Professional Documents
Culture Documents
1.1 Mastering Security Basics
1.1 Mastering Security Basics
CompTIA Security+
Get Certified Get Ahead
By Darril Gibson
• Actors • Postcondition
• Precondition • Normal flow
• Trigger • Alternate flow
Place order
– Encryption ciphertext
– Access controls
– Steganography and
Obfuscation I can pass
– Hashing
– Digital signatures
– Certificates
– Non-repudiation
– Redundancy
– Fault tolerance
– Patching
• Vulnerabilities Exploits
– Any weakness Vulnerability
Resulting in
• Risk is
Loss
– The likelihood that a threat will
exploit a vulnerability
• Risk mitigation
– Reduces the chances that a threat will exploit a
vulnerability by implementing controls
GetCertifiedGetAhead.com © 2017 YCDA, LLC
Understanding Control Types
• Technical controls
– Use technology to reduce vulnerabilities
• Examples
– Encryption
– Antivirus software
– IDSs
– Firewalls
– Least privilege
• Examples
– Lighting
– Signs
– Fences
– Security guards
• Prevention controls
– Stop the incident before it occurs
• Compensating
– Alternative controls used when a primary control is
not feasible
– TOTP (Time-based One-Time Password) instead of
smart card
GetCertifiedGetAhead.com © 2017 YCDA, LLC
Control Goals
• Deterrent
• Attempt to discourage individuals from causing an incident
• Cable locks, hardware locks
• Compare to prevention
• Deterrent encourages people to
decide not to take an undesirable action
• Prevention stops them from
taking an undesirable action
• Security guard can be both
GetCertifiedGetAhead.com © 2017 YCDA, LLC
Implementing Virtualization
• Terminology
– Hypervisor
One host
– Host Five guests
– Guest
– Host elasticity
– Host scalability
Appears as five
systems on a network
• Type II
– Runs as software
within an
operating system
• VDI/VDE
– A user’s desktop
– Persistent VDE – keeps user changes
– Non-persistent VDE – doesn’t keep user changes
GetCertifiedGetAhead.com © 2017 YCDA, LLC
Risks Associated with Virtualization
• VMs are files
– Can be copied
• VM escape
– Allows attacker to access host from guest
• VM sprawl
– Uncontrolled VM creation (not managed)
• Loss of confidentiality
– Launch terminal
in Kali
• Labs http://gcgapremium.com/501labs/
GetCertifiedGetAhead.com © 2017 YCDA, LLC