Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Search document
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
Professor Messer’s CompTIA SY0-501 Security+ Course Notes James “Professor “Professor”” Messer
hp://www.ProfessorMesser.com
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
Professor Messer’s CompTIA SY0-501 Security+ Course Notes
Wrien by James “Professor” Messer Copyright © 2017 by Messer Studios, LLC hp://www.ProfessorMesser.com All rights reserved. No part of this book may be reproduced or transmied in any form or by any means, electronic or mechanical, including photocopying, recording, or by any informaon storage storage and retrieval system, without wrien permission per mission from the publisher publisher.. First Edion: October 2017 Trademark Tr ademark Acknowledgments
All product names and trademarks are the property of their respecve owners, and are in no way associated or aliated with Messer Studios, LLC. “Professor Messer” is a registered trademark of Messer Studios LLC. “CompTIA” and “Security+” are registered trademarks of CompTIA, I nc. Warning and Disclaimer
This book is designed to provide informaon about the CompTIA SY0-501 Security+ cercaon c ercaon exam. However,, there may be typographical and/or content errors. Therefore, However Therefore, this book should serve ser ve only as a general guide and not as the ulmate source of subject informaon. The author shall have no liability or responsibility to any person or enty regarding any loss or damage incurred, or alleged to have incurred, directly or indirectly, by the informaon contained in this book.
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
Contents 1.0 - Threats, Aacks, and Vulnerabilies 1.1 - An Overview of Malware 1.1 - Viruses and Worms 1.1 - Ransomwa Ransomware re and Crypto-Malwar Crypto-Malware e 1.1 - Trojans and RAT RATss 1.1 - Rootkits 1.1 - Keyloggers 1.1 - Adware and Spyware 1.1 - Bots and Botnets 1.1 - Logic Bombs 1.2 - Phishing 1.2 - Tailgang and Impersonao Impersonaon n 1.2 - Dumpster Diving 1.2 - Shoulder Surng 1.2 - Hoaxes 1.2 - Watering Hole Aacks 1.2 - Principles of Social Engineering 1.2 - Denial of Service 1.2 - Man-in-the-Middle 1.2 - Buer Overows 1.2 - Data Injecon 1.2 - Cross-site Scripng - XSS 1.2 - Privilege Escalaon 1.2 - DNS Poisoning and Domain Hijacking 1.2 - Cross-site Request Forgery 1.2 - Zero-day Aacks 1.2 - Replay Aacks 1.2 - Client Hijacking Aacks 1.2 - Client Hijacking Aacks Special offer for students: Only $4.99/month. 1.2 - Driver Manipulaon
Master your semester with Scribd & The New York Times
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.0 - Technologies and Tools 2.1 - Firewalls 2.1 - VPN Concentrators 2.1 - Network Intrusion Detecon and Prevenon 2.1 - Router and Switch Security 2.1 - Proxies 2.1 - Load Balancers 2.1 - Access Points 2.1 - SIEM 2.1 - Data Loss Prevenon 2.1 - Network Access Control 2.1 - Mail Gateways 2.1 - Other Security Devices 2.2 - Soware Securit Securityy Tools 2.2 - Command Line Security Tools 2.3 - Common Security Issues 2.4 - Analyzing Security Output 2.5 - Mobile Device Connecon Methods 2.5 - Mobile Device Connecon Methods 2.5 - Mobile Device Enforcement 2.5 - Mobile Device Deployment Models 2.6 - Secure Protocols
3.0 - Architecture and Design 3.1 - Compliance and Framework Frameworkss 3.1 - Secure Conguraon Conguraon Guides 3.1 - Defense-in-D Defense-in-Depth epth 3.2 - Secure Network Topologies 3.2 - Network Segmentao Segmentaon n 3.2 - VPN Technologies 3.2 - Security Technology Placement Special offer for students: $4.99/month. 3.2 -Only Securing SDN 3.3 Hardwar Security
Master your semester with Scribd & The New York Times
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.6 - Provisioning and Deprovisioning 3.6 - Secure Coding Technique echniquess 3.6 - Code Quality and Tesng 3.7 - Cloud and Virtualizaon Overview 3.7 - Virtualizaon Security 3.7 - Security in the Cloud 3.7 - Security in the Cloud 3.8 - Resiliency and Automaon 3.8 - Redundancy, Fault Tolerance, and High Availabili Availability ty 3.9 - Physical Security Controls 1.4 - Storag Storage e Area Networking
4.0 - Identy and Access Management 4.1 - AAA and Authencaon 4.2 - Identy and Access Services 4.2 - PAP, CHAP, and MS-CHAP 4.2 - Federat Federated ed Idenes 4.3 - Access Control Models 4.3 - Access Control Technologies 4.4 - Account Types 4.4 - Account Management 4.4 - Account Policy Enforcemen Enforcementt
5.0 - Risk Management 5.1 - Agreement Types Types 5.1 - Person Personnel nel Management 5.1 - Role-based Awareness Tr Training aining 5.1 - General Security Policies 5.2 - Business Impact Analysis 5.3 - Risk Assessment 5.4 - Incident Response Planning 5.4 - Incident Response Process Special offer for students: Only $4.99/month. 5.5 - Gathering Forensics Data
Master your semester with Scribd & The New York Times
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
1.8K views
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.0 - Cryptography and PKI 6.1 - Cryptograph Cryptographyy Concepts 6.1 - Symmetric and Asymmetric Encrypon 6.1 - Hashing and Digital Signatures 6.1 - Randomizing Cryptograph Cryptographyy 6.1 - Weak Encrypon 6.1 - Cryptograph Cryptographic ic Keys 6.1 - Steganography 6.1 - Stream and Block Ciphers 6.1 - States of Data 6.1 - Perfect Forward Secrecy 6.1 - Common Cryptograph Cryptographyy Use Cases 6.2 - Symmetric Algorithms 6.2 - Block Cipher Modes 6.2 - Asymmetric Algorithms 6.2 - Hashing Algorithms 6.2 - Key Stretchin Stretching g Algorithms 6.2 - Obfusca Obfuscaon on 6.3 - Wireless Cryptograp Cryptographic hic Protocols 6.3 - Wireless Authencao Authencaon n Protoco Protocols ls 6.3 - Wireless Security 6.4 - PKI Components 6.4 - PKI Concepts 6.4 - Types of Cercates 6.4 - Cercate File Formats
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
Introducon
Informaon technology technology security is a signicant concern for every IT specialist. Our systems are un constant aack, and the next generaon of security professionals will be at the forefront of keepi crical informaon safe.
CompTIA’s Security+ exam tests you on the specics of network security, vulnerabilies and threa cryptography, and much more. I’ve created these Course Notes to help you through the details th to know for the exam. Best of luck with your studies! - Professor Messer
The CompTIA CompTIA Security+ Security+ cercaon To earn the Security+ cercaon, you must pass a single SY0-501 cercaon exam. The exam is in duraon and includes both mulple choice quesons and performance-based quesons. Perfo based quesons can include ll-in-the-blank, matching, sorng, and simulated operaonal enviro You will need to be very familiar with the exam topics to have the best possible exam results. Here’s the breakdown of each technology section and the percentage of each topic on the SY0Secon 1.0 - Threats, Aacks, Aacks, and Vulnerabilies - 21% Secon 2.0 - Technologies and Tools - 22% Secon 3.0 - Architecture and Design - 15% Secon 4.0 - Identy and Access Management - 16% Secon 5.0 - Risk Management - 14% Secon 6.0 - Cryptography and PKI - 12% CompTIA provides a detailed set of exam objecves that provide a list of everything you need to you take your exam. You can nd a link to the exam objecves here:
Master your semester with Scribd hp://www.professormesser.com/objecves/ & The New York Times Special offer for students: Only $4.99/month.
How to use this book
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Search document
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
Professor Messer’s
CompTIA Security+ SY0-501 Course Notes
hp://www.ProfessorMe
1.1 - An Overview of Malware Malware
How you get malware
• Malicious soware - These can be very bad • Gather informaon - Keystrokes • Parcipate in a group - Controlled over the ‘net • Show you adversing - Big money • Viruses and worms • Encrypt your data • Ruin your day
• These all work together • A worm takes advantage of a vulnerability • Installs malware that includes a remote acces ac ces • Bot may be installed later • Your computer must run a program • Email link • Don’t click links • Web page pop-up • Drive-by download • Worm • Your computer is vulnerable • Operang system • Keep your OS updated! • Applicaon • The Adobe Flash vulnerability of the moment
Malware types and methods
• Viruses • Crypto-malware, Ransomware • Worms • Trojan Horse • Rootkit • Keylogger • Adware/Spyware • Botnet
1.1 - Viruses and Worms Virus • Malware that can reproduce itself • It doesn’t need you to to click anything • It needs you to execute a program program • Reproduces through le systems or the network • Just running a program can spread a virus • May or may not cause problems • Some viruses are invisible, invisible, some are annoying annoying • An-virus is very common • Thousands of of new viruses every week • for Is your signature signature le updated? updated? Special offer students: Only $4.99/month.
Master your semester with Scribd & The New York Times
Types of Viruses
• Program viruses - It’s part of the applicaon applicaon • Boot sector sector viruses - Who needs an OS? • Script viruses - Operang system system and browse • Macro viruses viruses - Common in Microso Microso Oce Worms
• Malware that self-replica self-replicates tes • Doesn’t need you to do anything Read Free For 30this Days Signnetwork up to vote title • Uses the ason a transmission medium Not useful Useful • Self-propagates Self-propagat es and spreads quickly Cancel anytime. • Worms are prey bad things • Can take over many systems very quickly
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.1 - Ransomware and Crypto-Malware Your data is valuable • Personal data • Family pictures and videos • Important documents • Organizaon data • Planning documents • Employee personally idenable informaon (PII) • Financial informaon • Company private data • How much is it worth? • There’s a number Ransomware
• The bad guys want your money • They’ll take your computer in the meanme • Probably a fake ransom • Locks your computer “by the police” • The ransom may be avoided • A security professional may be able to remove these kinds of malware
• Crypto-malware
• New generaon of ransomware • Your data is unavailable unl you provide cash • Malware encrypts your data les • Pictures, documents, music, movies, etc. • Your OS remains available • They want you you running, but not working working • You must pay the bad guys to obtain the decryp • Untraceable payment payment system system • An unfortunate unfortunate use of public-key cryptograph cryptograph Protecng against ransomware • Always have a backup - an oine backup, ideally • Keep your operang system up to date • Patch those vulnerabilies vulnerabilies • Keep your applicaons up to date • Security patches • Keep your an-virus/an an-virus/an-malware -malware signatures up • New aacks aacks every hour • Keep everything up to date.
1.1 - Trojans and RATs Trojan horse
Remote Access Trojans (RATs)
• Used by the Greeks to capture Troy from the Trojans • A digital wooden horse • Soware that pretends to be something else • So it can conquer your computer • Doesn’t really care much about replicang • Circumvents your exisng security • An-virus may catch it when it runs • The beer Trojans are built to avoid and disable AV • Once it’s inside it has free reign • And it may open the gates for other programs
• Remote Administraon Tool • The ulmate backdoor • Administrave control of a device • Malware installs the server/service/host • Bad guys connect with the client soware • Control a device • Key logging, screen recording /screenshots, c • Embed more malware
Master your semester with Scribd Backdoors • WhyNew go through normalTimes authencaon methods? & The York • Just walk in the back door Special offer for students: Only $4.99/month. • Oen placed on your computer through malware
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
0
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.1 - Rootkits (connued) Finding and Removing rootkits
Sheet Music
• Look for the unusual • An-malware scans • Use a remover specic to the rootkit • Usually built aer the rootkit is discovered • Secure boot with UEFI • Security in the BIOS
1.1 - Keyloggers Keyloggers
• Your keystrokes contain valuable informaon • Web site login URLs, passwords, email messages • Save all of your input • Send it to the bad guys • Circumvents encrypon protecons • Your keystrokes are in the clear • Other data logging • Clipboard logging, screen logging, instant messaging, search engine queries
Prevenng Keyloggers • Usually installed with malware • Use an-virus/an an-virus/an-malware -malware • Keep your signatures updated • Block unauthorized communicaon • Block the exltraon aempt • Firewall rules / monitoring • Run a keylogging scanner • Checks for keylogging acvity
DarkComet-RAT Keylogger
Master your semester with Scribd & The1.1New York Times - Adware and Spyware Special offer for students: Only $4.99/month.
Adware
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Why is there so much adware and spy
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.1 - Bots and Botnets Botnets • Robot networks • Skynet is self-aware • Once your machine is infected, it becomes a bot • You may not even know • How does it get on your computer? • Trojan Trojan Horse (I just j ust saw a funny video of you! Click here.) You run a program or click an ad you THOUGHT was legit, but... • OS or applicaon vulnerability vulnerability • A day in the life of a bot • Sit around. Check in with the mother ship. Wait for instrucons. Botnets
Stopping the Bots
• Prevent the inial infecon • OS and applicaon patches • An-virus/an-m An-virus/an-malware alware and updated signatures • Idenfy an exisng infecon • On-demand scans • Network monitoring • Prevent command and control • Block at the rewall • Idenfy at the workstaon w host-based host-bas ed rewall or host-b
• A group of bots working together • Nothing good can come from this • Distributed Denial of service (DDoS) • The power of many • Botnets are for sale • Rent me from the bad guys • Not a long-term business proposion
1.1 - Logic Bombs Logic bomb • Waits for a predened event • Oen le by someone with grudge • Time bomb - Time or date • User event - Logic bomb • Dicult to idenfy • Dicult to recover if it goes o Real world logic bombs • March 19, 2013, South Korea • Email with malicious aachment sent to South Korean organizaon organizaonss • Posed as a bank email • Trojan installs malware Special• offer for 20, students: $4.99/month. March 2013,Only 2 p.m. local me • Malware logic-bomb acvates
Master your semester with Scribd & The New York Times
Real world logic bombs • December 17, 2016, 11:53 p.m. • Kiev, Ukraine, high-voltage substaon • Logic bomb begins disabling electrical ci • Malware mapped out the control netw • Began disabling power at a predetermin • Customized for SCADA networks • Supervisory Control and Data Acquisi Prevenng a logic bomb • Dicult to recognize signatu • Each isFree unique - 30 No predened Read Foron Days Sign up to vote this title • Process and procedures Not useful Useful anytime. • FormalCancel change control • Electronic monitoring
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.2 - Phishing (connued) The big phish • March 19, 2016 • John Podesta, Former White House Chief of Sta, Former Counselor to the President of the United States • Former chairman of the 2016 Hillary Clinton United States presidenal campaign • Gmail personal account with messages from 2007 through 2016
Filling the net
• Podesta used the bit.ly link in the to “reset” his password • Wasn’t actually a Google reset link • Ten years of personal emails were un • And downloaded • Every email was made available on W • The good, the bad, and the ugly • Don’t underesmate the eects of • It can have signicant repercussion
1.2 - Tailgang and Impersonaon Tailgang • Use someone else to gain access to a building • Not an accident • Johnny Long / No Tech Hacking • Blend in with clothing • 3rd-party with a legimate reason • Temporarily take up smoking • I sll prefer bringing doughnuts • Once inside, there’s lile to stop you • Most security stops at the border Watching for tailgang • Policy for visitors • You should be able to idenfy anyone • One scan, one person • A maer of policy or mechanically required • Mantrap / Airlock • You don’t have a choice • Don’t be afraid to ask • Who are you and why are you here?
Master your semester with Scribd - Dumpster & The1.2New York Diving Times Dumpster DivingOnly $4.99/month. Special offer for students: • Mobile garbage bin
Impersonaon • Pretend to be someone you aren’t • Halloween for the fraudster fraudsterss • Use some of those details you got from the d • You You can trust me, I’m with your help desk • Aack the vicm as someone higher in rank • Oce of the Vice President for Scamming • Throw tons of technical details around • Catastrophic feedback due to the depolariz of the dierenal magnetometer • Be a buddy - How about those Cubs? Protect against Impersonaon • Never volunteer informaon - My password • Don’t disclose personal details - The bad guy • Always verify before revealing info • Call back, verify through 3rd pares • Vericaon should be encouraged • Especially if your organizaon owns valuable informaon Read Free Foron 30this Days Sign up to vote title
Useful Not useful Cancel anytime. Is it legal to dive in a dumpster? • I am not a lawyer.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.2 - Shoulder Surng Shoulder Surng • You have access to important informaon • Many people want to see • Curiosity, industrial espionage, compeve advantage • This is surprisingly easy • Airports / Flights, hallway-facing hallway-facing monitors, coee shops • Surf from afar • Binoculars / Telescopes, webcam monitoring
Prevenng shoulder surng • Control your input • Be aware of your surroundings • Use privacy lters • It’s amazing how well they work • Keep your monitor out of sight • Away from windows and hallways • Don’t sit in front of me on your ight • I can’t help myself
1.2 - Hoaxes Computer hoaxes
De-hoaxing
• A threat that doesn’t actually exist • But they seem like they COULD be real • Sll oen consume lots of resources • Forwarded email messages, printed memorandums, wasted me • Oen an email - Or Facebook wall post, or tweet, or... or... • Some hoaxes will take your money • But not through electronic means • A hoax about a virus can waste as much me as a regular virus
• It’s the Internet. Believe no on • Consider the source • Cross reference • hp://www.hoax-slayer.net • hp://www hp://www.snopes.com .snopes.com • Spam lters can help • If it sounds too good to be true • So many sad stories
Hoax Examples
Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title 1.2 - Watering Hole Aacks & The New York Times Useful Not useful where Watering Hole Aack Because that’s the money is Special• offer forifstudents: Only $4.99/month. What your network was really secure? • You didn’t even plug in that USB key
Cancel anytime.
• January 2017 • Polish Financial Supervision Authority Authority,, Naonal Ba
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.2 - Principles of Social Engineering Eecve social engineering • Constantly changing • You You never know what they’ll use next • May involve mulple people • And mulple organiza organizaons ons • There are es connecng many organizaons • May be in person or electronic • Phone calls from aggressive “customers” • Emailed funeral nocaons of a friend or associaon Social engineering principles
• Authority • The social engineer is in charge • I’m calling from the help desk/oce of the CEO/police • Inmidaon • There will be bad things if you don’t help • If you don’t help me, the payroll checks won’t be processed • Consensus / social proof • Convince based on what’s normally expected • Your co-worker Jill did this for me last week • Scarcity • The situaon will not be this way for long • Must make the change before me expires • Urgency • Works alongside scarcity • Act quickly, don’t think • Familiarity / liking • Someone you know, we have common friends • Trust • Someone who is safe • I’m from IT, and I’m here to help
Master your semester with Scribd 1.2 - Denial of Service Denial of Service & The New York Times • Force a serviceOnly to fail Special offer for students: $4.99/month. • Overload the service
How I lost $50,000 Twier Username • Naoki Hiroshima - @N • hps://medium.com hps://medium.com/cyber-security/24 /cyber-security/24 • Bad guy calls PayPal and uses social engin the last four digits of the credit card on • Bad guy calls GoDaddy and tells them he so he can’t properly validate. But he has t does that help? • GoDaddy let the bad guy guess the rst the card • He was allowed to keep guessing unl h • Social engineering done really really,, really we How to steal $50,000 Twier name • Bad guy is now in control of every domain • And there were some good ones • Bad guy extorts a swap • Domain control for @N • Owner agrees • Twier reviewed the case for a month • Eventually restored restored access to @N
Read Free Foron 30this Days Sign up to vote title
Distributed Denial of (DDoS) Not useful Useful Service Cancel anytime. • Launch an army of computers to bring down • Use all the bandwidth or resources - trac
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.2 - Denial of Service (connued) Example of a DNS record used in DDoS amplicaon aack
Sheet Music
$ dig ANY isc.org @75.75.75.75 ;; Truncated, retrying in TCP mode. ; <<>> DiG 9.8.3-P1 <<>> ANY isc.org @75.75.75.75 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27443 ;; ags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION: ;isc.org.
IN
ANY
;; ANSWER SECTION: isc.org. 1712 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQb tphgq2wQUpEQ5t4Dt UHxoMVFu2hWLDM hhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+ u50WIL8ZR1R6KTbsYVMf/ Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy3 47cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQz Bkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyL KOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8l rzeC/bB yBNsO70aEFTd isc.org. 1712 IN DNSKEY 256 3 5 AwEAAbDs5ksq3roE gvN+HHzPqErVe5lO pQ6bNjRDH/ BSUisBM8gvgd ZGIdctVRYl8vgAJcpc//YE4vpNrDsfgGyz+Fd2pCJTXGm6mDoAAMLJ FrG64gYVdby2AnI7sonZlT5PHjS0dKBhhf0Pd/+SgKNIf25wh1UzFRCp CXznWdER isc.org. 1712 IN RRSIG DNSKEY 5 2 7200 20170712230419 20170612230419 12892 isc.org. MZ8PU+4k/wwHDw3jdyzUpm74MFhbFvCemlJ61ho0gkDGNhEqn8/yC1Fs oaT7PK9U8hknlrppp/ os08yUifegPsvO1mhezTfIEHTP+JPJS6VO0G5A a9QHQtVO2FOPuR7HW2AQysldFL9pfvwOlKkzm4yuuhrM2BqhMeSZimo6 VvolWqHyE58dOHoyeylmcvmNb45qoR4spKZR9A1hdxesYgI1tosw9tTd PswnkyO3rizmFjABzcXDUeKSlodPRr1hZd6rNRRacIeiskPxw8E6WTnT 0RzOM7nFBDIKeTixA59xlPpIN2t+xh1zu8tQ5NsMF2CJK+b5LZTjovEg 9ho9NA== isc.org. 1712 IN RRSIG DNSKEY 5 2 7200 20170712230419 20170612230419 60321 org. fVnJffUYaDDrUYbo4hhPwKzjyzB6QEExLWao5jyaIDpEYL/aymTk6/51 nAubio2qdlgFinpoHmkaRDVdV1DG/6CWmA2/ tVAzSs77+qw3KkEYJbNq IR/bgkhxPtti/7+65YrPZ9yrNiPpB5LbNTmJyeuuQD4camliS9qHnlv6 618= ;; ;; ;; ;;
Query time: 13 msec SERVER: 75.75.75.75#53(75.75.75.75) WHEN: Fri Jun 16 17:36:51 2017 MSG SIZE rcvd: 912
DNS Amplicaon Open DNS Resolver
Open DNS Resolver
Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title & The New York Times Useful Not useful Bots send Special offer for students: Only $4.99/month. 2 spoofed DNS
Cancel anytime.
