Course Hero Logo

Security__Notes.pdf - Intellectual Point – Security + Notes...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 31 pages.

Intellectual PointSecurity + NotesSecurity + sy0 60190 minutesCombination of PBQ and MCQoPBQPerformance based questions (Simulations)oMCQMultiple Choice QuestionsSimulations weighted heavily (about 350 Points)Total of 85 questions (approx.). 5 simulations, 80 multiple choices.Total time -> 90 MinAbout 1 min per questionHave good time management.SOCSecurity Operations CenterSoc AnalystPassing Score750/900Cert valid for 3 years. Every 3 years you need 50 Continuing Education (CE) credits.CompTIA Security+ is vendor neutral.3/12/2022Day 1, Morning TrainingConfidentiality - making sure any unauthorized person should not be able to access or view thedata.PIIPersonally Identifiable InformationMFAmulti factor authenticationEncryption, Strong Access Control, MFA, Strong Passwords, physical security, shredding.There is a lack of basic cyber hygiene.Integrity of the data = means any unauthorized person should not be able to change/alter thedata.Hashing allows you to maintain integrity.oThe dog is brown.MD5 Hash -e3c5b52e58182dfff6e7e2364e84c44coThe dog is yellow.MD5 Hash -6391db89007a17e75e6a55ab3e784b24
Hashes are different, meaning the original password/phrase has changed and thedata integrity is compromised.Hash is a unique representation of a value, message, file, or data.Passwords in your system are always hashed.Evidence is stored in the form of logs.oLogs don’t lie.CIA TriadoConfidentiality, Integrity, Availability.SIEM toolSecurity Information and Event Managementcollects the logs, indexes them,correlates and allows you to search on those logs and get alerts.SPLUNKNonrepudiationproof of origin. Cannot deny having done something.Understanding Core Security GoalsoConfidentialityEncryptionAccess controlsSteganographyData hidden in pictures (Osama bin Laden used this).oIntegrityoAvailabilityRedundancyFault ToleranceUpdating/PatchingConfidentiality controlsoLeast privilegeGive users only the permission they need to preform there duties.oNeed to knowoSeparation of dutiesIntegrity ControlsoHashingoDigital signaturesoBackupsoVersion controlsAvailability controlsoRedundanceMultiple or backup systems designed for immediate or quick recoveryoFault toleranceSystems that continue to function after components fail.oPatch managementApplication of software updates with minimal service disruption.Air Gapnot physically connected to any network.Research Log4Jvulnerability out this year (Level 10 of scale 1-10).Information Security Roles and ResponsibilityoOverall responsibilityChief Security Officer (CSO)
Chief Information Security Officer (CISO)Top role in Cybersecurity.oManagerialoTechnicalInformation Systems Security Officer (ISSO)oNon-technicaloDue care/liabilityInformation Security Business UnitsHow do you ingest and bring in threat intelligence data to look for indicators of compromise(IOC) to be able to prevent various of threatsuse TAXIIoTAXII, Trusted automated exchange of indicator informationoSTIX, Structured threat information exchangeHypervisor, software that allows you to create and mange virtual machines.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 31 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Alfredo Perez
Tags
IP address, Transport Layer Security

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture