designed to restrict and regulate access
to specific spaces or properties, preventing unauthorized intrusions and
safeguarding sensitive data and individuals
○ Types of Door Locks
■ Traditional Padlocks
● Easily defeated and offer minimal protection
39
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
40
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Some electronic door locks use multiple factors, such as an identification number and
fingerprint, to increase security
○ Cipher Locks
■ Mechanical locks with numbered push buttons, requiring a correct combination
to open
■ Commonly used in high-security areas like server rooms
○ Secure entry areas in office buildings, often using electronic access systems with badges
and PINs for authentication
41
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
42
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Social Engineering
Objectives:
● 2.2 - Explain common threat vectors and attack surfaces
● 5.6 - Given a scenario, you must be able to implement security awareness practices
● Social Engineering
○ Social Engineering
■ Manipulative strategy exploiting human psychology for unauthorized access to
systems, data, or physical spaces
○ Motivational Triggers
■ Used by Social Engineers
● Familiarity and Likability
● Consensus and Social Proof
● Authority and Intimidation
● Scarcity and Urgency
○ Social Engineering Techniques
■ Impersonation
● Pretending to be someone else
● Includes brand impersonation, typo-squatting, and watering hole attacks
■ Pretexting
● Creating a fabricated scenario to manipulate targets
● Impersonating trusted figures to gain trust
43
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
44
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Motivational Triggers
○ Six main types of motivational triggers that social engineers use
■ Authority
● Most people are willing to comply and do what you tell them to do if they
believe it is coming from somebody who is in a position of authority to
make that request
■ Urgency
● Compelling sense of immediacy or time-sensitivity that drives individuals
to act swiftly or prioritize certain actions
■ Social Proof
● Psychological phenomenon where individuals look to the behaviors and
actions of others to determine their own decisions or actions in similar
situations
■ Scarcity
● Psychological pressure people feel when they believe a product,
opportunity, or resource is limited or in short supply
■ Likability
● Most people want to interact with people they like, and social engineers
realize this
● Can be
○ Sexual attraction
○ Pretending to be a friend
○ Common interest
■ Fear
● These types of attacks generally are focused on "if you don't do what I tell
you, then this bad thing is going to happen to you”
45
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Impersonation
○ Four main forms of impersonation used by attackers
■ Impersonation
● Attack where an adversary assumes the identity of another person to gain
unauthorized access to resources or steal sensitive data
● Requires the attacker to collect information about the organization so
that they can more easily earn the trust of their targeted users
● Attackers provide details to help make the lies and the impersonation
more believable to a potential victim
● Consequences
○ Unauthorized access
○ Disruption of services
○ Complete system takeover
● To mitigate against these types of attacks, organizations must provide
security awareness training to their employees on a regular basis so that
they remain vigilant against future attacks
■ Brand Impersonation
● More specific form of impersonation where an attacker pretends to
represent a legitimate company or brand
● Attackers use the brand’s logos, language, and information to create
deceptive communications or website
● To protect against brand impersonation, organizations should do the
following
○ Educate their users about these types of threats
○ Use secure email gateways to filter out phishing emails
46
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
47
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Pretexting
○ Pretexting
■ Gives some amount of information that seems true so that the victim will give
more information
○ Mitigation involves training the employees not to fall for pretext and not to fill in the
gaps for people when they are calling
● Phishing Attacks
○ Different Types of Phishing Attacks
■ Phishing
● Sending fraudulent emails that appear to be from reputable sources with
the aim of convincing individuals to reveal personal information, such as
passwords and credit card numbers
■ Spear Phishing
● More targeted form of phishing that is used by cybercriminals who are
more tightly focused on a specific group of individuals or organizations
● Has a higher success rate
■ Whaling
● Form of spear phishing that targets high-profile individuals, like CEOs or
CFOs
● Attacker isn't trying to catch the little fish in an organization, but instead
they want to catch one of the executives, board members, or higher level
managers in the company since the rewards are potentially much greater
● Often used as an initial step to compromise an executive’s account for
subsequent attacks within their organization
48
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
49
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ To help prevent phishing your organization should regularly conduct user security
awareness training that contains coverage of the various phishing techniques
■ Phishing
■ Spear Phishing
■ Whaling
■ Business Email Compromise
■ Vishing
■ Smishing
■ Along with other relevant cyber threats and attacks that may affect your
organization
○ There are some commonly used key indicators that are associated with phishing attacks
■ Urgency
● Phishing emails often create a sense of urgency by prompting the
recipient to act immediately
■ Unusual Requests
● If your receive an email requesting sensitive information, such as
passwords or credit card numbers, you should treat these emails with a
lot of suspicion
■ Mismatched URLs
● When you are looking at an HTML-based email, the words you are
reading are called the display text, but the underlying URL of the weblink
could be set to anything you want
● To check if the text-based link matches the underlying URL, you should
always hover your mouse over the link in the email for a few seconds and
this will reveal the actual URL that the link is connected to
50
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
51
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Influence Campaigns
○ Influence Campaigns
■ Coordinated efforts to affect public perception or behavior towards a particular
cause, individual, or group
■ Are a powerful tool for shaping public opinion and behavior
■ Foster misinformation and disinformation
○ Misinformation
■ False or inaccurate information shared without harmful intent
○ Disinformation
■ Involves the deliberate creation and sharing of false information with the intent
to deceive or mislead
○ Remember, misinformation and disinformation can have serious consequences because
52
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
they can undermine public trust in institutions, fuel social divisions, and even influence
the outcomes of elections
53
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Eavesdropping
● Involves the process of secretly listening to private conversations
● perpetrator intercepts the communication of parties without their
knowledge
● Prevent this by encrypting data in transit
■ Baiting
● Involves leaving a malware-infected physical device, like a USB drive, in a
place where it will be found by a victim, who will then hopefully use the
device to unknowingly install malware on their organization's computer
system
● To prevent baiting, train users to not use devices they find
■ Piggybacking and Tailgating
● Involve an unauthorized person following an authorized person into a
secure area
● Tailgating
○ Attacker attempts to follow an employee through an access
control vestibule or access control point without their knowledge
● Piggybacking
○ Involves an attacker convincing an authorized employee to let
them into the facility by getting the authorized employee to swipe
their own access badge and allow the attacker inside the facility
54
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Malware
Objective 2.4: Given a scenario, analyze indicators of malicious activity
● Malware
○ Malware
■ Malicious software designed to infiltrate computer systems and potentially
damage them without user consent
○ Categories
■ Viruses
■ Worms
■ Trojans
■ Ransomware
■ Spyware
■ Rootkits
■ Spam
○ Threat Vector vs. Attack Vector
■ Threat Vector
● Method used to infiltrate a victim's machine
● Examples
○ Unpatched software
○ USB drive installation
○ Phishing campaigns
■ Attack Vector
● Means by which the attacker gains access and infects the system
● Combines both infiltration method and infection process
55
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
56
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Viruses
○ Computer Virus
■ Made up of malicious code that's run on a machine without the user's
knowledge and this allows the code to infect the computer whenever it has been
run
○ 10 Different Types of Viruses
■ Boot Sector
● One that is stored in the first sector of a hard drive and is then loaded
into memory whenever the computer boots up
■ Macro
● Form of code that allows a virus to be embedded inside another
document so that when that document is opened by the user, the virus is
executed
57
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Program
● Try to find executables or application files to infect with their malicious
code
■ Multipartite
● Combination of a boot sector type virus and a program virus
● Able to place itself in the boot sector and be loaded every time the
computer boots
● It can install itself in a program where it can be run every time the
computer starts up
■ Encrypted
● Designed to hide itself from being detected by encrypting its malicious
code or payloads to avoid detection by any antivirus software
■ Polymorphic
● Advanced version of an encrypted virus, but instead of just encrypting the
contents it will actually change the viruses code each time it is executed
by altering the decryption module in order for it to evade detection
■ Metamorphic
● Able to rewrite themselves entirely before it attempts to infect a given file
■ Stealth
● Technique used to prevent the virus from being detected by the anti-virus
software
■ Armored
● Have a layer of protection to confuse a program or a person who's trying
to analyze it
■ Hoax
● Form of technical social engineering that attempts to scare our end users
58
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Worms
○ Worm
■ Piece of malicious software, much like a virus, but it can replicate itself without
any user interaction
■ Able to self-replicate and spread throughout your network without a user's
consent or their action
● Trojans
○ Trojan
■ Piece of malicious software that is disguised as a piece of harmless or desirable
software
■ Claims that it will perform some needed or desired function for you
○ Remote Access Trojan (RAT)
■ Widely used by modern attackers because it provides the attacker with remote
control of a victim machine
○ Trojans are commonly used today by attackers to exploit a vulnerability in your
workstation and then conducting data exfiltration to steal your sensitive documents,
59
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Ransomware
○ Ransomware
■ Type of malicious software that is designed to block access to a computer system
or its data by encrypting it until a ransom is paid to the attacker
○ How can we protect ourselves and our organizations against ransomware?
■ Always conduct regular backups
■ Install software updates regularly
■ Provide security awareness training to your users
■ Implement Multi-Factor Authentication (MFA)
○ What should you do if you find yourself or your organization as the victim of a
ransomware attack?
■ Never pay the ransom
● Paying the ransom doesn't actually guarantee that you will ever get your
data back
■ If you suspect ransomware has infected your machine, you should disconnect it
from the network
■ Notify the authorities
■ Restore your data and systems from known good backups
60
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Zombie
■ Name of a compromised computer or device that is part of a botnet
■ Used to perform tasks using remote commands from the attacker without the
user's knowledge
○ Command and Control Node
■ Computer responsible for managing and coordinating the activities of other
nodes or devices within a network
○ Botnets are used
■ as pivot points
■ disguise the real attacker
■ to host illegal activities
■ to spam others by sending out phishing campaigns and other malware
○ Most common use for a botnet is to conduct a DDoS (Distributed Denial-of-Service)
attack
■ Distributed Denial-of-Service (DDoS) Attack
● Occurs when many machines target a single victim and attack them at the
exact same time
○ Botnets are used by attackers to combine processing power to break through different
types of encryption schemes
○ Attackers usually only use about 20-25% of any zombie’s power
● Rootkits
○ Rootkit
■ Designed to gain administrative level control over a given computer system
without being detected
61
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Account with the highest level of permissions is called the Administrator account
■ Allows the person to install programs, delete programs, open ports, shut ports,
and do whatever it is they want to do on that system
■ In a UNIX, Linux, or MacOS computer, this type of administrator account is
actually called the root account
○ A computer system has several different rings of permissions throughout the system
■ Ring 3 (Outermost Ring)
● Where user level permissions are used
■ Ring 0 (Innermost or Highest Permission Levels)
● Operating in Ring 0 is called “kernel mode”
● Kernel Mode
○ Allows a system to control access to things like device drivers, your
sound card, your video display or monitor, and other similar things
○ If you login as the administrator or root user on a system, you have root permission and
you will be operating at Ring 1 of the operating system
■ Remember, the closer the malicious code is to the kernel, the more permissions
it will have and the more damage it can cause on your system
○ When a rootkit is installed on a system, it tries to move from Ring 1 to Ring 0 so that it
can hide from other functions of the operating system to avoid detection
○ One technique used by rootkits to gain this deeper level of access is a DLL injection
■ DLL Injection
● Technique used to run arbitrary code within the address space of another
process by forcing it to load a dynamic-link library
■ Dynamic Link Library (DLL)
● Collection of code and data that can be used by multiple programs
simultaneously to allow for code reuse and modularization in software
62
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
development
■ Shim
● Piece of software code that is placed between two components and that
intercepts the calls between those components and can be used redirect
them
○ Rootkits are extremely powerful, and they are very difficult to detect because the
operating system is essentially blinded to them
■ To detect them, the best way is to boot from an external device and then scan
the internal hard drive to ensure that you can detect those rootkits using a good
anti-malware scanning solution from a live boot Linux distribution
63
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Keylogger
○ Keylogger
■ Piece of software or hardware that records every single keystroke that is made
on a computer or mobile device
○ Keyloggers can be either software-based or hardware-based
■ Software Keyloggers
● Malicious programs that get installed on a victim's computer
● Often bundled with other software or delivered through social
engineering attacks, like phishing or pretexting attacks
■ Hardware Keyloggers
● Physical devices that need to be plugged into a computer
● These will resemble a USB drive or they can be embedded within a
keyboard cable itself
○ To protect your organization from keyloggers, ensure the following
■ Perform regular updates and patches
■ Rely on quality antivirus and antimalware solutions
■ Conduct phishing awareness training for your users
■ Implement multi-factor authentication systems
■ Encrypt keystrokes being sent to your systems
■ Perform physical checks of your desktops, laptops, and servers
64
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
65
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
66
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Shellcode
○ Broader term that encompasses lightweight code meant to
execute an exploit on a given target
● Stage 2: Downloader
○ Downloads and installs a remote access Trojan to conduct
command and control on the victimized system
● “Actions on Objectives” Phase
○ Threat actors will execute primary objectives to meet core
objectives like
■ data exfiltration
■ file encryption
● Concealment
○ Used to help the threat actor prolong unauthorized access to a
system by
■ hiding tracks
■ erasing log files
■ hiding any evidence of malicious activity
○ “Living off the Land”
■ A strategy adopted by many Advanced Persistent Threats
and criminal organizations
■ the threat actors try to exploit the standard tools to
perform intrusions
67
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Resource Consumption
● If you are observing any unusual spikes in CPU, memory, or network
bandwidth utilization that cannot be linked back to a legitimate task
■ Resource Inaccessibility
● Ransomware
○ Form of malware that encrypts user files to make them
inaccessible to the user
● If a large number of files or critical systems suddenly become inaccessible
or if users receive messages demanding payment to decrypt their data
68
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Out-of-Cycle Logging
● If you are noticing that your logs are being generated at odd hours or
during times when no legitimate activities should be taking place (such as
in the middle of the night when no employees are actively working)
■ Missing Logs
● If you are conducting a log review as a cybersecurity analyst and you see
that there are gaps in your logs or if the logs have been cleared without
any authorized reason
■ Published or Documented Attacks
● If a cybersecurity research or reporter published a report that shows that
your organization’s network has been infected as part of a botnet or other
malware-based attack
69
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Data Protection
Objectives:
● 1.4 - Explain the importance of using appropriate cryptographic solutions
● 3.3 - Compare and contrast concepts and strategies to protect data
● 4.2 - Explain the security implications of proper hardware, software,and data asset
management
● 4.4 - Explain security alerting and monitoring concepts and tools
● 5.1 - Summarize elements of effective security governance
● Data Protection
○ Data Protection
■ Safeguarding information from corruption, compromise, or loss
○ Data Classifications
■ Types
● Sensitive
● Confidential
● Public
● Restricted
● Private
● Critical
○ Data Ownership Roles
■ Data Owners
■ Data Controllers
■ Data Processors
70
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Data Custodians
■ Data Stewards
○ Data States
■ States
● Data at rest
● Data in transit
● Data in use
■ Protection Methods
● Disk encryption
● Communication tunneling
○ Data Types
■ Examples
● Regulated data
● Trade secrets
● Intellectual property
● Legal information
● Financial information
● Human vs non-human readable data
○ Data Sovereignty
■ Information subject to laws and governance structures within the nation it is
collected
○ Securing Data Methods
■ Geographic Restrictions
■ Encryption
■ Hashing
■ Masking
71
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Tokenization
■ Obfuscation
■ Segmentation
■ Permission Restriction
○ Data Loss Prevention (DLP)
■ Strategy to prevent sensitive information from leaving an organization
● Data Classifications
○ Data Classification
■ Based on the value to the organization and the sensitivity of the information,
determined by the data owner
○ Sensitive Data
■ Information that, if accessed by unauthorized persons, can result in the loss of
security or competitive advantage for a company
■ Over classifying data leads to protecting all data at a high level
○ Importance of Data Classification
■ Helps allocate appropriate protection resources
■ Prevents over-classification to avoid excessive costs
■ Requires proper policies to identify and classify data accurately
○ Commercial Business Classification Levels
■ Public
● No impact if released; often publicly accessible data
■ Sensitive
● Minimal impact if released, e.g., financial data
■ Private
72
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
73
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Data Ownership
○ Data Ownership
■ Process of identifying the individual responsible for maintaining the
confidentiality, integrity, availability, and privacy of information assets
○ Data Owner
■ A senior executive responsible for labeling information assets and ensuring they
are protected with appropriate controls
○ Data Controller
■ Entity responsible for determining data storage, collection, and usage purposes
and methods, as well as ensuring the legality of these processes
○ Data Processor
■ A group or individual hired by the data controller to assist with tasks like data
collection and processing
○ Data Steward
■ Focuses on data quality and metadata, ensuring data is appropriately labeled and
classified, often working under the data owner
○ Data Custodian
■ Responsible for managing the systems on which data assets are stored, including
enforcing access controls, encryption, and backup measures
○ Privacy Officer
■ Oversees privacy-related data, such as personally identifiable information (PII),
sensitive personal information (SPI), or protected health information (PHI),
ensuring compliance with legal and regulatory frameworks
○ Data Ownership Responsibility
■ The IT department (CIO or IT personnel) should not be the data owner; data
74
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
owners should be individuals from the business side who understand the data's
content and can make informed decisions about classification
○ Selection of Data Owners
■ Data owners should be designated within their respective departments based on
their knowledge of the data and its significance within the organization
○ Note: Proper data ownership is essential for maintaining data security, compliance, and
effective data management within an organization. Different roles contribute to
safeguarding and managing data appropriately
● Data States
○ Data at Rest
■ Data stored in databases, file systems, or storage systems, not actively moving
■ Encryption Methods
● Full Disk Encryption (FDE)
○ Encrypts the entire hard drive
● Partition Encryption
○ Encrypts specific partitions, leaving others unencrypted
● File Encryption
○ Encrypts individual files
● Volume Encryption
○ Encrypts selected files or directories
● Database Encryption
○ Encrypts data stored in a database at column, row, or table levels
● Record Encryption
○ Encrypts specific fields within a database record
75
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
76
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
data protection
● Data Types
○ Regulated Data
■ Controlled by laws, regulations, or industry standards
■ Compliance requirements
● General Data Protection Regulation (GDPR)
● Health Insurance Portability and Accountability Act (HIPAA)
○ PII (Personal Identification Information)
■ Information used to identify an individual (e.g., names, social security numbers,
addresses)
■ Targeted by cybercriminals and protected by privacy laws
○ PHI (Protected Health Information)
■ Information about health status, healthcare provision, or payment linked to a
specific individual
■ Protected under HIPAA
○ Trade Secrets
■ Confidential business information giving a competitive edge (e.g., manufacturing
processes, marketing strategies, proprietary software)
■ Legally protected; unauthorized disclosure results in penalties
○ Intellectual Property (IP)
■ Creations of the mind (e.g., inventions, literary works, designs)
■ Protected by patents, copyrights, trademarks to encourage innovation
■ Unauthorized use can lead to legal action
○ Legal Information
■ Data related to legal proceedings, contracts, regulatory compliance
77
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Data Sovereignty
○ Data Sovereignty
■ Digital information subject to laws of the country where it's located
■ Gained importance with cloud computing's global data storage
○ GDPR (General Data Protection Regulation)
■ Protects EU citizens' data within EU and EEA borders
■ Compliance required regardless of data location
■ Non-compliance leads to significant fines
○ Data Sovereignty Laws (e.g., China, Russia)
■ Require data storage and processing within national borders
■ Challenge for multinational companies and cloud services
○ Access Restrictions
■ Cloud services may restrict access from multiple geographic locations
○ Data sovereignty and geographical considerations pose complex challenges, but
78
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
organizations can navigate them successfully with planning, legal guidance, and strategic
technology use, ensuring compliance and data protection
● Securing Data
○ Geographic Restrictions (Geofencing)
■ Virtual boundaries to restrict data access based on location
■ Compliance with data sovereignty laws
■ Prevent unauthorized access from high-risk locations
○ Encryption
■ Transform plaintext into ciphertext using algorithms and keys
■ Protects data at rest and in transit
■ Requires decryption key for data recovery
○ Hashing
■ Converts data into fixed-size hash values
■ Irreversible one-way function
■ Commonly used for password storage
○ Masking
■ Replace some or all data with placeholders (e.g., "x")
■ Partially retains metadata for analysis
■ Irreversible de-identification method
○ Tokenization
■ Replace sensitive data with non-sensitive tokens
■ Original data stored securely in a separate database
■ Often used in payment processing for credit card protection
○ Obfuscation
■ Make data unclear or unintelligible
79
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
80
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
81
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Cryptographic Solutions
Objectives:
● 1.4 - Explain the importance of using appropriate cryptographic solutions
● 2.3 - Explain various types of vulnerabilities
● 2.4 - Given a scenario, you must be able to analyze indicators of malicious activity
● Cryptographic Solutions
○ Cryptography
■ Practice and study of writing and solving codes
■ Encryption to hide information's true meaning
○ Encryption
■ Converts plaintext to ciphertext
■ Provides data protection at rest, in transit, and in use
○ Data States
■ Data at Rest
● Inactive data on storage devices
■ Data in Transit
● Moving across networks
■ Data in Use
● Currently undergoing change
○ Algorithm and Key
■ Algorithm (Cipher)
● Performs encryption or decryption
82
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Key
● Essential for determining cipher output
○ Key Strength and Rotation
■ Key Length
● Proportional to security
■ Key Rotation
● Best practice for security longevity
○ Symmetric and Asymmetric Encryption
■ Symmetric
● Uses same key for encryption and decryption
■ Asymmetric
● Uses a pair of keys for encryption and decryption
○ Symmetric Algorithms
■ DES
■ Triple DES
■ IDEA
■ AES
■ Blowfish
■ Twofish
■ Rivest Cipher
○ Asymmetric Algorithms
■ Diffie-Hellman
■ RSA
■ Elliptic Curve Cryptography
○ Hashing
■ Converts data into fixed-size string (digest) using hash functions
83
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Algorithms
● MD5
● SHA Family
● RIPEMD
● HMAC
○ Public Key Infrastructure (PKI)
■ Framework managing digital keys and certificates for secure data transfer
○ Digital Certificates
■ Electronic credentials verifying entity identity for secure communications
○ Blockchain
■ Decentralized, immutable ledger ensuring data integrity and transparency
○ Encryption Tools
■ TPM
■ HSM
■ Key Management Systems
■ Secure Enclave
○ Obfuscation
■ Steganography
■ Tokenization
■ Data Masking
○ Cryptographic Attacks
■ Downgrade Attacks
■ Collision Attacks
■ Quantum Computing Threats
84
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Symmetric vs Asymmetric
○ Symmetric Encryption
■ Uses a single key for both encryption and decryption
■ Often referred to as private key encryption
■ Requires both sender and receiver to share the same secret key
■ Offers confidentiality but lacks non-repudiation
■ Challenges with key distribution in large-scale usage
● More people means more sharing of the keys
○ Asymmetric Encryption
■ Uses two separate keys
● Public key for encryption
● Private key for decryption
■ Often called “Public Key Cryptography”
■ No need for shared secret keys
■ Commonly used algorithms include Diffie-Hellman, RSA, and Elliptic Curve
Cryptography (ECC)
■ Slower compared to symmetric encryption but solves key distribution challenges
○ Hybrid Approach
■ Combines both symmetric and asymmetric encryption for optimal benefits
■ Asymmetric encryption used to encrypt and share a secret key
■ Symmetric encryption used for bulk data transfer, leveraging the shared secret
key
■ Offers security and efficiency
○ Stream Cipher
■ Encrypts data bit-by-bit or byte-by-byte in a continuous stream
■ Uses a keystream generator and exclusive XOR function for encryption
85
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Suitable for real-time communication data streams like audio and video
■ Often used in symmetric algorithms
○ Block Cipher
■ Breaks input data into fixed-size blocks before encryption
● Usually 64, 128, or 256 bits at a time
■ Padding added to smaller data blocks to fit the fixed block size
■ Advantages include ease of implementation and security
■ Can be implemented in software, whereas stream ciphers are often used in
hardware solutions
● Symmetric Algorithms
○ DES (Data Encryption Standard)
■ Uses a 64-bit key (56 effective bits due to parity)
■ Encrypts data in 64-bit blocks through 16 rounds of transposition and
substitution
■ Widely used from the 1970s to the early 2000s
○ Triple DES (3DES)
■ Utilizes three 56-bit keys
■ Encrypts data with the first key, decrypts with the second key, and encrypts again
with the third key
■ Provides 112-bit key strength but is slower than DES
○ IDEA (International Data Encryption Algorithm)
■ A symmetric block cipher with a 64-bit block size
■ Uses a 128-bit key, faster and more secure than DES
■ Not as widely used as AES
86
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Asymmetric Algorithms
○ Public Key Cryptography
■ No shared secret key required
87
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
88
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Hashing
○ Hashing
■ One-way cryptographic function that produces a unique message digest from an
input
○ Hash Digest
■ Like a digital fingerprint for the original data
■ Always of the same length regardless of the input's length
○ Common Hashing Algorithms
■ MD5 (Message Digest Algorithm 5)
● Creates a 128-bit hash value
● Limited unique values, leading to collisions
● Not recommended for security-critical applications due to vulnerabilities
89
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
90
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
91
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Birthday Attack
● Occurs when two different messages result in the same hash digest
(collision)
● Named after the Birthday Paradox, where shared birthdays become likely
in a group
● Collisions in hashes can be exploited by attackers to bypass
authentication systems
● Use longer hash output (e.g., SHA-256) to reduce collisions and mitigate
the attack
○ Increasing Hash Security
■ Key Stretching
● Technique that is used to mitigate a weaker key by creating longer, more
secure keys (at least 128 bits)
○ increases the time needed to crack the key
● Used in systems like Wi-Fi Protected Access, Wi-Fi Protected Access
version 2, and Pretty Good Privacy
■ Salting
● Adds random data (salt) to passwords before hashing
● Ensures distinct hash outputs for the same password due to different
salts
● Thwarts dictionary attacks, brute-force attacks, and rainbow tables
■ Nonces (Number Used Once)
● Adds unique, often random numbers to password-based authentication
processes
● Prevents attackers from reusing stolen authentication data
● Adds an extra layer of security against replay attacks
92
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
93
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Digital Certificates
○ Digital Certificates
■ Digitally signed electronic documents
94
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
95
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
96
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
revoked
● Checked before validating a certificate
■ Online Certificate Status Protocol (OCSP)
● Determines certificate revocation status or any digital certificate using the
certificate's serial number
● Faster but less secure than CRL
■ OCSP Stapling
● Alternative to OCSP
● Allows the certificate holder to get the OCSP record from the server at
regular intervals
● Includes OCSP record in the SSL/TLS handshake
● Speeds up the secure tunnel creation
■ Public Key Pinning
● Allows an HTTPS website to resist impersonation attacks from users who
are trying to present fraudulent certificates
● Presents trusted public keys to browsers
● Alerts users if a fraudulent certificate is detected
■ Key Escrow Agents
● Securely store copies of private keys
● Ensures key recovery in case of loss
● Requires strong access controls
■ Key Recovery Agents
● Specialized type of software that allows the restoration of a lost or or
corrupted key to be performed
● Acts as a backup for certificate authority keys
○ Trust in Digital Certificates
97
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Blockchain
○ Blockchain
■ Shared immutable ledger for transactions and asset tracking
■ Builds trust and transparency
■ Widely associated with cryptocurrencies like Bitcoin
■ Is essentially a really long series of information with each block containing
information in it
● Each block has the hash for the block before it
■ Block Structure
● Chain of blocks, each containing
○ Previous block's hash
○ Timestamp
○ Root transactions (hashes of individual transactions)
● Blocks are linked together in a chronological order
■ Public Ledger
● Secure and anonymous record-keeping system
● Maintains participants' identities
● Tracks cryptocurrency balances
● Records all genuine transactions in a network
○ Blockchain Applications
■ Smart Contracts
98
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
99
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Encryption Tools
○ Encryption Tools for Data Security
■ TPM (Trusted Platform Module)
● Dedicated microcontroller for hardware-level security
● Protects digital secrets through integrated cryptographic keys
● Used in BitLocker drive encryption for Windows devices
● Adds an extra layer of security against software attacks
■ HSM (Hardware Security Module)
● Physical device for safeguarding and managing digital keys
● Ideal for mission-critical scenarios like financial transactions
● Performs encryption operations in a tamper-proof environment
● Ensures key security and regulatory compliance
■ Key Management System
● Manages, stores, distributes, and retires cryptographic keys
● Centralized mechanism for key lifecycle management
● Crucial for securing data and preventing unauthorized access
● Automates key management tasks in complex environments
■ Secure Enclaves
● Coprocessor integrated into the main processor of some devices
● Isolated from the main processor for secure data processing and storage
● Safeguards sensitive data like biometric information
● Enhances device security by preventing unauthorized access
100
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Obfuscation
○ Obfuscation Techniques in Data Security
■ Steganography
● Conceals a message within another to hide its very existence
● Involves altering image or data elements to embed hidden information
● Primary goal is to prevent the suspicion that there’s any hidden data at all
● Used alongside encryption for added security
● Detection is challenging due to hiding data in plain sight
■ Tokenization
● Substitutes sensitive data with non-sensitive tokens
● Original data securely stored elsewhere
● Tokens have no intrinsic value
● Reduces exposure of sensitive data during transactions
● Commonly used for payment systems to comply with security standards
■ Data Masking (Data Obfuscation)
● Disguises original data to protect sensitive information
● Maintains data authenticity and usability
● Used in testing environments, especially for software development
● Reduces the risk of data breaches in non-production settings
● Common in industries handling personal data
● Masks portions of sensitive data for privacy, e.g., credit card digits, social
security numbers
● Cryptographic Attacks
○ Cryptographic Attacks
101
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
102
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ SPHINCS+
103
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Risk Management
● Risk Management
○ Risk Management
■ Fundamental process involving identification, analysis, treatment, monitoring,
and reporting of risks
○ Risk Management Lifecycle
■ Risk Identification
● Proactive process recognizing potential risks
● Goal
○ Create a comprehensive list based on events hindering objectives
■ Risk Analysis
● Evaluate likelihood and potential impact
● Qualitative or quantitative methods
● Outcome
○ Prioritized list for guiding risk treatment
■ Risk Treatment
● Develop strategies
○ Avoidance
○ Reduction
○ Sharing
○ Acceptance
104
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
105
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Risk Identification
■ Process
● Identify potential risks; perform business impact analysis.
■ Concepts
● Recovery Time Objective
● Recovery Point Objective
● Mean Time to Repair
● Mean Time Before Failure
○ Qualitative Risk Analysis
■ Assess and prioritize risks based on likelihood and impact
○ Quantitative Risk Analysis
■ Numerically estimate probability and potential impact
○ Risk Management Strategies
■ Types
● Risk Transfer
● Risk Acceptance
● Risk Avoidance
● Risk Mitigation
○ Risk Monitoring and Reporting
■ Crucial Steps
● Continuous tracking and regular reporting
■ Long-Term Impact
● Significant for the effectiveness of the risk management process
106
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Risk Identification
○ Risk Identification
■ Crucial first step in risk management
■ Involves recognizing potential risks that could impact an organization
■ Risks can vary from financial and operational to strategic and reputational
107
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Techniques
● Brainstorming
● Checklists
● Interviews
● Scenario Analysis
■ Organization should consider a wide range of risks, including operational,
financial, strategic, and reputational risks
■ Document and analyze risks based on impact and likelihood
○ Business Impact Analysis (BIA)
■ Evaluates effects of disruptions on business functions
■ Identifies and prioritizes critical functions
■ Assesses impact of risks on functions
■ Determines required recovery time for functions
■ Key Metrics in BIA
● Recovery Time Objective (RTO)
○ Maximum acceptable time before severe impact
○ Target time for restoring a business process
● Recovery Point Objective (RPO)
○ Maximum acceptable data loss measured in time
○ Point in time data must be restored to
● Mean Time to Repair (MTTR)
○ Average time to repair a failed component or system
○ Indicator of repair speed and downtime minimization
● Mean Time Between Failures (MTBF)
○ Average time between system or component failures
○ Measure of reliability
108
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Risk Register
○ Risk Management
■ Crucial for projects and business, it involves the identification and assessment of
uncertainties that may impact objectives
○ Risk Register
■ Records identified risks, descriptions, impacts, likelihoods, and mitigation actions
■ Key tool in risk management
■ May resemble a heat map risk matrix
■ Facilitates communication and risk tracking
■ Key component of project and business operations
○ Components of Risk Register
■ Risk Description
● Identifies and describes the risk
● Clear and concise description
■ Risk Impact
● Potential consequences of risk occurrence
● Rated on a scale (e.g., low, medium, high)
■ Risk Likelihood
● Probability of risk occurrence
● Rated on a scale (e.g., numerical or descriptive)
■ Risk Outcome
● Result of the risk if it occurs
● Related to impact and likelihood
■ Risk Level or Threshold
● Determined by combining the impact and likelihood
109
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
110
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Medium Impact
■ Significant damage, loss to assets
○ High Impact
■ Major damage, essential functions impaired
111
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
112
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
113
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
114
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Control Risk
○ Assessment of how a security measure has lost effectiveness over
time
○ Risk Reporting
■ Communicating information about risk management activities to stakeholders
■ Includes results of risk identification, assessment, response, and monitoring
■ Often presented in the form of a risk report
○ Risk Monitoring and Reporting are essential for
■ Informed decision making
● Offer insights for informed decisions on resource allocation, project
timelines, and strategic planning
■ Risk mitigation
● Recognize when a risk is escalating so it can be mitigated before
becoming an issue
■ Stakeholder communication
● Assist in setting expectations and showing effective risk management
■ Regulatory compliance
● Demonstrate compliance with these regulations
115
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
116
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Vendor Assessments
■ Evaluation
● Pre-partnership assessment
■ Penetration Testing
● Testing vendor security
■ Audit Rights
● Right to audit vendors
■ Evidence Collection
● Internal and external audit evidence
○ Vendor Selection and Monitoring
■ Importance
● Meticulous selection process
■ Vigilance
● Ongoing monitoring of vendor performance
○ Contracts and Agreements
■ Basic Contracts
● Forming relationships
■ Nuanced Agreements
● SLAs, MOUs, NDAs for specific safeguards
117
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
integrity
■ Trusted foundry programs ensure secure manufacturing
○ Secondary/Aftermarket Sources
■ Risk of acquiring counterfeit or tampered devices
■ Devices may contain malware or vulnerabilities
■ Budget-friendly but high-risk option
○ Software Developers/Providers
■ Software developers and software providers are integral cogs in the supply chain
● However, software can introduce vulnerabilities
■ Check for proper licensing, authenticity, known vulnerabilities, and malware
■ Open-source software allows source code review
■ Proprietary software can be scanned for vulnerabilities
○ Service Providers/MSPs
■ Managed Service Providers
● Organizations that provide a range of technology services and support to
businesses and other clients
■ Security challenges with Software-as-a-Service (SaaS) providers
● Data confidentiality and integrity concerns
● Assess provider's cybersecurity protocols and support for security
incidents
● Vendor selection should consider due diligence, historical performance,
and commitment to security
■ Considerations
● Evaluate data security measures
● Ensure confidentiality and integrity
● Assess cybersecurity protocols
118
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
119
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Vendor Assessment
○ Vendor Assessments