3
DNS send a
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Sheet Music
Search document
1.2 - Man-in-the-Middle Man -in- the-middle
• How can a bad guy watch without you knowing? • Man-in-the-middle • Redirects your trac • Then passes it on to the desnaon • You never know your trac was redirected • ARP poisoning • ARP has no security
Man-in-the-browser • What if the middleman was on the same computer a • The calls are coming from inside the browser! • Malware/Trojan Malware/Trojan does all of the proxy work • Huge advantages for the bad guys • Relavely easy to proxy encrypted trac • Everything looks normal to the vicm • The man-in-the-browser waits for you to login to you • And cleans you out
1.2 - Buer Overows Buer Overows • Overwring a buer of memory • Spills over into other memory areas • Developers need to perform bounds checking • The bad guys spend a lot of me looking for openings • Not a simple exploit • Takes me to avoid crashing things • Takes me to make it do what you want • A really useful buer overow is repeatable • Which means that all systems are owned
Variable A and B before buffer overflow Variable Name
A
Value
[null string]
Hex Value
00
00
00
00
00
00
00
Overflowing variable A changes variable B Variable Name
A
Value
'e'
' x'
'c'
'e'
's'
's'
'i'
Hex Value
65
78
63
65
73
73
69
1.2 - Data Injecon Code Injecon • Code injecon • Adding your own informaon into a data stream • Enabled because of bad programming • The applicaon should properly handle input and output • So many dierent data types • HTML, SQL, XML, LDAP, etc. SQL Injecon • SQL - Structured Query Language • The most common relaonal database management system language • SQL Injecon Special offer for students: Only $4.99/month. • Modifying SQL requests • Your applicaon shouldn’t really allow this
Master your semester with Scribd & The New York Times
XML injecon and LDAP injecon • XML - Extensible Markup Language • A set of rules for data transfer and storage XML injecon • Modifying XML requests • A good applicaon will validate • LDAP - Lightweight Directory Acce • Created by the telephone compa • Now used by almost everyone • LDAP injecon Read Free For 30this Days Sign up to vote on title • Modify LDAP requests Not useful Useful toCancel manipulate applicaon results anytime.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.2 - Cross-site Scripng - XSS (connued) Persistent (stored) XSS aack • Bad guy posts a message to a social network • Includes the malicious payload • It’s now “persistent” • Everyone gets the payload • No specic target • All viewers to the page • For social networking, this can spread quickly • Everyone who views the message can have it posted to their page • Where someone else can view it and propagate it further... further... Hacking a Subaru • June 2017, Aaron Guzman • Security researcher • When authencang with Subaru, users get a token • This token never expires (bad!) • A valid token allowed any service request • Even adding your email address to someone else’s account • Now you have full access to someone else’s car • Web front-end included an XSS vulnerability • A user clicks a malicious link, and you have their token • Web server and browser-based applicaons
Protecng against XSS • Be careful when clicking untrusted links • Never blindly click in your email inbox. N • Consider disabling JavaScript • Or control with an extension • This oers limited protecon • Keep your browser and applicaons upda • Avoid the nasty browser vulnerabilies • Validate input • Don’t allow users to add their own scrip to an input eld
1.2 - Cross-site Request Forgery Cross-site request forgery
• One-click aack, session riding • XFRF, XFRF, CSRF (sea surf) • Takes advantage of the trust that a web applicaon has for the user • The web site trusts your browser • Signicant web applicaon development • The applicaon should have an-forgery an-forg ery techniques added • Usually a cryptographic token to preve
1.2 - Privilege Escalaon Privilege escalaon • Gain higher-level access to a system • Exploit a vulnerability • Might be a bug or design aw • Higher-level access means more capabilies • This commonly is the highest-lev highest-level el access • This is obviously a concern • These are high-priority vulnerability patches • You You want to get these holes closed very quickly • Any user can be an administrator • Horizontal privilege escalaon Special offer forAstudents: Onlyuser $4.99/month. • User can access B resources
Master your semester with Scribd & The New York Times 1.2 - DNS Poisoning and Domain Hijacking
Migang privilege escalaon • Patch quickly • Fix the vulnerability • Updated an-virus/an an-virus/an-malware -malware sow • Block known vulnerabilies • Data Execuon Prevenon • Only data in executable areas can run • Address space layout randomizaon randomizaon •Read Prevent buer overrun Free Foron 30this Days Sign up toavote title at a known memory address Useful Not useful Cancel anytime.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
Search document
1.2 - Zero-day Aacks
Zero-day aacks Zero-day vulnerabilies • Many applicaons have vulnerabilies • March 2017 • We’ve just not found them yet • CVE-2017-0199 - Microso Oce/WordPad • Someone is working hard to nd the next big vulnerability Remote Code Execuon Vulnerability w/Wind • The good guys share these with the developer • Open a Microso Oce or WordPad le • SophosLabs documented aacks in the wild si • Bad guys keep these yet-to-be-discovered November 2016 holes to themselves • They want to use these vulnerabilies for personal gain • June 2017 • CVE-2017-8543 | Windows Search • Zero-day Remote Code Execuon Vulnerability • The vulnerability has not been detected or published • Send a specially craed SMB message to the S • Zero-day exploits are increasingly common • Install programs, view/change/delete view/change/delete data, • Common Vulnerabi Vulnerabilies lies and Exposures (CVE) create new user accounts • hp://cve. hp://cve.mitre.org/ mitre.org/
1.2 - Replay Aacks Replay aack • Useful informaon is transmied over the network • A cray hacker will take advantage of this • Need access to the raw network data • Network tap, ARP poisoning, malware on the vicm computer
• The gathered informaon may help the bad guy • Replay the data to appear as someone else
1
• This is not a MitM aack • The actual replay doesn’t require the original workstaon • Avoid this type of replay aack wit • Use a session ID with the passwo create a unique authencaon ha
Client authen3cates to the server with a username and hashed password
Client Master your semester with Scribd & The New York Times During authen3ca3on authen3ca3on,, Special offer for students: Only $4.99/month.
2
the bad guy captures the username
Read Free Foron 30this Days Sign up to vote title
Useful
Not useful
Serve
Cancel anytime.
Bad guy sends his own
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
Sheet Music
Search document
1.2 - Client Hijacking Aacks Clickjacking
• You’re clicking on a buon • But you’re actually clicking on something else • Normal web page underneath • Invisible layer on the top Clickjacking your phone
• May 2017 • Georgia Instute of Technology Technology report • Cloak & Dagger • Android OS up to version 7.1.2 • Invisible informaon drawn over the screen • Monitor keystrokes keystrokes and record user input
Header manipulaon • Informaon gathering • Wireshark, Kismet • Exploits • Cross-site scripng • Modify headers • Tamper, Firesheep, Scapy • Modify cookies • Cookies Manager+ (Firefo (Firefoxx add-on) Prevent session hijacking
Browser cookies and session ID’s
• Cookies • Informaon stored on your computer by the browser • Used for tracking, personalizaon, session management • Not executable, not generally a security risk • Unless someone gets access to them • Could be considered be a privacy risk • Lots of personal data in there t here • Session IDs are oen stored in the cookie • Maintains sessions across mulple browser sessions
• Encrypt end-to-end • They can’t capture your session ID if they • Addional load on the web server (HTTPS • Firefox extension: HTTPS Everywhere, For • Encrypt end-to-somewhere • At least avoid capture over a local wireless • Sll in-the-clear for part of the journey • Personal VPN (OpenVPN, VyprVPN, etc.) • Use session ID monitors • Blacksheep • Applicaon-specic
Vic*m authen*cates to the server
1
Client authen*ca*on Your session ID: 3B0027A38FDF37
Master your semester with 3Scribd Vic*m & The New YorkA"acker Timesintercepts Special offer for students: Only $4.99/month.
the session ID and
2
Read Free Foron 30this Days Sign up to vote title : useful Useful DNot I D s io nanytime. Se sCancel 7 8 F D F 3 3 A 7 2 3 B 0 0
Server p a session to the cl
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
0
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.2 - Driver Manipulaon (connued) Shimming
Refactoring
• Filling in the space between two objects • A middleman • Windows includes it’s own shim • Backwards compability with previous Windows versions • Applicaon Compability Shim Cache • Malware authors write their own shims • Get around security (like UAC) • January 2015 Microso vulnerability • Elevates privilege
• Metamorphic malware • A dierent program each me it’s downloa • Make it appear dierent each me • Add NOP instrucons • Loops, pointless code strings • Can intelligently redesign itself • Reorder funcons • Modify the applicaon ow • Reorder code and insert unused data types • Dicult to match with signature-based detec • Use a layered approach
1.2 - Spoong Spoong • Pretend to be something you aren’t • Fake web server, fake DNS server, etc. • Email address spoong • The sending address of an email isn’t really the sender • Caller ID spoong • The incoming call informaon is completely fake • Man-in-the-middle aacks • The person in the middle of the conversaon pretends to be both endpoints MAC spoong • Your Your Ethernet device has a MAC address • A unique burned-in address • Most drivers allow you to change this t his • Changing the MAC address can be legimate • Internet provider expects a certain ce rtain MAC address • Certain applicaons require a parcular MAC address
Master your semester with Scribd legimateTimes response to & The NewA York an ARP request is received Special offer for students: Only $4.99/month. from the default gateway.
1
• It might not be legimate • Circumvent MAC-based ACLs • Fake-out a wireless address lter • Very dicult to detect • How do you know it’s not the origin IP address spoong • Take someone else’s IP address • Actual device • Pretend to be somewhere you are n • Can be legimate • Load balancing • Load tesng • May not be legimate • ARP poisoning • DNS amplicaon / DDoS • Easier to idenfy than MAC address sp • Apply rules to prevent invalid trac enable switch security Read Free Foron 30this Days Sign up to vote title ARP Response: I am 192.168.1.1
Not useful Cancel anytime.
Useful
My MAC address is 11:22:33:44:55: 11:22:33:44:55:66 66
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.2 - Wireless Replay Aacks Wired vs. wireless replay
Cracking WEP
• Similar to a wired replay aacks • Wireless doesn’t change those aacks • Wireless adds some addional capabilies • This is a big concern for the security professional • Much easier to capture the data • Hotspots are generally in the clear • Just like tuning in to a radio staon
• WEP - Wired Equivalent Privacy • A broken security protocol • Could not stop the replay of 802.11 packets • ARP request replay aack • Cracking WEP requires thousands of Inializaon Vector (IV) packets • Wait all day to collect IV informaon • Or replay a ton of ARPs and collect the IV pac • Now you have many thousands of IV packets • You can crack WEP in seconds
1.2 - Rogue Access Points and Evil Twins Rogue Access Points
Wireless Evil Twins
• A signicant potenal backdoor • Huge security concerns • Very easy to plug in a wireless AP • Or enable wireless sharing in your OS • Schedule a periodic survey • Walk around your building/campus • Use third-party tools / WiFi Pineapple • Consider using 802.1X (Network Access Control) • You must authencate, regardless of the connecon type
• Buy a wireless access point • -Less than $100 US • Congure it exactly the same way as an exisn • -Same SSID and security sengs • Overpower the exisng access points • -May not require the same physical physical locaon • WiFi hotspots are easy e asy to fool • -And they’re wide open • You encrypt your communicaon, right? • -Use HTTPS and a VPN
1.2 - Wireless Jamming Radio frequency (RF) jamming
• Denial of Service • Prevent wireless communicaon • Transmit Transmit interfering wireless signals • Decrease the signal-to-noise rao at the receiving device • The receiving device can’t hear the good signal • Somemes it’s not intenonal • Interference, not jamming • Microwave oven, uorescent lights Special offer for students: Only $4.99/month. • Jamming is intenonal
Master your semester with Scribd & The New York Times
Wireless jamming
• Many dierent types • Constant, random bits / Constant, legimat • Data sent at random mes • Random data and legimate frames • Reacve jamming • Only when someone else tries to communic Read Free Foron 30this Days Sign to vote title • Needs to be up somewhere close • Dicult be eecve a distance Useful Notfrom useful to Cancel anytime. • Time to go fox hunng • You’ll You’ll need the right equipment to hunt dow
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.2 - WPS Aacks (connued) Other WPA Aacks • Walk up to the access point • Default PIN may be wrien on the device • Or just push the WPS buon on the front • Pixie Dust - Summer 2014 • WPS PIN may be poorly encrypted • Based on the wireless chipset • Oine WPS brute force • Takes a few minutes or less • So much for slowdowns and lockouts • WPS is just awful • Make sure it’s disabled
1.2 - Bluejacking and Bluesnarng Bluejacking
• Sending of unsolicited messages to another device via Bluetooth • No mobile carrier required! • Typical funconal distance distance is about 10 meters • More or less, depending on antenna and interference • Bluejack with an address book object • Instead of contact name, write a message • “You are Bluejacked!” • “You are Bluejacked! Add to contacts?” • Third-party soware may also be used • Blooover, Bluesni
Bluesnarng • Access a Bluetooth-enabled device and • Contact list, calendar, email, pictures, • First major security weakness in Blueto • Marcel Holtmann in September 2003 Adam Laurie in November 2003 • This weakness was patched • Serious security issue • If you know the le, you can download it without authencaon
1.2 - RFID and NFC Aacks
Master your semester with Scribd RFID (Radio-frequency idencaon) • It’s everywhere & The Newbadges York Times • Access Special offer for students: Only $4.99/month. • Inventory/Assembly line tracking • Pet/Animal idencaon
Near eldFree communicaon (NFC) Read Foron 30this Days Sign up to vote title • Two-way wireless communicaon Useful Not useful • Builds Cancel on RFID, which was one-way anytime. • Payment systems • Google wallet and MasterCard partne
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Sheet Music
Search document
1.2 - Wireless Disassociaon Di sassociaon Aacks It started as a normal day
• Surng along on your wireless network • And then you’re not • And then it happens again • And again • You may not be able to stop it • There’s (almost) nothing you can do • Time to get a long patch cable • Wireless disassociaon • A signicant wireless denial of service (DoS) aack 802.11 management frames
Protecng against disassociaon • IEEE has already addressed the problem • 802.11w - July 2014 • Some of the important management frame are encrypted • Disassociate, deauthencate, channel switch announcements, etc. • Not everything is encrypted • Beacons, probes, authencaon, associa • Cart before the horse • 802.11w is required for 802.11ac complianc • This will roll out going forward
• 802.11 wireless includes a number of management features • Frames that make everything work • You never see them • Important for the operaon of 802.11 wireless • How to nd access points, manage QoS, associate/ disassociate with an access point, etc. • Original wireless standards did not add protecon for management frames • Sent in the clear • No authencaon or validaon
1.2 - Cryptographic Aacks Aacks Cryptographic aacks • You’ve You’ve encrypted data and sent it to another person • Is it really secure? • How do you know? • The bad guy doesn’t have the combinaon (the key) • So they break the safe (the cryptography) • Finding ways to undo the security • There are many potenal cryptographic shortcomings SpecialBirthday offer for students: aack Only $4.99/month. • In a classroom of 23 students, what is the chance of
Master your semester with Scribd & The New York Times
• WWII Enigma cipher • Easier to break if you knew some plaintext • Daily weather report (weer) • Numbers were common (eins) • Royal Air Force would “seed” the North Sea w • Future messages would reference the harbor Rainbow tables Read Free Foron 30this Days Sign up to vote title • An opmized, pre-built set of hashes Useful Notevery usefulhash • Doesn’t to contain need Cancel anytime. • The calculaons have already been done • Remarkable speed increase
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
1.8K views
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
Sheet Music
1.2 - Cryptographic Aacks Aacks (connued) Brute force
• The password is the key • Secret phrase • Stored hash • Brute force aacks - Online • Keep trying the login process • Very slow • Most accounts will lockout aer a number of failed aempts • Brute force the hash - Oine • Obtain the list of users and hashes • Calculate a password hash, compare it to a stored hash • Large computaonal resource requirement The password le • Dierent across operang systems • Dierent hash methods
Linux Account Hashes
Downgrade aack • Instead of using perfectly good encr use something that’s not so great • Force the systems to downgrade th • 1995 - SSL/TLS vulnerability FREAK - Factoring RSA Export Keys • Public key pairs can be limited to 51 • 1990 U.S. cryptography export re • Weak keys could be forced during the SSL handshake • Modern systems can easily brute fo the small keys • Vulnerability was patched
Jumper Bay:1001::42e2f19c31c9ff73cb97eb1b26c10 Carter:1007::cf4eb977a6859c76efd21f5094ecf77d: Jackson:1008::e1f757d9cdc06690509e04b5446317d2 O’Neill:1009::78a8c423faedd2f002c6aef69a0ac1af Teal’c:1010::bf84666c81974686e50d300bc36aea01:
Collisions
• Hash digests are supposed to be unique • Dierent input data should never create the same hash • MD5 hash • Message Digest Algorithm 5 • First published in April 1992 • Collisions idened in 1996 • December 2008: Researchers created CA cercate that appeared legimate when MD5 is checked • Built other cercates that appeared to be legit and issued by RapidSSL
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Replay aacks • Some cryptographic algorithms are more suscep than others to a replay aack • A hash with no salt, no session ID tracking, t racking, no • Replay countermeasure may be part of the cryp • Kerberos and Kerberos derivaves include m • Anything aer the me to live (TTL) is discarde Weak implementaons • Weak encrypon • One weak link breaks the enre chain • 802.11 WEP Free For 30this Days • The RC4 Read key bevote recovered by gathering en Signcan up to on title • The algorithm didn’t suciently Not usefulprotect the Useful Cancel anytime. • DES - Data Encrypon Standard • Relavely small 56-bit keys
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.3 - Threat Actors (connued) Organized crime • Professional criminals • Movated by money • Almost always an external enty • Very sophiscated • Best hacking money can buy • Crime that’s organized • One person hacks, one person manages the exploits, another person sells the data, another handles customer support • Lots of capital to fund hacking eorts Naon states / APT • Governments • Naonal security, job security • Always an external enty • Highest sophiscaon • Military control, ulies, nancial control • United States and Israel destroyed 1,000 nuclear centrifuges with the Stuxnet worm • Constant aacks • Advanced Persistent Threat (APT) • Massive resources availabl available e
Insiders
• More than just passwords on scky notes • Some insiders are out for no good • Sophiscaon may not be advanced, but the insider has instuonal knowledge • Aacks can be directed at vulnerable syste • The bad guy knows what to hit • Extensive resources • Eang away from the inside Competors • Many dierent movaons • DoS, espionage, harm reputaon • High level of sophiscaon • The compeve upside is huge (and very u • Many dierent intents • Shut down your competor during an even • Steal customer lists • Corrupt manufacturing databases • Take nancial informaon
1.4 - Penetraon Tesng Penetraon Tesng • Pentest • Simulate an aack • Similar to vulnerability scanning • Except we actually try to exploit the vulnerabilies • Oen a compliance mandate • Regular penetraon tesng by a 3rd-party • Technical Technical Guide to Informaon Security Tesng and Assessment • hp://www.professormesser.link/800115 SpecialVerify offer for students: Only $4.99/month. a threat exists • Stay up-to-date
Master your semester with Scribd & The New York Times
Acve reconnaissance • Trying the doors • Maybe one is unlocked • Don’t open it yet • Relavely easy to be seen • Ping scans, port scans • DNS queries • OS scans, ngerprinng Read Free Foron 30this Days SignOS up to vote title • Service scans, version scans Useful Not useful Cancel anytime. Exploing vulnerabilies • Try to break into the system • Be careful; this can cause
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.4 - Penetraon Tesng (connued) The process
Sheet Music
• Inial exploraon • Get into the network • A challenging hurdle (most of the me) • Persistence • Once you’re there, you need to make sure there’s a way back in • Set up a backdoor • Build user accounts, change or verify default passwords • The pivot • The foothold point • The inside of the network is oen relavely open • Jump from here to the rest of the network
Black box, white box, and grey b • How much do you know about • Many dierent approaches • Black box • The pentester knows nothing about the systems under aa • “Blind” test • White box • Full disclosure • Grey box • A mix of black and white • Focus on certain systems or a
1.5 - Vulnerability Scanning Vulnerability scanning Vulnerability • Usually minimally invasive, unlike a penetraon test • Port scan - Poke around and see what’s open • Idenfy systems and security devices • Test from the outside and inside • Don’t dismiss insider threats • Gather as much informaon as possible • We’ll separate wheat from cha later Scan types
• Scanners are very powerful • Use many dierent techniques to idenfy vulnerabilies • Non-intrusive scans • Gather informaon, don’t try to exploit a vulnerability • Intrusive scans • You’ll You’ll try out the vulnerability to see if it works • Non-credenaled scans • The scanner can’t login to the remote device • Credenaled scan Special offer for students: Onlyuser, $4.99/month. • You’re a normal emulates an insider aack
Master your semester with Scribd & The New York Times
Vulnerability scan results Vulnerability • Lack of security controls • No rewall, no an-virus, no an-spy • Misconguraons - Open shares, gues • Real vulnerabilies • Especially newer ones, occasionally t Dealing with false posives • False posives • A vulnerability is idened that doesn’t really exist • This is dierent than a low-severity vu • It’s real, but it may not be your highe • False negaves • A vulnerability exists, but you didn’t • Update to the latest signatures • If you don’t know about it, you can’t • Work with the vulnerability detecon manufacturer Free For 30to Days Sign up to vote on this title their signa •Read They may need update your environment forUseful Not useful Cancel anytime.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.6 - Vulnerability Types Types Vulnerability types Vulnerability • There are many types of vulnerabilies • Some digital, some physical • Cover a broad scope • Programming, network design, process/procedure • Any of these can be exploited at any me • Or mulples at the same me • Be on your toes Race condion • A programming conundrum • Somemes, things happen at the same me • This can be bad if you’ve not planned for it • Two bank accounts with $100 • User 1 and User 2 transf transfer er $50 from Account A to Account B • Expected outcome: Account A has $50, Account B has $150 • What if you don’t perform proper validaon? • User 1 and User 2 check the account balances ($100 in each account) • User 1 transfers $50 from Account A (now at $50) to Account B (now at $150) • At about the same me, user 2 transf transfers ers $50 from Account A (sll has $100, right?, so now at $50) to Account B (now at $200) • Outcome: Account A has $50, Account B has $200 Race condions can cause big problems • January 2004 - Mars rover “Spirit” • Reboot when a problem is idened • Problem is with the le system and prevents reboong • Reboot because of the le system problem • GE Energy - Energy Management System • When mulple power lines failed at the same me, no alert was sent Special offer for students: Only $4.99/month. • Caused the Northeast Blackout of 2003 • Therac-25 radiaon therapy machine in the 1980s 198 0s
Master your semester with Scribd & The New York Times
Embedded system vulnerabilies v ulnerabilies • No direct access to the operang system • You’ll probably never see it • These devices are usually connected to the • Very convenient to the hacker • Old, outdated operang system soware • Why upgrade? May not even be upgrada • June 2017 - Wikileaks releases CIA les call • CIA takes advantage of vulnerabilies on Linksys and D-Link routers • They can easily get your administrav administrave e pa • At which point they install their own rm Lack of vendor support
• Security requires diligence • The potenal for a vulnerability is always • Vendors are the only ones who can x their • Assuming they know about the problem • And care about xing it • Trane Comfortlink II thermostats t hermostats • Control the temperature from your phon • Trans Trans noed of three vulnerabilies in A • Two patched patched in April 2015, one in January Improper input handling
• Many applicaons accept user input • We put data in, we get data back • All input should be considered malicious • Check everything. Trust nobody. • Allowing invalid input can be devastang • SQL injecons, buer overows, denial o • It takes a lot of work to nd input that can be used maliciously • But they will nd it Read Free Foron 30this Days Sign up tohandling vote title Improper error
Useful Not useful • Errors happen Cancel anytime. • And you should probably know about it • Messages should be just informaonal eno
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.6 - Vulnerability Types Types (connued) Default conguraon • Every applicaon and network device has a default login • Not all of these are ever changed • Mirai botnet • Takes advantage of default conguraons • Takes Takes over Internet of Things (IoT) devices • 60+ default conguraons • Cameras, routers, doorbells, garage door openers, etc. • Mirai released as open-source soware Untrained users
• It takes one person to allow a breach • And it can happen without the user even knowing • Training is crical • Emails don’t work • This is me consuming and expensive (and important) • Annual reinforcement • Quiz and role play • Become familiar with common situaons Improperly congured accounts • Technical issue and process issue • Frequent audits are important • Accounts without a need • Abandoned and unnecessary accounts • Accounts with administrave access • These should be severely limited • Should not be able to login directly as administrator • Unless it’s on a server console Vulnerable Vulner able business processes • If there’s a way to game the system, the bad guys will nd it • It doesn’t have to be a technical vulnerability • The Society for Worldwide Interbank Financial Telecommunicaon (SWIFT) • Electronically send payment instrucons between banks • February 2016Only - Bangladesh Bank Special offer for students: $4.99/month. • Dridex malware used to steal SWIFT credenals
Master your semester with Scribd & The New York Times
Memory/buer vulnerabilies • Manipulang memory can be advantag • Relavely dicult to accomplish • Memory leak • Unused memory is not properly relea • Begins to slowly grow in size • Eventually uses all available memory • System crashes • Integer overow • Large number into a smaller sized spa • Where does the extra number go? • You shouldn’t be able to manipulate memory this way • Buer overow • Overwring a buer of memory • Spills over into other memory areas • NULL Pointer dereference • Programming technique that referenc a poron of memory • What happens if that reference point • Applicaon crash, debug informaon Denial of Service, etc. • DLL injecon • The bad guys didn’t write wr ite the applica • But they could write an external libra manipulate the operang system or a to run the library System sprawl/undocumented assets • Hundreds of projects, test plaorms, acve operang systems, producon V • Spin up a new instance with a click • Keeping track is a challenge • Easy miss a forgoen computer Read Free For 30this Days Signto up to vote on title • Under a desk Useful Not useful • Part ofCancel a rered anytime.applicaon • Not part of regular security patches • These become pivot points
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
1.6 - Vulnerability Types Types (connued) New threats/zero day • What you don’t know can really hurt you • And you won’t even see it coming • Vulnerabilies are sing in your system, waing for someone to nd them • Some problems are hidden for years • As soon as the problem is discovered (day zero), patch it • There isn’t always me to properly test • Balance severity with stability • WannaCry ransomware hit on May 12, 2017 • However, However, the patch had been available since March 14
Improper cercate and key management • Manage your keys and cercates • This needs to be well planned • Important decisions, can’t do this on the • What will be the organizaons cercate a • How will the CA content be protected? • How will intermediate CAs be created and • Who will validate and sign the organiza organizaon’s on’s cercates? • What is the validaon process? • And many more
2.1 - Firewalls The universal security control
• Standard issue • Home, oce, and in your operang system • Control the ow of network trac • Everything passes through the rewall • Corporate control of outbound and inbound data • Sensive materials • Control of inappropriate content • Not safe for work, parental controls • Protecon against evil - An-virus, an-malware Network based rewalls • Filters trac by port number • OSI layer 4 (TCP/UDP) • Some rewalls can lter through OSI layer 7 • Can encrypt trac into/out of the network • Protect your trac between sites • Can proxy trac • A common security technique • Most rewalls can be layer 3 devices (routers) • Usually sits on the ingress/egress of the network Stateless rewall Special• offer students: Onlyof $4.99/month. Doesfor not keep track trac ows • Each packet is individually examined,
Master your semester with Scribd & The New York Times
Applicaon-aware security devices Applicaon-aware • Network-based Firewalls • Control trac ows based on the app • Microso SQL Server, Twier, YouTube • Intrusion Prevenon Systems • Idenfy the applicaon • Apply applicaon-specic vulnerability to the trac • Host-based rewalls • Work with the OS to determine the ap Firewall rules
• Access control lists (ACLs) • Allow or disallow trac based on tupl • Groupings of categories • Source IP, Desnaon IP, port number, me of day day,, applicaon, etc. • A logical path • Usually top-to-boom • Can be very general or very specic Read Free For 30usually Days Sign up to vote on this titleat the top • Specic rules are • Implicit deny Not useful Useful Cancel anytime. • Most rewalls include a deny at the • Even if you didn’t put one
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.1 - VPN Concentrators VPN Concentrat Concentrator or • Virtual Private Network • Encrypted (private) data traversing a public network • Concentrator • Encrypon/decrypon access device • Oen integrated into a rewall • Many deployment opons • Specialized cryptographic cr yptographic hardware • Soware-based opons available • Used with client soware • Somemes built into the OS Remote access VPN • On-demand access from a remote device • Soware connects to a VPN concentrator • Some soware can be congured as always-on SSL VPN (Secure Sockets Layer VPN) • Uses common SSL/TLS protocol (tcp/443) • (Almost) No rewall issues! • No big VPN clients • Usually remote access communicaon • Authencate users • No requirement for digital cercates or shared passwords (like IPSec) • Can be run from a browser or from a VPN client • Across many operang systems
2
Site-to-site VPN • Always-on • Or almost always • Firewalls oen act as VPN concentrators • Probably already have rewalls in place IP Sec (Internet Protocol Security)
• Security for OSI Layer 3 • Authencaon and encrypon for every • Condenality and integrity/an-r integrity/an-replay eplay • Encrypon and packet signing • Very standardized • Common to use mul-vendor implementa • Two core IPSec protocols • Authencaon Header (AH) • Encapsulaon Security Payload (ESP) Authencaon Header • Hash of the packet and a shared key • MD5, SHA-1, or SHA-2 are common • Adds the AH to the packet header Encapsulaon Security Payload (ESP) • Encrypts the packet • MD5, SHA-1, or SHA-2 for hash, and 3DES or AES for encrypon • Adds a header, a trailer, and an Integrity C
Master your Corporate semester with Scribd Network & The New York Times Special offer for students: Only $4.99/month.
Full VPN
VPN concentrator decrypts the tunneled traffic and routes it into the corporate network
VPN Concentrator
1 Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
0
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
Search document
2.1 - VPN Concentrators (connued) Site-to-site
1
VPN
Traffic is encrypted as it passes through the local VPN concentrator
2
Traffic is decrypted in the VPN concentrator on the other side of the tunnel
Remote Site
Corporate Network
Firewall / VPN Concentrator
Firewall / VPN Concentrator
AH (Authencaon Header) • Data integrity • Origin authencaon • Replay aack protecon • Keyed-hash mechanism • No condenality/en condenality/encrypon crypon
IP Packet with Authen/ca/on (tunnel mode)
New IP Header
ESP (Encapsulang Security Payload) • Data condenality (encrypon) • Limited trac ow condenality • Data integrity • An-replay protecon
AH Header
IP Header
Data
Authen/cated
IPsec Datagram with ESP (tunnel mode)
New IP Header
ESP Header
IP Header
ESP Trailer
Data Encrypted Authen;cated
IPsec Transport mode and Tunnel mode AH and ESP Master your semester with Scribd • Combine the data integrity of AH Read Free Foron 30this Days Sign up to vote title with the condenality of ESP & The New York Times Useful Not useful Original Packet Cancel anytime.
Special offer for students: Only $4.99/month.
IP Header
Data
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.1 - Network Intrusion Detecon and Prevenon NIDS and NIPS
• Intrusion Detecon System / Intrusion Prevenon System • Watch network trac • Intrusions • Exploits against operang systems, applicaons, etc. • Buer overows, cross-site scripng, other vulnerabilies • Detecon vs. Prevenon • Detecon – Alarm or alert • Prevenon – Stop it before it gets into the network Passive monitoring
• Examine a copy of the trac • Port mirror (SP (SPAN), AN), network tap • No way to block (prevent) trac Out-of-band Out-of-b and response • When malicious trac is idened, IPS sends TCP RST (reset) frames • Aer-the-f Aer-the-fact act • Limited UDP response available Inline monitoring
• IDS/IPS sits physicall physicallyy inline • All trac passes through the IDS/IPS In-band response • Malicious trac is immediately idened • Dropped at the IPS • Does not proceed through the network Idencaon Idencao n technologies • Signature-based - Look for a perfect match • Anomaly-based - Build a baseline of what’s “normal” • Behavior-based - Observe and report • Heuriscs - Use arcial intelligence to idenfy
IPS Rules
• You determine what happens with unwan • Block, allow, send an alert, etc. • Thousands of rules • Or more • Rules can be customized by group • Or as individual rules • This can take me to nd the right balanc • Security / alert “noise” / false posives False Posives • A report that isn’t true • A false alarm or mistak mistaken en identy • IDS/IPS informaon • Only as good as the signatures • Some legimate trac could be marke • Time-consuming to research and resolv • Workstaon anvirus • April 2017: Webroot Anvirus • Windows les quaranned as malicious • Facebook and Bloomberg marked as ph • Consider a second opinion opinion • hp://www.VirusTotal.com False Negaves • A report missed idenfying something • You didn’t get a nocaon • Malicious trac got through your defens • You’ll You’ll probably see the results of this • It’s dicult to know when this happens • It’s completely silent • Get catch/miss rates with industry tests • IPS, an-virus Read Free Foron 30this Days Sign up to vote title
Master your semester with Scribd Passive monitoring traffic is sent from client to & The New York Times Network Useful 1 server through the network switch Special offer for students: Only $4.99/month.
Not useful Cancel anytime.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.1 - Router and Switch Security Routers
Network Access Control (NAC)
• Routes trac between IP subnets • OSI layer 3 device • Routers inside of switches somemes called “layer 3 switches” • Layer 2 = Switch, Layer 3 = Router • Oen connects diverse network types • LAN, WAN, copper, ber
• IEEE 802.1X - Port-based Network Access Control (NAC) • You You don’t get access unl you authen • Makes extensive use of EAP and RAD • Extensible Authencaon Protocol / Remote Authencaon Dial In User S • We’re talking about physical interfaces • Not TCP or UDP ports • Administrave enable/disable • Disable your unused ports • Duplicate MAC address checking • Stop the spoofers
Access Control Lists (ACLs)
• Used to allow or deny trac • Also used for NAT, QoS, etc. • Dened on the ingress or egress of an interface • Incoming or outgoing • ACLs evaluate on certain criteria • Source IP, Desnaon IP, TCP port numbers, UDP port numbers, ICMP • Deny or permit • What happens when an ACL matches the trac? • ACLs have evolved through the years • Standard vs. Extended, numbered vs. named An-spoong • Prevent a bad guy from using someone else’s address • Man-in-the-middle, DDoS, etc. • Filter reserved IP addresses • An RFC 1918 address should not be routed to or from the Internet • A simple ACL will work • Enable Reverse Path Forwarding (RPF) • The response to an inbound packet should return the same way • If it doesn’t, then drop the packet right now
Master your semester with Scribd Switches & The New York Times • Bridging done in hardware Special offer for students: Only $4.99/month. • Applicaon-specic integrated circuit (ASIC)
An OSI layer 2 device
Loop Prevenon • Connect two switches to each other • They’ll send trac back and forth for • There’s no “counng” mechanism at the MAC layer • This is an easy way to bring down a net • And somewhat dicult to troublesho • Relavely easy to resolve • Spanning Tree Protocol • IEEE standard 802.1D to prevent loop in bridged (switched) networks (1990 • Created by Radia Perlman • Used praccally everywhere Flood Guard
• Congure a maximum number of sourc MAC addresses on an interface • You decide how many is too many • You You can also congure specic MAC a • The switch monitors the number Read Free For 30this Days Sign up to vote on title of unique MAC addresses • Maintains listNot of useful every source MAC Useful a Cancel anytime. • Once you exceed the maximum, port security acvates
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
2.1 - Proxies Proxies
Sheet Music
Search document
• Sits between the users and the external network • Receives the user requests and sends the request on their behalf (the proxy) • Useful for caching informaon, access control, URL ltering, content scanning • Applicaons may need to know how to use the proxy (explicit) • Some proxies are invisible (transparent)
Applicaon proxies • One of the simplest “proxies” is NAT NAT • A network-level proxy • Most proxies in use are applicaon proxies • The proxy understands the way the applic • A proxy may only know one applicaon • HTTP • Many proxies are mulpurpose proxies • HTTP, HTTPS, FTP, etc.
Forward Proxy
• An “internal proxy” • Commonly used to protect and control user access to the Internet
Interne User
Proxy
www.examp Internal Network
Reverse Proxy
• Inbound trac from the Internet to your internal service
Internet
Web S
Proxy www.example.com
Internal Network Open your Proxy Master semester with Scribd • A third-party, proxy Times & Theuncontrolled New York • Can be a signicant Special offer for students: Only $4.99/month. security concern • Oen used to
Internet
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Interne
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.1 - Load Balancers (connued) Scheduling
Sheet Music
• Round-robin • Each server is selected in turn • Weighted round-robin • Priorize the server use • Dynamic round-robin • Monitor the server load and distributed to the server with the lowest use
Acve/Acve load balancing Acve/Acve • Anity - A kinship, a likeness • Many applicaons require communicaon to the • Each user is “stuck” to the same server • Tracked through IP address or session IDs • Source anity Acve/passive load balancing • Some servers are acve • Others are on standby • If an acve server fails, the passive server takes its p
2.1 - Access Points Wireless Access Point (WAP)
Power Level Controls
• Not a wireless router • A wireless router is a router and a WAP in a single device • WAP is a bridge • Extends the wired network onto the wireless network • WAP is an OSI layer 2 device
• Usually a wireless conguraon • Set it as low as you can • How low is low? • This might require some addion • Consider the receiver • High-gain antennas can hear a lot • Locaon, locaon, locaon Band selecon and bandwidth • Throughput • Maximum theorecal throughpu • Actual throughput can vary widel • Frequency • 2.4 GHz and 5 GHz • -And somemes both both • Distance • A combinaon of antennas • Channels • Non-overlapping channels would
SSID management
• Service Set Idener • Name of the wireless network • LINKSYS, DEFAULT, NETGEAR • Change the SSID SSI D to something not-so obvious • Disable SSID broadcasng? • SSID is easily determined through wireless network analysis • Security through obscurity MAC ltering • Media Access Control • The “hardware” address • Limit access through the physical hardware hardware address • Keeps the neighbors out • Addional administraon with visitors • Easy to nd working MAC addresses through wireless LAN analysis • MAC addresses can be spoofed Special offer for students: Only $4.99/month. • Free open-source soware
Master your semester with Scribd & The New York Times
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.1 - Access Points (connued) Omnidireconal antennas • One of the most common • Included on most access points • Signal is evenly distributed on all sides • Omni=all • Good choice for most environments • You need coverage in all direcons • No ability to focus the signal • A dierent antenna will be required Direconal antennas • Focus the signal • Increased distances • Send and receive in a single direcon • Focused transmission and listening • Antenna performance is measured in dB • Double power every 3dB of gain Direconal antennas • Yagi antenna • Very direconal and high gain • Parabolic antenna • Focus the signal to a single point
Managing wireless congura conguraons ons • LWAPP • Lightweight Access Point Protocol • Cisco proprietary - CAPWAP is an RFC standa based on LWAPP • Manage mulple access points simultaneous • Thick/fat access points • The access point handles most wireless tasks • The switch is not wireless-aware • Thin access points • Just enough to be 802.11 wireless • The intelligence is in the switch • Less expensive Wireless LAN controllers
• Centralized management of WAPs - A single “p • Deploy new access points • Performance and security monitoring • Congure and deploy changes to all sites • Report on access point use • Usually a proprietary system • The wireless controller is paired with the acc
2.1 - SIEM SIEM
• Security Informaon and Event Management • Security events and informaon • Security alerts - Real-me informaon • Log aggregaon and long-term storage • Usually includes advanced reporng features • Data correlaon - Link diverse data types • Forensic analysis - Gather details aer an event Time Synchronizao Synchronizaon n • Switches, routers, rewalls, servers, ser vers, workstaons • Every device has its own clock Special offer for students: Only $4.99/month. • Synchronizing the clocks becomes crical • Log les, authencaon informaon, informaon, outage details
Master your semester with Scribd & The New York Times
Syslog
• Standard for message logging • Diverse systems, consolidated lo • Usually a central logging receiver • Integrated into the SIEM • You’re You’re going to need a lot of disk • No, more. More than that. • WORM drive technology • Write Once Read Many Read Free Forimportant 30this Days Sign •up to vote on titlesecurity logs Protect Useful de-duplicaon Not useful Event Cancel anytime. • Event storms • When it rains, it pours
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.1 - Data Loss Prevenon Data Loss Prevenon (DLP) • Where’s your data? • Social Security numbers, credit card numbers, medical records • Stop the data before the bad guys get it • Data “leakage” • So many sources, so many desnaons • Oen requires mulple soluons in dierent places Data Loss Prevenon (DLP) systems • On your computer - Data in use, Endpoint DLP, Data in moon • On your server - Data at rest USB Blocking
• DLP on a workstaon - Allow or deny certain tasks • November 2008 - U.S. Department of Defense • Worm virus “agent.btz” replicates using USB US B storage • Bans removable ash media and storage devices • All devices had to be updated • Local DLP agent handled USB blocking • Ban was lied in February 2010 - Replaced with strict guidelines Cloud based DLP • Located between users and the Internet • Watch every byte of network trac • No hardware, no soware • Block custom dened data strings • Unique data for your organizaon • Manage access to URLs - Prevent le transfer transferss to cloud storage • Block viruses and malware - Anything traversing the network
DLP and email
• Email connues to be the most crical risk vector • Inbound threats, outbound dat • Check every email e mail inbound and o • Internal system or cloud-based c loud-based • Inbound • Block keywords, idenfy impos quaranne email messages • Outbound • Fake wire transfers, W-2 transm employee informaon Emailing a spreadsheet template
• November 2017 • Boeing employee emails spouse a spreadsheet to use as a templa • Contained the personal informa 36,000 Boeing employees • In hidden columns • Social security numbers, date o • Boeing sells its own DLP soware • But only uses it for classied w
2.1 - Network Access Control Edge vs. access control
• Control at the edge • Your Internet link • Managed primarily through rewall rules • Firewall rules rarely change • Access control Special offer for students: Only $4.99/month. • Control from wherever you are • Inside or outside
Master your semester with Scribd & The New York Times
Health checks/posture assessment • Persistent agents • Permanently installed onto a system • Periodic updates may be required Read Free Foron 30this Days Sign up to vote title • Dissolvable agents Useful Not useful • No installaon is required Cancel anytime. • Runs during the posture assessment • Terminates Terminates when no longer required
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
2.1 - Mail Gateways Mail gateways
Sheet Music
Search document
• Unsolicited email • Stop it at the gateway before it reaches the user • On-site or cloud-based Email ltering • Inbound and outbound email • Examine the trac • Unsolicited email adversements - Spam • Control of phishing aempts • Email is a large aack vector • An-virus - Block bad aachments • DLP - Data Loss Prevenon • Block condenal informaon in emails
Mail Gateway Internal Network
Internet
Firewall
Internal Mail Server
Idenfying spam • Whitelist • Only receive email from trusted tr usted sender • SMTP standards checking • Block anything that doesn’t follow RFC • rDNS - Reverse DNS • Block email where the sender ’s domain match the IP address • Tarping • Intenonally slow down the server conv • Recipient ltering • Block all email not addressed to a valid recipient email address Email Encrypon • Mail can be easily intercepted • And most mail is not encrypted • Send and receive sensive informaon • The encrypon mechanisms aren’t alwa • Encrypon can be required on the gatew • Based on policy • Force the encrypon, send a password • Send a text message to the recipient • Many email clients support encrypon • Email gateway recognizes the encrypo
2.1 - Other Security Devices SSL accelerators
• You You have a server farm full of web servers • Asymmetric encrypon is hard • Much more computaonally intense than symmetric encrypon • The SSL handshake uses asymmetric encrypon • Transfers Transfers the symmetric key using the asymmetric encrypon • Ooad the handshake process to hardware Special offer for students: Only $4.99/month. • May use a dierent device
Master your semester with Scribd & The New York Times
• The CA has ostensibly performed some • Validated Validated against the DNS record, pho • Your Your browser checks the web server • If it’s signed by a trusted CA, the e seamlessly Hardware Security Module (HSM) Read Free Foron 30this Days Sign up tocryptographic vote title • High-end hardware
• Plug-in orNot separate Usefulcard useful hardware de Cancel anytime. Key backup • Secured storage
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.2 - Soware Security Tools Passive vs. acve tools • Passive security • You’re a network ninja • Watch the packets go by • There’s a lot to learn • Top talkers, servers, clients, applicaons, operang systems, services • Acve security • Send trac to a device, watch the results • Query a login page • Try a known vulnerability • Check account access Protocol analyzers • Solve complex applicaon issues • Get into the details • Gathers packets on the network • Or in the air • Somemes built into the device • View trac paerns • Idenfy unknown trac • Verify packet ltering and security controls • Large scale storage • Big data analycs Network scanners
• Acve - scan for IP addresses and open ports • And operang systems, services, etc. • Pick a range of IP addresses • See who responds to the scan • Visually map the network • Gather informaon on each device • IP, operang system, services, etc. • Rogue system detecon • It’s dicult to hide from a layer 2 ARP • Nmap/Zenmap, Angry IP Scanner
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Wireless scanners and cracker crackerss
• Wireless monitoring - Packet capturing • Wireless aacks • Rogue access point, deauthencaon aa • Cracking - Find a wireless network key • WEP - Cryptographic vulnerabilies vulnerabilies • Relavely straighorward • WPA1 PSK and WPA2 PSK • Diconary brute force, rainbow tables • Many open source projects - Aircrack Aircrack-ng -ng Sui Password crackers
• Passwords are stored as hashes - It ’s a one-w • Some are stored without much complexity • Relavely straighorward straighorward to brute-force a • Get the hashes - Can be the hardest part • Use a good wordlist or use rainbow tables • Common passwords, mulple languages, e • Many tools available • John the Ripper, Ophcrack Vulnerability Vulner ability scanners • Did you miss a security patch? • We’ll nd it • Minimally invasive, but sll acve • Unlike a penetraon test • Gather as much informaon as possible • We’ll separate wheat from cha later • Microso Baseline Security Analyzer, Tenabl • Scan one or many devices • Automate the process, report on ndings Conguraon Congurao n compliance scanners • Do your devices meet your minimum security conguraons? Read Free For 30this Days Sign up to vote on title • Need to comply with internal requirement Useful Not useful or industryCancel regulaons anytime. • Check for various conguraons • Operang system version, installed applica
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.2 - Soware Security Tools Tools (connued) Data sanizaon tools • Time to upgrade that hard drive • What happens to the data on the old drive? • Overwrite the data once, and it’s gone • One and done Sanize enre drives • Darik’s Boot and Nuke (DBAN) • Sanize individual les or folders • Microso SDelete • Don’t forget about caches and temporary les • Data is stored in many places Stenoganography tools
• Greek for “concealed wring” • Security through obscurity • Message is invisible • But it’s really there • The covertext • The container document or le Common steganography techniques
• Network based • Embed messages in TCP packets • Use an image • Embed the message in the image itself • Invisible watermarks • Yellow dots on printers • Serial number and mestamp
Honey pots
• Aract the bad guys - And trap them ther • The bad guys are probably a machine • Makes for interesng recon Honeypots
• Create a virtual world to explore • Many dierent opons • hp://www.projecthoneypot.org/, hp://www.projecthoneypot.org/, hon • Constant bale to discern the real from th Backup Ulies • Protect from unexpected downme • Malware infecon, ransomware, server • Real-me le sync - rsync • Regular paral backups • Hourly incremental backups • Full backups • Complete le backups • System images • Complete coverage, fast recovery Banner grabbing • Applicaons can be chay • They somemes say too much • The banner is always there • But usually behind the scenes • Capture it with telnet, nc, or an automated tool (i.e., Nmap)
2.2 - Command Line Security Tools ping
• Test reachability • Determine round-trip me • Uses Internet Control Message Protocol (ICMP) • One of your primary troubleshoong tools Special offer for students: • Can you pingOnly the $4.99/month. host? • Wrien by Mike Muuss in 1983
Master your semester with Scribd & The New York Times
traceroute
• Determine the route a packet takes to a des • Map the enre path Read Free Foron 30this Days Sign up to vote title (PO • tracert (Windows) or traceroute Useful Not useful • Takes Takes advantage ICMP Time to Live Excee Cancelof anytime. message • The me in TTL refers to hops, not seconds
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.2 - Command Line Security Tools Tools (connued) Nmap
Address Resoluon Protocol • Determine a MAC address based on an IP address • You need the hardware address to communicate
• Network mapper • Find and learn more about networ • Port scan • Find devices and idenfy open por • Operang system scan • Discover the OS without logging in • Service scan • What service is available on a devic Name, version, details • Addional scripts • Nmap Scripng Engine (NSE) • Extend capabilies, vulnerability
• arp -a
• View local ARP table ipcong and ipcong and ifcong
• Most of your troubleshoong starts with your IP address • Ping your local router/gateway • Determine TCP/IP and network adapter informaon • And some addional IP details • ipcong – Windows TCP/IP conguraon • ifcong – Linux interface conguraon tcpdump
• Capture packets from the command line • Very convenient • Available in most Unix/Linux operang systems • Included with Mac OS X, available for Windows (WinDump) • Apply lters, view in real-me • Quickly idenfy trac paerns • Save the data, use in another applicaon • Wrien in standard pcap format • Can be an overwhelming amount of data • Takes Takes a bit of pracce to parse and lter
netcat
• “Read” or “write” to the network • Open a port and send or receive so • Many dierent dierent funcons • Listen on a port number • Transfer data • Scan ports and send data to a port • Become a backdoor • Run a shell from a remote device • Other alternaves and OSes - Ncat
2.3 - Common Security Issues Unencrypted credenals • Authencaon is a crical process • All data must be protected • Some protocols aren't encrypted • All trac sent in the clear • Telnet, FTP F TP,, SMTP S MTP,, IMAP I MAP • Verify with a packet capture • View everything sent over the network
Master your semester with Scribd Logs and event anomalies & The New York Times • Gather as much informaon as possible • Will important Special offer forbe students: Onlylater $4.99/month. • Many dierent sources
Access violaons • Segmentaon fault • Your operang system is looking out for you • Prevents access to a restricted area of mem • Might be a programming error • A pointer to the wrong locaon • Could be a security issue • Malware aempng to access restricted me Read Free For 30 Days Sign up to vote on this title • Denial of service Useful Not useful issues Cercate Cancel anytime. • A cercate should be signed by someone yo • It’s really someone your computer trusts
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.3 - Common Security Issues (connued) Miscongured devices • Another example of leaving the door open • The bad guys walk right in • Default username and password - Easy to authencate • Outdated soware - Known vulnerabilies • Running maintenance code • Debug informaon displayed to users • Firewalls • Rules provide too much access • Can be dicult to audit with a large rule base • Content lters • URLs are not specic enough • Some protocols not ltered (i.e., hps) • Access points • No encrypon mechanisms • Open conguraons from the wireless side Weak security congura conguraons ons • Digital security works great • Unl it doesn’t work great any longer • Too Too old - DES (Data Encrypon Standard) encrypon encr ypon • Created in 1975, 56 bit keys • Small key size is easily brute-forced with today’s technologies • Encrypon vulnerabilies - WEP (Wired Equivalent Privacy) • Inial 802.11 encrypon algorithm • Vulnerabilies found with RC4 ciphers and IVs • Hash collisions - SHA-1 (Secure Hash Algorithm 1) • Many collision aacks idened - Dierent documents with the same hash - No longer viable Personnel issues
• The weakest link - People make mistakes • Policy violaons • It’s in your Acceptable Use Policy (AUP) document • Insider threats • Authencated users have more free reign non-authencated Special offerthan for students: Only $4.99/month. • Important to assign the correct rights and permissions
Master your semester with Scribd & The New York Times
• Licensing • You’re going to pay for that, right? • Ongoing support • Who’s going to upgrade the unautho soware? Security patches? • What happens when it stops workin Baseline deviaon • Everything should be well documente • Hardware, soware, network trac data storage • Any changes to the norm should be id • And alerts should be sent immediate • Common with VPNs • Security posture analysis before con to the network • If something deviates from the base you must x it • An-virus and signature version, O • No remote access unl it matches th License compliance violaon • So many soware licenses • Operang systems, applicaons, hardware appliances • And they all license with dierent m • Availabili Availability ty • Everything works great when the • Meeng the expiraon date may cau • Applicaon may stop working comp • Integrity • Data and applicaons must be accurate and complete • A missing/bad license may cause pro with data integrity Asset management Read Free Foron 30this Days Sign up to vote title • Idenfy and track compung assets Useful Not useful • Usually ananytime. automated process Cancel • Respond faster to security problem • You know who, what, and where
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.4 - Analyzing Security Output Host-based IDS/IPS • Intrusion Detecon System / Intrusion Prevenon System • Started as a separate applicaon • Now integrated into many “endpoint” products • Protect based on signatures • Decrypted data • Protect based on acvity • Why are you modifying that le? Anvirus • The viruses are out there • It’s just a maer of me • From computers running Kaspersky Lab products in Q1 2017: • 479,528,279 malicious aacks blocked • 79,209,775 malicious URLs idened • 240,799 blocked ransomware ransomware aacks • 1,333,605 malicious installaon packages on mobile devices • hp://professormesser.link/q1stats • Anvirus apps will alert and log on malicious soware • Download or execute • Visit known-bad URL File integrity check
• Operang system check • Are the original les sll in place? • Host based rewalls • Protect against others on the network • Restrict access to your personal computer • Protect wherever you go • Required for laptops and mobile devices • Restricts by applicaon and network port numbers • The rewall knows what you’re doing • Log displays connecon aempts Special offer for students: Only $4.99/month. • Allowed and denied access Applicaon whitelisng
Master your semester with Scribd & The New York Times
• Exltraon - Terabytes of data that ts into yo • Windows Event Log • Security auding • View USB media use, log lenames copied to removable drives Advanced malware tools
• Specialized removal and recovery tools • Malware techniques vary widely • Malware is is pervasive pervasive • Spreads to all parts of your operang system • The best recovery is to delete and restore from good backup • You don’t always have this opon • Research as much as possible • Gather recon from the malware tools • Stop it and prevent it UTM/All-in-one UTM/All-in-on e security appliance • Unied Threat Management (UTM) / Web security gateway • URL lter / Content inspecon, Malware insp Spam lter, CSU/DSU, Router, Router, Switch, Firewal Bandwidth shaper, VPN endpoint Data Loss Prevenon (DLP) • Where’s your data? • Social Security numbers, credit card numbe medical records • Stop the data before the bad guys get it • Data “leakage” • So many sources, so many desnaons • Oen requires mulple soluons in dieren Data Execuon Prevenon (DEP) • No-eXecute bit Read Free Foron 30 Days Signitup to vote this title Disable) • Intel calls the XD bit (eXecute Useful Not useful • AMD calls itCancel Enhanced Virus Protecon anytime. • Designate secons of memory as execung c • Code can’t run from protected memory loca
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.5 - Mobile Device Connecon Methods Cellular networks
NFC security concerns
• Mobile devices • “Cell” phones • Separate land into “cells” • Antenna coverages a cell with certain c ertain frequencies • Security concerns • Trac monitoring • Locaon tracking • Worldwide access to a mobile device
• Remote capture • It’s a wireless network • 10 meters for acve devices • Frequency jamming • Denial of service • Relay / Replay aack • Man in the middle • Loss of RFC device control • Stolen/lost phone ANT/ANT+ • Wireless sensor network protocol • 2.4 GHz ISM band (industrial, scienc, an • An “Internet of Things” ultra-low-power p • Fitness devices, heart rate monitors, etc. • A separate wireless service • Not 802.11 or Bluetooth • Denial of service • Spectrum jamming • Oponal encrypon • And no method to maintain integrity
Wi-Fi
• Local network access • Local security problems • Same security concerns as other Wi-Fi devices • Data capture • Encrypt your data! • Man-in-the-middle • Modify and/or monitor data • Denial of service • Frequency interference Satellite communicaons - SATCOM • Remote locaons, natural disasters • Standard communicaon won’t work • Literally talking to space • Satellites in a low earth orbit or geostaonary • Voice and data communicaon • Communicate from almost anywhere • Handheld devices can be a security risk • Operang system vulnerabilies • Remote code execuon • Similar security issues to other smartphones Near eld communicaon (NFC) • Two-way wireless communicaon • Builds on RFID, which was one-way • Payment systems Special offer for students: Only • Google wallet and$4.99/month. MasterCard partnership • Apple Pay
Master your semester with Scribd & The New York Times
IR (Infrared)
• Included on many smartphones, tablets, and smartwatches • Not really used much for le transfers an • Control your entertainment center • Almost exclusively IR • File transfers are possible • Other phones can be used to control your I USB (Universal Serial Bus)
• Physical connecvity to your mobile device • USB to your computer Read Free For 30this Days Sign up to vote title on your ph • USB, Lightning, or on proprietary Not useful Useful • Physical access is always a concern Cancel anytime. • May be easier to gain access than over a remote connecon
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
2.5 - Mobile Device Connecon Methods (connued) Content management
Sheet Music
Search document
• Mobile Content Management (MCM) • Secure access to data • Protect data from outsiders • File sharing and viewing • On-site content (Microso Sharepoint, le servers) • Cloud-based storage (Box, Oce 365) • Data sent from the mobile device • DLP (Data Loss Prevenon) prevents copy/paste of sensive data • Ensure data is encrypted on the mobile device • Managed from the mobile device manager (MDM) Remote wipe
• Remove all data from your mobile device • Even if you have no idea where it is • Oen managed from the MDM • Connect and wipe from the web • Nuke it from anywhere • Need to plan for this • Congure your mobile device now • Always have a backup • Your data can be removed at any me • As you are walking out the door Geolocaon • Precise tracking details • Tracks within feet • Can be used for good (or bad) • Find your phone • Find you • Most phones provide an opon to disable • Limits funconality of the phones • May be managed by the MDM
Master your semester with Scribd Geofencing & The New York Times • Some MDMs allow for geofencing • Restrict or allow features when the device Special offer for students: Only $4.99/month. is in a parcular area
Push nocaon services • Informaon appears on the mobile devic • The nocaon is “pushed” to your de • No user intervenon • Receive nocaons from one app when using a completely dierent app • Control of displayed nocaons can be managed from the MDM • Or nocaons can be pushed from th
Nocaon Opons
Passwords and PINs
• The universal help desk call • I need to reset my password • Mobile devices use mulple authencao • Password/passphrase, PINs, paerns • Recovery process can be iniated from the • Password reset opon is provided on the mobile device • MDM also has full control • Completely remove all security controls • Not the default or best pracce Biometrics
• You are the authencaon factor • Fingerprint, face • MayRead not be the most Free For 30secure Days Sign up to vote on this titleauthencao • Useful in some environments Useful Not useful • Completely forbidden Cancel anytime. in others • Availability is managed through the MDM • Organizaon determines the security of
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.5 - Mobile Device Connecon Methods (connued) Containerizaon • Dicult to separate personal from business • Especially when the device is BYOD • Owned by the employee • Separate enterprise mobile apps and data • Create a virtual “container” for company data • A contained area - limit data sharing • Storage segmentaon keeps data separate • Easy to manage ooarding • Only the company informaon is deleted • Personal data is retained • Keep your pictures, video, music, email, etc.
Full device encrypon • Scramble all of the data on the mobile • Even if you lose it, the t he contents are s • Devices handle this in dierent ways • Strongest/stronger/strong Strongest/stronger/strong ? • Encrypon isn’t trivial • Uses a lot of CPU cycles • Complex integraon between hardware and soware • Don’t lose or forget your password! • There’s no recovery
2.5 - Mobile Device Enforcement Third-party app stores
• Centralized app clearinghouses • Apple App Store • Google Play • Microso Store • Not all applicaons are secure • Vulnerabilies, data leakage • Not all applicaons are appropriate for business use • Games, instant messaging, etc. • MDM can allow or deny app store use Roong/jailbreaking • Mobile devices are purpose-built systems • You don’t need access to the operang system system • Gaining access • Android - Roong • Apple iOS - Jailbreaking • Install custom rmware • Replaces the exisng operang system • Uncontrolled access • Circumvent security features, sideload apps without using an app store Special offer for students: Only $4.99/month. • The MDM becomes relavely useless
Master your semester with Scribd & The New York Times Carrier unlocking
• Updates are provided over the air (OTA) • No cable required • Security patches or enre operang system • Signicant changes without connecng th • This may not be a good thing • The MDM can manage what OTA updates Camera use
• Cameras are controversi controversial al • They’re not always a good thing • Corporate espionage, inappropriate use • Almost impossible to control on the device • No good way to ensure the camera won’t • Camera use can be controlled by the MDM • Always disabled • Enabled except for certain locaons (geoSMS/MMS • Short Message Service / Mulmedia Messa • Text messages, video, audio • Control ofup data can a Days concern Read Free Forbe 30this Sign to vote on title • Outbound data leaks, nancial disclosure Useful Not useful • Inbound nocaons, Cancel anytime. phishing aempts • MDM can enable or disable SMS/MMS • Or only allow during certain meframes o
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.5 - Mobile Device Enforcement (connued) USB OTG • USB On-The-Go • Connect mobile devices directly together • No computer required, only a cable • The mobile device can be both a host and and a device • Read from an external device, then act as a storage device itself • No need for a third-party storage device • A USB 2.0 standard • Commonly seen on Android devices • Extremely convenient • From a security perspecve, it’s too convenient Recording microphone
• Audio recordings • There are microphones on every mobile device • Useful for meengs and note taking • A standard for college classes • A legal liability • Every state has dierent laws • Every situaon is dierent • Disable or geo-fence • Manage from the MDM Geotagging/GPS tagging • Your phone knows where you are • Locaon Services, GPS • Adds your locaon to document metadata • Longitude, latude • Photos, videos, etc. • Every document may contain geotagged informaon • You can track a user quite easily • This may cause security concerns • Take Take picture, upload to social media
Master your semester with Scribd 2.5 New - Mobile Device Deployment Models & The York Times SpecialBYOD offer for students: Only $4.99/month. • Bring Your Own Device / Bring Your Own Technology
WiFi Direct/ad hoc • We’re so used to access points • SSID conguraons • The wireless standard includes an ad hoc mod • Connect wireless devices directly • Without an access point • WiFi Direct simplies the process • Easily connect many devices together • Common to see in home devices • Simplicity can aid vulnerabilies • Invisible access to important devices Hotspot/tethering • Turn your phone into a WiFi hotspot • Your own personal wireless router • Extend the cellular data network to all of you • Dependent on phone type and provider • May require addional charges and data cos • May provide inadvertent access to an internal • Ensure proper security / passcode Payment methods
• Send small amounts of data wirelessly over a l • Built into your phone • Payment systems, transportaon, in-person informaon exchange • A few dierent standards • Apple Pay, Android Pay, Samsung Pay • Bypassing primary authencaon would allow • Use proper security • Or disable completely
Read Free Foron 30this Days Sign up to vote title
Useful Not useful Cancel anytime. Corporate-owned • The company owns the device
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.6 - Secure Protocols Voice and video • SRTP • Secure Real-Time Transport Protocol Protocol / Secure Se cure RTP • Adds security features to RTP • Keep conversa conversaons ons private • Encrypon • Uses AES to encrypt the voice/video ow • Authencaon, integrity, and replay protecon • HMAC-SHA1 - Hash-based message authencaon code using SHA1 Time synchroniza synchronizaon on • Classic NTP has no security features • Exploited as ampliers in DDoS aacks • NTP has been around prior to 1985 • NTPsec • Secure network me protocol • Began development in June of 2015 • Cleaned up the code base • Fixed a number of vulnerabilies
LDAP (Lightweight Directory Access Protocol)
Email
Remote access
• S/MIME • Secure/Mulpurpose Internet Mail Extensions • Public key encrypon and digital signing of mail content • Requires a PKI or similar organizaon of keys • Secure POP and Secure IMAP • Use a STARTTLS extension to encrypt POP3 with SSL or use IMAP with SSL • SSL/TLS • If the mail is browser based, always encrypt with SSL Web • SSL/TLS • Secure Sockets Layer • Transport Transpo rt Layer Special offer for students: OnlySecurity $4.99/month. • HTTPS
Master your semester with Scribd & The New York Times
• Protocol for reading and wring directories over an IP network • An organized set of records, like a phone dire • X.500 specicaon was wrien by the Internaonal Telecommunicaons Telecommunicaons Union (ITU) • They know directories! • DAP ran on the OSI protocol stack • LDAP is lightweight, and uses TCP TCP/IP /IP • LDAP is the protocol used to query and update an X.500 directory • Used in Windows Acve Directory, Apple OpenDirectory, OpenLDAP, etc. Directory services
• LDAPS (LDAP Secure) • A non-standard implementaon of LDAP ove • SASL (Simple Authencaon and Security Se curity Laye • Provides authencaon using many dierent i.e., Kerberos or client cercate
• SSH (Secure Shell) • Encrypted terminal communicaon • Replaces Telnet Domain name resoluon • DNS had no security in the original design • Relavely easy to poison a DNS • DNSSEC • Domain Name System Security Extensions • Validate DNS responses • Origin authencaon, data integrity • Public key cryptography • DNS records are signed with a trusted third p Read Free For 30 Days Sign up to vote on this title • Signed DNS records are published in DNS Useful Not useful switching Roung and Cancel anytime. • SSH - Secure Shell - Encrypted Encr ypted terminal commu • SNMPv3 - Simple Network
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
2.6 - Secure Protocols (connued) Network address allocaon • DHCP client DoS - Starvaon aack • Use spoofed MAC addresses to exhaust the DHCP pool • Switches can be congured to limit the number of MAC addresses per interface • Disable an interface when mulple MAC addresses are seen
Subscripon services • Automated subscripons • An-virus / An-malware signature updat • IPS updates • Malicious IP address databases / Firewall • Constant updates • Each subscripon uses a dierent update • Check for encrypon and integrity checks • May require an addional public key con • Set up a trust relaonship - Cercates, IP
3.1 - Compliance and Frameworks Compliance
Frameworks
• Compliance • Meeng the standards of laws, policies, and regulaons • A healthy catalog of rules • Across many aspects of business and life • Many are industry-specic or situaonal • Penales • Fines • Incarceraon • Loss of employment • Scope • Domesc and internaonal requirements
• Structure and organizaon • What works best for IT? • Process management • Geng the IT “product” to work best wi organizaon • Best pracces • Guidelines and examples for IT managem • Cost eecve, agile • Lots of training • For everyone Industry-specic frameworks • COBIT • Control Objecves for Informaon and Related Technologies • Created by ISACA, formerly the Informaon Systems Audit and Control A • Focus on regulatory compliance, risk man and aligning IT strategy with organizaon • ITIL • Formerly the Informaon Technology Read Free Foron 30this Days Sign up to vote title Infrastructure Library Useful Not useful • Mulple stages of the IT I T lifecycle Cancel anytime. • Service Design, Service Transion, Service Operaon, Service Ser vice Strategy
Regulatory
• Sarbanes-Oxley Act (SOX) • The Public Company Accounng Reform and Investor Protecon Act of 2002 • The Health Insurance Portability and Accountability Act (HIP (HIPAA) AA) • Extensive healthcare standards for storage, use, and transmission of health care informaon • The Gramm-Leach-Bliley Act of 1999 (GLBA) • Disclosure of privacy informaon Special offer for nancial students: instuons Only $4.99/month. from HIPPA Non-compliance penales
Master your semester with Scribd & The New York Times
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.1 - Secure Conguraon Guides Secure conguraons • No system is secure with the default conguraons conguraons • You You need some guidelines to keep everything safe • Hardening guides are specic to the soware or plaorm • Get feedback from the manufacturer or Internet interest group • They’ll have the best details • Other general-purpose guides are available online Web server hardening • Access a server with your browser • The fundamental server on the Internet • Microso Internet Informaon Server, Server, Apache HTTP Server Ser ver,, et al. • Huge potenal for access issues • Data leaks, server access • Secure conguraon • Informaon leakage: Banner informaon, directory browsing • Permissions: Run from a non-privileged account, congure le permissions • Congure SSL: Manage and install cercates • Log les: Monitor access and error logs Operang system hardening • Many and varied • Windows, Linux, iOS, Android, et al. • Updates • Operang system updates/service packs, security patches
• User accounts • Minimum password lengths and com • Account limitaons • Network access and security • Limit network access • Monitor and secure • An-virus, an-malware Applicaon server • Programming languages, runme libra • Usually between the web server and • Middleware • Very specic funconality • Disable all unnecessary services • Operang system updates • Security patches • File permissions and access controls • Limit rights to what’s what ’s required • Limit access from other devices Network infrastructure devices
• Switches, routers, rewalls, IPS, etc. • You You never see them, but they’re they ’re alwa • Purpose-built devices • Embedded OS, limited OS access • Check with the manufacturer • Security updates • Not usually updated frequently • Updates are usually important
3.1 - Defense-in-Depth Layering the defense
• Physical controls • Keep people away from the technology • Door locks, fences, rack locks, cameras • Technical controls • Hardware and soware to keep things secure Special offer for students: Only $4.99/month. • Firewalls, acve directory authencaon, disk encrypon
Master your semester with Scribd & The New York Times
Defense in depth
• Firewall • DMZ Read Free For 30this Days Sign to vote on title • up Hashing passwords Useful Not useful • Authencaon Cancel anytime.
• Intrusion detecon system • VPN access
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
3.2 - Secure Network Topologies Topologies (connued) ( connued) DMZ
Sheet Music
Search document
DMZ
• Demilitarized zone • An addional layer of security between the Internet and you • Public access to public resources
DMZ Switch
Internal Network
Internet Internal Network Switch Firewall
Extranet
Internal Network
• A private network for partners • Vendors, suppliers • Usually requires addional authencaon • Only allow access to authorized users
Internal Network Switch
Internet
Extranet Firewall Extranet Switch
Intranet
Router
• Private network • Only available internally • Company announcements, important documents, other company business • Employees only • No external access • Internal or VPN access only
Intranet Switch
Switch
Remote Site 2
Master your semester with Scribd Guest network • An oponal & The Newnetwork York Times • Convenient for meengs, demonstraons demonstraons,, etc. Special offer for students: Only $4.99/month. • No access to the internal network
HQ Network
Switch
Remote Site 1
Read Free ForTranslaon 30this Days Sign up to vote on title NAT - Network Address • It is esmated that there are over 20 billion de Not useful Useful Cancel anytime. connected to the Internet (and growing) • IPv4 supports around 4.29 billion addresses
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.2 - Network Segmentaon Segmenng the network • Physical, logical, or virtual segmentaon • Devices, VLANs, virtual networks • Performance - High-bandwidth applicaons • Security • Users should not talk directly to database servers • The only applicaons in the core are SQL and SSH • Compliance • Mandated segmentaon (PCI compliance) • Makes change control much easier Physical segmentaon • Devices are physicall physicallyy separate • Switch A and Switch B • Must be connected to provide communicaon • Direct connect, or another switch or router • Web servers in one rack • Database servers on another • Customer A on one switch, customer B on another • No opportunity for mixing data • Separate devices • Mulple units, separate infrastructur infrastructure e
Virtualizaon • Get rid of physical devices • All devices become virtualized • Servers, switches, routers, rewalls, load • All virtual devices • Instant and complete control • Build a new network • Route between IP subnets • Drop a rewall between • Drag and drop devices between networ Air gaps
• One step farther than physical segmenta • Physical segmentaon usually has some • Remove any connecvity between compo • No possible way for one device to communicate to another • No shared components • Network separaon • Secure networks • Industrial systems (SCADA, manufacturi • Some technologies can jump the gap • Removable media
Physical segmentaon • Separate Device • Mulple units, separate infrastructure
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.2 - VPN Technologies Technologies Site-to-Site VPNs • Encrypt trac between sites • Through the public Internet • Use exisng Internet connecon • No addional circuits or costs Host-to-Site VPNs • Also called “remote access VPN” • Requires soware on the user device • May be built-in to exisng operang system
Internet Corporate Network
Remo VPN Appliance
Corporate Network
Host-to-Host VPNs • User to user encrypon • Soware-based • No hardware needed
VPN Appliance
Internet VPN Concentrator
Internet
3.2 - Security Technology Technology Placement Sensors and collectors
• Gather informaon from network devices • Built-in sensors, separate devices • Integrated into switches, routers, servers, rewalls, etc. • Sensors • Intrusion prevenon systems, rewall logs, authencaon logs, web server access logs, Special offer for students: Only $4.99/month. database transacon logs, email logs
Master your semester with Scribd & The New York Times
Proxy servers
• An intermediate server • Client makes the request to the proxy • The proxy performs the actual request • The Read proxy provides results back to the clie Free Foron 30this Days Sign up to vote title • Useful Useful Not useful features Cancel anytime. • Access control, caching, • URL ltering, content scanning
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.2 - Security Technology Technology Placement (connued) SSL accelerator acceleratorss
Sheet Music
• The SSL handshake requires some cryptographic overhead • A lot of CPU cycles • Ooad the SSL process to a hardware accelerator acc elerator • Oen integrated into a load balancer
HTTPS
HTTP
Client / Browser
DDoS migaon • Resist a distributed denial of service aack • Minimize the impact • Cloud-based • Internet provider or reverse proxy service • On-site tools • DDoS ltering in a rewall or IPS • Posioned between you and the Internet I nternet • Literally you against the world
SSL Accelerator
Aggregaon switches
Taps and port mirrors
• Intercept network trac • Send a copy to a packet capture device • Physical taps • Disconnect the link, put a tap in the middle • Can be an acve or passive tap • Port mirror • Port redirecon, SPAN (Switched Port ANalyzer) • Soware-based tap • Limited funconality, funconality, but can work well in a pinch
3.2 - Securing SDN
Master your semester with Scribd SDN (Soware Dened Networking) • Networking devices have two funconal planes of operaon & The New York Times • Control plane, data plane Special offer for students: Only $4.99/month. • Directly programmable
• Conguraon is dierent than forwarding
Centrally managed Read Free Foron 30this Days Sign•up to vote title
• Global view, view, single paneof gla Useful Not useful Cancel anytime. • Programmacally congured • Orchestraon • No human intervenon
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.3 - Hardware Security (connued) Hardware Security Module (HSM)
Secure Boot
• High-end cryptographic hardware • Plug-in card or separate hardware device • Key backup • Secured storage • Cryptographic accelerators • Ooad that CPU overhead from other devices • Used in large environmen e nvironments ts • Clusters, redundant power
• Malicious soware can “own” your system • Malicious drivers or OS soware • Secure boot - Part of the UEFI specicaon • Digitally sign known-good soware • Cryptographically secure • Soware won’t run without the t he proper sig • Support in many dierent operang system • Windows, Linux Fedora, openSUSE, Ubunt • Apple uses their own EFI implementaon Remote aestaon • Nothing on this computer has changed • There have been no malware infecons • How do you know? • Easy when it’s just your computer • More dicult when there are 1,000 • Remote aestaon • Device provides an operaonal report to a vericaon server • Encrypted and digitally signed with the TP • Changes are idened and managed
Hardware root of trust
• Security is based on trust • Is your data safely encrypted? • Is this web site legimate? • The trust has to start somewhere • TPM, HSM • Designed to be the hardware root of the trust • Dicult to change or avoid • It’s It ’s hardware hardware • Won’t work without the hardware UEFI BIOS • Unied Extensible Firmware Interface • Based on Intel’s EFI (Extensible Firmware Interface) • A dened standard • Implemented by the manufacturers • Designed to replace the legacy BIOS • Need a modern BIOS for modern computers computers
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Supply chain
• September 2015: Hundreds of Cisco routers infected with “SYNful Knock” • Firmware modied for back-door access • Can you trust your new server/router/switc • Supply chain cyber security • Use trusted vendors • Crical devices should not be connected to • Verify your hardware is genuine EMI/EMP • Electromagnec interference /Electromagne Read Free Foron 30this Days Sign up to vote title • EMI leakage Useful Not useful • DetermineCancel dataanytime. streams based on EMI em • Keyboards, hard drives, network conneco • Modify the security by injecng EMI
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
3.3 - Operang System Security (connued) Patch management
Sheet Music
Search document
• Incredibly important • System stability, security xes • Service packs • All at once • Monthly updates - Incremental (and important) • Emergency out-of out-of-band -band updates • Zero-day and important security discoveries Update opons • Windows update • Bring Windows up-to-date on each workstaon • Windows Server Update Services (WSUS) • Centralized management for Windows devices • Mac OS • Soware Update • Available on the Apple menu • Linux - Many dierent opons • yum, atp-get, rpm, graphical front-ends The patching process
• Not always seamless • May take some planning • May introduce other problems • The x can cause another problem • Pick and choose • You don’t have to install every single patch • Oen centrally managed • The update server determine when you patch • Test all of your apps, then deploy • Eciently manage bandwidth Disabling unnecessary services • “Unnecessary” isn’t always obvious • Windows XP included almost 90 services by default, Windows 7 has over 130 • Every service has the potenal for trouble Special offer for students: Only $4.99/month. • The worst vulnerabilies are 0-day • This may require a lot of research
Master your semester with Scribd & The New York Times
Secure conguraons • Fine tuning of the operang system • Make your least funconality very secur • These will apply regardless of the system u • The operang system is common to all • Example secure conguraon policies • Stay updated with the latest patches • Compromised systems are re-imaged (no • Changes to the standard build must go through change management • Perform regular integrity checks of operang system les Evaluaon Assurance Level • Common Criteria for Informaon Technology Security Evaluaon • Also called Common Criteria (or CC) • An internaonal computer security cercaon standard (ISO/IEC 15408) • A common reference for US Federal Gov • Evaluaon Assurance Level (EAL) • EAL1 through EAL7 • Trusted operang system • The operang system is EAL compliant • EAL4 is the most accepted minimum lev Applicaon whitelisng/blacklisng • Any applicaon can be dangerous • Vulnerabilies, trojan horses, malware • Security policy can control app execuon • Whitelisng and blacklisng • Whitelisng • Nothing runs unless it’s it ’s approved approved - Very • Blacklisng Read Free For 30this Days Sign up tothe vote on title • Nothing on “bad list” can be execute • An-virus, an-malware Not useful Useful Cancel anytime. Examples of applicaon management • Decisions are made in the operang syste
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.3 - Peripheral Security Wireless keyboards and mice • Many wireless keyboards and mice communicate in the clear • Use proprietary wireless communicaon protocols • Over 2.4 GHz frequencies • Easy to capture keystrokes with a receiver • Inject keystr keystrokes okes and mouse movements • Control the computer remotely • Vulnerability called “KeySnier” • Some keyboard manufacturers support AES encrypon Displays
• Electromagnec radiaon • View informaon on a screen by eavesdropping the EM signals • Internal signals of a laptop or external cable • Eavesdrop through the walls • Firmware hacks • Many displays have no security for rmware upgrades • Log informaon on the screen • Ransomware with an LCD display WiFi- enabled microSD • Combinaon SD ash storage device and 802.11 Wi-Fi le transfers • Transfer Transfer from a camera to a computer without removing the SD card • SD card authencaon vulnerabilies • Predictable access, easy to read les over Wi-Fi • API access to the SD card • Manufacturer must implement strong security • API access can result in data leakage or data loss
Printers/mul-funcon devices Printers/mul-funcon • Mul-funcon devices • Printer, scanner, fax • Network connecvity • Local storage • Reconnaissance • Log les for all acvity, acvity, addres • Unauthorized access • Print without authencaon • Capture spool les External storage devices
• Storage outside the computer and oen removable • Very portable, easy to move la • No authencaon • Anyone can connect and read • Always use le/volume encryp • Oen used for exltraon of dat • Manage the use of removal sto Digital cameras
• Capture sll images and video • Save to digital storage • Device operates as external stor • Easy to move data around • Camera rmware can be compr • Security cameras are also vuln
3.4 - Secure Deployments Development to producon • Your programming programming team has been working on a new applicaon • How will you deploy it safely and reliably? • Patch Tuesday Special offer forand students: Only $4.99/month. • Test deploy Wednesday? Thursday? Friday? • Manage the process
Master your semester with Scribd & The New York Times
• Test Test - Sll in the t he development stage • All of the pieces are put together • Does it all work? Read Free Foron 30this Days Sign up to vote title tesn • Funconal tests, quality assurance (QA) Useful Not useful • If it works in test, then it ’s ready for staging Cancel anytime. • Staging - Almost ready to roll it out • Works and feels exactly like the producon en
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.5 - Embedded Systems SCADA/ICS • Supervisory Control and Data Acquision System • Large-scale, mul-site Industrial Control Systems (ICS) • PC manages equipment • Power generaon, rening, manufacturing equipment • Distributed control systems • Real-me informaon • System control • Requires extensive segmentaon • No access from the outside Smart devices/IoT (Internet of Things) • Wearable technology • Glasses, watches, health monitors • Early generaon products • Track our locaon • Where is that data and how is it stored? • Home automaon • Video doorbells • Internet-connected garage door openers • Heang and cooling • It knows when you are home (and when you aren’t) HVAC • Heang, Venlang, and Air Condioning • Thermodynamics, uid mechanics, and heat transfer • A complex science • Not something you can properly design yourself • Must be integrated into the re system • PC manages equipment • Makes cooling and heang decisions for workspaces and data centers • Tradionally Tradionally not built with security in mind • Dicult to recover from an infrastructure DoS
Master your semester with Scribd & The York SoCNew (System on a Chip)Times • Mulple components running on a single chip Special offer for students: Only $4.99/month. • Common with embedded systems
RTOS (Real-TIme Operang System) • An operang system with a determinisc processing schedule • No me to wait for other processes • Industrial equipment, automobiles, • Military environments • Extremely sensive to security issues • Non-trivial systems • Need to always be available • Dicult to know what type of security Printers, scanners, and fax machines
• All-in-one or mulfuncon devices (MF • Everything you need in one single dev • No longer a simple printer • Very sophiscated rmware • Some images are stored locally on the d • Can be retrieved externally • Logs are stored on the device • Contain communicaon and fax detai Camera systems
• Video monitoring for home or oce • 24 hour / 7 day video (and audio) • Video recorders are IP devices • Authencate using a specialized appli • Cameras are IP devices • 4K/high denion • Privacy concerns • Don’t need to ring a doorbell • We know when you are home • We might even see you Special purpose
• Medical devices Free Foron 30 Days Sign up to vote this title • Read Heart monitors, insulin pumps • Oen use older operang Useful useful systems Not Cancel anytime. • Vehicles • Internal network is oen accessible acc essible
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.6 - Development Life-Cycle Models (connued) • The waterfall • Requirements: Document the request • Analysis: Build models and business rules • Design: Pick a soware architecture • Coding: Development and integraon work • Tesng: Debug the applicaon • Operaons: Install and support the applicaon
Agile
• Ready, shoot, aim. Repeat. • It’s beer to get moving than to wait aroun • Everyone works together • Co-locaon and pair programming • Get some code out there • An app under construcon is beer than sl • Customer collaboraon - Constant communi • Quick response to change - Development is c
3.6 - Secure DevOps DevOps • Development and Operaons • Bring together the two sides of the house • Create and deploy • Speed, availabi availability lity,, and security • Emphasis on automaon and monitoring • Integraon, tesng, release, and manage • Shrink deployment cycles • And increase the frequency of deployments • How do you do this safely? Security automaon • Automaon is relavely inexpensive • It’s automated, so run them early and oen • Funconal security tests • Login, logout, ensure a secure plaorm • Test against known vulnerabilies • Misconguraons, weak SSL ciphers, etc. • Penetraon tesng • Test Test the OS and applicaon services • Test the applicaon • Manipulate the applicaon to get unexpected results Connuous integraon • Code is constantly wrien • And merged into the central c entral repository many mes a day So many chancesOnly for security problems Special• offer for students: $4.99/month. • Security should be a concern from the beginning
Master your semester with Scribd & The New York Times
Immutable systems • Update an applicaon every week for a ye • It’s nothing like the original deployment • You couldn’t rebuild it if you had to • Conguraon dri • Immutable systems • Locked down and unable to change c hange • To update an applicaon, a new iteraon is deployed • The enre iteraon is up to date and tes • Must stronger security posture • Test and validate without worrying about a change Infrastructure Infrastructu re as code (IAC)
• Cloud compung • Relies on automaon • If you can automate it, you can quickly and deploy it • Except for the server hardware, switche rewalls, etc. • Tu Turn rn the infrastructure devices into into code • Virtualize everything • Focus what the applicaon Read Free For 30 Days Signon up to vote on this title needs, rat on a than building the applicaon based Useful Not useful infrastructure Cancel anytime. • A clearly dened infrastructure • Security is a known quanty
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.6 - Version Control and Change Management (connued) Change management
Change management and security
• Change control • A formal process for managing change • Avoid downme, confusion, and mistakes • Nothing changes without the process • Plan for a change • Esmate the risk associated with the change • Have a recovery plan if the change doesn’t work • Make the change
• Every change has a security component • Each change must be evaluated separat • Install security patches • Ideally makes the systems more secure • Applicaon update • New version, new code, new security co • Change to the applicaon instance • New servers, updated middleware, etc. • Everything must be evaluated together
3.6 - Provisioning and Deprovisioning Provisioning
• Deploy an applicaon • Web server, database server, middleware server, user workstaon conguraons, conguraons, cercate updates, etc. • Applicaon soware security • Operang system, applicaon • Network security • Secure VLAN, internal access, external access • Soware deployed to workstaons • Check executables for malicious code, verify security sec urity posture of the workstaon Orchestraon • Automaon is the key to cloud c loud compung • Services appear and disappear automacally, automacally, or at the push of a buon • Enre applicaon instances can be instantly provisioned • All servers, networks, switches, rewalls, and policies
• Instances can move around the world as • Follow the sun • The security policies should be part of th orchestraon • As applicaons are provisioned, the pro is automacally included Deprovisioning
• Dismantling and removing an applicaon • All good things • Security deprovisioning is important • Don’t leave open holes, don’t close imp • Firewall policies must be reverted • If the applicaon is gone, so is the acce • What happens to the data? • Don’t leave informaon out there
3.6 - Secure Coding Techniques Techniques Secure coding concepts Master your semester with Scribd • A balance between me and quality • Programming with security in mind is oen secondary & The Newtesng, York Times • Tesng, tesng
Special offer for students: Only $4.99/month. • The Quality Assurance (QA) process
• Vulnerabilies will eventually be found
Input validaon • What is the expected input? Read Free Foron 30this Days Sign up to vote title • Validate actual vs. expected Useful Not useful • Document all input Cancel anytime.methods - Forms, e • Check and correct all input (normalizao • A zip code should be only X characters
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
3.6 - Secure Coding Techniques Techniques (connued) Code signing
Sheet Music
Search document
• An applicaon is deployed • Users run applicaon executable or scripts • So many security quesons • Has the applicaon been modied in any way? • Can you conrm that the applicaon was wrien by a specic developer? • The applicaon code can be digitally signed by the developer • Asymmetric encrypon • A trusted CA signs the developer’s public key • Developer signs the code with their private key • For internal apps, use your own CA Encrypon • If you can see the source code, you can easily look for security holes • Source code is closely guarded • Development plaorms should use encrypon • If you’re sending data over the network, it should be encrypted • Easy to grab data from the air • Encrypt important data • Some operang systems do this anyway Obfuscaon /camouage • Obfuscate • Make something normally understandable very dicult to understand • Take Take perfectly readable code and turn it into nonsense • The developer keeps the readable code and gives you the chicken c hicken scratch • Both sets of code perform exactly the same way • Helps prevent the search for security holes • Makes it more dicult to gure out Special offer for students: Only $4.99/month. what’s happening • But not impossible
Master your semester with Scribd & The New York Times
Validaon points • Server-side validaon • All checks occur on the server • Helps protect against malicious user • Bad guys may not even be using your interface • Client-side validaon • The end-user’s app makes the validaon decisions • Can lter legimate input from genu • May provide addional speed to the • Use both • But especially server-side validaon Memory management
• As a developer, you must be mindful of how memory is used • Many opportunies to build vulnera • Never trust data input • Malicious users can aempt to circumvent your code • Buer overows are a huge security r • Make sure your data matches your b • Some built-in funcons are insecure • Use best pracces when designing y Third-party libraries and SDK’s • Your programming programming language does eve • Almost • Third-party libraries and soware development kits • Extend the funconality of a programming language • Security risk Read Free Forcode 30this Days Sign up to vote on title by someon • Applicaon wrien • Might secure. Might not be secu Usefulbe Not useful Cancel anytime. • Extensive tesng is required • Balancing act
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.6 - Code Quality and Tesng Tesng Stac code analyzers • Stac Applicaon Security Tesng (SAST) • Help to idenfy security aws • Many security vulnerabilies found easily • Buer overows, database injecons, etc. • Not everything can be idened through analysis • Authencaon security security,, insecure cryptography, cryptography, etc. • Don’t rely on automaon for everything • Sll have to verify each nding • False posives are an issue Dynamic analysis (fuzzing) • Send random input to an applicaon • Fault-injecng, robustness tesng, syntax tesng, negave tesng • Looking for something out of the ordinary • Applicaon crash, server error error,, excepon • 1988 class project at the University of Wisconsin • “Operang System Ulity Program Reliability” • Professor Barton Miller • The Fuzz Generator Fuzzing engines and frameworks • Many dierent fuzzing opons • Plaorm specic, language specic, etc. • Very me and processor resource heavy • Many, many dierent iteraons to try • Many fuzzing engines use high-probability tests • Carnegie Mellon Computer Emergency Response Team (CERT) • CERT Basic Fuzzing Framework (BFF) • hp://professormesser.link/b Stress tesng • The soware works with one user • What about 1,000 users? • Inadvertent results can occur at load • Unintended messages Special offer for students: error Only $4.99/month. • Applicaon details and versions
Master your semester with Scribd & The New York Times
Sandboxing • A bit dierent than the t he developer sandb • A dierent sandbox at a dierent play • Test environment looks and works exact producon • No producon systems are used • No producon data is used • QA can fuzz, overload, and try to break the sandboxed environment • You can’t hurt anything in the sandbox Model vericaon • Vericaon and Validaon (V&V) • You started development with a set of requirements • Vericaon • Does the soware work properly? • Are there any bugs to address? • Are we building the product right? • Validaon • Did you meet the high level requireme • Are we building the right product? Compiled vs. runme code • Compiled code • You You don’t see the source code • The applicaon is an executable compiled from the source • The compiled code is specic to an operang system and CPU • Logical bugs can be idened at comp • Runme code • Source code is usually viewable • The code instrucons execute when the is run Read Free Foron 30this Days Sign up to applicaon vote title • No opportunity to nd compile-me Useful Not useful Cancel so errors areanytime. detected during or aer
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.7 - Cloud and Virtualizaon Overview Virtualizaon • One computer, many operang systems • Mac OS X, Windows 7, Linux Ubuntu, all at the same me! • Separate OS, independent CPU, memory, network, etc. • But really one computer • Host-based virtualizaon • Your normal desktop plus others • Standalone server that hosts virtual machines • Enterprise-level • Been around since 1967 - IBM mainframe virtualizaon
The hypervisor
• Virtual Machine Manager • Manages the virtual plaorm and guest operang systems • May require a CPU that supports virtualiza • Can improve performance • Hardware management • CPU • Networking • Security Hypervisors
• Type I • Bare metal, Embedded, Nave • Run directly with hardware, no addional • Type II • Run on a host OS • On top of Windows, Linux, Mac OS X, etc. • Applicaon containeriza containerizaon on • Run an applicaon without launching an • Uses just the right resources for the applic • Everything you need to run the app is in the image (container/cell)
3.7 - Virtualizaon Security VM sprawl avoidance • Click a buon • You’ve built a server • Or mulple servers, networks, and rewalls • It becomes almost too easy to build instances • This can get out of hand very quickly • The virtual machines are sprawled everywhere • You aren’t sure which VMs are related to which applicaons Special offer for students: Only $4.99/month. • It becomes extremely dicult to deprovision • Formal process and detailed documentaon
Master your semester with Scribd & The New York Times
• Virtual machine escape • Break out of the VM and interact with the host operang system or hardware • Once you escape the VM, you have great c • Control the host and control other guest • This would be a huge exploit • Full control of the virtual world Escaping the VM • March 2017 - Pwn2Own hacking contest Read Free Foron 30this Days Sign up to vote title some • You You pwn it, you own it - along with Not useful Useful Cancel anytime. • JavaScript engine bug in Microso Edge • Code execuon in the Edge sandbox
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.7 - Security in the Cloud VDI (Virtual Desktop Des ktop Infrastructure) Infrastructure) • Virtualize the user’s desktop and run it in the data center • Somemes called VDE (Virtual Desktop Environment) • All of the compung power is in the data center • The end-user hardware is a “virtual desktop” • Relavely small compung requirements on the client workstaon • The end-user operang system becomes less important • Enhanced security • Centralized and easier to manage • Changes can be ghtly ghtly controlled • The data never leaves the data center Cloud access security broker (CASB) • Clients are at work, data is in the cloud • How do you keep everything secure? sec ure? • The organizaon already has well-dened security policies • How do you make your security policies work in the cloud? • Integrate a CASB • Implemented as client soware, local security appliances, or cloud-based security soluons
• Visibility • Determine what apps are in use • Are they authorized to use the ap • Compliance • Are users complying with HIPAA? • Threat prevenon • Allow access by authorized users, prevent aacks • Data security • Ensure that all data transfers are e • Protect the transfer of PII with DL Security as Service (SECaaS)
• Instead of managing your own secu move it to the cloud • Pay for what you use • Scale up and down as needed • Connuously monitoring • Uniformly applies to all trac • An-virus/an-malware signatures are constantly updated • Block emerging threats without deploying updates
3.8 - Resiliency and Automaon Automaon and scripng • Plan for change - Implement automacally • Automated courses of acon • Many problems can be predicted • Have a set of automated responses • Connuous monitoring • Check for a parcular event, and then react • Conguraon validaon • Cloud-based technologies allow for constant change • Automacally validate a conguraon before going live • Perform ongoing Special offer for students: Only automated $4.99/month.checks
Master your semester with Scribd & The New York Times Templates
• You’ll You’ll sll need to make changes when de • IP addresses, rewall rules, licensing up • You’ll have to keep the master image upd • Security patches, operang system upda • This can be administravely challenging Non-persistence
• The cloud is always in moon • App instances are constantly built and to Read Free Foron 30 Days Sign up to vote this title congura • Snapshots capture the current congura • Preserve the complete state of a device Useful Not useful Cancel anytime. or just the conguraon • Revert to known state
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
0
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
Search document
3.8 - Redundancy, Fault Tolerance, and High Availability Distribuve allocaon • The bad guys are looking for your data • Most people keep it in the data center • Web servers, database servers, ser vers, middleware, security devices, monitoring systems • Many devices are required to maintain an applicaon instance • Don’t keep everything in one place • Crical assets, data, and other system should be in dierent places • Makes it more dicult to target and exploit an applicaon instance • A distribuve allocaon Redundancy and fault tolerance
• Maintain upme • The organizaon connues to funcon • No hardware failure - Servers keep running • No soware failure - Services always available available • No system failure - Network performing opmally
Redundancy and fault tolerance
• Redundant hardware components • Mulple devices, load balancing powe • RAID • Redundant Array of Independent Disks • Uninterrupble power supplies (UPS) • Prepare for the disconnecons • Clustering • A logical collecve of servers (downm • Load balancing • Shared load across components High availability • Redundancy doesn’t always mean alway • May need to be enabled manually • HA (high availabili availability) ty) • Always on, always available • May include many dierent components working together • Watch for single points of failure
RAID Level
Descrip/on
RAID 0
Stri St ripi ping ng wi with thou outt pa pari rity ty
High Hi gh pe perf rfor orma manc nce, e, no fau ault lt to tole lerran
Mirroring
Duplicates data for fault tolerance but requires twice the disk space
RAID 5
Striping with parity
Fault tolerant, only requires an addi=onal disk for redundancy
RAID 0+1, RAID 1+0, RAID 5+1, etc.