■ Process to evaluate the security, reliability, and performance of external entities
■ Crucial due to interconnectivity and potential impact on multiple businesses
○ Entities in Vendor Assessment
■ Vendors
● Provide goods or services to organizations
■ Suppliers
● Involved in production and delivery of products or parts
■ Managed Service Providers (MSPs)
● Manage IT services on behalf of organizations
○ Penetration Testing of Suppliers
■ Penetration Testing
● Simulated cyberattacks to identify vulnerabilities in supplier systems
■ Validates supplier's cybersecurity practices and potential risks to your
organization
○ Right-to-Audit Clause
■ Contract provision allowing organizations to evaluate vendor's internal processes
for compliance
■ Ensures transparency and adherence to standards
120
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Internal Audits
■ Vendor's self-assessment of practices against industry or organizational
requirements
■ Demonstrates commitment to security and quality
○ Independent Assessments
■ Evaluations conducted by third-party entities without a stake in the organization
or vendor
■ Provides a neutral perspective on adherence to security or performance
standards
○ Supply Chain Analysis
■ Assessment of an entire vendor supply chain for security and reliability
■ Ensures integrity of the vendor's entire supply chain, including sources of parts or
products
121
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Vendor Questionnaires
■ Comprehensive documents filled out by potential vendors
■ Vendor questionnaires provide insights into operations, capabilities, and
compliance
■ Standardized criteria for fair and informed decision-making
○ Rules of Engagement
■ Guidelines for interaction between organization and vendors
■ Cover communication protocols, data sharing, and negotiation boundaries
■ Ensure productive and compliant interactions
○ Vendor Monitoring
■ Mechanism used to ensure that the chosen vendor still aligns with organizational
needs and standards
■ Performance reviews assess deliverables against agreed-upon standards and
objectives
■ Feedback loops
● Involve a two-way communication channel where both the organization
and the vendor share feedback
122
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
123
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Objectives:
● 5.1 - Summarize elements of effective security governance
● 5.4 - Summarize elements of effective security compliance
124
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Importance
● Legal Obligations
○ Non-compliance leads to penalties (fines, sanctions)
● Trust and Reputation
○ Compliance enhances reputation and fosters trust
● Data Protection
○ Prevents breaches and protects privacy
● Business Continuity
○ Ensures operation in disasters or disruptions
○ Governance Structures
■ Boards, Committees
● Key elements in organizational structure
■ Government Entities
● External entities influencing governance
■ Centralized vs Decentralized
● Explanation of organizational structures
○ Policies
■ High-level guidelines indicating organizational commitments
■ Topics Covered
● Acceptable Use Policies
● Information Security Policies
● Business Continuity
● Disaster Recovery
● Incident Response
● Change Management
● Software Development Lifecycle (SDLC)
125
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Standards
■ Specific, mandatory actions or rules adhering to policies
■ Covered Standards
● Password Standards
● Access Control Standards
● Physical Security Standards
● Encryption Standards
○ Procedures
■ Step-by-step instructions ensure consistency and compliance
■ Covered Procedures
● Change Management Procedures
● Onboarding and Offboarding Procedures
● Playbooks
○ Compliance Coverage
■ Monitoring and Reporting
● Concepts like due diligence, due care, attestation, and acknowledgment
■ Internal and External Compliance
● Differentiating factors
■ Automation in Compliance
● Utilizing automation in the compliance process
○ Consequences of Non-compliance
■ Fines, Sanctions
● Legal penalties
■ Reputational Damage
● Impact on trust and reputation
126
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Governance
○ Governance
■ Part of the GRC triad (Governance, Risk, and Compliance)
■ Strategic leadership, structures, and processes ensuring IT aligns with business
objectives
■ Involves risk management, resource allocation, and performance measurement
○ Purpose of Governance
■ Establishes a strategic framework aligning with objectives and regulations
■ Defines rules, responsibilities, and practices for achieving goals and managing IT
resources
○ Influence on IT Components
■ Shapes guidelines for recommended approaches in handling situations
■ Drives policy development, outlining organizational commitments (e.g., data
protection)
■ Impacts standards, defining mandatory rules for policy adherence
■ Ensures procedures align with objectives, providing task-specific guidance
○ Adaptation and Revision
■ Governance must adapt to technological advancements, regulatory changes, and
industry culture shifts
■ Monitoring evaluates governance effectiveness and identifies gaps
■ Revision updates governance framework
127
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Governance Structures
○ Organizational Governance
■ Complex, multifaceted concept essential for successful organization operation
■ Comprises various components, each with unique functions
○ Governance Structures
■ Boards
● Elected by shareholders to oversee organization management
● Responsible for setting strategic direction, policies, and major decisions
■ Committees
● Subgroups of boards with specific focuses
● Allows detailed attention to complex areas
■ Government Entities
● Play roles in governance, especially for public and regulated organizations
● Establish laws and regulations for compliance
■ Centralized and Decentralized Structures
● Centralized
○ Decision-making authority at top management levels
○ Ensures consistent decisions and clear authority
○ Slower response to local/departmental needs
● Decentralized
○ Decision-making authority distributed throughout the
organization
○ Enables quicker decisions and local responsiveness
○ Potential for inconsistencies
128
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Policies
○ Acceptable Use Policy (AUP)
■ Document that outlines the do's and don'ts for users when interacting with an
organization's IT systems and resources
■ Defines appropriate and prohibited use of IT systems/resources
■ Aims to protect organizations from legal issues and security threats
○ Information Security Policies
■ Cornerstone of an organization's security
■ Outlines how an organization protects its information assets from threats, both
internal and external
■ These policies cover a range of areas
● Data Classification
● Access Control
● Encryption
● Physical Security
■ Ensures confidentiality, integrity, and availability of data
○ Business Continuity Policy
■ Ensures operations continue during and after disruptions
■ Focuses on critical operation continuation and quick recovery
■ Includes strategies for power outages, hardware failures, and disasters
○ Disaster Recovery Policy
■ Focuses on IT systems and data recovery after disasters
■ Outlines data backup, restoration, hardware/software recovery, and alternative
locations
○ Incident Response Policy
■ Addresses detection, reporting, assessment, response, and learning from
129
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
security incidents
■ Specifies incident notification, containment, investigation, and prevention steps
■ Minimizes damage and downtime during incidents
○ Software Development Lifecycle (SDLC) Policy
■ Guides software development stages from requirements to maintenance
■ Includes secure coding practices, code reviews, and testing standards
■ Ensures high-quality, secure software meeting user needs
○ Change Management Policy
■ Governs handling of IT system/process changes
■ Ensures controlled, coordinated change implementation to minimize disruptions
■ Covers change request, approval, implementation, and review processes
● Standards
○ Standards
■ Provides a framework for implementing security measures, ensuring that all
aspects of an organization's security posture are addressed
○ Password Standards
■ Define password complexity and management
■ Include length, character types, regular changes, and password reuse rules
■ Emphasize password hashing and salting for security
○ Access Control Standards
■ Determine who has access to resources within an organization
■ Include access control models like
● Discretionary Access Control (DAC)
● Mandatory Access Control (MAC)
● Role Based Access Control (RBAC)
130
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Procedures
○ Procedures
■ Systematic sequences of actions or steps taken to achieve a specific outcome in
an organization
■ Ensures consistency, efficiency, and compliance with standards
○ Change Management
■ Systematic approach to handling organizational changes
■ It aims to implement changes smoothly and successfully with minimal disruption
■ Key Stages
● Identifying the need for change
● Assessing impacts
● Developing a plan
● Implementation
● Post-change review
131
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Governance Considerations
○ Regulatory Considerations
■ Organizations must comply with various regulations, depending on industry and
location
■ Regulations cover areas such as
● Data Protection
● Privacy
● Environmental Standards
● Labor Laws
■ Non-compliance leads to penalties, sanctions, and reputational damage
○ Legal Considerations
■ Complement regulatory considerations, encompassing contract, intellectual
property, and corporate law
■ Employment laws address minimum wage, overtime, safety, discrimination, and
132
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
benefits
■ Litigation risks include breach of contract, product liability, and employment
disputes
■ Robust legal strategies and resources are needed to manage legal risks
○ Industry Considerations
■ Refer to industry-specific standards, practices, and ethical guidelines
■ Not legally binding but influence customer, partner, and regulator expectations
■ Non-adoption may lead to competitive disadvantages and stakeholder criticism
○ Geographical Considerations
■ Geographical regulations impact organizations at local, regional, national, and
global levels
■ Local considerations include city ordinances, zoning laws, and operational
restrictions
■ Regional considerations, like CCPA in California, impose state-level regulations
■ National considerations, e.g., ADA in the US, affect businesses across the entire
country
■ Global considerations, like GDPR, apply extraterritorially to organizations dealing
with EU citizens' data
■ Conflict of laws between jurisdictions is a significant challenge
■ Navigating these differences requires deep legal knowledge and flexibility in
governance
● Compliance
○ Compliance
■ Ensures adherence to laws, regulations, guidelines, and specifications
■ Includes compliance reporting and compliance monitoring
133
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Compliance Reporting
■ Systematic process of collecting and presenting data to demonstrate adherence
to compliance requirements
■ Two Types of Compliance Reporting
● Internal Compliance Reporting
○ Ensures adherence to internal policies and procedures
○ Conducted by an internal audit team or compliance department
● External Compliance Reporting
○ Demonstrates compliance to external entities
○ Mandatory, often by law or contract
○ Compliance Monitoring
■ Regularly reviews and analyzes operations for compliance
■ Includes due diligence and due care, attestation and acknowledgement, and
internal and external monitoring
○ Due Diligence and Due Care
■ Due Diligence
● Identifying compliance risks through thorough review
■ Due Care
● Mitigating identified risks
○ Attestation and Acknowledgement
■ Attestation
● Formal declaration by a responsible party that the organization’s
processes and controls are compliant
■ Acknowledgement
● Recognition and acceptance of compliance requirements by all relevant
parties
134
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Non-compliance Consequences
○ Compliance in IT is essential to avoid severe consequences
○ Consequences of non-compliance include
■ Fines
● Monetary penalties imposed by regulatory bodies
■ Sanctions
● Strict measures by regulatory bodies to enforce compliance
● Range from restrictions to bans
■ Reputational Damage
● Negative impact on a company's reputation
● Significant and long-lasting in the age of social media
■ Loss of License
● Loss of the right to operate, relevant in regulated industries
■ Contractual Impacts
● Breach of contracts due to non-compliance with laws and regulations
● Can lead to legal disputes, financial penalties, or contract termination
135
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
136
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Objectives:
● 1.3 - Explain the importance of change management processes and the impact to security
● 4.1 - Given a scenario, you must be able to apply common security techniques to computing
resources
● 4.2 - Explain the security implications of proper hardware, software, and data asset
management
137
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Asset Management
■ Assignment/Accounting and Monitoring/Asset Tracking
● Clear ownership and classification of assets
● Rigorous monitoring through inventory checks and MDM solutions
○ Asset Disposal and Decommissioning
■ Processes
● Sanitization, destruction, certification, data retention
● Minimizes the risk of unauthorized access or data breaches
○ Change Management Importance
■ Approval Process
● Strict approval for every change
● Consideration of CAB insights, ownership, stakeholder involvement, and
impact analysis
○ Change Management Processes
■ Best Practices
● Schedule maintenance windows
● Thorough backout plans
● Consistent testing post-implementation
○ Technical Implications of Changes
■ Management Aspects
● Allow lists, deny lists
● Handling downtime, restarts
● Managing legacy applications and dependencies
○ Documenting Changes
■ Importance
● Version controlling changes
138
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
139
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Post-Approval Procurement
■ Product compatibility assessment
■ Security checks and configurations
■ User training
■ Integration into the existing workflow
140
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Asset Management
○ Asset Management
■ Systematic approach to governing and maximizing the value of items an entity is
responsible for throughout the asset’s life cycle
● Tangible Assets
○ Office buildings
○ Computers
○ Machinery
● Intangible Assets
○ Intellectual property
○ Organization’s reputation
○ Goodwill
○ Assignment and Accounting of Assets
■ Each asset assigned to a person or group, known as owners
■ Process referred to as the allocation or assignment of ownership
■ Avoids ambiguity, aids troubleshooting, upgrades, and replacements
○ Classification and Categorization
■ Assets should be classified and categorized
■ Classification based on criteria such as function and value
■ Informs maintenance, replacement, or retirement decisions
■ High-value assets may require stringent maintenance schedules
141
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
142
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
143
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
144
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Trend prediction
● Dispute resolution
■ Retaining everything is not feasible due to costs and security risks
● The more you store, the more you must secure
■ Clutter and excessive data require additional security measures
○ Data Protection
■ All data needs protection from potential data breaches
■ More data requires more extensive security measures
■ Leads to higher costs and resource allocation
■ Excessive data complicates retrieval and analysis
● Change Management
○ Change Management
■ Orchestrated strategy to transition teams, departments, and organizations from
existing state to a more desirable future state
● Necessary in modern business environments due to constant changes
● Change is essential but requires
○ Precision
○ Planning
○ Structured approach
● Ensures changes are properly controlled, planned, and integrated to avoid
disruptions
○ Challenges of Change
■ Unplanned or poorly coordinated changes can lead to resistance and confusion
■ Even seemingly simple changes, like software upgrades, can cause issues
■ Existing processes become disrupted by changes, impacting efficiency
145
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
146
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
147
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Stakeholder interviews
● Address discrepancies or issues to refine and optimize the process
■ Documenting the Change
● Maintain historical records of implemented changes
● Capture lessons learned for future reference
● Reflect on past initiatives and improve change management practices
○ Key Aspects of the Change Management Process
■ Scheduled Maintenance Window
● Designated timeframes for implementing changes
● Reduces potential disruptions to daily operations
● Allows flexibility for emergency changes
■ Backout Plan
● Pre-determined strategy to revert systems to their original state in case of
issues during change implementation
● Acts as a safety net for ensuring quick return to normal operations
■ Testing the Results
● Validates the success of the change by conducting tests on systems and
operational processes after implementation
● Ensures desired outcomes and identifies areas needing further
adjustments
148
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
149
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
or backlog
● Consider the implications of restarts, especially for key servers
■ Legacy Applications
● Older software or systems still in use due to functionality and user needs
● Legacy applications are less flexible and more sensitive to changes
● Minor updates can lead to malfunctions or crashes, so assess their
compatibility.
■ Dependencies
● Interconnected systems create dependencies, where changes in one area
affect others
● Mapping dependencies is crucial before implementing changes
● Prevents cascading effects, outages, or disruptions in various parts of
your network
● Documenting Changes
○ Documenting changes provides a clear history of the what, when, and why for
accountability and future reference
○ Version Control
■ Tracks and manages changes in documents, software, and other files
■ Allows multiple users to collaborate and revert to previous versions when
needed
■ Ensures changes do not create chaos and helps track project evolution
■ Preserves past iterations and ensures continuity and stability
○ Proper Documentation
■ All accompanying documentation should be updated when implementing a
change
150
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
management
151
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
152
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Significance of Audits
○ Identifying Gaps
■ Security policies, procedures, and controls
○ Ensuring Compliance
■ GDPR, HIPAA, PCI DSS
○ Assessments
■ Detailed analysis to identify vulnerabilities and risks
■ Performed before implementing new systems or significant changes
■ Categories
● Risk Assessments
● Vulnerability Assessments
● Threat Assessments
○ Internal Audits and Assessments
■ Review processes, controls, and compliance
■ Importance
● Ensure operational effectiveness and adherence to internal policies
○ External Audits and Assessments
■ Independent evaluations by external parties
■ Verification Areas
● Financial statements
● Compliance
● Operational practices
○ Penetration Testing
■ Simulated cyber attacks to identify vulnerabilities
■ Objective
● Find vulnerabilities exploited by attackers
153
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
154
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
155
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Internal Assessments
■ Conducted to identify and evaluate potential risks and vulnerabilities in an
organization's information systems
■ Commonly performed before implementing new systems or making significant
changes to existing ones
■ Self-assessments
● Internal evaluations assessing compliance with specific standards or
regulations
■ Vulnerability assessments, threat modeling exercises, and risk assessments are
part of internal assessments
■ Assisted internal assessments may involve dedicated assessment groups
■ Internal Assessment Process
● Threat Modeling Exercise
○ Identifies potential threats to applications (e.g., SQL injection, XSS,
DoS attacks)
● Vulnerability Assessment
○ Uses automated scanning tools and manual testing techniques to
identify known vulnerabilities and code weaknesses
● Risk Assessment
○ Evaluates the potential impact of the following
■ Identified threats and vulnerabilities
■ Considering likelihood
■ Potential damage
■ Cost of security measures
■ Mitigation Strategies
● Recommendations to address risks and vulnerabilities
156
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Code fixes
○ Additional security controls
○ Architectural changes
157
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Collaborative Approach
■ To maximize the checklist's effectiveness, involve a diverse group of participants
from across the organization
● Administration team
● Information technology staff
● Cybersecurity professionals
○ Overview of the Checklist
■ The checklist is broad and aims to provide a quick overview of the organization's
current risk posture
■ Organizations may use different checklists or variations with distinct questions
■ The general format and purpose of self-assessments are consistent across most
organizations
158
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
159
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Data protection
● Access controls
■ May include testing of the following
● Key personnel
● Certifications
● Standardized assessments
■ Crucial for maintaining a strong security posture and regulatory compliance.
○ Independent Third-Party Audits
■ Provide an unbiased perspective on an organization's security posture
■ Validate security measures and build trust with
● Customers
● Stakeholder
● Regulatory bodies
■ Required by regulations like GDPR and PCI DSS for organizations to undergo
regular independent third-party audits
160
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
cybersecurity risks
○ Preparing for a HIPAA External Assessment
■ Examiners provide a checklist of questions that organizations must answer
■ Questions are answered as either "yes" or "no"
■ Evidence files, such as documents or links, must be provided to demonstrate
compliance
○ Sample Checklist
■ Questions cover various aspects like general information, policies, procedures,
and employee training
■ Organizations must provide evidence files as proof of compliance
■ External assessments aim to provide a quick overview of the organization's
current risk posture
● Penetration Testing
○ Penetration Testing (Pentesting)
■ Simulated cyber attack to identify exploitable vulnerabilities in a computer
system
■ Assesses systems for potential weaknesses that attackers could exploit
■ Various types include
● Physical
● Offensive
● Defensive
● Integrated
161
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
162
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Red team conducts offensive attacks, while the blue team detects and responds
■ Encourages collaboration and learning between the red and blue teams
■ Benefits
● Comprehensive security assessment
● Promotes collaboration within cybersecurity teams
● Conducts simulated attacks and responses to improve skills
● Reconnaissance in Pentesting
○ Reconnaissance
■ Initial phase where an attacker gathers information about the target system
■ Information helps plan the attack and increase its success rate
○ Importance of Reconnaissance
■ Crucial step in penetration testing
■ Identifies potential vulnerabilities in the target system
■ Helps plan the attack to reduce the risk of detection and failure
○ Types of Reconnaissance
■ Active Reconnaissance
● Engaging with the target system directly, such as scanning for open ports
using tools like Nmap
■ Passive Reconnaissance
● Gathering information without direct engagement, like using open-source
intelligence or WHOIS to collect data
○ Reconnaissance and Environment Types
■ Known Environment
● Penetration testers have detailed information about the target
163
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
infrastructure
● Focuses on known assets
● Evaluates vulnerabilities and weaknesses
● Aims to understand exploitability and potential damages
● Resembles an insider threat scenario
■ Partially Known Environment
● Testers have limited information, simulating a scenario where an attacker
has partial inside knowledge
● Focus on discovering and navigating the broader environment
■ Unknown Environment
● Minimal to no information about the target system
● Simulates a real-world external attacker aiming to find entry points and
vulnerabilities
● Extensive reconnaissance is essential
● Attestation of Findings
○ Attestation
■ Involves formal validation or confirmation provided by an entity to assert the
accuracy and authenticity of specific information
■ Crucial in internal and external audits to ensure the reliability and integrity of the
following
164
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Data
● Systems
● Processes
○ Attestation of Findings in Penetration Testing
■ Used to prove that a penetration test occurred and validate the findings
■ May be required for compliance or regulatory purposes (e.g., GLBA, HIPAA,
Sarbanes-Oxley, PCI DSS)
■ Includes a summary of findings and evidence of the security assessment
■ Evidence helps to prove that identified vulnerabilities and exploits are valid
■ The difference between attestation and the report
● Attestation includes evidence
● Report focuses on findings and recommended remediation
■ A letter of attestation may be provided to prove the occurrence of the
penetration testing, especially when required by third parties interested in
network security
○ Types of Attestation
■ Software Attestation
● Involves validating the integrity of software to ensure it hasn't been
tampered with
■ Hardware Attestation
● Validates the integrity of hardware components to confirm they haven't
been tampered with
■ System Attestation
● Validates the security posture of a system, often related to compliance
with security standards
165
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Attestation in Audits
■ In internal audits, attestation evaluates organizational compliance, effectiveness
of internal controls, and adherence to policies and procedures
■ In external audits, third-party entities provide attestation on financial
statements, regulatory compliance, and operational efficiency
■ Attestation builds trust, enhances transparency, ensures accountability, and is
essential for stakeholders in making informed decisions
166
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Objective 3.4: Explain the importance of resilience and recovery in security architecture
167
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Data Redundancy
■ Achieved by
● Redundant storage devices
■ Types
● RAID configurations
○ Capacity Planning
■ Importance
● Efficient scaling during peak demand
■ Considerations
● People
● Technology
● Infrastructure
○ Power Components
■ Generators, UPS, line conditioners, power distribution centers (PDCs)
■ Ensures constant power supply to data centers
○ Data Backups
■ Types
● Onsite
● Offsite
■ Methods
● Encryption
● Snapshots
● Recovery
● Replication
● Journaling
168
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● High Availability
○ High Availability Basics
■ High Availability
● Aims to keep services continuously available by minimizing downtime
● Achieved through load balancing, clustering, redundancy, and multi-cloud
strategies
169
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
170
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Service providers
■ Prevents single points of failure in systems
■ Examples
● Redundant power supplies
● Network connections
● Backup servers
○ Multi-Cloud Approach
■ Distributes data, applications, and services across multiple cloud providers
■ Mitigates the risk of a single point of failure
■ Offers flexibility for cost optimization
■ Aids in avoiding vendor lock-in
■ Requires proper data management, unified threat management, and consistent
policy enforcement for security and compliance
○ Strategic Planning
■ Design a robust system architecture to achieve high availability
■ Utilize load balancing, clustering, redundancy, and multi-cloud approaches
■ Proactive measures reduce the risk of service disruptions and downtime costs
■ Safeguard organizational continuity and reliability in a competitive environment
● Data Redundancy
○ RAID Overview
■ RAID (Redundant Array of Independent Disks)
● Combines multiple physical storage devices into a single logical storage
device recognized by the operating system
○ RAID 0
■ Provides data striping across multiple disks
171
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
172
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Fault-tolerant
● Allows continued operation and quick data rebuild in case of failure (e.g.,
RAID 1, RAID 5, RAID 6, RAID 10)
■ Disaster-tolerant
● Safeguards against catastrophic events by maintaining data in
independent zones (e.g., RAID 1, RAID 10)
○ RAIDs are essential for ensuring data redundancy, availability, and performance in
enterprise networks
○ The choice of RAID type depends on specific requirements for performance and fault
tolerance
● Capacity Planning
○ Capacity Planning
■ Critical strategic planning effort for organizations
■ Ensures an organization is prepared to meet future demands in a cost-effective
manner
○ Four Main Aspects of Capacity Planning
■ People
● Analyze current personnel skills and capacity
● Forecast future personnel needs for hiring, training, or downsizing
● Ensure the right number of people with the right skills for strategic
objectives
● Example
○ Hiring seasonal employees for holiday retail demand
■ Technology
● Assess current technology resources and their usage
173
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Processes
● Optimize business processes for varying demand levels
● Streamline workflows, improve efficiency, and consider outsourcing
● Example
○ Automating employee onboarding to handle high demand
174
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Sags
● Brief decreases in voltage, usually not severe enough to cause system
shutdown
■ Undervoltage Events (Brownouts)
● Prolonged reduction in voltage, leading to system shutdown
■ Power Loss Events (Blackouts)
● Complete loss of power for a period, potentially causing data loss and
damage
○ Power Protection Components
■ Line Conditioners
● Stabilize voltage supply and filter out fluctuations
● Mitigate surges, sags, and undervoltage events
● Prevent unexpected system behavior and hardware degradation
● Unsuitable for significant undervoltage events or complete power failures
■ Uninterruptible Power Supplies (UPS)
● Provide emergency power during power source failures
● Offer line conditioning functions
● Include battery backup to maintain power during short-duration failures
● Typically supply 15 to 60 minutes of power during a complete power
failure
■ Generators
● Convert mechanical energy into electrical energy for use in an external
circuit through the process of electromagnetic induction
● Backup generators supply power during power grid outages
● Smaller generators for limited applications (e.g., emergency lighting)
● Different Types of Generators
175
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Data Backups
○ Data Backup
■ Creating duplicate copies of digital information to protect against data loss,
corruption, or unavailability
■ Safeguards data from accidental deletion or system failures
○ Onsite and Offsite Backups
■ Onsite Backup
● Storing data copies in the same location as the original data
176
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Offsite Backup
● Storing data copies in a geographically separate location
■ Importance
● Onsite backups are convenient but vulnerable to disasters
● Offsite backups protect against physical disasters
○ Backup Frequency
■ Determining factor of backup frequency is the organization’s RPO
● Recovery Point Objective (RPO)
○ Ensures that the backup plan will maintain the amount of data
required to keep any data loss under the organization’s RPO
threshold
■ Considerations
● Data change rate
● Resource allocation
● Organizational needs
○ Encryption
■ Fundamental safeguard that protects the backup data from unauthorized access
and potential breaches
● Data-at-rest Encryption
○ Encrypting data as it is written to storage
● Data-in-transit Encryption
○ Protecting data during transmission
● Importance
○ Safeguarding backup data from unauthorized access and breaches
○ Snapshots
■ Point-in-time copies capturing a consistent state
177
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
178
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
179
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
180
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Cold Sites
● Fewer facilities than warm sites
● May be just an empty building, ready in 1-2 months
● Cost-effective but adds more recovery time
■ Mobile Sites
● Can be hot, warm, or cold
● Utilizes portable units like trailers or tents
● Offers flexibility and quick deployment (e.g., military DJC2)
○ Platform Diversity
■ Critical for effective virtual redundant sites
■ Diversify operating systems, network equipment, and cloud platforms
■ Reduces the risk of a single point of failure
■ Ensures resilience and adaptability in case of disruptions
○ Virtual Sites
■ Leveraging cloud-based environments for redundancy
■ Virtual Hot Site
● Fully replicated and instantly accessible in the cloud
■ Virtual Warm Site
● Involves scaling up resources when needed
■ Virtual Cold Site
● Minimizes ongoing costs by activating resources only during disasters
■ Offers scalability, cost-effectiveness, and easy maintenance
○ Geographic Dispersion
■ Spreading resources across different locations for higher redundancy
■ Mitigates the risk of localized outages
■ Enhances disaster recovery capabilities
181
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
182
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
183
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Security Architecture
Objectives:
● 3.1 - Compare and contrast security implications of different architecture models
● 4.1 - Given a scenario, apply common security techniques to computing resources
● Security Architecture
○ Security Architecture
■ Design, structure, and behavior of an organization's information security
environment
○ On-Premise vs. Cloud Deployment
■ On-Premise
● Traditional local infrastructure setup
■ Cloud
● Delivery of computing services over the internet
○ Cloud Security Considerations
■ Shared Physical Server Vulnerabilities
■ Inadequate Virtual Environment Security
■ User Access Management
■ Lack of Up-to-date Security Measures
■ Single Point of Failure
■ Weak Authentication and Encryption Practices
■ Unclear Policies and Data Remnants
184
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
185
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Embedded Systems
■ Dedicated computer system designed for specific functions
■ Part of a complete device system with hardware components
186
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ On-Premise Solutions
■ Computing infrastructure physically located on-site at a business
○ Key Considerations in Cloud Computing
■ Availability
● System's ability to be accessed when needed
■ Resilience
● System's ability to recover from failures
■ Cost
● Consider both upfront and long-term costs
■ Responsiveness
● Speed at which the system can adapt to demand
■ Scalability
● System's ability to handle increased workloads
■ Ease of Deployment
● Cloud services are easier to set up than on-premise solutions
■ Risk Transference
● Some risks are transferred to the provider, but customers are responsible
for security
■ Ease of Recovery
● Cloud services offer easy data recovery and backup solutions
■ Patch Availability
● Providers release patches for vulnerabilities automatically
■ Inability to Patch
● Compatibility issues or lack of control can hinder patching
187
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Power
● Cloud provider manages infrastructure, including power supply
● Reduces customer costs and eliminates power management concerns
■ Compute
● Refers to computational resources, including CPUs, memory, and storage
● Cloud providers offer various compute options to suit different needs
○ Remember
■ Cloud computing offers flexibility, scalability, and cost-effectiveness
■ On-premise solutions provide control and security but can be expensive and
challenging to maintain
■ Hybrid solutions offer flexibility and control but require considerations of
security, compliance, interoperability, and cost
● Cloud Security
○ Shared Physical Server Vulnerabilities
■ In cloud environments, multiple users share the same physical server
● Compromised data from one user can potentially impact others on the
same server
■ Mitigation
● Implement strong isolation mechanisms (e.g., hypervisor protection,
secure multi-tenancy)
● Perform regular vulnerability scanning, and patch security gaps
○ Inadequate Virtual Environment Security
■ Virtualization is essential in cloud computing
● Inadequate security in the virtual environment can lead to unauthorized
access and data breaches
188
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Mitigation
● Use secure VM templates
● Regularly update and patch VMs
● Monitor for unusual activities
● Employ network segmentation to isolate VMs
○ User Access Management
■ Weak user access management can result in unauthorized access to sensitive
data and systems
■ Mitigation
● Enforce strong password policies
● Implement multi-factor authentication
● Limit user permissions (Principle of Least Privilege)
● Monitor user activities for suspicious behavior
○ Lack of Up-to-date Security Measures
■ Cloud environments are dynamic and require up-to-date security measures
● Failure to update can leave systems vulnerable to new threats
■ Mitigation
● Regularly update and patch software and systems
● Review and update security policies
● Stay informed about the latest threats and best practices
○ Single Point of Failure
■ Cloud services relying on specific resources or processes can lead to system-wide
outages if they fail
■ Mitigation
● Implement redundancy and failover procedures
● Use multiple servers, data centers, or cloud providers
189
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
190
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
191
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Resource Reuse
● Improper clearing of resources may expose sensitive data
○ Containerization Technologies
■ Docker, Kubernetes, Red Hat OpenShift are popular containerization platforms
■ Revolutionized application deployment in cloud environments
○ Securing Virtual Machines
■ Regularly update OS, applications, and apply security patches
■ Install antivirus solutions and software firewalls
■ Use strong passwords and implement security policies
■ Secure the hypervisor with manufacturer-released patches
■ Limit VM connections to physical machines and isolate infected VMs
■ Distribute VMs among multiple servers to prevent resource exhaustion
■ Monitor VMs to prevent "Virtualization Sprawl”
■ Enable encryption of VM files for data safety and confidentiality
● Serverless
○ What is Serverless?
■ Serverless computing doesn't mean no servers; it shifts server management
away from developers
■ Relies on cloud service providers to handle server management, databases, and
some application logic
■ Functions as a Service (FaaS) Model
● Developers write and deploy individual functions triggered by events
○ Benefits of Serverless
■ Reduced operational costs
● Pay only for compute time used, no charges when code is idle
192
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Automatic scaling
● Cloud provider scales resources based on workload, ensuring optimal
capacity
■ Focus on core product
● Developers can concentrate on application functionality, not server
management
■ Faster time to market
● Reduced infrastructure concerns speed up application development
○ Challenges and Risks
■ Vendor Lock-in
● Reliance on proprietary interfaces limits flexibility and may increase costs
■ Immaturity of best practices
● Serverless is a relatively new field, and best practices are still evolving
○ Not a one-size-fits-all solution
■ Consider the specific needs and requirements of your application; serverless
introduces challenges like Vendor Lock-in and service provider dependencies
● Microservices
○ Microservices
■ Architectural style for breaking down large applications into small, independent
services
■ Each microservice runs a unique process and communicates through a
well-defined, lightweight mechanism
■ Contrasts with traditional monolithic architecture, where all components are
interconnected
● Each service in the microservice architecture is self-contained and able to
193
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
run independently
○ Advantages of Microservices
■ Scalability
● Services can be scaled independently based on demand
■ Flexibility
● Microservices can use different technologies and be managed by different
teams
■ Resilience
● Isolation reduces the risk of system-wide failures
■ Faster Deployments and Updates
● Independent deployment and updates allow for agility and reduced
deployment risk
○ Challenges of Microservices
■ Complexity
● Managing multiple services involves inter-service communication, data
consistency, and distributed system testing
■ Data Management
● Each microservice can have its own database, leading to data consistency
challenges
■ Network Latency
● Increased inter-service communication can result in network latency and
slower response times
■ Security
● The distributed nature of microservices increases the attack surface,
requiring robust security measures
194
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Network Infrastructure
○ Network Infrastructure
■ Backbone of modern organizations
■ Comprises hardware, software, services, and facilities for network support and
management
○ Physical Separation
■ Security measures to protect sensitive information
■ Often referred to as "Air Gapping”
■ Isolates a system by physically disconnecting it from all networks
■ Physical separation is one of the most secure methods of security, but it is still
vulnerable to sophisticated attacks
○ Logical Separation
■ Establishes boundaries within a network to restrict access to certain areas
■ Implemented using firewalls, VLANs, and network devices
○ Comparison
■ Physical Separation (Air-Gapping)
● High security, complete isolation
■ Logical Separation
● More flexible, easier to implement
● Less secure if not configured properly
195
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
196
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ IaC Method
■ Developers and ops teams manage infrastructure through code
■ Code files are versioned, tested, and audited
■ High-level languages like YAML, JSON, or domain-specific languages (e.g., HCL)
used
■ Idempotence ensures identical environments
● Idempotence
○ Operation consistently produces the same results
○ Crucial for consistency and reliability in multiple environments
○ Benefits of IaC
■ Speed and Efficiency
■ Consistency and Standardization
■ Scalability
■ Cost Savings
■ Auditability and Compliance
○ Challenges
■ Learning Curve
● New skills and mindset required
● Teams learn to write, test, and maintain infrastructure code
■ Complexity
● Infrastructure code can become complex
● Mitigated with modularization and documentation
■ Security Risks
● Sensitive data exposure in code files
● Insecure configurations may be introduced
197
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Security Risks
○ Attractive targets for cybercriminals; compromised server risks
data and app security
○ Decentralized Architecture
■ Computing functions distributed across multiple systems or locations
198
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
199
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Hub/Control System
■ Central component connecting IoT devices
■ Collects, processes, analyzes data, and sends commands
■ Can be a physical device or software platform
○ Smart Devices
■ Everyday objects enhanced with computing and internet capabilities
■ Sense environment, process data, and perform tasks autonomously
○ Wearables
■ Subset of smart devices worn on the body
■ Monitor health, provide real-time information, and offer hands-free interface
○ Sensors
■ Detect changes in environment, convert into data
■ Measure various parameters (temperature, motion, etc.)
■ Enable interaction and autonomous decisions in smart devices
○ IoT Risks
■ Weak Default Settings
● Common security risk
● Default usernames/passwords are easy targets for hackers
● Changing defaults upon installation is essential
■ Poorly Configured Network Services
● Devices may have vulnerabilities due to open ports, unencrypted
communications
● Unnecessary services can increase attack surface
● Keeping IoT devices on a separate network is recommended
200
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Lack of Updates
● Running outdated software with unpatched vulnerabilities
■ Physical Threats
● Susceptible to damage to hardware or infrastructure
201
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Embedded Systems
○ Embedded Systems
■ Specialized computing components designed for dedicated functions within
larger devices
■ They integrate hardware and mechanical elements and are essential for various
daily-use devices
○ Real-Time Operating System (RTOS)
■ Designed for real-time applications that process data without significant delays
■ Critical for time-sensitive applications like flight navigation and medical
equipment
202
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
203
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Security Infrastructure
Objectives:
● 3.2 - Given a scenario, you must be able to apply security principles to secure enterprise
architecture
● 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance security
● Security Infrastructure
○ Security Infrastructure
■ Encompasses hardware, software, networks, data, and policies working
cohesively for information asset safeguarding
○ Firewalls
■ Types
● Web Application
● Unified Threat Management
● Next-generation
○ Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
■ Mechanisms
● Identifying trends
● Showcasing signatures
○ Network Appliances
■ Specialized hardware or software for specific networking functions
■ Functions
● Load Balancing
● Proxying
204
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Monitoring
● Security Enforcement
○ Port Security
■ Restricting and controlling network access
■ Basis
● Media Access Control (MAC) addresses
■ Concepts
● 802.1x and EAP
○ Securing Network Communications
■ Technologies
● VPNs
● IPSec
● TLS
■ Objective
● Create a secure backbone for communication
○ Software-Defined Wide Area Networks (SD-WAN) and Secure Access Service Edge (SASE)
■ SD-WAN
● Optimize WAN connections with software-defined principles
■ SASE
● Cloud-based service integrating security and wide area networking
○ Infrastructure Considerations
■ Aspects
● Device placement, security zones, screen subnets, attack surfaces
■ Connectivity
● Concerns and considerations
205
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Device Attributes
● Active vs. passive, inline vs. taps or monitors
■ Failure Mode Options
● Fail-open or fail-closed for security devices
○ Selection of Infrastructure Controls
■ Choosing controls aligned with network needs
■ Tailoring
● Ensuring robust security architecture
206
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
207
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Firewalls
○ Firewall
■ A network security device or software that monitors and controls network traffic
based on security rules
■ Protects networks from unauthorized access and potential threats
208
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
209
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
protection
● Operate fast within minimal network performance impact
● Offer full-stack traffic visibility
● Can integrate with other security products
○ Can be a problem if organizations become reliant on a single
vendor due to firewall configurations tailored to one product line
■ Unified Threat Management (UTM) Firewall
● Combines multiple security functions in a single device
● Functions include firewall, intrusion prevention, antivirus, and more
● Reduces the number of devices
● Are a single point of failure
● UTMs use separate individual engine
○ NGFW uses a single engine
■ Web Application Firewall (WAF)
● Focuses on inspecting HTTP traffic
● Prevents common web application attacks like cross-site scripting and SQL
injections
● Can be placed
○ In-line (live attack prevention)
■ Device sits between the network firewall and the web
servers
○ Out of band (detection)
■ Device receives a mirrored copy of web server traffic
○ Layer based Firewalls
■ Layer 4 Firewall
● Operates at the transport layer
210
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Configuring Firewalls
○ Firewalls and Access Control Lists (ACLs)
■ Firewalls
● Dedicated devices for using Access Control Lists (ACLs) to protect
networks
■ Access Control Lists (ACLs)
● Essential for securing networks from unwanted traffic
● Consist of permit and deny statements, often based on port numbers
● Rule sets placed on firewalls, routers, and network infrastructure devices
● Control the flow of traffic into and out of networks
● May define quality of service levels inside networks but are primarily
used for network security in firewalls
○ Configuring ACLs
■ A web-based interface or a text-based command line interface can be used
■ The order of ACL rules specifies the order of actions taken on traffic (top-down)
■ The first matching rule is executed, and no other ACLs are checked
■ Place the most specific rules at the top and generic rules at the bottom
■ Some devices support implied deny functions, while others require a "deny all"
rule at the end
■ Actions taken by network devices should be logged, including deny actions
211
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ ACL Rules
■ Made up of some key pieces of information including
● Type of traffic
● Source of traffic
● Destination of traffic
● Action to be taken against the traffic
○ Firewall Types
■ Hardware-Based Firewall
● A dedicated network security device that filters and controls network
traffic at the hardware level
● Commonly used to protect an entire network or subnet by implementing
ACLs and rules
■ Software-Based Firewall
● A firewall that runs as a software application on individual devices, such
as workstations
● Utilizes ACLs and rules to manage incoming and outgoing traffic,
providing security at the software level on a per-device basis
○ Key Takeaway
■ Firewalls use ACLs to control network traffic, ensuring security by specifying
permitted and denied actions
■ Proper ACL configuration and rule order are crucial for effective network
protection
212
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
213
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● HIDS
● Anomaly-based IDS
○ Analyzes traffic and compares it to a normal baseline of traffic to
determine whether a threat is occurring
○ Five Types of Anomaly-based Detection Systems
■ Statistical
■ Protocol
■ Traffic
■ Rule or Heuristic
■ Application-based
○ Intrusion Prevention Systems (IPS)
■ Logs, alerts, and takes action when it finds something suspicious or malicious
■ Scans traffic to look for malicious activity and takes action to stop it
● Network Appliances
○ Network Appliance
■ A dedicated hardware device with pre-installed software for specific networking
services
○ Different Types of Network Appliances
■ Load Balancers
● Distribute network/application traffic across multiple servers
● Enhance server efficiency and prevent overload
● Ensure redundancy and reliability
● Perform continuous health checks
● Application Delivery Controllers (ADCs) offer advanced functionality
● Essential for high-demand environments and high-traffic websites
214
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Proxy Servers
● Act as intermediaries between clients and servers
● Provide content caching, requests filtering, and login management
● Enhance request speed and reduce bandwidth usage
● Add a security layer and enforce network utilization policies
● Protect against DDoS attacks
● Facilitate load balancing and user authentication
● Handle data encryption and ensure compliance with data sovereignty
laws
■ Sensors
● Monitor, detect, and analyze network traffic and data flow
● Identify unusual activities, security breaches, and performance issues
● Provide real-time insights for proactive network management
● Aid in performance monitoring and alerting
● Act as the first line of defense against cyber threats
■ Jump Servers/Jump Box
● Secure gateways for system administrators to access devices in different
security zones
● Control access and reduce the attack surface area
● Offer protection against downtime and data breaches
● Simplify logging and auditing
● Speed up incident response during cyber-attacks
● Streamline system management and maintenance
● Host essential tools and scripts
● Monitor system health for performance and security
215
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Port Security
○ Port Security
■ A network switch feature that restricts device access to specific ports based on
MAC addresses
■ Enhances network security by preventing unauthorized devices from connecting
○ Network Switches
■ Networking devices that operate at Layer 2 of the OSI model
■ Use MAC addresses for traffic switching decisions through transparent bridging
■ Efficiently prevent collisions, operate in full duplex mode
■ Remember connected devices based on MAC addresses
■ Broadcast traffic only to intended receivers, increasing security
○ CAM Table (Content Addressable Memory)
■ Stores MAC addresses associated with switch ports
■ Vulnerable to MAC flooding attacks, which can cause the switch to fail open
○ Port Security Implementation
■ Associate specific MAC addresses with interfaces
■ Prevent unauthorized devices from connecting
■ Can use Sticky MACs for easier setup
■ Susceptible to MAC spoofing attacks
○ 802.1x Authentication
■ Provides port-based authentication for wired and wireless networks
■ Requires three roles
● Supplicant
● Authenticator
● Authentication server
■ Utilizes RADIUS or TACACS+ for actual authentication
216
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
217
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
218
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
219
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
220
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
221
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Purpose
● Efficiently routes traffic between remote sites, data centers, and cloud
environments
■ Benefits
● Increased agility, security, and efficiency for geographically distributed
workforces
■ Control
● Software-based architecture with control extracted from underlying
hardware
■ Transport Services
● Allows the use of various transport services
○ MPLS
○ Cellular
○ Microwave links
○ Broadband internet
■ Centralized Control
● Utilizes centralized control function for intelligent traffic routing
■ Traditional WAN vs. SD-WAN
● Traditional WANs
○ Cannot efficiently integrate cloud services
● SD-WAN
○ Enables dynamic and efficient routing, improving visibility,
performance, and manageability
■ Use Cases
● Ideal for enterprises with multiple branch offices moving towards
cloud-based services
222
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ IaaS
○ PaaS
○ SaaS
○ SASE (Secure Access Service Edge)
■ A network architecture combining network security and WAN capabilities in a
single cloud-based service
■ Purpose
● Addresses challenges of securing and connecting users and data across
distributed locations
■ Key Technology
● Utilizes software-defined networking (SDN) for security and networking
services from the cloud
■ Components
● Firewalls
● VPNs
● Zero-trust network access
● Cloud Access Security Brokers (CASBs)
■ Policy and Management
● Delivered through a common set of policy and management platforms
■ Cloud Providers
● Major cloud providers offer services aligned with SASE
● Examples:
○ AWS VPC
○ Azure Virtual WAN
○ Azure ExpressRoutes
○ Google Cloud Interconnect
223
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Infrastructure Considerations
○ Device Placement
■ Proper placement of routers, switches, and access points is crucial
■ Correct placement ensures
● Optimal data flow,
● Minimizes latency
● Enhances security
■ Routers at the network's edge help filter traffic efficiently
■ Strategic placement of access points ensures coverage and reduces interference
■ Switches should be located for easy connection to network segments
○ Security Zones and Screened Subnets
■ Security Zones
● Isolate devices with similar security requirements
■ Screened Subnets
● Act as buffer zones between internal and external networks
● Hosts public-facing services, protecting core internal networks
● Use the term "screened subnet" instead of "DMZ" for modern
224
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
configurations
○ Attack Surface
■ Refers to points where unauthorized access or data extraction can occur
■ A larger attack surface increases the risk of vulnerabilities
■ Identify and mitigate vulnerabilities to reduce the attack surface
■ Regularly assess and minimize the attack surface for network security
○ Connectivity Methods
■ Choose connectivity methods that influence network performance, reliability,
and security
■ Wired (e.g., Ethernet) offers stability and speed but restricts mobility
■ Wireless (e.g., Wi-Fi) provides flexibility but may suffer from interference and
security issues
■ Consider factors like scalability, speed, security, and budget constraints when
choosing connectivity methods
○ Device Attributes
■ Consider whether devices are active or passive, and if they are inline or tapped
■ Active devices (e.g., intrusion prevention systems)
● monitor and act on network traffic.
■ Passive devices (e.g., intrusion detection systems)
● observe and report without altering traffic
■ Inline devices are in the path of network traffic
■ Taps and monitors capture data without disruption
■ Align device choices with network goals and challenges
225
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Failure Mode
■ Choose between "fail-open" and "fail-closed" modes to handle device failures
■ Fail-open
● Allows traffic to pass during a failure, maintaining connectivity but
reducing security
■ Fail-closed
● Blocks all traffic during a failure, prioritizing security over connectivity
■ The choice depends on the organization's security policy and the criticality of the
network segment
226
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
threat landscape
■ Open Design Principle
● Ensure transparency and accountability through rigorous testing and
scrutiny of controls
○ Methodology
■ Assess Current State
● Understand existing infrastructure, vulnerabilities, and current controls
■ Gap Analysis
● Identify discrepancies between current and desired security postures
■ Set Clear Objectives
● Define specific goals for adding new controls (data protection, uptime,
compliance, etc.)
■ Benchmarking
● Compare your organization's processes and security metrics with industry
best practices
■ Cost-Benefit Analysis
● Evaluate the balance between desired security level and required
resources
■ Stakeholder Involvement
● Engage relevant stakeholders to ensure controls align with business
operations
■ Monitoring and Feedback Loops
● Continuously revisit control selection to adapt to evolving threats
○ Best Practices
■ Conduct Risk Assessment
● Regularly assess threats and vulnerabilities specific to your organization,
227
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
228
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Objectives:
● 2.4 - Given a scenario, you must be able to analyze indicators of malicious activity
● 4.6 - Given a scenario, you must be able to implement and maintain identity and access
management
229
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ IAM Concepts
■ Processes
● Provisioning
● Deprovisioning
● Identity Proofing
● Interoperability
● Attestation
○ Multi Factor Authentication (MFA)
■ Factors
● Something you know
● Something you have
● Something you are
● Something you do
● Somewhere you are
■ Implementations
● Biometrics
● Hard tokens
● Soft tokens
● Security keys
● Passkeys
○ Password Security
■ Best Practices
● Password policies
● Password managers
● Passwordless authentication
230
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Password Attacks
■ Types
● Spraying Attacks
● Brute Force Attacks
● Dictionary Attacks
● Hybrid Attacks
○ Single Sign-On (SSO)
■ User authentication service using one set of credentials for multiple applications
■ Technologies
● LDAP
● OAuth
● SAML
○ Federation
■ Sharing and using identities across multiple systems or organizations
○ Privileged Access Management (PAM)
■ Involves the following
● Just-in-Time (JIT) Permissions
● Password Vaulting
● Temporal Accounts
○ Access Control Models
■ Mandatory Access Control
■ Discretionary Access Control
■ Role-based Access Control
■ Rule-based Access Control
■ Attribute-based Access Control
231
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Assigning Permissions
■ Best practices to enhance organization security
232
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Accounting (Auditing)
● Tracks and records user activities
○ Logins
○ Actions
○ Changes
● Helps detect security incidents, identify vulnerabilities, and provide
evidence in case of breaches
○ Key IAM Concepts
■ Provisioning and Deprovisioning of User Accounts
● Provisioning
○ Creating new user accounts, assigning permissions, and providing
system access
● Deprovisioning
○ Removing access rights when no longer needed (e.g., when an
employee leaves)
■ Identity Proofing
● Process of verifying a user's identity before creating their account
● May involve checking personal details or providing identification
documents (e.g., driver's license or passport)
■ Interoperability
● Ability of different systems, devices, and applications to work together
and share information
● In IAM, it can involve using standards like SAML or OpenID Connect for
secure authentication and authorization
■ Attestation
● Process of validating that user accounts and access rights are correct and
233
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
up-to-date
● Involves regular reviews and audits of user accounts and their access
rights
● Multi-factor Authentication
○ Multi-factor Authentication (MFA)
■ A security system requiring multiple methods of authentication from
independent categories of credentials
■ Enhances security by creating a layered defense against unauthorized access
○ Five Categories of Authentication for MFA
■ Something You Know (Knowledge-Based Factor)
● Authentication based on information the user knows, like a password,
PIN, or answers to secret questions
■ Something You Have (Possession-Based Factor)
● Authentication based on physical possession of an item
○ Smart card
○ Hardware token (key fob)
○ Software token on a device
■ Something You Are (Inherence-Based Factor)
● Authentication based on biometric characteristics unique to individuals
○ Fingerprints
○ Facial recognition
○ Voice recognition
■ Somewhere You Are (Location-Based Factor)
● Authentication based on the user's location, determined through IP
address, GPS, or network connection
234
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
235
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Password Security
○ Password Security
■ Measures the effectiveness of a password in resisting guessing and brute-force
attacks
■ Estimates the number of attempts needed to guess a password correctly
○ Group Policy Editor for Password Policies
■ Used to create password policies in Windows
■ Available for local machines, and global policy orchestrator can be used in
domain environments
○ Five Characteristics of Password Policies
■ Password Length
● Longer passwords are harder to crack
● Strong passwords should be at least 12 to 16 characters
● Longer passwords increase security exponentially
■ Password Complexity
● Combines uppercase and lowercase letters, numbers, and special
characters
● Complexity makes passwords resistant to brute force attacks
● The more character choices, the more secure the password
■ Password Reuse
● Avoid using the same password for multiple accounts
● Reusing passwords increases vulnerability
236
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Password Expiration
● Requires users to change passwords after a specific period
● Overemphasis on expiration can lead to poor password choices
■ Password Age
● Password age refers to the time a password has been in use
● Older passwords have a higher risk of being compromised
○ Password Managers
■ Tools for storing and managing passwords securely
■ Features
● Password generation
○ Password managers create unique strong passwords for accounts
to prevent reuse and enhance security
● Auto-fill
○ Password managers autofill login details, sparing users the need to
recall or input information manually
● Secure sharing
○ Password managers provide secure methods to share passwords
without directly disclosing the password itself
● Cross-platform access
○ Password managers offer cross-device compatibility, allowing
access to passwords from any location or device
■ Promote password complexity, prevent reuse, and offer easy access to strong,
unique passwords
○ Passwordless Authentication Methods
■ Provide a higher level of security and better user experience
237
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Methods
● Biometric Authentication
○ Uses unique biological characteristics
● Hardware Token
○ Generate ever-changing login codes
● One-Time Passwords (OTP)
○ Sent to email or phone for one-time use
● Magic Links
○ One-time links sent via email for automatic login
● Passkeys
○ Rely on device screen lock for authentication
● Password Attacks
○ Password Attacks
■ Methods used by attackers to crack or recover passwords
■ Types of password attacks
● Brute Force
● Dictionary
● Password Spraying
● Hybrid
○ Brute Force Attack
■ Tries every possible character combination until the correct password is found
■ Effective for simple passwords but time-consuming for complex ones
■ Mitigation
● Increasing password complexity and length
● Limiting login attempts
238
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
239
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
240
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Federation
○ Federation
■ Links electronic identities and attributes across multiple identity management
systems
■ Enables users to use the same credentials for login across systems managed by
different organizations
■ Based on trust relationships between systems
■ Federation extends beyond an organization's boundaries
● Partners
● Suppliers
● Customers
■ Simplifies user access to various services
■ Ensures security through trust relationships between networks
○ Federation Process
■ Login Initiation
● User accesses a service or application and chooses to log in
241
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
242
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ The policies, procedures, and technical controls that are used to prevent
malicious abuse of privileged accounts
■ Crucial for preventing data breaches and ensuring the least privileged access is
granted for specific tasks or roles
○ Components of Privileged Access Management
■ Just-In-Time Permissions (JIT Permissions)
● Security model that grants administrative access only when needed for a
specific task
● Reduces the risk of unauthorized access or misuse of privileges
● Access rights are given when the task begins and revoked once the task is
completed
■ Password Vaulting
● Technique that stores and manages passwords securely, often in a digital
vault.
● Requires multi-factor authentication for accessing stored passwords
● Tracks access to privileged credentials, providing an audit trail
■ Temporal Accounts
● Temporary accounts used for time-limited access to resources
● Created for specific purposes and automatically disabled or deleted after
a predefined period
243
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Access is granted only if the user's label is equal to or higher than the
resource's label
■ Discretionary Access Control (DAC)
● Resource owners specify which users can access their resources
● Access control based on user identity, profile, or role
● Allows resource owners to grant access to specific users
■ Role-Based Access Control (RBAC)
● Assigns users to roles and assigns permissions to roles
● Roles mimic the organization's hierarchy
● Enforces minimum privileges
● Effective for managing permissions based on job roles and turnover
■ Rule-Based Access Control
● Uses security rules or access control lists
● Policies can be changed quickly and frequently
● Applied across multiple users on a network segment
■ Attribute-Based Access Control (ABAC)
● Considers various attributes like
○ User Attributes
■ User’s name, role, organization ID, or security clearance
○ Environment Attributes
■ Time of access, data location, and current organization’s
threat level
○ Resource Attributes
■ File creation date, resource owner, file name, and data
sensitivity
● Access decisions are based on the combination of attributes
244
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Assigning Permissions
○ Privileges
■ Define the levels of access that users have
■ Local Administration Account
● High level of access
● Allows administrator to
○ change system settings
○ install softwares
○ perform a variety of managerial tasks
■ Standard User Accounts
● Can’t change system settings
● Can store files in their designated area only
○ Principle of Least Privilege
■ A user should only have the minimum access rights needed to perform their job
245
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
246
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Objectives:
● 2.2: Explain common threat vectors and attack strategies
● 2.3: Explain various types of vulnerabilities
● 2.4: Given a scenario, you must be able to analyze indicators of malicious activity
● 2.5: Explain the purpose of mitigation techniques used to secure the enterprise
● 4.1: Given a scenario, you must be able to apply common security techniques to computing
resources
247
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Hardware Vulnerabilities
■ Focus
● Firmware
● End-of-life systems
● Missing patches
● Misconfigurations
■ Mitigation
● Harden systems
● Patch
● Enforce baseline configurations
● Decommission old assets
● Isolation
○ Bluetooth Vulnerabilities and Attacks
■ Vulnerabilities attacks like the following
● Bluesnarfing
● Bluejacking
● Bluebugging
● Bluesmark
● Blueborne
○ Mobile Vulnerabilities and Attacks
■ Topics
● Sideload
● Jailbreaking
● Insecure connections
■ Mitigation
● Patch Management
248
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
249
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ XML Injection
● Targets XML data processing
○ Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) Attacks
■ Cross-Site Scripting (XSS)
● Injects malicious scripts into web pages
■ Cross-Site Request Forgery (CSRF)
● Triggers actions on different websites without user consent
○ Buffer Overflows
■ Software vulnerability when more data is written to a memory buffer than it can
hold
○ Race Conditions
■ Multiple processes or threads accessing shared resources simultaneously
■ Key Terms
● Time-of-Check (TOC)
● Target-of-Evaluation (TOE)
● Time-of-Use (TOU)
● Hardware Vulnerabilities
○ Hardware Vulnerabilities
■ Security flaws or weaknesses in a device's physical components or design that
can be exploited to compromise system integrity, confidentiality, or availability
○ Types of Hardware Vulnerabilities
■ Firmware Vulnerabilities
● Specialized software stored on hardware devices
● Can grant attackers full control, leading to unauthorized access or
takeover
250
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Legacy
○ Outdated and superseded by newer alternatives
● Unsupported
○ No official support, security updates, or patches
● Vulnerable due to the lack of patching and updates
■ Unpatched Systems
● Devices, applications, or software without the latest security patches
● Exposed to known exploits and attacks
● Risk from oversight, negligence, or challenges in updating
■ Hardware Misconfigurations
● Incorrect device settings or options
● May lead to vulnerabilities, performance issues, or unintended behavior
● Caused by oversight, lack of understanding, or deployment errors
○ Mitigation Strategies
■ Hardening
● Tighten security by closing unnecessary ports, disabling services, and
setting permissions
■ Patching
● Regular updates to fix known vulnerabilities in software, firmware, and
applications
251
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Configuration Enforcement
● Ensure devices adhere to secure configurations
■ Decommissioning
● Retire end-of-life or legacy systems posing security risks
■ Isolation
● Isolate vulnerable systems from the enterprise network
■ Segmentation
● Divide the network into segments to limit the impact of breaches
252
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Bluebugging
● Allows attackers to take control of a device's Bluetooth functions
● Can make calls, send messages, or access the internet
■ Bluesmack
● Denial-of-service attack by overwhelming a device with data, causing it to
crash or become unresponsive
■ BlueBorne
● Spreads through the air to infect devices without user interaction
○ Best Practices for Secure Bluetooth Usage
■ Turn off Bluetooth when not in use
● Reduces the attack surface and exposure to threats
■ Set devices to "non-discoverable" mode by default
● Prevents unsolicited connection attempts
■ Regularly update firmware
● Ensures security is up-to-date with patches for vulnerabilities
■ Only pair with known and trusted devices
● Mitigates the risk of connecting to malicious devices
253
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
254
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Zero-day Vulnerabilities
○ Zero-day Vulnerabilities
■ Discovered or exploited before vendors issue patches
○ Zero-day Exploits
■ Attacks that target previously unknown vulnerabilities
○ Zero-day
■ Refer to the vulnerability, exploit, or malware that exploits the vulnerability
○ Zero-Day Exploits and Value
■ Zero-day exploits are significant in the cybersecurity world and can be lucrative
■ Bug bounty hunters can earn money by discovering zero-day vulnerabilities
■ Zero-days are also sold to government agencies, law enforcement, and criminals
■ Threat actors save zero-days for high-value targets, using generic malware for
initial attempts
255
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
256
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
protection tools
■ Endpoint protection tools can monitor and restrict unauthorized data transfers
○ Malicious Updates
■ Appear as legitimate security updates but contain malware or exploits
■ Source updates from trusted vendors and official channels
■ Maintain application allow lists, verify update authenticity with digital signatures
and hashes
257
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Example statement
○ SELECT * FROM USERS WHERE userID = 'Jason' AND password =
'pass123';
■ SQL Injection
● Involves inserting malicious SQL code into input fields
● Attackers use URL parameters, form fields, cookies, POST data, or HTTP
headers for SQL injection
● Prevention
○ Input validation
○ Sanitize user data
○ Use a web application firewall
● SQL Injection Attempt
○ Involve statements like " ‘ OR 1=1"
○ Example
■ Original SQL statement
● SELECT * FROM USERS WHERE userID = 'Jason' AND
password = 'pass123';
■ Injected SQL statement
● SELECT * FROM Users WHERE userID = 'Jason' AND
password = '' OR 1=1;
○ XML (Extensible Markup Language) Injection
■ XML Data
● Used for data exchange in web applications
● Should be sent within an encrypted tunnel, like TLS
● Input validation and sanitization are crucial for protection
● Appears as tagged fields
258
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Example
○ <?xml version="1.0" encoding="UTF-8"?>
<question>
<ID>SECURITY-002-0001</ID>
<title>Is this an XML vulnerability?</title>
<choice1>Option 1</choice1>
<choice2>Option 2</choice2>
</question>
■ XML Exploits
● XML Bomb (Billion Laughs Attack)
○ Consumes memory exponentially, acting like a denial-of-service
attack
● XXE (XML External Entity) Attack
○ Attempts to read local resources, like password hashes in the
shadow file
○ Example
■ <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE foo [
<!ELEMENT foo ANY>
<!ENTITY xxe SYSTEM "file:///etc/shadow">
]>
<foo>Some data</foo>
■ Prevention
● Implement proper input validation
259
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
260
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
261
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
replaces it with his or her own machine by spoofing the original host IP
● Session Prediction
○ Type of spoofing attack where the attacker attempts to predict the
session token in order to hijack the session
○ Prevent these attacks by using a non-predictable algorithm to
generate session tokens
○ XSRF
■ Malicious script is used to exploit a session started on another site within the
same web browser
■ Can be disguised
● Can use tags, images, and other HTML code
■ Doesn’t need victim to click on a link
■ Prevention
● Use user-specific tokens in all form submissions
● Add randomness and prompt for additional information whenever a user
tries to reset their password
○ Require two-factor authentication
● Require users to enter their current password when changing their
password
● Buffer Overflow
○ Buffer Overflow Attack
■ Occurs when a process stores data outside the memory range allocated by the
developer
■ Common initial attack vector in data breaches
● 85% of data breaches used buffer overflow as the initial vector
262
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
263
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Race Conditions
○ Race Conditions
■ Software vulnerabilities related to the order and timing of events in concurrent
processes
■ Exploiting race conditions allows attackers to disrupt intended program behavior
and gain unauthorized access
○ Understanding Race Conditions
■ Race conditions occur when multiple threads or processes access and manipulate
shared resources simultaneously
■ Dereferencing
● Software vulnerability that occurs when the code attempts to remove the
relationship between a pointer and the thing that the pointer was
pointing to in the memory which allows changes to be made
■ Vulnerabilities stem from unexpected conflicts and synchronization issues
○ Exploiting Race Conditions
■ Attackers exploit race conditions by timing their actions to coincide with
vulnerable code execution
■ Exploitation may lead to unauthorized access, data manipulation, or system
crashes
264
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
265
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Deadlock
● Occurs when a lock remains in place because the process it’s waiting for is
terminated, crashes, or doesn’t finish properly, despite the processing
being complete
266
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Malicious Activity
Objective 2.4: Given a scenario, you must be able to analyze indicators of malicious activity
● Malicious Activity
○ Malicious Activity
■ Constantly evolving threats in the digital age
■ Concerns
● Cyber attacks, increasing in frequency and sophistication
■ Purpose
● Delve into cyber threats, types, mechanisms, and impacts
○ Understanding Cyber Threats
■ Importance
● First step to effective prevention and mitigation
■ Insights
● Tactics, techniques, and procedures employed by cybercriminals
○ Distributed Denial of Service (DDoS) Attacks
■ Variants
● Denial of Service
● Amplified DDoS
● Reflected DDoS
○ Domain Name Server (DNS) Attacks
■ Types
● DNS Cache Poisoning
● DNS Amplification
● DNS Tunneling
267
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Domain Hijacking
● DNS Zone Transfer
○ Directory Traversal Attacks
■ Exploiting insufficient security validation of user-supplied input file names
○ Privilege Escalation Attack
■ Exploiting system vulnerability to gain elevated access
○ Replay Attacks
■ Malicious or fraudulent repeat/delay of a valid data transmission
○ Session Hijacking
■ Attacker takes over a user session to gain unauthorized access
○ Malicious Code Injection Attacks
■ Introduction of harmful code into a program or system
○ Indicators of Compromise (IoC)
■ Examples
● Account lockout
● Concurrent session usage
● Blocked content
● Impossible travel
● Resource consumption
● Inaccessibility
● Out-of-cycle logging
● Published documents indicating hacking
● Missing logs
268
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
269
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