Mul=ple RAID types
RAID 1
Master with Scribd 3.9 - your Physicalsemester Security Controls Proper Lighng & The New York • More light means moreTimes security Special offer forguys students: $4.99/month. • Bad avoidOnly the light • Easier to see when lit
Details
Combine RAID methods to increase redu
Read Free Foron 30this Days Sign up to vote title
Fencing Useful Not useful • Build a perimeter
Cancel anytime.
• Usually very obvious • May not be what you’re looking for
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.9 - Physical Security Controls (connued) Guards and access lists
Air gap
• Security guard • Physical protecon • Validates idencaon of exisng employees • Provides guest access • ID badge • Picture, name, other details • Must be worn at all mes • Access list • Physical list of names • Enforced by security guard
• Physical separaon between networks • Secure network and insecure network • Separate customer infrastructures • Most environments are shared • Shared routers, switches, rewalls • Some of these are virtualized • Specialized networks require air gaps • Stock market networks • Power systems/SCADA • Airplanes • Nuclear power plant operaons
Alarms
• Circuit-based • Circuit is opened or closed • Door, window, fence • Useful on the perimeter • Moon detecon • Radio reecon or passive infrared • Useful in areas not oen in use • Duress • Triggered by a person • The big red buon
Mantraps
Safe
Faraday cage
• Secure your important hardware and media • Backups, laptops, hard drives • Protecon against the elements • Fire, water • Dicult to steal • Very heavy • Must be carefully managed • Don’t share the combinaon • What happens when you lose the combinaon? Locking cabinets • Data center hardware is oen managed byfor dierent groups Special offer students: Only $4.99/month. • Responsibility lies with the owner
Master your semester with Scribd & The New York Times
• All doors normally unlocked • Opening one door causes others to lock • All doors normally locked • Unlocking one door prevents others from being unlocked • One door open / other locked • When one is open, the other cannot be • One at a me, controlled groups • Managed control through an area
• Blocks electromagnec elds • Discovered by Michael Faraday in 1836 • A mesh of conducve material • The cage cancels the electromagnec on the interior • The window of a microwave oven • Not a comprehensive soluon • Not all signal types are blocked • Some signal types are not blocked at al Free Foron 30 Days Sign up toaccess vote title networks • CanRead restrict tothis mobile • Some very specic would Notconngencies useful Useful Cancel anytime. to be in place for emergency calls Door access controls
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.9 - Physical Security Controls (connued)
HVAC • Heang, Venlang, and Air Condionin • Thermodynamics, uid mechanics, and heat transfer • A complex science • Not something you can properly design • Must be integrated into the re system • Data center should be separate from the rest of the building • Not too cold, not too hot • Overheang is a huge issue • Closed-loop recirculang and posive pr • Recycle internal air, air, and air is pushed o
Biometrics Sheet Music
• Biometric authencaon • Fingerprint, iris, voiceprint • Usually stores a mathemacal representaon of your biometric • Your actual ngerprint isn’t usually saved • Dicult to change • You can change your password • You can’t change your ngerprint • Used in very specic situaons • Not foolproof Barricades/bollards • Prevent access • There are limits to the prevenon • Channel people through a specic access point • And keep out other things • Allow people, prevent cars and trucks • Idenfy safety concerns • And prevent injuries • Can be used to an extreme • Concrete barriers / bollards • Moats
Fire suppression
Token and cards
• Smart card • Integrates with devices • May require a PIN • USB token • Cercate is on the USB device • Hardware or soware tokens • Generates pseudo-random authencaon codes • Your phone • SMS a code to your phone
Master your semester with Scribd & The New York Times Hot and cold aisles Special offer for students: Only $4.99/month.
Hot Air
• Electronics require unique responses to • Water is generally a bad thing • Detecon • Smoke detector, ame detector, heat d • Suppress with water • Dry pipe, wet pipe, pre-acon • Suppress with chemicals • Halon - No longer manufactured • Dupont FM-200 / American Ame rican Pacic Hal Cable locks • Temporary security • Connect your hardware to something s • Cable works almost anywhere • Useful when mobile • Most devices have a standard connector • Reinforced notch • Not designed for long-term protecon • Those cables are prey thin Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
3.9 - Physical Security Controls (connued) Screen lters • Control your input • Be aware of your surroundings • Use privacy lters • It’s amazing how well they work • Keep your monitor out of sight • Away from windows and hallways • Don’t sit in front of me on your ight • I can’t help myself Video surveillance • CCTV (Closed circuit television) • Can replace physical guards • Camera properes are important • Focal length - Shorter is wider angle • Depth of eld - How much is in focus • Illuminaon requirements - See in the dark • Oen many dierent cameras cameras • Networked together and recorded over me
Logs
• Everything is logged • Entering the parking area • Idencaon upon entering the building • Badge assignment tracks door operaon • Correlate physical locaon with digital access • Someone logged into the console while in the • Need a formal process to collect collect and archive log • Some of the logs are physical, some are digital • May fall under privacy laws Key management
• Cryptographic key management • Policies for the creaon and protecon of imp • Some keys should be physically separated from t • Cercate Authority (CA) root key • If compromised, all keys must be replaced • One good reason for intermediate CAs • The root CA cercate will only be used to sign other intermediate CAs
4.1 - AAA and Authencaon AAA framework
• Idencaon • This is who you claim to be • Usually your username • Authencaon • Prove you are who you say you are • Password and other authencaon factors • Authorizaon • Based on your idencaon and authencaon, what access do you have? • Accounng • Resources used: Login me, data sent and received, logout me Mul-factor authencaon • More than oneOnly factor Special offer for students: $4.99/month. • Something you are
Master your semester with Scribd & The New York Times
Something you have
• Smart card • Integrates with devices • May require a PIN • USB token - Cercate is on the USB devic • Hardware or soware tokens • Generates pseudo-random authencao • Your phone • SMS a code to your phone Something you know
• Password • Secret word/phrase, string of characters Read Free Foron 30this Days Sign up to vote title • Very common authencaon factor Useful Not useful • PIN Cancel anytime. • Personal idencaon number • Not typically contained anywhere
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
4.1 - AAA and Authencaon (connued) Something you do
Sheet Music
Search document
• A personal way of doing things • You’re special • Handwring analysis • Signature comparison • Wring technique • Typing technique • Personal typing paern • Very similar to biometrics • Close to something you are Federaon • Provide network access to others • Not just employees • Partners, suppliers, customers, etc. • Third-pares can establish a federated network • Authencate and authorize between the two organiza organizaons ons • Login with your Facebook credenals • The third-pares must establish a trust relaonship • And the degree of the trust
Single sign-on (SSO) • Authencate one me • Gain access to everything! • Saves me • A seamless process • End-user doesn’t see any of the complexies under the surface • Many dierent methods • Kerberos authencaon and authorizaon • 3rd-party opons Transive trust • Trust relaonships relaonships need to be established e stablished early • Dicult to change once in place • One-way trust • Domain B trusts Domain A, Domain A doesn’t trust Domain B • Two-way trust • Both domains are peers, both trust each other equally • Non-transive trust • A trust is specically created and applies only to that domain • Transive trust • Domain A trusts Domain B, Domain B trusts D therefore Domain A trusts Domain C
4.2 - Identy and Access Services RADIUS (Remote Authencaon Dial-in User Service) • One of the more common AAA protocols • Supported on a wide variety of plaorms and devices • Not just for dial-in • Centralize authencaon for users • Routers, switches, rewalls Special offer for students: Only $4.99/month. • Server authencaon • Remote VPN access
Master your semester with Scribd & The New York Times
LDAP (Lightweight Directory Access Protocol)
• Protocol for reading and wring directories • An organized set of records, like a phone • X.500 Read specicaon was wrien Free For 30this Days Sign up to vote on title by the Intern Telecommunicaons Union (ITU) Not useful Useful Cancel anytime. • DAP ran on the OSI protocol stack • LDAP is lightweight, and uses TCP/IP (tcp/3 udp/389)
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
4.2 - Identy and Access Services (connued) Microso NTLM • Windows challenge/response • Domain name, username, password hash • LAN Manager (LANMAN) • Microso and 3Com network operang system • NT LAN Manager v2 (NTLM) challenge/response • Hash challenge, similar to CHAP • Somewhat insecure • MD4 password hash (same as NTLMv1) • HMAC-MD5 hash of username and server ser ver name • Variable-length Variable-length challenge of mestamp, random data, domain name Microso NTLM vulnerabilies v ulnerabilies • Some Windows password databases contain LM hash versions of the passwords • Compability with older systems • NTLM vulnerable to a credenals forwarding aack • Use credenals of one computer to gain access to another • Migrate to Kerberos • If you haven’t already
Kerberos • Network authencaon protocol • Authencate once, trusted by the system • No need to re-authencate to everything • Mutual authencaon - the client and the • Protect against man-in-the-middle or • Standard since the 1980s • Developed by the Massachuses Instute of Technology (M • RFC 4120 • Microso starng using Kerberos in Window • Based on Kerberos 5.0 open standard • Compable with other operang systems SSO with Kerberos • Authencate one me • Lots of backend ckeng • No constant username and password input • Save me • Only works with Kerberos • Not everything is Kerberos-friendly
4.2 - PAP, CHAP, and MS-CHAP PPP authencaon • Point-to-Point Protocol • Analog dialup, ISDN • And derivaves • PPTP (Point-to-Point Tunneling Protocol) • PPPoE (Point-to-Point (Point-to-Point Protocol over Ethernet) • Need to authencate through these non-Ethernet networks • PAP, CHAP, and MS-CHAP
PAP (Password Authencaon Protocol) • A basic authencaon method • Used in legacy operang systems • Rare to see singularly used • PAP is in the clear • Weak authencaon scheme • Non-encrypted password exchange • We didn’t require encrypon on analog
Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title PAPNew (Password Authencaon Protocol) - Authencaon process Useful Not useful & The York Times Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
Search document
4.2 - PAP, CHAP, and MS-CHAP (connued) CHAP
MS-CHAP
• Challenge-Handshake Authencaon Protocol • Encrypted challenge sent over the network • Three-way handshake • Aer link is established, server sends a challenge message • Client responds with a password hash calculated from the challenge and the password • Server compares received hash with stored hash • Challenge-Response connues • Occurs periodically during the connecon • User never knows it happens
• Microso’s implementaon of CHAP • Used commonly on Microso’s Microso ’s Point-to-Point Tunneling Tunneling Proto • MS-CHAP v2 is the more recent version • Security issues related to the use of DES • Relavely easy to brute force the 256 poss to decrypt the NTLM hash • Don’t use MS-CHAP! • Consider L2TP, L2TP, IPsec, or some other secure technology
1
Login request is sent to the server
2
Server looks up the credenRals and sends a challenge to the us
I’d like to login, username is james Here’s your challenge message: 15472a309fe22789efa522d45c7af9ad
password111 + 15472a309fe22789efa522d45c7af9ad
Challenge response: db3fc40e6439d4d972870252ccc11f99
3
Username: james Password: password111
Client
password11 15472a309fe22789efa5
Challenge response: db3fc40e6439d4d972870252ccc11f99
User combines the password and challenge to create a response
CHAP Server
4
Expected challeng db3fc40e6439d4d972
Server compares the user’s response with a locally created response
4.2 - Federa Federated ted Idenes Server-based authencaon • HTTP/web browser communicaon is stateless • Each request is unique and has no relaonship to the previous request • Tradionally, the server has kept track of logins • You You are assigned a session ID when you login • The server checks each me you send a request • Adds overhead to the server • Dicult to scale • Adds with redundancy Special offer for challenges students: Only $4.99/month. and cloud services
Master your semester with Scribd & The New York Times
• Third-pares can establish e stablish a federated netw • Authencate and authorize between the organizaons • Login with your Facebook credenals • The third-pares must establish a trust rela • And the degree of the trust Security Asseron Markup Language(SAML) Read Free For 30this Days Sign up tofor vote on title and autho • Open standard authencaon Not useful a third-party • You canUseful authencate through Cancel anytime. • One standard does it all, sort of • Shibboleth is open-source soware
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
4.3 - Access Control Models Access control
Sheet Music
Search document
• Authorizaon • The process of ensuring e nsuring only authorized rights are exercised • Policy enforcement • The process of determining rights r ights • Policy denion • Users receive rights based on Access Control models • Dierent business needs or mission requirements Mandatory Access Control (MAC)
• The operang system limits the operaon on an object • Based on security clearance levels • Every object gets a label • Condenal, secret, top secret, etc. • Labeling of objects uses predened rules • The administrator decides who gets access to what security level • Users cannot change these sengs Discreonary Access Control (DAC) • Used in most operang systems • A familiar access control model • You create a spreadsheet • As the owner, you control who has access • You You can modify access at any me • Very exible access control • And very weak security Role based access control (RBAC) • You have a role in your organizaon • Manager, director, director, team lead, project manager • Administrators provide provide access based on the role of the user • Rights are gained implicitly instead of explicitly • In Windows, use Groups to provide role-based access control • You Yfor oustudents: are in shipping and receiving, Special offer Only $4.99/month. so you can use the t he shipping soware
Master your semester with Scribd & The New York Times
Aribute-based access control (ABAC) • Users can have complex relaonships to applicaons and data • Access may be based on many dierent • ABAC can consider many parameters • A “next generaon” authorizaon mode • Aware of context • Combine and evaluate mulple paramete • Resource informaon, IP address, me desired acon, relaonship to the data, Rule-based access control • Generic term for following rules • Condions other than who you are • Access is determined through system-enf • System administrators, not users • The rule is associated with the object • System checks the ACLs for that object • Rule examples • Lab network access is only available bet • Only Chrome browsers may complete t File system security
• Store les and access them • Hard drive, SSDs, ash drives, DVDs • Part of most operang systems • Accessing informaon • Access control list • Group/user rights and permissions • Can be centrally ce ntrally administered administered and/or u can manage les they own • Encrypon can be built-in • The le system handles encrypon and Database security Read Free For 30this Days Sign up to vote on title • Databases have their own access control • Username, password, permissions Not useful Useful Cancel anytime. • Encrypon may be an opon • Most databases support data encrypo
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
4.3 - Access Control Technologies Technologies (connued) Biometric factors
Sheet Music
Search document
• Fingerprint scanner • Phones, laptops, door access • Renal scanner • Unique capillary structure in the back of the eye • Iris scanner • Texture, color • Voice recognion • Talk for access • Facial recognion • Shape of the face and features Biometric acceptance rates
• False acceptance rate (FAR) • Likelihood that an unauthorized user will be accepted • This would be bad • False rejecon rate (FRR) • Likelihood that an authorized user will be rejected • No, it’s really me • Let’s try again • Crossover error rate (CER) • The rate at which FAR and FRR are equal • Adjust sensivity to equalize both values • Used to quantavely compare biometric systems Token generators
• Pseudo-random token generators • A useful authencaon factor • Carry around a physical hardware token generator • Where are my keys again? • Use soware-based token generator on your phone • Powerful and convenient
Master your semester with Scribd & The New York Times TOTP - Time-based One-me Password Algorithm Special offer for students: Only $4.99/month. • Hardware and soware token generator
HOTP • One-me passwords • Use them once, and never again • Once a session, once each authencaon a • HMAC-based One-Time Password algorithm • Keyed-hash message authencaon code • The keys are based on a secret key and a co • Token-based authencaon • The hash is dierent every me • Hardware and soware tokens available • You’ll need addional technology to make TOTP • Time-based One-Time Password algorithm • Use a secret key and the me of day • No incremental counter • Secret key is congured ahead of me • Timestamps are synchronized via NTP • Timestamp usually increments every 30 seco • Put in your username, password, and TOT • One of the more common OTP methods • Used by Google, Facebook, Microso, etc. Cercate-based authencaon • Smart card • Private key is on the card • PIV (Personal Identy Vericaon) card • US Federal Government smart card • Picture and idencaon informaon • CAC (Common Access Card) • US Department of Defense smart card • Picture and idencaon • IEEE 802.1X • Gain access to the network using a cer Read Free For 30 Days Sign up to vote on this title • On device storage or separate physical dev Useful Not useful Cancel anytime. Proximity cards
• Close range card • Contactless smart card
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
4.4 - Account Types User accounts
Service accounts
• An account on a computer computer associated with a specic person • The computer associates the user with a specic idencaon number • Storage and les can be private private to that user • Even if another person is using the same computer • No privileged access to the operang system system • Speci Specically cally not allowed allowed on a user account • This is the account account type most people will will use • Your user community Shared and gene ric accounts • Shared accou account nt • Used by more more than one person person • Guest login, login, anonymous anonymous login • Very dicult dicult to create an audit trail • No way to know exactly exactly who was working • Dicult to determine the proper proper privileges • Password management becomes dicult • Password changes require nofying nofying everyone • Dicult to remember so many password password changes • Just write it down down on this yellow yellow scky paper • Best pracce: Don’t Don’t use these accounts accounts
• Used exclusively exclusively by services running on a computer • No interacve/user interacve/user access (ideall • Web server, server, database server, server, etc. • Access can be dened dened for a specic • Web server rights rights and permissi be dierent than a database serv • Commonly use usernames usernames and pas • You’ll need to determine determine the best for password updates Privileged accounts
• Elevated access to one or more s • Administra Administrator tor,, Root • Complete access to to the system system • Oen used to manage manage hardware, and soware installaon • This account should should not be used normal administra administraon on • User accounts accounts should should be used • Needs to be be highly secured secured • Strong passwords, passwords, 2FA • Scheduled password changes
4.4 - Account Management Least privilege
• Rights and permissions permissions should be set to to the bare minimum • You only get exactly what’s what’s needed to complete your objecve • All user accounts accounts must be be limited • Applicaons should should run with minimal minimal privileges • Don’t allow allow users users to run Special offer for students: Only $4.99/month. with administrave privileges Limits the scope of malicious behavior
Master your semester with Scribd & The New York Times
O-boarding • All good good things… things… • But you knew this this day would would come • This process should be pre-planned pre-planned • You don’t want to decide how to do thing • How will sto systems ystems bethis dissolved? dissolved? Read Free Foron 30 Days Signthe up vote title • What happens theNot data? Useful to useful Cancel anytime. • When will the nal connecons be terminat Perform roune audits
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
4.4 - Account Management (connued) Standard naming conveno convenon n • Unique • The username shouldn’t conict with another user • Use the same username across mulple systems • Consistent • Usernames shouldn’t describe a role or status • Persistent • Use the same username for the duraon of employment • Memorable • This shouldn’t be dicult. Make it easy e asy to remember Account maintenance
• Account creaon • Inial provisioning • Password management • Group and permission assignments • Periodic updates • Password resets / forced updates • Permission audits • Deprovisionin De provisioning g • Disable account • Archive user documents and encrypon encr ypon keys
Group-based access control • Set privileges based on what you do • Put many users into a single group • Set privileges on the group • Add/remove users from the group to assign • Users can be members of mulple groups • Group permissions can overlap • How do you determine the eecve permi • Not as straighorward as you might think Locaon-based policies • User access is based on locaon • GPS - mobile devices, very accurate • 802.11 wireless, less accurate • IP address, not very accurate • Restrict applicaon use • Don’t allow this app to run unless you’re near the oce • Apply security rules • Your Your IP address is associated with an IP blo • We don’t have an oce in China • Permission not granted
4.4 - Account Policy Enforcement Credenal management • All that stands between the outside world and all of the data • The data is everything • Passwords must not be embedded in the applicaon • Everything needs to reside on the server, not the client • Communicaon across the network should be encrypted • Authencaon trac should be impossible to see Conguring sengs • Windows Group Policy Management • Apply security and admin sengs across many computers Special offer for students: Only $4.99/month. • Thousands of sengs
Master your semester with Scribd & The New York Times
Password complexity and length
• Make your password strong • No single words • No obvious passwords • What’s the name of your dog? • Mix upper and lower case • Use special characters • Don’t replace a o with a 0, t with a • A strong password is at least 8 charact Read Free For 30 Days Sign up to vote on this title • Consider a phrase or set of words Useful Notreuse useful • Prevent password Cancel anytime. • System remembers password history requires unique passwords
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
5.1 - Agreement Types Standard operang procedure • Important processes to maintain data and system security • Detail roune operaons • Usually quite extensive • Day-to-day processes • New user account creaon • Backup data storage requirements • Encrypon key requests • These should be well documented • Some processes require extensive documentaon • Comply with industry regulaons Interoperability Interoper ability agreements • Third-pares and outsourced services • The legal side of informaon technology • Web hosng, payroll services, rewall management, etc. • Some of your data is in the hands of others • Who do they hire? • What type of access controls are in place? • Include the legal department with these agreements • It can only help you later
Common agreements
• Service Level Agreement (SLA) • Minimum terms for services provided • Upme, response me agreement, etc. • Business Partners Agreement (BP (BPA) A) • Commonly seen between manufacturers • Interconnecon Security Agreement (ISA) • Used by US Federal Government to dene security controls Common agreements
• Memorandum of Understanding (MOU) • Both sides agree on the contents of the m • Usually includes statements of conden • Informal leer of intent; not a signed con • Memorandum of Agreement (MOA) • The next step above a MOU • Both sides agree to the objecves • A legal document, even without legal lan • Unlike a contract, may not contain legally enforceable promises
5.1 - Personnel Management Business policies
• Mandatory vacaons - Rotate others through the job • The longer the vacaon, the beer chance to idenfy fraud • Especially important in high-security environments • Job rotaon • Keep people moving between responsibilies • No one person maintains control for long periods of me • Separaon of dues • Split knowledge • No one person has all of the details Special offer •forHalf students: Only $4.99/month. of a safe combinaon • Dual control
Master your semester with Scribd & The New York Times
Personnel security procedures
• NDA (Non-disclosure agreement) • Condenality agreement / Legal contra • Prevents the use and disseminaon of condenal informaon • Onboarding • Bring someone into the organiza organizaon on • Inducon / Training - Usually a formal pr • Connuing educaon • Inial training isn’t30 enough Read Free For Days Sign up to vote on this title • Security is constantly changing Useful Not useful Cancel anytime. (AUP) Acceptable use policies • What is acceptable use of company assets • Detailed documentaon
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
5.1 - Role-based Awareness Training Training Role-based awareness training • Before providing access, train your users • Detailed security requirements • Specialized training • Each user role has unique security responsibilies • Also applies to third-pares • Contractors, partners, suppliers • Detailed documentaon and records • Problems later can be severe for everyone
User roles
Roles
• Data owner • Execuve level manager, responsible for data security Ulmately responsible for compliance • System administrat administrator or • Administrator of the systems that enable the applicaons and data • May not necessarily be a user of the app or view the data • System owner • Makes decisions about the overall operaon of the app and data • Denes security policies and backup policies • Manages changes and updates
• User • Applicaon user • Has least privileged access to the applicaon and data • Privileged user • Addional applicaon and data permissions • Area manager, report creaon, user and password changes • Execuve user • Responsible for the overall ope of the applicaon • High-level decision making for • Evaluates goals and makes dec about future direcons
5.1 - General Security Policies Social media policies
• Balance the company reputaon with employee parcipaon • Social media use can be a great thing t hing • Extension of your code of conduct • Dene requirements and expectaons • Idencaon as an employee • Personal responsibility • Condenal informaon • Public companies are legally bound • There’s a company spokesperson forfor public comments Special offer students: Only $4.99/month.