270
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
271
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Mitigation
○ Regularly update and secure registration account information
○ Use domain registry lock services to prevent unauthorized
changes
■ DNS Zone Transfer Attacks
● Attempts to obtain an entire DNS zone data copy
● Exposes sensitive information about a domain's network infrastructure
● Could be used for reconnaissance in future attacks
272
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
273
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
274
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Replay Attacks
○ Replay Attacks
■ Type of network-based attack where valid data transmissions are maliciously or
fraudulently re-broadcast, repeated, or delayed
■ Involves intercepting data, analyzing it, and deciding whether to retransmit it
later
■ Different from a Session Hijack
● In a Session Hijack, the attacker alters real-time data transmission
● In a Replay Attack, the attacker intercepts the data and then can decide
later whether to retransmit the data
○ Applications of Replay Attacks
■ Not limited to banking; can occur in various network transmissions
● Email
● Online shopping
● Social media
■ Common in wireless authentication attacks, especially with older encryption
275
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Session Hijacking
○ Session Management
■ Fundamental security component in web applications
■ Enables web applications to uniquely identify a user across a number of different
actions and requests, while keeping the state of the data generated by the user
and ensuring it is assigned to that user
○ Cookie
■ Text file used to store information about a user when they visit a website
■ Cookies must be protected because they contain client information that is being
transmitted across the Internet
276
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Session cookies
● Non-persistent, reside in memory, and are deleted when the browser
instance is closed
■ Persistent Cookies
● Cookies that are stored in the browser cache until they are deleted by the
user or pass a defined expiration date
● Cookies should be encrypted if they store confidential information
○ Session Hijacking
■ A type of spoofing attack where the attacker disconnects a host then replaces it
with his or her own machine, spoofing the original host's IP address
■ Session hijacking attacks can occur through the theft or modification of cookies
○ Session Prediction Attacks
■ A type of spoofing attack where the attacker attempts to predict the session
token to hijack a session
■ A session token must be generated using a non-predictable algorithm and it must
not reveal any information about the session client
○ Cookie Poisoning
■ Modifies the contents of a cookie after it has been generated and sent by the
web service to the client's browser so that the newly modified cookie can be
used to exploit vulnerabilities in the web app
● On-path Attacks
○ On-Path Attack
■ An attack where the attacker positions their workstation logically between two
hosts during communication
■ The attacker transparently captures, monitors, and relays communications
277
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
278
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Injection Attacks
○ Lightweight Directory Access Protocol (LDAP)
■ An open, vendor-neutral, industry standard application protocol for accessing
and maintaining distributed directory information services over an Internet
Protocol network
○ LDAP Injection
■ An application attack that targets web-based applications by fabricating LDAP
statements that are typically created by user input
■ Use input validation and input sanitization as protection against an LDAP
injection attack
279
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Command Injection
■ Occurs when a threat actor is able to execute arbitrary shell commands on a host
via a vulnerable web application
○ Process Injection
■ Method of executing arbitrary code in the address space of a separate live
process
■ There are many different ways to inject code into a process
● Injection through DLLs
● Thread Execution Hijacking
● Process Hollowing
● Process Doppel Ganging
● Asynchronous Procedure Calls
● Portable Executable Injections
■ Mitigation includes
● Endpoint security solutions that are configured to block common
sequences of attack behavior
● Security Kernel Modules
● Practice of Least Privilege
280
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
281
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
attacks
○ Resource Inaccessibility
■ Inability to access resources like files, databases, or network services
■ Suggests a ransomware attack, where files are encrypted, and a ransom is
demanded
○ Out-of-Cycle Logging
■ Log entries occurring at unusual times
■ Indicates an attacker trying to hide their activities during off-peak hours
○ Missing Logs
■ Sign that logs have been deleted to hide attacker activities
■ May result in gaps in the log data, making it harder to trace the attacker's
actions
○ Published Articles or Documents
■ Attackers publicly disclose their actions, boasting about their skills or
causing reputational damage
■ Can occur on social media, hacker forums, newspaper articles, or the
victim's own website
282
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Hardening
Objectives:
● 2.5 - Explain the purpose of mitigation techniques used to secure the enterprise
● 4.1 - Given a scenario, you must be able to apply common security techniques to computing
resources
● 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance security
● Hardening
○ Hardening
■ Process of enhancing system, application, or network security
■ Measures
● Apply security patches, configure access controls, disable unnecessary
services
■ Purpose
● Strengthen overall security posture and resilience against cyberattacks
○ Study Topics
■ Default Configurations
● Definition and identification of default configurations
● Changing default passwords, open ports, and insecure configurations
■ Restricting Applications
● Application restriction approach
● Allow listing, blocking unauthorized software
■ Disabling Unnecessary Services
● Identifying unnecessary services
283
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
284
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Restricting Applications
○ Least Functionality
■ Involves configuring systems with only essential applications and services
■ Least functionality aims to provide only the necessary applications and services
■ Unneeded applications should be restricted or uninstalled to reduce
vulnerabilities
■ Over time, personal computers accumulate unnecessary programs
○ Managing Software
■ Keeping software up-to-date is crucial for security
■ New programs may be installed without removing old versions
■ Large networks require preventive measures to control excessive installations
285
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
286
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
workstations in a network
287
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Trusted Solaris
● Offers secure, multi-level operations with MAC, detailed system audits,
and data/process compartmentalization
○ Trusted OS enhances security with microkernels by minimizing the trusted base and
reducing attack surface and vulnerabilities
○ Choosing an operating system requires balancing security with usability, performance,
and functional requirements
288
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Patch Management
○ Patch Management
■ Planning, testing, implementing, and auditing of software patches
○ Important for compliance
○ Four Step Process
■ Planning
● Creating policies, procedures, and systems to track and verify patch
compatibility
● A good patch management tool confirms patch deployment, installation,
and functional verification on servers or clients
■ Testing
● Do this to prevent the patch from causing additional problems
■ Implementing
● Deploy to all devices that need it
● Can be done manually or automated
289
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Group Policies
○ Group Policy
■ A set of rules and policies that can be applied to users or computer accounts
within an operating system
○ Accessing Group Policy Editor
■ Access the Group Policy Editor by entering "gpedit" in the run prompt
■ The local Group Policy Editor is used to create and manage policies within a
Windows environment
○ Group Policies Overview
■ Each policy acts as a security template applying rules such as
● Password complexity requirements,
● Account lockout policies
● Software restrictions
● Application restrictions
■ In a Windows environment with an Active Directory domain controller, you have
290
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
291
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● SELinux
○ SELinux and MAC Basics
■ SELinux (Security Enhanced Linux)
● A security mechanism that provides an additional layer of security for
Linux distributions
● Enforces Mandatory Access Control (MAC)
■ Mandatory Access Control (MAC)
● Restricts access to system resources based on subject clearance and
object labels
■ Context-based permissions
● Permission schemes that consider various properties to determine
whether to grant or deny access to a user
292
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
293
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Optional Context
■ Level Context
● Describes the sensitivity level of a file, directory, or process
● Known as a multi-level security context, allowing further access control
refinement
○ SELinux Modes
■ Disabled Mode
● Turns off SELinux, relying on default DAC for access control
■ Enforcing Mode
● Enforces all SELinux security policies, preventing policy violations
■ Permissive Mode
● Enables SELinux but doesn't enforce policies, allowing processes to
bypass security policies
○ SELinux Policies
■ SELinux Policy
● Describes access permissions for users, programs, processes, files, and
devices
■ Two Main Policy Types
● Targeted Policies
○ Only specific processes are confined to a domain, while others run
unconfined
● Strict Policies
○ Every subject and object operates under MAC, but it's more
complex to set up
294
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Violation Messages
■ SELinux captures violation messages in an audit log
■ Violations can occur when someone tries to access an unauthorized object, or an
action contradicts an existing policy
○ Policy Configuration
■ Initial SELinux setup may result in false violations, requiring policy tweaking and
fine-tuning
■ Strong security depends on creating effective restricted profiles and hardening
applications to prevent malicious attacks
295
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ File-level Encryption
● Used to encrypt an individual file instead of an entire partition or an
entire disk drive
● GNU Privacy Guard
○ A tool that provides cryptographic privacy and authentication for
data communication
■ Database
● Secures the entire database
● Can extend the encryption across multiple storage devices or cloud
storage
● Similar to full-disk encryption
■ Record
● Encrypts individual records or rows within a database
● Secure Baselines
○ Secure Baseline
■ Standard set of security configurations and controls applied to systems,
networks, or applications to ensure a minimum level of security
■ Helps organizations maintain consistent security postures and mitigate common
vulnerabilities
○ Establishing a Secure Baseline
■ The process begins with a thorough assessment of the system, network, or
application that requires protection
■ Identify the type of data involved, understand data workflows, and evaluate
potential vulnerabilities and threats
■ Best practices, industry standards, and compliance requirements (e.g., ISO
296
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
27001, NIST SP 800-53) are used as starting points for defining the secure
baseline
■ Create a secure baseline configuration by securing the operating system on a
reference device (e.g., a laptop)
○ Configuring a Secure Baseline
■ Install, update, configure, and secure the operating system on the reference
device
■ Check the device against baseline configuration guides and scan for known
vulnerabilities or misconfigurations
■ Install required applications (e.g., Microsoft Office suite, endpoint detection and
response agents)
■ Scan for vulnerabilities in the installed applications and remediate them
■ Create an image of the reference device as the "known good and secure
baseline”
○ Deployment
■ Configure firewalls, set up user permissions, implement encryption protocols,
and ensure antivirus and anti-malware solutions are properly installed and
updated
■ Use automated tools and scripts to ensure consistent application of the secure
baseline across devices
■ In a Windows environment, Group Policy Objects (GPO) can be used to dictate
policies, user rights, and audit settings
■ In cloud environments (e.g., AWS), services like AWS Config are employed to
define and deploy secure configurations
○ Maintenance
■ Lock down systems to prevent unauthorized software installation or
297
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
configuration changes
■ Regular audits, monitoring, and continuous assessment are required to keep the
baseline up-to-date
■ Continuous monitoring tools help identify deviations from the baseline and
trigger alerts for immediate remediation
■ Periodically review and update the secure baseline to adapt to changes in
organizational infrastructure, business needs, and emerging threats
○ Employee Training and Awareness
■ Conduct training sessions to educate employees about the importance of
adhering to secure baseline configurations
■ Raise awareness about the potential risks of deviating from the baseline
■ Encourage employees to report any suspicious activities they notice when using
their systems
298
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Security Techniques
Objectives:
● 4.1 - Given a scenario, you must be able to apply common security techniques to computing
resources
● 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance security
● Security Techniques
○ Security Techniques
■ Protecting digital assets from evolving cyber threats
■ Scope
● Traditional to advanced security techniques
○ Study Topics
■ Wireless Infrastructure Security
● Significance of wireless networks
● Challenges and security considerations
■ Wireless Security Settings
● WPA3, AAA/RADIUS, Cryptographic protocols
● Authentication protocols in wireless security
■ Application Security
● Input validation, secure cookies
● Static and dynamic code analysis
● Code signing and sandboxing
■ Network Access Control (NAC)
● Purpose and functionality of NAC
299
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
300
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Placement influences
● Network range
● Coverage
● Security
■ Proper placement prevents unauthorized access by limiting signal leakage or
dead zones
■ Is a huge concern in terms of the security of the wireless network
○ Placement Considerations
■ Avoid placing WAPs near external walls or windows to prevent signal leakage
■ Place WAPs in central locations for optimal coverage
■ Use unidirectional antennas when WAPs are near external walls
■ Mount WAPs on higher locations, such as ceilings, for better coverage
○ Extended Service Set (ESS)
■ Multiple WAPs work together to provide seamless network coverage
■ Important for large buildings where a single WAP is insufficient
○ Wireless Access Point Interference
■ Interference occurs when multiple WAPs use the same channels or overlapping
frequencies
■ Types
● Co-Channel Interference
● Adjacent Channel Interference
■ In the 2.4 GHz band, select Channels 1, 6, and 11 to avoid overlap
○ Tools for ensuring good Wireless Access Point Coverage
■ Site Surveys
● Essential for planning and designing wireless networks
● Involves a site visit to test for radio frequency interference and identify
301
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
302
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
303
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ AAA Protocols
■ Important for centralized user authentication and access control
■ Examples
● RADIUS (Remote Authentication Dial-In User Service)
○ Offers Authentication, Authorization, and Accounting services
○ Widely used for secure access to network resources
● TACACS+ (Terminal Access Controller Access-Control System Plus)
○ Separates Authentication, Authorization, and Accounting
functions
○ More granular control
○ Encrypts the authentication process using TCP for enhanced
security
○ Authentication Protocols
■ Used to verify user identity and control network access
■ EAP (Extensible Authentication Protocol)
● Authentication framework supporting multiple methods
● Provides common functions and negotiation of authentication protocols
■ PEAP (Protected Extensible Authentication Protocol)
● Encapsulates EAP within an encrypted TLS tunnel
● Developed jointly by Cisco Systems, Microsoft, and RSA Security
■ EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security)
● Extends TLS support across platforms
● Requires server-side certificates for security
■ EAP-FAST (Extensible Authentication Protocol-Flexible Authentication via Secure
Tunneling)
● Developed by Cisco Systems for secure re-authentication
304
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Application Security
○ Application Security
■ Focuses on building secure applications
■ Aims to prevent, detect, and remediate security vulnerabilities
○ Six Key Areas in Application Security
■ Input Validation
● Ensures that applications process well-defined, secure data
● Guards against attacks exploiting data input vulnerabilities (e.g., SQL
injection, XSS, buffer overflows)
● Serves as a kind of quality control for data to ensure that every piece of
information is valid, secure, and correctly formatted
● Validation Rules
○ Delineate acceptable and unacceptable inputs
● Validates data early in the process (front-end validation)
● Used with additional tools for defense in-depth
○ Secure communication protocols
○ Regular security auditing
○ Implementing proper error handling
■ Cookies
● Small data pieces stored by web browsers
● Maintain stateful information between the server and client
● Secure Cookies
○ Secure cookies are transmitted over HTTPS for enhanced security
305
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Best practices
○ Refraining from persistent cookies for session verification
○ Enabling the Secure attribute
○ Enabling HttpOnly attribute
○ Configuring the SameSite attribute
■ Static Code Analysis (SAST)
● A method of debugging an application by reviewing and examining its
source code before running the program
● Identifies issues like buffer overflows, SQL injection, and XSS
● Important for proper input validation in both front-end and back-end
code
■ Dynamic Code Analysis (DAST)
● Analyzes applications while they run
● Common methods of DAST
○ Fuzzing (Fuzz Testing)
■ Inputs random data to provoke crashes or exceptions
■ Helps uncover security flaws and weaknesses
○ Stress Testing
■ Evaluates system stability and reliability under extreme
conditions
■ Reveals bottlenecks and assesses system recovery
■ Code Signing
● Confirms the software author's identity and integrity
● Utilizes digital signatures to verify code authenticity
● Protects against code tampering but doesn't guarantee absence of
vulnerabilities
306
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Sandboxing
● Isolates running programs, limiting their access to resources
● Prevents harmful actions on the host device or network
● Used to execute untrusted or untested programs securely
307
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
308
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
309
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Users' devices request domain name translation from DNS servers; if the domain
is on the block list, the server withholds the IP address to prevent access
■ Commonly used to enforce internet usage policies, block inappropriate content,
and protect against malicious websites
■ Often employed by schools, universities, and organizations to ensure safe and
educational internet usage
● Email Security
○ Email Security
■ Encompasses techniques and protocols to protect email content, accounts, and
infrastructure from unauthorized access, loss, or compromise
○ Key email security techniques
■ DKIM (DomainKeys Identified Mail)
● Allows the receiver to verify the source and integrity of an email by
adding a digital signature to the email headers
● The recipient server validates the DKIM signature using the sender's
public cryptographic key in the domain's DNS records
● Benefits
○ Email authentication
○ Protection against email spoofing
○ Improved email deliverability
○ Enhanced reputation score
■ SPF (Sender Policy Framework)
● Prevents sender address forgery by verifying the sender's IP against
authorized IPs listed in the sender's domain DNS records
● A receiving server checks if the sender's IP is authorized in the SPF record
310
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
311
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
312
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Alerting
■ Focuses on incident data for enhancing security monitoring, incident response,
and forensic investigations
○ How EDR Works
■ Data Collection
● Collects data from endpoints (devices that are physically on the endpoint
of a network)
○ System processes
○ Registry changes
○ Memory usage
○ Network traffic patterns
■ Data Consolidation
● Sends collected data to a centralized security solution or database
■ Threat Detection
● Analyzes data using techniques like signature-based and behavioral-based
detection to identify threats
■ Alerts and Threat Response
● Takes actions such as creating alerts or performing threat response
actions when threats are detected
■ Threat Investigation
● Provides tools for security teams to investigate threats, including detailed
timelines and forensic data
■ Remediation
● Removing malicious files
● Reversing changes
● Restoring systems to their normal state
313
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
314
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
315
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
316
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ SMTPS
○ SNMPS
○ Port Selection
■ Ports are logical constructs used to identify processes or services on a system
■ Categorized into the following
● Well-known ports (0-1023)
● Registered ports (1024-49151)
● Dynamic/private ports (49152-65535)
■ Default port numbers often indicate whether a protocol is secure (e.g., HTTP on
port 80 vs. HTTPS on port 443)
■ Additional security considerations
● Follow the principle of least privilege by opening only necessary ports to
minimize the attack surface
● Changing port numbers can add a layer of obscurity but should not
replace robust security measures
○ Transport Methods
■ Choose a transport method (TCP or UDP) based on the application's needs
■ TCP (Transmission Control Protocol)
● Connection-oriented, ensuring data delivery without errors
● Ideal for applications where data accuracy is crucial, like web and email
servers
● Uses acknowledgments, retransmission, and sequencing for data integrity
■ UDP (User Datagram Protocol)
● Connectionless and faster, but doesn't guarantee data delivery
● Suitable for applications prioritizing speed over accuracy, like streaming
video or gaming
317
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Vulnerability Management
● Vulnerability Management
○ Vulnerability Management
■ Systematic process for identifying, evaluating, prioritizing, and mitigating
vulnerabilities
■ Goals
● Maintain secure and resilient cybersecurity posture, minimize security
breaches, and manage risk effectively
○ Study Topics
■ Identifying Vulnerabilities
● Recognizing weaknesses in systems, applications, and networks
● Critical first step for building a robust security posture
■ Threat Intelligence Feeds
● Provide essential information on emerging threats
● Proactive identification and mitigation of vulnerabilities
■ Responsible Disclosure Programs
● Framework for ethical reporting of discovered vulnerabilities
● Fostering collaboration between security researchers and organizations
■ Analyzing Vulnerabilities
● Evaluating severity and potential impact
● Prioritizing remediation efforts effectively
318
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Vulnerability Scans
● Employing scanning tools and methodologies
● Systematically searching for vulnerabilities
■ Assessing Scan Results
● Comprehensive analysis of gathered data
● Determining vulnerabilities requiring immediate attention
■ Responding and Remediating
● Developing effective response strategies
● Promptly addressing and reducing exposure to potential threats
■ Validating Remediation
● Ensuring remediation actions effectively mitigate vulnerabilities
● Confirming the security of systems
■ Vulnerability Reporting
● Communicating findings and remediation progress
● Maintaining transparency and facilitating decision-making
● Identifying Vulnerabilities
○ Identifying Vulnerabilities
■ Systematic practice of recognizing and categorizing weaknesses in systems,
networks, or applications that could be exploited
■ This process is crucial for enhancing system security, preventing unauthorized
access, and protecting the integrity of an organization's data and systems
○ Methods for Identifying Vulnerabilities
■ Vulnerability Scanning
● Automated probing of systems, networks, and applications to discover
potential vulnerabilities
319
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Tools like Nessus and OpenVAS are used to analyze the current state of
systems against a database of known vulnerabilities
● Prioritize identified vulnerabilities, apply patches, and implement
mitigation measures to prevent exploitation
■ Application Security
● Protecting software from manipulation during its lifecycle
● Techniques include static analysis, dynamic analysis, and package
monitoring for custom software applications
● Static analysis examines the source code without execution to identify
vulnerabilities
● Dynamic analysis evaluates applications in real-time to detect
vulnerabilities
● Package monitoring ensures the security and updates of libraries and
components that applications depend on
■ Penetration Testing
● Simulates real-world attacks on systems to evaluate their security
● Examining penetration test results to understand how systems were
infiltrated or exploited
● Mitigate identified issues to prevent similar attack vectors from being
used by attackers
■ System and Process Audits
● Comprehensive reviews of information systems, security policies, and
procedures
● Ensures adherence to security best practices and industry standards
320
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
321
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Malware signatures
● Indicators of Compromise (IoC)
● Malicious IP addresses
● URLs
■ Different feed sources are used to enhance security posture
○ Understanding Threat Intelligence
■ Threat Intelligence
● Continuous process to comprehend the specific threats an organization
faces
■ It focuses on analyzing evidence-based knowledge about existing or emerging
hazards to an organization's assets
■ Combines data from multiple sources to provide context, mechanisms,
indicators, implications, and actionable information about threats
■ Threat intelligence services from companies like FireEye help cybersecurity
professionals stay updated on the latest attacks, vulnerabilities, and threats
○ Evolution of Threats
■ Threat actors adapt their attack methods as technology changes
■ In the past, server-side attacks were common due to open ports and protocols on
servers
■ With better server protection, threat actors shifted to client-side attacks,
targeting vulnerabilities in client applications
■ Enterprise networks implement Network Access Control (NAC) to secure clients
■ The mobile environment and cloud technology have also become targets for
attacks
322
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
323
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
324
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Analyzing Vulnerabilities
○ Vulnerability Confirmation
■ Determining the accuracy of identified potential security weaknesses
● True Positive
○ Real and exploitable vulnerability correctly identified
● False Positive
○ Incorrectly stated vulnerability
● True Negative
○ Correctly identifies the absence of a vulnerability
● False Negative
○ Serious finding – vulnerability exists but remains undetected
○ Prioritizing Vulnerabilities
■ Ranking identified vulnerabilities by severity and potential impact
■ Factors include ease of exploitation, potential damage, system importance
■ Use scoring systems like Common Vulnerability Scoring System (CVSS)
■ Ensure focus on the most critical security threats
○ Classifying Vulnerabilities
■ Categorizing vulnerabilities based on type, potential impact, and affected
325
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
systems
■ Streamlines management and response efforts
■ Vulnerabilities might be classified into categories such as
● Software flaws
● Configuration errors
● Security policy gaps
■ CVE (Common Vulnerabilities and Exposures)
● System that provides a standardized way to uniquely identify and
reference known vulnerabilities in software and hardware
● Provides solutions and mitigation strategies
● Help assess security and prioritize vulnerability fixes
○ Organizational Impact of Vulnerabilities
■ Assessing potential impact on confidentiality, integrity, and availability
■ Consider industry-specific impact
■ Impact on reputation, business continuity, regulatory fines, customer trust
○ Exposure Factor (EF)
■ A quantifiable metric to estimate the percentage of asset damage
■ Helps understand potential loss due to vulnerability exploitation
■ Supports qualitative risk management in the organization
○ Risk Tolerance
■ The level of risk an organization is willing to accept
■ Determines the urgency of vulnerability remediation
■ High risk tolerance may allow monitoring of certain vulnerabilities
■ Low risk tolerance may require swift remediation of even minor vulnerabilities
■ Alignment of vulnerability management with overall business strategies and
objectives
326
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
327
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
328
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Vulnerability Reporting
○ Vulnerability Reporting
■ Process of documenting and communicating security weaknesses in software or
systems to individuals and organizations responsible for addressing the issues
■ Reports should use clear, concise, and transparent language
■ Confidentiality is crucial to prevent exploitation, reputation damage, and legal
repercussions
329
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Internal Reporting
■ First line of defense in vulnerability management within the organization
■ Identifying, documenting, and communicating vulnerabilities within the
organizational structure
■ Information remains internal
■ Timely reporting reduces exposure to unpatched vulnerabilities
■ Establish clear communication paths and protocols
○ External Reporting
■ Reporting vulnerabilities outside the organization, involving vendors, partners,
customers, or the public
■ Coordinating with vendors to address vulnerabilities for the benefit of all
customers
■ Sharing non-sensitive details with databases like CVE or vendor knowledge bases
■ Respect privacy when discussing vulnerabilities with external organizations
○ Responsible Disclosures
■ Ethical and judicious disclosure to affected stakeholders before public
announcement
■ Collaborate with the entity responsible for the vulnerability (e.g., software
developer)
■ Consider bug bounty programs
■ Give vendors time to address the issue before public disclosure
■ Provide detailed reports, including methods used to exploit vulnerabilities and
recommended mitigations
○ Importance of Confidentiality
■ Confidentiality is non-negotiable to prevent exploitation
■ Vulnerability reports are valuable maps for attackers
330
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
331
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Objective 4.4: Explain security alerting and monitoring concepts and tools
332
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Monitoring Types
● Automated Monitoring
○ Software tools for scanning and analyzing
● Manual Monitoring
○ Human personnel actively reviewing and analyzing
■ Monitoring Resources
● Overview of monitoring systems, applications, and infrastructure
■ Alerting and Monitoring Activities
● Log Aggregation
○ Collecting and centralizing log data
● Alerting
○ Notification of potential security incidents
● Scanning
○ Continuous examination for anomalies
● Reporting
○ Generating reports on system and network status
● Archiving
○ Storing historical data
● Alert Response and Remediation/Validation
○ Responding to alerts and validating remediation
■ Simple Network Management Protocol (SNMP)
● Widely used in network management systems
● Monitors and manages network devices
● SNMP traps for setting up and collecting data
■ Security Information and Event Management (SIEM)
● Integrated management technologies for holistic security views
333
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Monitoring Resources
○ Monitoring Systems
■ Involves observing a computer system's performance, including
● CPU
● Memory
● Disk usage
● Network performance
334
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Baseline
■ A reference point representing normal system behavior under typical operating
conditions
■ Baseline metrics can include CPU usage, memory utilization, disk activity, and
network traffic
■ Deviations from the baseline can indicate potential issues, prompting proactive
troubleshooting and maintenance
○ Application Monitoring
■ Focuses on managing and monitoring software application performance and
availability
■ Tracks errors, bottlenecks, and issues that may affect an application's
performance or user experience
■ Tools like New Relic and AppDynamics track response times and error rates
■ Slower response times may indicate code problems or resource deficiencies
○ Infrastructure Monitoring
■ Observes physical and virtual infrastructure, including servers, networks, virtual
machines, containers, and cloud services
■ Provides insights into network traffic, bandwidth usage, and device status
■ Tools like SolarWinds and PRTG Network Monitor help monitor network
infrastructure
■ Overloaded network switches can signal the need for additional capacity or
configuration issues
335
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
336
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
337
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
338
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ SNMP Agents
■ Networked devices that send information about themselves to the manager
■ Run background services to collect data and send it to the manager
■ Transmit data at regular intervals or when requested by the manager
○ SNMP Message Types
■ SET
● Manager-to-agent request to change variable values
339
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ GET
● Manager-to-agent request to retrieve variable values
■ TRAP
● Asynchronous notifications from agents to the manager to notify
significant events
● Notify the manager of events such as uptime, configuration changes, and
network downtime
● May be granular or verbose
○ Granular
■ Sent TRAP messages get a unique object identifier OID) to
distinguish each message as a unique message being
received
■ OID (Object Identifier)
● Unique object identifier used to identify variables
for reading or setting via SNMP
● Allows the manager to distinguish individual SNMP
trap messages
■ MIB (Management Information Base)
● A hierarchical namespace containing OIDs and their
descriptions
● Describes the structure of device subsystem
management data
● Stores consolidated information received through
SNMP traps
○ Verbose
■ SNMP traps may be configured to contain all of the
340
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
341
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
342
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
343
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Generates data like malware detection logs, system scans, and updates
■ Data sent to SIEM for aggregation and correlation
■ Helps identify security threats and system health
○ Data Loss Prevention (DLP) Systems
■ Monitor and control data endpoints, network traffic, and cloud-stored data to
prevent data breaches
■ Generate data on potential data leak incidents, policy violations, and suspicious
user activities
■ Flags attempts to send sensitive data outside the organization
■ Data sent to SIEM for timely corrective actions
○ Network Intrusion Detection Systems and Network Intrusion Prevention Systems
■ Network Intrusion Detection Systems (NIDS)
● Passively identify potential threats and generate alerts
■ Network Intrusion Prevention Systems (NIPS)
● Actively block or prevent threats from accessing the network
■ Data includes the following
● Detected threats
● Blocked traffic
● Network anomalies
■ Sent to SIEM for identifying malicious activity, security vulnerabilities, and
effectiveness of intrusion prevention measures
○ Firewalls
■ Act as a barrier between trusted internal networks and untrusted external
networks
■ Filter incoming and outgoing traffic based on security rules (ACLs)
■ Generate logs with data on allowed and blocked traffic, rule changes, and
344
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
potential threats
● Sent to SIEM for monitoring network perimeter security and identifying
intrusion attempts
○ Vulnerability Scanners
■ Identify security weaknesses, including missing patches, incorrect configurations,
and known vulnerabilities
■ Generate data on identified vulnerabilities, severity, and remediation
recommendations
■ Data integrated into SIEM to prioritize vulnerability remediation
● Used to track remediation progress and verify the effectiveness of steps
taken
345
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
requirements
■ Ensures that different security tools communicate using the same SCAP
formatted data
○ SCAP Languages
■ OVAL (Open Vulnerability and Assessment Language)
● XML schema for describing system security states and querying
vulnerability reports
■ XCCDF (Extensible Configuration Checklist Description Format)
● XML schema for developing and auditing best-practice configuration
checklists and rules
● Allows improved automation
■ ARF (Asset Reporting Format)
● XML schema for expressing information about assets and their
relationships
● Vendor and technology neutral
● Flexible
● Suited for a wide variety of reporting applications
346
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ cpe:/part:vendor:product:version:update:edition:language
■ CVE (Common Vulnerabilities and Exposures)
● Describes publicly known vulnerabilities with unique identifiers
● Standard format
○ CVE-Year first documented-Number
○ CVE-2017-0144
○ Common Vulnerability Scoring System (CVSS)
■ Used to provide a numerical score reflecting the severity of a vulnerability (0 to
10)
■ Scores are used to categorize vulnerabilities as none, low, medium, high, or
critical
■ Scores assist in prioritizing remediation efforts but do not account for existing
mitigations
○ SCAP Benchmarks
■ Benchmarks
● Sets of security configuration rules for specific products to establish
security baselines
● Provide a detailed checklist that can be used to secure systems to a
specific baseline
■ Expressed in the XCCDF format and used for compliance testing
■ Many SCAP Benchmarks available for different systems and applications,
ensuring proper system configuration and vulnerability identification
■ Examples of SCAP Benchmarks
● Red Hat Enterprise Linux Benchmark
○ Provides security configuration rules for Red Hat Enterprise Linux
● CIS Microsoft Windows 10 Enterprise Benchmark
347
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
348
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
349
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
350
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
351
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
352
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Incident Response
Objective 4.8: Explain appropriate incident response activities
● Incident Response
○ Incident Response
■ Systematic approach to managing and mitigating security incidents
■ Goals
● Minimize impact
● Reduce detection and containment time
● Facilitate recovery
■ Key Steps
● Detection
● Classification
● Containment
● Eradication
● Evidence preservation
● Communication
● Lessons learned
○ Study Topics
■ Incident Response Process
● Steps
○ Preparation
○ Detection
○ Analysis
○ Containment
353
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Eradication
○ Recovery
○ Lessons Learned
■ Threat Hunting
● Proactive cybersecurity approach for continuous threat identification
● Purpose
○ Identify hidden or emerging threats
■ Root Cause Analysis
● Systematic process to investigate incidents and identify underlying factors
● Purpose
○ Understand the cause of security breaches or operational issues
■ Incident Response Training and Testing
● Methods
○ Tabletop Exercises
○ Simulations
○ Drills
○ Live Exercises
● Purpose
○ Prepare personnel and systems for effective incident response
■ Digital Forensic Procedures
● Systematic techniques to gather, analyze, and preserve digital evidence
● Purpose
○ Investigate cybercrimes or security incidents
■ Data Collection Procedures
● Established methods for gathering relevant information during incident
response
354
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Concept
○ Order of volatility (prioritizing data collection based on volatility)
■ Disk Imaging and Analysis
● Creating a bit-by-bit copy (image) of a storage device, examining content
● Purpose
○ Recover data
○ Investigate incidents
○ Identify security issues
355
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
networks
● Involves creating policies, procedures, and a communication plan
■ Detection
● Determines if a security incident has occurred
● Identifies a security incident
● Cybersecurity and triage analysts play a vital role in assessing incident
severity
■ Analysis
● Thoroughly examines and evaluates the incident
● Provides insights into the incident's scope and impact
● Notifies stakeholders and initiates containment
■ Containment
● Limits the incident's scope by securing data and minimizing business
impact
● Prevents the spread of malicious activity
■ Eradication
● Starts after containment
● Focuses on removing malicious activity from systems or networks
● May involve reimaging affected systems
■ Recovery
● Restores affected systems and services to their secure state
● Includes restoring from backups, patching, and updating configurations
● Ensures resilience against future threats
■ Post-Incident Activity
● Occurs after containment, eradication, and recovery
● Identifies the initial incident source and improvements to prevent future
356
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
incidents
● Involves
○ Root cause analysis
■ Identifies the incident’s source and how to prevent it in the
future
■ Steps
● Define/scope the incident
● Determine the causal relationships that led to the
incident
● Identify an effective solution
● Implement and track the solutions
○ Lessons learned
■ Documents experiences during incidents in a forma
○ After-action report
■ Collects formalized information about what occurred
○ Incident Response Team
■ The core team includes cybersecurity professionals with incident response
experience
● Temporary members may be added as needed (e.g., database
administrators)
■ Large organizations have full-time incident response teams
● Smaller organizations form temporary teams for specific incidents
■ Team Roles
● Leader
● Subject Matter Experts
● IT Support
357
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Legal Counsel
● HR
● Public Relations
■ Leadership and management ensure the incident response team has necessary
funding, resources ,and expertise
■ Management makes crucial decisions and communicates them during the
incident response
○ Outsourcing Incident Response
■ Some organizations outsource incident response to specialized teams
■ Effective but expensive; external teams may not be familiar with the
organization's network
● Threat Hunting
○ Threat Hunting
■ Proactive cybersecurity technique to detect threats that haven't been discovered
by normal security monitoring
■ Involves actively seeking out potential threats within your network, as opposed
to waiting for them to trigger alerts
○ Steps in Threat Hunting
■ Establishing a Hypothesis
● Conduct threat modeling to identify potential threats with high impact
● Use threat intelligence to form hypotheses about threat actors or
campaigns that may target your organization
■ Profiling Threat Actors and Activities
● Create scenarios to understand how attackers might attempt an intrusion
● Determine the type of threat actor (insider, hacktivist, criminal, nation
358
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
state)
● Identify their objectives and potential targets
■ Threat Hunting Process
● Utilizes security monitoring and incident response tools
● Analyzes logs, system data, file systems, and registry information
● Focuses on finding threats not detected by existing rules
● Start by assuming that the current rules haven’t flagged potential threats
● Seeks new tactics, techniques, and procedures used by threat actors
○ Key Considerations
■ Threat hunters must stay updated on the latest attacks and threats
■ Use advisories and bulletins published by vendors and researchers to identify
new TTPs and vulnerabilities
■ Utilize intelligence fusion and threat data, combining SIEM logs with real-world