Master your semester with Scribd & The New York Times
Personal email policies
• Qualify the use of email • Business use, no personal use • Prohibit disrupve or oensive use • Avoid problems in the workplace • Compliance issues • Some organizaons are legally required to prohibit personal email • The line becomes hazy when browser-ba Read Free Foron 30this Days Signisup to vote title email used Useful Not useful using • Is Google Mail at work “personal Cancel anytime.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
Search document
5.2 - Business Impact Analysis (connued) Removing single points of failure
Impact
• A single event can ruin your day • Unless you make some plans • Network conguraon • Mulple devices (the “Noah’s Ark” of networking) • Facility / Ulies • Backup power, mulple cooling devices • People / Locaon • A good hurricane can disrupt personnel travel • There’s no praccal way to remove all points of failure • Money drives redundancy
• Life - The most important consideraon • Property - The risk to buildings and assets • Safety - Some environments are too dange • Finance - The resulng nancial cost • Reputaon • An event can cause status or character pr
Availability
Annual Down/me (hh:mm:ss)
99.9999%
00:00:32
99.999%
00:05:15
99.99%
00:52:34
99.9%
08:45:36
99%
87:36:00
Privacy compliance
• Some compliance requires a public privacy • Gramm-Leach-Bliley Act (nancial inform HIPAA HIP AA (health care), etc. • Privacy threshold analysis (PTA) • The rst step in the compliance process • Idenfy business processes that are priva • Determines if a privacy impact assessmen • Privacy impact assessment (PIA) • Ensures compliance with privacy laws and • What PII is collected, and why • How the PII data will be collected, used, and secured
5.3 - Risk Assessment Threat assessments
• Environmental threats • Tornado, Tornado, hurricane, earthquake, severe weather • Man-made threats • Internal threats are from employees, external threats are from outside the organiza organizaons ons Quantave risk calculaon • Likelihood - Annualized Rate of Occurrence (ARO) • How likely is it that a hurricane will hit? In Montana? In Florida? • SLE (Single Loss Expectancy) • What is the monetary loss if a single event occurs? • Laptop stolenOnly (asset value) = $1,000 Special offer for students: $4.99/month. • ALE (Annual Loss Expectancy)
Master your semester with Scribd & The New York Times
Qualitave risk assessment • Idenfy signicant risk factors • Ask opinions about the signicanc • Display visually with trac light g or similar method Business impact analysis
• What are your crical business func • Dene the important business ob • What is impacted? • Loss revenue, legal requiremen Read Free For 30this Days Sign up toof vote on title customer service Not useful Useful • HowCancel longanytime. will you be impacted? • You’ll need personnel, equipment
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
5.3 - Risk Assessment (connued) Risk response techniques
Change management
• Risk-avoidance • Stop parcipang in high-risk acvity • Transference • Buy some insurance • Acceptance • A business decision; we’ll take the risk! • Migaon • Decrease the risk level • Invest in security systems
• How to make a change • Upgrade soware, change rewall conguraon, modify sw • One of the most common risks in the enterprise • Occurs very frequently • Oen overlooked or ignored • Did you feel that bite? • Have clear policies • Frequency, duraon, installaon process, fallback procedur • Somemes extremely dicult to implement • It’s hard to change corporate culture
5.4 - Incident Response Planning Security incidents
• User clicks an email aachment and executes malware • Malware then communicates with external servers • DDoS • Botnet aack • Condenal informaon is stolen • Thief wants money or it goes public • User installs peer-to-peer soware and allows external access to internal servers Examples of incidents categories
• External/removable media • Aack used removable media • Arion • A brute-force aack • Web • Aack executed from a web site or web-based applicaon • Email • Aack executed from an email message or aachment Special• offer for students: Improper usage Only $4.99/month. • Aack resulted from a violaon of the
Master your semester with Scribd & The New York Times
Incident nocaon • Get your contact list together • There are a lot of people in the loop • Corporate / Organiza Organizaon on • CIO / Head of Informaon Security / Internal Response Teams • Internal non-IT • Human resources • Public aairs • Legal department • External contacts • System owner, law enforcement • US-CERT (for U.S. Government agencies) Cyber-incident response team (CIRT) • Receives, reviews, and responds • A predened group of professionals • Determine what type of events require a CIRT response • A virus infecon? Ransomware? DDoS? Read Free Foron 30this Days Sign up to vote title • The CIRT may or may not be part of Not useful Useful the organizaonal structure Cancel anytime. • Pulled together on an as-needed basis • Focuses on incident handling
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
5.4 - Incident Response Process NIST SP800-61
Sheet Music
Search document
• Naonal Instute of Standards and Technology • NIST Special Publicaon 800-61 • Computer Security Incident Handling Guide • The incident response lifecycle: • Preparaon • Detecon and Analysis • Containment, Eradicaon, and Recovery • Post-incident Acvity Preparing for an incident
• Communicaon methods • Phones and contact informaon • Incident handling hardware and soware • Laptops, removable media, forensic soware, digital cameras, etc. • Incident analysis resources • Documentaon, network diagrams, baselines, crical le hash values • Incident migaon soware • Clean OS and applicaon images • Policies needed for incident handling • Everyone knows what to do The challenge of detecon • Many dierent detecon sources • Dierent levels of detail, dierent levels of percepon • A large amount of “volume” • Aacks are incoming all the me • How do you idenfy the legimate threats? • Incidents are almost always complex • Extensive knowledge needed
Incident precursors Master your semester with Scribd • An incident might occur in the future is your heads-up & The• This New York Times
• Web logOnly $4.99/month. Special offer for server students: • Vulnerability scanner in use
Isolaon and containment • Generally a bad idea to let things run the • An incident can spread quickly • It’s your fault at that point • Sandboxes • The aacker thinks they’re on a real sys • But they’re not • Isolaon can be somemes be problema • Malware or infecons can monitor con • When connecvity is lost, everything co deleted/encrypted/damaged Recovery aer an incident • Get things back to normal • Remove the bad, keep the good • Eradicate the bug • Remove malware • Disable breached user accounts • Fix vulnerabilies • Recover the system • Restore from backups • Rebuild from scratch • Replace compromised les • Tighten down the perimeter Reconstuon • A phased approach • It’s dicult to x everything at once • Recovery may take months • Large-scale incidents require a large am • The plan should be ecient • Start with quick, high-value security ch • Patches, rewall policy changes • Later phases involve much “heavier lii •Read Infrastructure changes, Free Foron 30this Days Sign up to vote title large-scale rollouts Useful security Not useful
Cancel anytime. Lessons learned
• Learn and improve
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
5.5 - Gathering Forensics Data Forensic procedures
Capture video
• Collect and protect informaon relang to an intrusion • Dierent data sources and protecon mechanisms • RFC 3227 - Guidelines for Evidence Collecon and Archiving • A good set of best pracces • Standard digital forensic process • Acquision, analysis, and reporng • Must be detail oriented - Take extensive notes Order of volality • How long does data sck around? • Some media is much more volale than others • Gather data in order from the most volale to less volale
• A moving record of the event • Gathers informaon external to the computer and network • Captures the status of the screen and other volale informaon • Today’s mobile video devices are remar • Don’t forget security cameras and your p • The video content must also be archived • May have some of the most important informaon Recording me osets • Windows: 64-bit me stamp • Number of 100-nanosecond intervals si January 1, 1601 00:00:00 GMT • This stops working in 58,000 years • Unix: 32-bit me stamp • Number of seconds since January 1, 1970 00:00:00 GMT • This stops working on Tuesday Tu esday,, January 19, 2038 at 3:14:07 • Dierent le systems store mestamps d • FAT: Time is stored in local me • NTFS: Time is stored in GMT • Record the me oset from the operan • The Windows Registry • Many dierent values (daylight saving me change informaon, etc.)
Chain of custody
• Control evidence - Maintain integrity • Everyone who contacts the evidence • Avoid tampering - Use hashes • Label and catalog everything - Seal and store Legal hold
• A legal technique to preserve relevant informaon • Prepare for impending ligaon • Iniated by legal counsel • Hold nocaon • Records custodians are instructed to preserve data • Separate repository for electronically stored informaon (ESI) • Many dierent data sources and types • Unique workow and retenon requirements • Ongoing preservaon • Once noed, there’ there’ss an obligaon to preserve data
Master semester with Scribd Captureyour system image • Copy the contents of a disk - bit-for-bit, byte-for-byte byte-for-byte & The New York Times • Get every morsel of informaon Special• offer for students: Only $4.99/month. Soware imaging tools - Use a bootable device • Remove the physical drive
Take hashes
• How can you ensure that there’ there’ss no tamp • Use a digital hash • MD5 (Message Digest 5) Read Free Foron 30this Sign up to vote title • 128 bits, displayed asDays hexadecimal • Chance of duplicaon is one in 2128 Not useful Useful Cancel anytime. (230 billion billion billion billion) • CRC (Cyclical Redundancy Check)
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
Search document
5.5 - Gathering Forensics Data (connued) Most Vola)le
CPU registers, CPU cache
Router table, ARP cache, process table, kernel sta8s8cs, memo Temporary file systems Disk Remote logging and monitoring data Physical configura8on, network topology Least Vola)le
Archival media
5.5 - Using Forensics Data Preservaon • There will be a lot of data • You need to keep it all • Important for the current invesgaon • Immediate need to si through the evidence • There may be a future invesgaon • Or revisit the exisng event • New items of interest may be discovered • You’ll You’ll need the data to explore these new items Recovery
• Strategic intelligence • Collect and process informaon • What important informaon did you nd? • Base security policy changes on this intelligence
• Counterintelligence gathering • What do we know about the aacker? • Learn as much as you can about the aa • Acve logging • Log everything, everywhere • Track every step the aacker takes Track man hours and expenses
• Some incidents can use massive resource • All at once • Over a long period • May have an impact on the boom line • Can be wide ranging • May be required for restuon • Be as accurate as possible
5.6 - Disaster Recovery Sites Cold site Master your semester • No hardware - Empty building with Scribd • No data - Bring it with you & The New York Times • No people - Bus in your team
Special offer for students: Only $4.99/month. Warm site • Somewhere between cold and hot
Hot site
• An exact replica Read Free Foron 30this Days up to vote title • Sign Duplicate everything Useful Not useful • StockedCancel withanytime. hardware • Constantly updated • You buy two of everything
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
5.6 - Applicaon Recovery (connued) Backup Types
Sheet Music
Search document
• The archive aribute • Set when a le is modied • Full • Everything • You’ll want this one rst • Incremental • All les changed since the last incremental backup • Dierenal • All les changed since the last full backup
Type
Data Selec,on
Backup / Restore Time
Full
All selected data
High / Low (one tape set)
Incremental
New files and files modified since the last backup
Low / High (Mulple tape sets)
Differenal
All data modified since the last full backup
Moderate / Moderate (No more than 2 sets)
Incremental Backup
• A full backup is taken rst • Subsequent backups contain data changed since the last full backup and last incremental backup • These are usually smaller than the full backup • A restoraon requires the full back and all of the incremental backups
Incremental
Incremental
Incremental
Tuesday
Wednesday
Full Backup
Monday
Dierenal Backup • A full backup is taken rst • Subsequent backups contain data changed since the last full backup • These usually grow larger as data is changed • A restoraon requires the full back Special offer for students: Only $4.99/month. and the last dierenal backup
Differen9al
Full Master your semester withBackup Scribd & The New York Times Monday
Differen9al
Thursday
Differen9al
Read Free Foron 30this Days Sign up to vote title
Tuesday
Not useful Cancel anytime.
Useful
Wednesday
Thursday
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
5.6 - Geographic Consideraons (connued) Distance
Sheet Music
Search document
• A balancing act • Recovery vs. accessibility • The recovery site should be outside the scope of the disaster • Natural disasters can aect a large area • Travel for support sta • And for employees • Unique business requirements • Specialized printers, bandwidth availability
Locaon selecon • Legal implicaons • Business regulaons vary between states • For a recovery site outside of the country must have a passport and be able to clear • Refer to your legal team • Data sovereignty • Data that resides in a country is subject to the laws of that country • Legal monitoring and court orders • Where is your data stored? • Your compliance laws may prohibit the moving data out of the country
5.6 - Connuity of Operaons Tabletop exercises • Performing a full-scale disaster drill can be costly • And me consuming • Many of the logiscs can be determined through analysis • You You don’t physically have to go through a disaster or drill • Get key players together for a tabletop exercise • Talk through a simulated disaster The scope of a tabletop exercise exercise • Decide on complexity • Invite local rst responders or just discuss internally? • Determine the scope of the disaster • Water main break? Death and injuries? • Involve everyone • Perhaps even make the discussion a surprise • Don’t assume that every piece of informaon is going to be available in a disaster • The tabletop exercise should nd the gaps Aer-acon reports (AAR) • Exercise scope and objecves - What’s the endgame? • Methodology - Detailed explanaon of the exercise Special offer for students: Only $4.99/month. • What worked? What didn’t work? - The good and the bad
Master your semester with Scribd & The New York Times
Failover
• Recovery site is prepped • Data is synchroniz synchronized ed • A disaster is called • Business processes failover to the alternate processing site • Problem is addressed • This can take hours, weeks, or lo • Revert back to the primary locao • The process must be document for both direcons Alternate business pracces • Not everything goes according to • Disasters can cause a disrupon • We rely on our computer systems • Technology is pervasive • There needs to be an alternave Manual Read Free Fortransacons 30this Days Sign•up to vote on title • Paper receipts Not useful Useful • Phone calls for transacon appr Cancel anytime. • These must be documented and t before a problem occurs
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
5.7 - Security Controls (connued) Security controls
Sheet Music
Search document
• Deterrent • May not directly prevent access • Discourages an intrusion aempt • Warning signs, login banner • Prevenve • Physically control access • Door lock • Security guard • Firewall • Detecve • May not prevent access • Idenes and records any intrusion aempt • Moon detector, IPS
• Compensang • Doesn’t prevent an aack • Restores using other means • Re-image or restore from backup • Hot site • Backup power system • Correcve • Designed to migate damage • Correcve controls • IPS can block an aacker • Backups can migate a ransomware infec • A backup site can provide opons when a storm hits
5.8 - Data Destrucon Data destrucon and media sanizaon • Disposal becomes a legal issue • Some informaon must not be destroyed • Consider osite storage • You don’t want crical informaon in the trash • People really do dumpster dive • Recycling can be a security concern • Physically destroy the media • Reuse the storage media • Sanize the media for reuse • Ensure nothing is le behind Protect your rubbish • Secure your garbage • Fence and a lock • Shred your documents • This will only go so far • Governments burn the good stu Burnfor documents Special• offer students: Only $4.99/month. • No going back
Master your semester with Scribd & The New York Times
Cercate of destrucon • Destrucon is oen done by a 3rd party • How many drills and degaussers do you have • Need conrmaon that your data is destroyed • Service should include a cercate • A paper trail of broken data • You know exactly what happened Sanizing media • Purge data • Remove it from an exisng data store • Delete some of the data from a database • Wipe data • Unrecoverable removal of data on a storage device • Usually overwrites the data storage locaons Read Free Foron 30this Days Sign up to vote title • Useful when you need touseful reuse or Not Useful Cancel connue using theanytime. media Data security
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
5.8 - Handling Sensive Data Labeling sensive data • Not all data has the same level of sensivity • License tag numbers vs. health records • Dierent levels require dierent security and handling • Addional permissions • A dierent process to view • Restricted network access Data sensivity labels • Public / Unclassied • No restricons on viewing the data • Private / Classied / Restricted / Internal use only • Restricted access, may require a non-disclosure agreement (NDA) • Condenal • Very sensive - Must be approved to view
Sensive data types • Proprietary • Data that is the property of an organiz • May also include trade secrets • Oen data unique to an organiza organizaon on • PII - Personally Idenable Informaon • Data that can be used to idenfy an in • Name, date of birth, mother’s maiden biometric informaon • PHI - Protected Health Informaon • Health informaon associated with • Health status, health care records, pay for health care, and much more
5.8 - Data Roles and Retenon Data roles
• High-level data relaonships • Organizaonal responsibilies, not always technical • Data owner • Accountable for specic data, oen a senior ocer • VP of Sales owns the customer relaonship data • Treasurer Treasurer owns the nancial informaon • Data steward • Responsible for data accuracy, privacy, and security • Associates sensivity labels to the data • Ensures compliance with any applicable laws and standards • Data custodian • Manages the access rights to the data • Implements security controls • Somemes the same person as the data steward • Privacy ocer Special offer for students: for Onlythe $4.99/month. • Responsible organizaon’s data privacy • Sets policies, implements processes and procedures
Master your semester with Scribd & The New York Times
Data retenon • Keep les that change frequently for version control • Files change oen • Keep at least a week, perhaps m • Recover from virus infecon • Infecon may not be idened • May need to retain 30 days of b • Consider legal requirements for da • Email storage may be required o • Some industries must legally sto certain data types • Dierent data types have diere requirements • Corporate tax informaon, cu Read Free Foron 30this Days Sign up to vote title tape backups, etc. Useful Not useful Cancel anytime.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.1 - Cryptography Concepts (connued)
Random numbers • Cryptography relies on randomness • Used to generate keys, salt hashes, and • Random number generaon • It’s very dicult to create true randomne with a program • Usually includes some type of natural inp • Mouse movements, atmospheric noise, la • Pseudo-randomness doesn’t rely on the nat • Approximate true randomness • Based on a starng seed
Cryptographic keys Sheet Music
• Keys • Add the key to the cypher to encrypt • Larger keys are ostensibly more secure • Some encrypon methods use one key • Some use more than one key • Every method is a bit dierent Confusion
• Encrypon is based on confusion and diusion • Confusion • The encrypted data is drascally dierent dierent than the plaintext • The process should be non-linear, with no discernible paerns Diusion • Change one character of the input, and many characters change of the output Security through obscurity • Security should exist, even if the aacker knows everything about the system • Encrypon key would be the only unknown • Cryptography is security through secrecy • Substuon Cipher (Caesar cipher) • Substute one leer with another • ROT13 - “URYYB” is “HELLO” • Hack these ciphers with frequency ROT13 analysis or brute force • If you know how the system works, you can decrypt it
App development and cryptograph cryptography y
• Developers don’t need to be cryptographer • They write to an API (applicaon programming interface) • Crypto modules • The API library does all of the heavy liing • Send plaintext into the box, get ciphertex • No extra programming required • The Windows soware library is the • Cryptographic Service Provider (CSP) • The Microso CryptoAPI is the bridge between the applicaon and the CSP
A B C D E F G H I J K L M
H
N O P Q R S T U VWX Y Z
U
6.1 - Symmetric and Asymmetric Encrypon Symmetric encrypon • A single, shared key • Encrypt with the key • Decrypt with the same key • If it gets out, you’ll need another key Secret algorithm Special• offer forkey students: Only $4.99/month. • A shared secret
Master your semester with Scribd & The New York Times
The key pair
• Asymmetric encrypon • Public Key Cryptograph Cr yptographyy Read Free Foron 30this Days Sign up to vote title • Key generaon Useful Not useful • Build both the public and private key at the Cancel anytime. • Lots of randomiza randomizaon on • Large prime numbers
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
1.8K views
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
Save
Embed
Share
Print
1
Download
of 103
Search document
6.1 - Symmetric and Asymmetric Encrypon (connued)
Alice’s Private K
Alice’s Key Genera/on
Large Random Number
Key Genera)on Program
Alice’s Public K
Asymmetric encrypon sBcBAE BCAAQ BQJYtX ToCRA
Hello, Alice Plaintext
sBcBAE BCAAQ BQJYtX ToCRA
Ciphertext
Ciphertext
Alice’s Computer
Bob’s Laptop Alice’s Public Key
Bob combines Alice’ Al ice’ss public key 1 Master yourwith semester with Scribd plaintext to create ciphertext
& The New York Times
Alice’s Private Key
Alice uses her private key to the ciphertext into the origina Read Free Foron 30this Days Sign up to vote title
2
Not useful Cancel anytime.
Useful
Symmetric key from asymmetric keys
Special offer for students: Only $4.99/month.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
6.1 - Hashing and Digital Signatures Hashes
Sheet Music
Search document
• Represent data as a short string of text • A message digest • One-way trip • Impossible to recover the original or iginal message from the digest • Used to store passwords / condenality • Verify a downloaded document is the same as the original • Integrity • Can be a digital signature • Authencaon, non-repudiaon, and integrity • Will not have a collision (hopefully) • Dierent messages will not have the same hash Collision
• Hash funcons • Take an input of any size • Create a xed size string • Message digest, checksum • The hash should be unique unique • Dierent inputs should never create the same hash • If they do, it’s a collision • MD5 has a collision problem • Found in 1996 - Don’t use MD5
Praccal hashing • Verify a downloaded le • Hashes may be provided on the downlo • Compare the downloaded le hash with posted hash value • Password storage • Instead of storing the password, store t • Compare hashes during the authenca • Nobody ever knows your actual passwo Digital signatures
• Prove the message was not changed • Integrity • Prove the source of the message • Authencaon • Make sure the signature isn’t fake fake • Non-repudiaon • Sign with the private key • The message doesn’t need to be encryp • Nobody else can sign this (obviously) • Verify with the public key • Any change in the message will invalidate the signature
Creang a Digital Signature You’re hired, Bob Plaintext Hash
sBcBAEBCAA QBQJZzBIbCR AW8ZAwUFg
Hash of Plaintext
sBcBAEBCAA QBQJZzBIbCR AW8ZAwUFg
Hashing Algorithm
Special offer for students: Only $4.99/month.
1
Alice creates a hash
Hash of Plaintext
2
GmdBkELopt 8hF85TetMS
Encrypon
Alice’s Computer Master your semester with Scribd & The New York Times
You’re hired, Bob
Digital Signature
GmdBkELopt 8hF85TetMS
Plaintext
Read Free Foron 30this Days and Digital Sign up to vote title Alice’s Private Key
Signature
Not useful Cancel anytime.