threat feeds
○ Benefits of Threat Hunting
■ Improves detection capabilities by identifying threats that bypass existing
defenses
■ Enhances threat intelligence by correlating external threat feeds with internal
logs
■ Provides actionable intelligence to strengthen security measures
359
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
360
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
361
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
362
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Align simulations with the organization's threat landscape and risk profile
■ Identifies gaps in incident response plans, improves team coordination, and
ensures role clarity during real incidents
■ Regularly incorporating simulations improves an organization's readiness for
cybersecurity incidents
363
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
364
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Additional Concepts
■ Legal Hold
● Issued when litigation is expected and preserves potentially relevant
electronic data
● Ensures evidence is not tampered with, deleted, or lost
● Requires the implementation of preservation practices to protect systems
and evidence
■ E-Discovery (Electronic Discovery)
● Process of identifying, collecting, and presenting electronically stored
information for potential legal proceedings
● Involves searching, analyzing, and formatting electronic data for litigation
○ Ethical Considerations
■ Adherence to a code of ethics that emphasizes avoiding bias, repeatable actions,
and evidence preservation
● Avoiding bias
○ Analysis should be performed without bias or prejudice and be
based solely on the evidence
○ Use forensic analysts who are removed from the situation to avoid
potential bias
● Repeatable actions
○ All analysis must be based on repeatable processes documented
in the final report
○ Ensuring the original evidence remains unchanged is critical to
maintaining evidentiary integrity
● Evidence preservation
○ Evidence includes both the device (e.g., laptop hard disk) and the
365
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
366
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
367
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Investigating an Incident
Objective 4.9: Given a scenario, you must be able to use data sources to support an investigation
● Investigating an Incident
○ Data Sources for Incident Investigation
■ Dashboards and Automated Reports
● Purpose
○ Provide high-level insights
● Role
○ Initial overview of the security landscape
■ Vulnerability Scans
● Purpose
○ Identify system vulnerabilities
● Role
○ Foundation for understanding potential entry points
■ Packet Captures
● Purpose
○ Capture and analyze network traffic
● Role
○ Reveal communication patterns and potential threats
■ Logs (Various Types)
● Firewall Logs
○ Monitor network traffic, detect unauthorized access
368
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Application Logs
○ Record application-specific events, identify abnormal behavior
● Endpoint Logs
○ Capture activities on individual devices
● OS-Specific Security Logs
○ Monitor operating system security events
● IPS and IDS Logs and Alerts
○ Track intrusion attempts and system compromises
● Network Logs
○ Record network activities and connections
● Metadata
○ Provide contextual information about other data sources
● Investigative Data
○ SIEM (Security Information and Event Monitoring System)
■ Real-time analysis of security alerts from applications and network hardware
■ Combination of different data sources into one tool
■ Provides a consolidated view of network activity
■ Allows for trend analysis, alert creation, and correlation of data
■ Considerations
● Sensors
● Sensitivity
● Trends
● Alerts
● Correlation
369
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Log Files
■ Records events and messages in operating systems, software, and network
devices
■ Includes network, system, application, security, web, DNS, authentication, dump
files, VoIP, and call managers
○ Syslog, Rsyslog, Syslog-ng
■ Tools for centralizing log data from different systems into a repository
■ Commonly used to feed data into SIEM
○ JournalCTL
■ Linux command-line utility for querying and displaying logs from the Journal
Daemon (SystemD's logging service)
○ NXLog
■ Multi-platform, open-source log management tool
■ Identifies security risks and analyzes logs from server, OS, and applications
○ NetFlow
■ Network protocol for collecting active IP network traffic data
■ Provides information on source, destination, volume, and paths
○ SFlow (Sampled Flow)
■ Open-source alternative to NetFlow
■ Exports truncated packets and interface counter for network monitoring
○ IPFIX (Internet Protocol Flow Information Export)
■ Universal standard for exporting IP flow information
■ Used for mediation, accounting, and billing by defining data format for exporters
and collectors
○ Metadata
■ Data that describes other data
370
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Useful for understanding details about events, calls, emails, web visits, and files
during investigations
■ Use Cases for Metadata
● Email
○ Analyze metadata for phishing campaigns
● Mobile
○ Review data transfer, call duration, and contacts
● Web
○ Determine website visits and user behavior
● File
○ Examine file details, such as creation time and viewer statistics
● Dashboards
○ Dashboards
■ Graphical displays of information across multiple systems
○ Single Pane of Glass
■ A single screen for analysts to access everything across the organization
○ Splunk
■ A big data platform for ingesting various types of data, including security and
incident response data
■ Collects data from firewalls, applications, endpoints, operating systems, intrusion
detection systems, intrusion prevention systems, antivirus software, and
networks
○ Dashboards help analyze trends over time and inform actions
○ Use the dashboard as a central starting point for investigations and incident response
371
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Automated Reports
○ Automated Reports
■ Generated by computer systems to provide information about various aspects of
a network's security
■ Common sources are antivirus software, endpoint detection response
capabilities, and other security tools
○ Automated Security Incident Report Key Elements
■ Report ID
● A unique identifier for the report
■ Generation date
● The date the report was generated
■ Report period
● The time frame covered by the report
■ “Prepared by”
● The entity responsible for creating the report
■ Executive Summary
● Provides a brief overview of the report's content, helping readers
determine its relevance
■ Incident Alerts
● Can be categorized into different levels
○ Critical
○ High
○ Moderate
○ Informational
372
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Incident Details
● Timestamps
● User accounts
● Affected systems
● Incident descriptions
● Actions taken
○ Automated responses can include suspending user accounts,
blocking IP addresses, and resetting passwords
○ Outbound traffic and software installations may trigger alerts,
which require investigation to determine their nature and
potential security implications
■ Incident Analysis
● May include threat trends, user behavior, and data flow anomalies
■ Security Recommendations
● Suggest actions to address identified security issues
■ Conclusion
● Summary of the report's findings and contains outlines of any further
actions to be taken
■ Appendices
● May include log snippets, IP addresses, domains, or other relevant data
○ Automation and orchestration enable real-time responses to security incidents, helping
to prevent major security breaches and network outages
● Vulnerability Scans
○ Vulnerability Scan Report
■ Generated automatically after completing a vulnerability scan
373
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
374
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Impact
● Common Vulnerability Scoring System (CVSS) Score
○ Measures severity
● Remediation Recommendations
■ Additional Findings
■ Recommendations
■ Conclusion
● Packet Captures
○ Packet Capture
■ Captures data going to or from a network device
■ Can be set up on a span port to capture all data going to and from devices on the
network
■ Packet captures in exam are typically short snippets, not massive data dumps
○ Packet Capture Columns
■ Number
● Packet sequence number in the capture
■ Time
● Elapsed time since the capture started
■ Source/Destination IP Addresses
● Show where the data is coming from and going to
■ Protocol
● Typically TCP or UDP
■ Length
● The size of the packet
375
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Info
● Provides information from the packet header, including flags, sequence,
window, length, MSS, source port, and destination port
○ Look for patterns that indicate attack types, such as SYN floods or DDoS attacks
○ Consider the relationship between source and destination IP addresses to identify the
type of attack
● Metadata
○ Metadata
■ Information about a file, application, or other data
○ MD5/SHA256 Checksum
■ Serves as unique digital fingerprint for file identification, including potential
malware
376
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Objective 4.7: Explain the importance of automation and orchestration related to secure operations
377
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Playbook
■ Checklist of actions for detecting and responding to a specific incident
■ Role
● Guides incident response processes
■ Example
● Steps for responding to a phishing campaign
○ Runbook
■ Automated version of a playbook with defined interaction points for human
analysis
■ Role
● Executes automated tasks with human decision points
■ Example
● Automated incident response with analyst decision points
○ Benefits of Automation and Orchestration
■ Efficiency
● Time-saving and consistent execution
■ Standardization
● Enforces baselines and standardized configurations
■ Scalability
● Scales securely and efficiently
■ Employee Retention
● Reduces repetitive tasks
■ Reaction Time
● Faster responses to incidents
■ Workforce Multiplier
● Maximizes human resources
378
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
379
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Technical Debt
● Technical debt is the cost and complexity of suboptimal software
solutions
● Regular reviews and updates are necessary to avoid technical debt
● Technical debt can impede efficiency and security
■ Ongoing supportability
● Automation and orchestration systems need ongoing maintenance and
adaptation
● Teams must possess the necessary skills to maintain and adapt these
systems
● Training and skill development are essential
● Most automation depends on the connection of systems via APIs and
webhooks
380
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
381
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
382
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
level agreements
● Create automation rules to monitor ticket attributes and trigger
escalation
● Perform predefined escalation actions (e.g., notification, reassignment,
change in priority)
● Monitor and track the escalated ticket's progress
● Resolve and close the ticket, triggering notification to the user
■ Benefits of Automating Ticket Escalation
● Ensures prompt handling of critical issues
● Maintains transparency and accountability in the support process
● Helps meet service level agreements and minimize delays in addressing
urgent matters
● Automating Onboarding
○ Automation
■ Involves using technology to execute repetitive tasks without continuous human
intervention
○ Automating the onboarding process impacts organizational productivity, employee
satisfaction, and retention rates
■ Streamlining onboarding ensures new hires are integrated quickly and efficiently
into their roles and the organization's culture
■ Benefits
● Eliminates manual tasks, reduces errors, and provides structured,
consistent onboarding
● Reduces administrative burden on HR and IT departments
● Enhances support ticket management processes
383
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
384
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ Resource Provisioning
■ Ensures timely allocation of physical and digital resources needed by new
employees
■ Resources include
● Workstations
● Software licenses
● Communication tools
■ Process involves
● Requirements analysis
● Resource allocation
● Configuration
● Verification and auditing
● Gathering feedback
■ Steps in Resource Provisioning
● Analyze role and department information to determine specific resources
● Initiate procurement workflows or allocate available resources based on
rules
● Configure resources to meet the employee's role
● Verification process to ensure successful allocation
● Auditing to track allocated resources for inventory management and
compliance
● Employee and manager feedback on resource suitability and additional
requirements
385
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
● Automating Security
○ Automating Security
■ Helps prevent security vulnerabilities, respond to threats swiftly, and maintain
consistent security policies
■ It involves using technology to perform crucial but repetitive security tasks to
maintain updated defenses and swift response to security threats
■ Automation includes the use and configuration of guardrails, security groups,
service access management, and permissions
○ Ways to Automate Security
■ Implementing Guardrails
● Guardrails are automated safety controls to protect against insecure
infrastructure configurations
● Configured according to security standards and enforce security policies
automatically
● Continuously monitor infrastructure, detect security violations, and take
predefined corrective actions
■ Managing Security Groups
● Security groups act as virtual firewalls for cloud-based server instances
● Specify allowed incoming and outgoing network traffic using predefined
rules
● Automate assignment of instances to appropriate security groups
● Dynamically adjust security group configurations to respond to evolving
threats
● Analyze traffic for unauthorized access attempts
■ Enabling and Disabling Services and Access
● Automate service access management to prevent unnecessary risks and
386
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
387
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
during integration
● Automation tools manage code integration, provide notifications for
conflicts or errors
● Automated tests ensure software quality after integration
● Developers receive feedback on detected issues to make necessary
corrections
● Release
○ Process of finalizing and preparing new software or updates
○ Enabling software installation and usage
● Deployment
○ Involves automated process of software releases to users
○ Actual installation of software in a new environment
■ Continuous Integration and Continuous Delivery (CI/CD)
● CI/CD includes continuous integration
● Continuous Delivery (CD) ensures code is always deployable after every
change
○ Automated testing and build processes
○ CD stops short of automatic production deployment
○ CD is part of the release process
○ Full deployment process is automated only to a certain stage
■ Doesn’t deploy into the production environment
automatically
○ Deployment to production environment is a manual business
decision
○ Allows flexibility in timing, market conditions, and stakeholder
readiness
388
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Continuous Deployment
● Takes CI/CD further by automatically deploying code changes to testing
and production environments
● All changes passing through the production pipeline are fully released
with no human intervention
● Automation ensures consistent deployments, faster releases, and offers
rollback capabilities
● Requires a paradigm shift, more developer involvement in the
deployment process
● Promotes increased communication and collaboration within teams for
collective responsibility
■ Benefits of CI/CD
● Adapting to changing market demands more quickly
● Efficient workflow from development to deployment
● Improves code quality, streamlines deployment processes, and allows
flexible production release
● Reduces deployment risks and enhances software reliability
389
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
○ API Communication
■ APIs facilitate communication between different parts of a microservice or
service-oriented architecture
■ Allows automation of administration, management, and monitoring of services
and cloud-based infrastructures
■ Common communication methods used by APIs
● REST (Representational State Transfer)
○ REST uses standard HTTP methods, status codes, URIs, and MIME
types for interactions
○ Primarily uses JSON for data transfer
○ Lightweight protocol suitable for integrating with existing websites
● SOAP (Simple Object Access Protocol)
○ SOAP has a structured message format in XML
○ Known for robustness, additional security features, and
transaction compliance
○ Suitable for enterprise-level web services with complex
transactions and regulatory compliance requirements
○ Benefits of API Integrations
■ Improved efficiency and consistency
■ Allows direct integration of third-party applications into web applications
■ Reduces the need to build entire services from scratch
○ API Testing with CURL
■ CURL
● A tool for transferring data to or from a server using various supported
protocols
■ Commonly used protocols for API testing are HTTP and HTTPS
390
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Use CURL to send data to an API and receive a response for testing
■ CURL allows sending data to an API and receiving a JSON response
■ Helpful for software developers and cybersecurity professionals, especially in
penetration testing scenarios
391
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Security Awareness
Objective 5.6: Given a scenario, you must be able to implement security awareness practices
● Security Awareness
○ Security Awareness
■ Knowledge and understanding of security threats and mitigation measures
■ Goal
● Equip individuals to recognize and respond to threats for data protection
■ Focus
● Common threats, potential risks, best practices for secure digital
interactions
○ Insider Threats
■ Security risk from individuals within an organization
■ Source
● Employees, former employees, contractors, or business partners
■ Risk
● Exploiting inside information intentionally or unintentionally
○ Password Management
■ Practices and tools for creating, storing, and managing passwords
■ Goal
● Ensure strong, unique passwords; securely stored; reduces unauthorized
access risk
392
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
393
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
394
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Financial Struggles
● Employees under financial stress may express financial woes to coworkers
● Financial pressures can make individuals susceptible to bribery or data
selling
● Organizations should have policies in place for handling such scenarios,
like financial counseling or monitoring for unusual data access
○ Building a Robust Insider Threat Program
■ Establish an insider threat program to create a security culture
■ Encourage employees to report suspicious activities
■ Provide training to recognize warning signs
■ Implement policies that support mental health and financial well-being
■ Ensure fair and confidential investigation processes
■ Employ user activity monitoring tools to detect anomalous behavior while
respecting employee privacy
● Password Managers
○ Password Manager
■ Specialized tool, plugin, or extension used with web browsers
■ Helps users securely store and manage various usernames and passwords for
different websites
○ Password Reuse Risks
■ Reusing passwords across multiple websites is dangerous
■ Breaches of one website can expose reused passwords
■ Attackers use known credentials to compromise other sites
■ Most usernames are email addresses, further increasing risk
395
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
396
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
397
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
398
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
399
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
400
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
employees
■ Conduct regular security audits and feedback sessions
401
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
402
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
Conclusion
● Conclusion
○ 5 Domains of CompTIA Security+ (SY0-701)
■ Domain 1: General Security Concepts
● It makes up 12% of the exam
■ Domain 2: Threats, Vulnerabilities, and Mitigations
● It makes up 22% of the exam
■ Domain 3: Security Architecture
● It makes up 18% of the exam
■ Domain 4: Security Operations
● It makes up 28% of the exam
■ Domain 5: Security Program Management and Oversight
● It makes up 20% of the exam
○ How do you sign up and schedule your exam?
■ PearsonVUE or CompTIA Web Store
● You can take it at any Pearson VUE testing center worldwide, at either a
local testing center or online
● You can buy that exam voucher by going to PearsonVue directly when
you're scheduling your exam at pearsonvue.com, or going to the store at
store.comptia.org to buy it from the CompTIA web store
● PearsonVUE and CompTIA have now created a capability for you to take
your certification exam online from the comfort of your home or office,
using the Pearson VUE OnVue testing system
403
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
■ Dion Training
● If you'd like to pre-purchase your exam voucher before you schedule the
exam, you can actually save 10% off the price by going to our website at
diontraining.com/vouchers
● Currently, we carry vouchers for over 50 countries around the world, and
we are adding countries all the time
● As a CompTIA Platinum Partner, we receive a special discounted rate on
these exam vouchers and we pass those savings onto our students when
they order their exam vouchers from us
○ Top five tips for increasing your score on the exam
■ Use a cheat sheet
● You're not allowed to actually carry anything into the exam with you, but
if you're at a local testing center, they will give you a whiteboard or a dry
erase sheet that's about the size of a normal piece of paper
● Once the clock starts on the exam, you can brain-dump anything you
want onto that paper
● Use the sheet and spend the first 1-2 minutes writing down those
important things you may forget later on
■ Skip any questions that are giving you trouble
● If you find yourself struggling with a really hard question, just mark it for
review and skip it
● Students who do this end up increasing their score by at least 5% to 10%
over their peers who try to do the simulations at the beginning of their
exam
■ Take a guess
● If you're in doubt, take a guess from the possible answer choices
404
https://www.DionTraining.com
CompTIA Security+
(SY0-701) (Study Notes)
405
https://www.DionTraining.com