Useful
Alice encrypts the hash
3
The encrypted hash (digital signature) is
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.1 - Randomizing Cryptography Cryptographic nonce
Salt
• Arbitrary number • Used once • “For the nonce” - For the me being • A random or pseudo-random number • Something that can’t be reasonably guessed • Can also be a counter • Use a nonce during the login process • Server gives you a nonce • Calculate your password hash using the nonce • Each password hash sent to the host will be dierent, so a replay won’t work Inializing vectors • A type of nonce • Used for randomizing an encrypon scheme • The more random the beer • Used in encrypon ciphers, WEP, WEP, and older SSL implementaons
• A nonce most commonly associated with password randomizaon • Make the password hash unpredictab • Password storage should always be salt • Each user gets a dierent salt • If the password database is breached, you can’t correlate any passwords • Even users with the same password have dierent hashes stored
Cryptography without randomiza
6.1 - Weak Encrypon The strength of encrypon • Strong cryptography vs. weak cryptography • It’s all relave • Praccally everything can be brute forced • Try every possible key • Strong algorithms have been around for a while • That’s part of the reason that they are strong • Wired Equivalent Privacy (WEP) had design aws • Strong algorithms • PGP, AES • Weak algorithms • DES (56-bit keys), WEP (design aw)
6.1 your - Cryptographic Keyswith Scribd Master semester Cryptographic keys • There’s veryYork lile that isn’t known about & The New Times theforcryptographic Special offer students: Onlyprocess $4.99/month. • The algorithm is usually a known enty
Give weak keys a workout
• A weak key is a weak key • By itself, it’s not very secure • Make a weak key stronger by performing processes • Hash a password. Hash the hash of the password. And connue… • Key stretching, key strengthening • Brute force aacks would require reversi each of those hashes • The aacker has to spend much more though the key is small
Read Free Foron 30this Days Sign up to vote title Key exchange • A logiscal Useful Not useful challenge Cancel anytime.
• How do you transfer an encrypon key acros medium without having an encrypon key?
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.1 - Steganogr Steganography aphy Obfuscaon • The process of making something unclear • It’s now much more dicult to understand • But it’s it ’s not impossible to understand • If you know how to read it • Make source code dicult to read • But it doesn’t change the funconality of the code • Hide informaon inside of an image • Steganography
Common steganography techniques
• Network based • Embed messages in TCP packets • Use an image • Embed the message in the image itself • Invisible watermarks • Yellow dots on printers
Steganography
• Greek for “concealed wring” - security through obscurity • Message is invisible - But it’s really there • The covertext - The container document or le
6.1 - Stream and Block Ciphers Stream ciphers
Block ciphers
• Used with symmetric encrypon • Not used in asymmetric encrypon • Encrypon is done one bit or byte at a me • High speed, low hardware complexity • The starng state should never be the same twice • Key is oen combined with an inializaon vector (IV)
• Symmetric encrypon - Similar to stream ciph • Encrypt xed-length groups • Oen 64-bit or 128-bit blocks • Pad added to short blocks • Each block is encrypted or decrypted indepe • Block cipher modes of operaon • Avoid paerns in the encrypon • Many dierent modes to choose from
6.1 - States of Data Data in-transit
• Data transmied over the network • Also called data in-moon • Not much protecon as it travels • Many dierent switches, routers, devices • Network-based protecon - Firewall, IPS • Provide transport encrypon • TLS (Transport Layer Security) • IPsec (Internet Protocol Security) Special offer for students: Only $4.99/month.
• Apply permissions - Access control lists • Only authorized users can access the data Data in-use
• The data is in memory • System RAM, CPU registers and cache • The data is almost always decrypted Free Fordo 30this Days Sign to vote on title with it • Otherwise,Read youup couldn’t anything • The bad guys pick the decrypted Useful Not useful informaon can Cancel anytime. • A very aracve opon • Target Target Corporaon breach - November 2013
Master your semester with Scribd & The New York Times Data at-rest
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.1 - Common Cryptography Use Cases Finding the balance • Low power devices • Mobile devices, portable systems • Smaller symmetric key sizes • Use ellipc curve cur ve cryptography (ECC) for asymmetric encrypon • Low latency • Fast computaon me • Symmetric encrypon, smaller key sizes • High resiliency • Larger key sizes • Encrypon algorithm quality • Hashing provides data integrity Use cases
• Condenality • Secrecy and privacy • Encrypon (le-level, drive-level, email) • Integrity • Prevent modicaon of data • Validate the contents with hashes • File downloads, password storage
• Obfuscaon • Modern malware • Encrypted data hides the acve malware c • Decrypon occurs during execuon • Authencaon • Password hashing • Protect the original password • Add salts to randomize the stored passwor • Non-Repudiaon • Conrm the authencity of data • Digital signature provides both integrity an repudiaon • Resource vs. security constraints • An ongoing bale • Browser support vs. supported encrypon • VPN soware support vs. supported algori
6.2 - Symmetric Algorithms AES (Advanced Encrypon Standards) • US Federal Government Standard • FIPS 197 in 2001 • It took ve years to standardize standardize on this! • Developed by two Belgian cryptographers c ryptographers • Joan Daemen and Vincent Rijmen • 128-bit block cipher - 128-, 192-, and 256-bit keys • Used in WPA2 - Powerful wireless encrypon
Master semester with • Datayour Encrypon Standard - DES and Triple Trip leScribd DES • Developed between 1972 and 1977 by & The New Times IBM for theYork NSA DES
Special offer for students: Only $4.99/month. • One of the Federal Informaon Processing Standards (FIPS)
RC4
• Rivest Cipher 4 - Ron Rivest (Ron’s (Ron’s Code 4 • Part of the ill-fated WEP standard • Also part of SSL, but removed from TLS • RC4 has “biased output” • If the third byte of the original state is z second byte is not equal to two, then th output byte is always zero • Not common to see RC4 these days • WPA2 moved to AES Read Free Foron 30this Days Sign up to vote title Blowsh and Twosh Useful Not useful • Blowsh Cancel anytime. • Designed in 1993 by Bruce Schneier Sc hneier • 64-bit block cipher, variable length key (
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
1.8K views
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
Search document
6.2 - Symmetric Algorithms (connued) Space, the final fron-er. Plaintext Encryp-on
xsRY+wtH LuKUci8n SU0ZRiEn
Ciphertext Decryp-on
Ciphertext
Encrypt the plaintext with the 1st DES key
bcPwJtyyi Z16DqjAN hN4Ry7R
Ciphertext Encryp-on
Ciphertext
DES Key 1
1
bcPwJtyyi Z16DqjAN hN4Ry7R
xsRY+wtH LuKUci8n SU0ZRiEn
Ciphert
DES Key 2
2
Decrypt the ciphertext with the 2nd DES key
dSPvEZ 1s6pp7 W1lOn
DES Key 3
3
Encrypt the ciphertext with the 3rd DES key
6.2 - Block Cipher Modes Block Cipher mode of operaon • Encrypt one xed-length group of bits at a me • A block • Mode of operaon • Denes the method of encrypon • May provide a method of authencaon • The block size is a xed size • Not all data matches the block size perfectly • Split your plaintext into smaller blocks • Some modes require padding before encrypng ECB (Electronic Code book) • The simplest encrypon mode • Too simple for most use cases • Each block is encrypted with the same key • Idencal plaintext blocks create idencal ciphertext blocks
Master your semester with Scribd & The NewBlock York Times CBC (Cipher Chaining) Special• offer for students: $4.99/month. A popular mode Only of operaon • Relavely easy to implement
CTR (Counter)
• Block cipher mode / acts like a stream c • Encrypts successive values of a “coun • Plaintext can be any size, since it’s part of the XOR • i.e., 8 bits at a me (streaming) instead of a 128-bit block GCM (Galois/Counter Mode) • Encrypon with authencaon • Authencaon is part of the block mo • Combines Counter Mode with Galois authencaon • Minimum latency, minimum operaon overhead • Very ecient encrypon Read Free Foron 30this Days Signauthencaon up to vote title and Notpackezed useful Useful • Commonly used in data Cancel anytime. • Network trac security (wireless, IPse • SSH, TLS
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
Download
of 103
Search document
6.2 - Block Cipher Modes (connued) CBC (Cipher Block Chaining) cipher mode
Sheet Music
Plaintext
Plaintext
Block Cipher Encryp0on
Block Cipher Encryp0on
Plainte
Ini0aliza0on Vector (IV)
Block Cipher E
Key
Key
Key
Ciphertext
Ciphertext
Ciphert
CTR (Counter) cipher mode Counter 0
0
0
0
0
0
0
Counter 0
0
0
0
0
0
0
Block Cipher Encryp0on
Key
0
0
0
0
0
0
Block Cipher Encryp
Key
Plaintext
Plaintext
Ciphertext
Ciphertext
6.2 - Asymmetric Algorithms Die-Hellman key exchange • A key exchange method • Over an insecure communicaons channel • Published in 1976 • Wiield Die and Marn Hellman (and Ralph Merkle) • DH does not itself encrypt or authencate • It’s It ’s an anonymous key-agreement protocol • Used for Perfect Forward Secrecy Special offer for students:Die-Hellman Only $4.99/month. • Ephemeral (EDH or DHE) • Combine with ellipc curve cur ve cryptography for ECDHE
Master your semester with Scribd & The New York Times
Ellipc curve cryptograph cry ptography y (ECC) • Used for encrypon, digital signatures, pseudo-random generators, generators, and more • Asymmetric encrypon • Tradionally Tradionally need large integers comp two or more large prime factors Read Free Foron 30this Days Sign up to vote title • Instead of numbers, use curves! Not • JustUseful as Cancel infeasible touseful nd the discrete lo anytime. a random ellipc curve element with r publicly known base point
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.2 - Hashing Algorithms MD5 Message Digest Algorithms
HMAC
• Designed by Ronald Rivest • One of the “fathers” of modern cryptography • First published: April 1992 • Replaced MD4 • 128-bit hash value • 1996: Vulnerabilies found • Not collision resistant • December 2008: Researchers created CA cercate that appeared legimate when MD5 is checked • Built other cercates that appeared to be legit and issued by RapidSSL
• Hash-based Message Authencaon Code • Combine a hash with a secret key • e.g., HMAC-MD5, HMAC-SHA1 • Verify data integrity and authencity • No fancy asymmetric encrypon required • Used in network encrypon encr ypon protocols • IPsec, TLS
Secure Hash Algorithm (SHA)
• Developed by the Naonal Security Agency (NSA) • A US Federal Informaon Processing Standard • SHA-1 • Widely used - 160-bit digest • 2005: Collision aacks published • SHA-2 • The preferred SHA variant • Up to 512-bit digests • SHA-1 is now rered for most US Government use
RIPEMD
• A family of message digest algorithms • RACE Integrity Primives Evaluaon Message • RACE • Research and Development in Advanced Communicaons Technologies Technologies in Europe • Created to help with Integrated I ntegrated Broadband Communicaons in Europe • Centralized cryptographic standards and man • Original RIPEMD was found to have collision is • Eecvely replaced with RIPEMD-160 (no known collision issues) • Based upon MD4 design but performs simila • RIPEMD-128, RIPEMD-256, RIPEMD-320
6.2 - Key Stretching Algorithms Give weak keys a workout
• A weak key is a weak key • By itself, it’s not very secure • Make a weak key stronger by performing mulple processes • Hash a password. Hash the hash of the password. And connue… • Key stretching, key strengthening • Brute force aacks would require reversing each of those hashes • The aacker has to spend much more me, even though the keyOnly is small Special offer for students: $4.99/month.
Master your semester with Scribd & The New York Times 6.2 - Obfuscaon
Key stretching libraries • Already built for your applicaon • No addional programming involved • bcrypt • Generates hashes from passwords • An extension to the UNIX crypt library • Uses Blowsh cipher to perform mulple rounds of hashing • Password-Based Key Derivaon Funcon Read Free Foron 30this Days Sign up to vote title • Part of RSA public key cryptography NotRFC useful Useful standards (PK (PKCS CS #5, 2898) Cancel anytime.
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
0
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.2 - Obfuscaon (connued) XOR (Exclusive OR) cipher - Outputs true when inputs dier
Sheet Music
01010111 01101001 01101011 01101001
⊕ 11110011 11110011 11110011 11110011
Plaintext Key
10100100 10011010 10011000 10011010
Ciphertext
10100100 10011010 10011000 10011010
Ciphertext
⊕ 11110011 11110011 11110011 11110011
Key
01010111 01101001 01101011 01101001 Plaintext
6.3 - Wireless Cryptographic Protocols Protocols Wireless encrypon • All wireless computers are radio transmiers and receivers • Anyone can listen in • Soluon: Encrypt the data • Everyone gets the password • Only people with the password can transmit and listen • WPA and WPA2
Temporal Key Integrity Protocol
WPA WP A (Wi-Fi Protected Access)
WPA2 and CCMP
• 2002: WPA was the replacement for serious cryptographic weaknesses in WEP • Needed a short-term bridge between WEP and whatever would be the successor • Run on exisng hardware • WPA: RC4 with TKIP (Temporal Key Integrity Protocol) • Inializaon Vector (IV) is larger and an encrypted hash • Every packet gets a unique 128-bit encrypon key
Master your semester with Scribd 6.3 - Wireless Authencaon Protocols Protocols & The EAPNew York Times Special offer for students: Only $4.99/month. • Extensible Authencaon Protocol • An authencaon framework
• Combines the secret root key with the • Adds sequence counter - Prevents repl • Implements a 64-bit Message Integrity • Protects against tampering • TKIP has it’s it ’s own set of vulnerabilies • Deprecated in the 802.11-2012 stand
• WPA2 cercaon began in 2004 • AES (Advanced Encrypon Standard) • CCMP (Counter Mode with Cipher Blo Message Authencaon Code Protocol) • A more advanced security protocol • Based on AES for data condenality • Uses a 128-bit key and a 128-bit bloc • Requires addional compung resou • Authencaon and access control with • Provides proof of genuineness of the Read Free Foron 30this Days Sign up to vote title PEAP
Not useful Cancel anytime.
Useful
• Protected Extensible Authencaon Proto • Protected EAP
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.3 - Wireless Authencaon Auth encaon Protocols Protocols (connued) RADIUS Federao Federaon n • Use RADIUS with federaon • Members of one organizaon can authencate to the network of another organizaon • Use their normal credenals
• Use 802.1X as the authencaon method • And RADIUS on the backend, EAP to authen • Driven by eduroam (educaon roaming) • Educators can use their normal authenca when vising a dierent campus • hps://www hps://www.eduroam.org/ .eduroam.org/
6.3 - Wireless Security Wireless security modes
Using WPS
• Congure the authencaon on your wireless access point / wireless router • Open System • No authencaon password is required • WPA-Personal / WPA-PSK • WPA2 with a pre-shared key • Everyone uses the same 256-bit key • WPA-Enterprise / WPA-802.1X • Authencates users individually with an authencaon server (i.e., RADIUS) Capve portal • Authencaon to a network • Common on wireless networks • Access table recognizes a lack of authencaon • Redirects your web access to a capve portal page • Username / password • And addional authencaon factors • Once proper authencaon is provided, the web session connues • Unl the capve portal removes your access
• Wi-Fi Protected Setup • Originally called Wi-Fi Simple Cong • Allows “easy” setup of a mobile device • A passphrase can be complicated to a novice • Dierent ways to connect • PIN congured on access point must be enter on the mobile device • Push a buon on the access point • Near-eld communicaon - Bring the mobile device close to the access point • USB method - no longer used
6.4 - your PKI Components Master semester with Scribd Public Key Infastructure (PKI) • Policies, procedures, soware, people & The New Yorkhardware, Times • Digital cercates: distribute, Special offer for students: Only create, $4.99/month. manage, store, revoke
The WPS hack
• December 2011 - WPS has a design aw • PIN is an eight-digit number • Really seven digits and a checksum • Seven digits, 10,000,000 possible combinao • The WPS process validates each half of the PIN • First half, 4 digits. Second half, 3 digits. • First half, 10,000 possibilies Second half, 1,000 possibilies • It takes about four hours to go through all of th • Most devices never considered a lockout func
Read Free Foron 30this Days Sign up to vote title • Revocaon • Manage that have been compro Useful keys Not useful Cancel anytime. • Expiraon • A cercate may only have a certain
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.4 - PKI Components (connued) Cercate extensions • Add more informaon to a digital cercate cer cate • Extension ID (extnID) - an object idener • Crical - True/False • Value (extnValue) (extnValue) - The string value of the extension • Standard extensions • digitalSignature (0) - used to digitally sign documents • nonRepudiaon (1) - used by a non-repudiaon service • keyEncipherment (2) - used for key exchange • dataEncipherment (3) - used to make data condenal • keyAgreement (4) - used for Die-Hellman key agreement • keyCertSign (5) - used by a CA for cercate signing • cRLSign (6) - used to sign a Cercate Revocaon List • encipherOnly (7) - used with Die-Hellman key agreement • decipherOnly (8) - used with Die-Hellman key agreement • Built-in to your browser • Any browser • Purchase your web site cercate c ercate • It will be trusted by everyone’s browser browser • Create a key pair, send the public key to the CA to be signed • A cercate signing request (CSR) • May provide dierent levels of trust and addional features • Add a new “tag” to your web site Private cercate authories • You are your own CA • Build it in-house • Needed for medium-to-large organizaons • Many web servers and privacy requirements • Implement as part of your overall compung strategy • Windows Cercate Services • OpenCA
Master your semester with Scribd 6.4 - PKI Concepts & The New Online oineYork and CAsTimes • A compromised cercate authority Special offer for students: Only $4.99/month. • A very, very bad thing
PKI trust relaonships • Single CA • Everyone receives their cercate from one authority • Hierarchical • Single CA issues certs to intermed • Distributes the cercate managem • Easier to deal with the revocaon intermediate CA than the root CA Key revocaon • Cercate Revocaon List (CRL) • Maintained by the Cercate Auth • Many dierent reasons • Changes all the me • April 2014 - CVE-2014-0160 • Heartbleed • OpenSSL aw put the private key aected web servers at risk • OpenSSL was patched, every web cercate was replaced • Older cercates were moved to Geng revocaon details to the bro • OCSP (Online Cercate Status Prot • The browser can check cercate • Messages usually sent to an OCSP r via HTTP • Easy to support over Internet links • Not all browsers support OCSP • Early Internet Explorer versions di support OCSP • Some support OCSP, OCSP, but don’t
Read Free Foron 30this Days Sign up to vote title
Not useful Pinning Useful Cancel anytime.
• You’re You’re communicang over TLS/SSL to a • How do you really know it’s a legimate s
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Sign In
Upload
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.4 - PKI Concepts (connued) It’s all about the process • Need clear process and procedures • Keys are incredibly important pieces of informaon • You You must be able to trust your 3rd-party • Access to the keys is at the control of the 3rd-party • Carefully controlled condions • Legal proceedings and court orders
Cercate chaining • Chain of trust • List all of the certs between the server and the root CA • The chain starts with the SSL cercate cer cate • And ends with the Root CA cercate • Any cercate between the SSL cercat the root cercate is a chain cercate • Or intermediate cercate • The web server needs to be congured w proper chain • Or the end user will receive an error e rror
Single CA
• Everyone receives their cercates from one authority • Hierarchical • Single CA issues certs to intermediate CAs
Mesh
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
• Cross-cer • Doesn’t sc
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Sheet Music
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
Search document
6.4 - Types of Cercates Root cercate • The public key cercate that idenes the CA (Cercate Authority) • Everything starts with this cercate • The root cercate issues other cercates • Intermediate CA cercates • Any other cercates • This is a very important cercate • Take all security precauons • Access to the root cercate allows for the creaon of any trusted tr usted cercate Web server SSL cercates • Domain validaon cercate (DV) • Owner of the cercate has some control over a DNS domain • Extended validaon cercate (EV) • Addional checks have veried the cercate owner’s identy • Green name on the address bar Web server SSL cercates • Subject Alternave Name (SAN) • Extension to an X.509 cercate • Lists addional idencaon informaon • Allows a cercate to support many dierent domains • Wildcard domain • Cercates are based on the name of the server • A wildcard domain will apply to all server names in a domain • *.professormesser.com Self-signed cercates • Internal cercates don’t need to be signed by a public CA • Your company is the only one going to use it • No need to purchase trust for devices Special offerthat for students: already Only trust$4.99/month. you • Build your own CA
Master your semester with Scribd & The New York Times
Machine and computer cercates • You have to manage many devices • Oen devices that you’ll never physical • How can you truly authencate a device? • Put a cercate on the device that you • Other business processes rely on the cer • Access to the remote access • VPN from authorized devices • Management soware can validate the User cercates • Associate a cercate with a user • A powerful electronic “id card” • Use as an addional authencaon facto • Limit access without the cercate • Integrate onto smart cards • Use as both a physical and digital acces Email cercates • Use cryptography in an email plaorm • You’ll need public key cryptography • Encrypng emails • Use a recipient’s recipient ’s public key to encrypt • Receiving encrypted emails • Use your private key to decrypt • Digital signatures • Use your private key to digitally sign an • Non-repudiaon, integrity Code signing cercates • Developers can provide a level of trust tr ust • Applicaons can be signed by the devel • The user’s user ’s operang system system will examine • Checks the developer signature not bee • Validates Validates that the soware has Read Free Foron 30this Days Sign up to vote title • Is it from a trusted enty? Useful Not useful • The userCancel will anytime. have the opportunity to stop the applicaon execuon
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
Upload
Sign In
Join
RELATED TITLES
0
Professor Messer Comptia Sy0 501 Security Plus Course Notes
Uploaded by Adriel Martinez
Bestsellers
Books
Audiobooks
Magazines
News
Documents
1.8K views
Professor Messer Sec+ 501 Exam Guide
Save
Embed
Share
Print
Download
Pearson.compTIA.cybersecurity.analyst.c CompTIA Comptia Security Security+ Plus Mini Course
1
of 103
6.4 - Cercate File Formats (connued) • A very common format • Generally the format provided by CAs • Supported on many dierent plaorms • ASCII format • Leers and numbers • Easy to email • Readable
CER (Cercate) • Primarily a Windows X.509 le extension • Can be encoded as binary DER format or as the ASCII PEM format • Usually contains a public key • Private keys would be transferred in the .pfx • Common format for Windows cercates • Look for the .cer extension
PKCS #12
PKCS #7
• Public Key Cryptography C ryptography Standards Standards #12 • Personal Informaon Exchange Syntax Standard • Developed by RSA Security, now an RFC standard • Container format for many cercates • Store many X.509 cercates in a single .p12 le • Oen used to transfer a private and public key pair • The container can be password protected • Extended from Microso’s .pfx format • The two standards are very similar • Oen referenced interchangeably
• Public Key Cryptography C ryptography Standards #7 • Cryptographic Message Syntax Standard • Associated with the .p7b le • Stored in ASCII format • Human-readable • Contains cercates and chain cercates • Private keys are not included in a .p7b le • Wide plaorm support • Microso Windows • Java Tomcat
PEM (Privacy-Enhanced Mail) Sheet Music
Search document
X.509 formaed cercate in readable output format # openssl x509 -in cert.pem -text -noout Certicate: Data: Version: 3 (0x2) Serial Number: 03:23:14:9e:79:07:4c:7f:fb:9a:01:40:c7:05:d3:9d:3c:08 Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, O=Let’s Encrypt, CN=Let’s Encrypt Authority X3 Validity Not Before: Jul 23 15:01:00 2017 GMT Not After : Oct 21 15:01:00 2017 GMT Subject: CN=professormesser.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Read Free Foron 30this Days Sign up to vote title Public-Key: (2048 bit) Modulus: Useful Not useful Cancel anytime. 00:c9:57:55:5a:e3:c5:88:5e:8e:8b:9f:af:42:0b:... Special offer for students: Only $4.99/month. Exponent: 65537 (0x10001) X509v3 extensions:
Master your semester with Scribd & The New York Times
Home
Saved
Bestsellers
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join