Revision Topics
Revision Topics
So here’s what happening, I doubt that I will pass the exam (CompTIA Security+). There are so many topics, I am getting confused. I will pickup some topics I think I am weak at and study them from different sources.
The chapter “Risk Management & Privacy” have something called “ different data roles “. These roles helps to clarify responsibilities for managing & protecting data within an organization.
Different data roles outlined
- Data Owners : These are senior executives who are designated responsibility for different data types. E.G. VP of HR might be the data owner of employment and payroll data. Data owners understands the impact of there decisions about there data on there business. They delegate responsibilities and rely of advice from subject matter experts.
- Data Subjects : These are individuals whose data is being processed. This includes customers, employee and partners. Data subjects often have rights to there data like right to access, correct & request deletion.
- Data Controllers : These are individuals who defines the reason from processing personal information and direct the method of processing the data. They serves as the substitute of Data Owners to avoid the presumption of ownership.
- Data Stewards : There are induvial who carry out the intent of “Data Controller” and are delegated responsibility from the controller.
- Data Custodian : These are individuals or teams responsible for the secure safekeeping of the information but do not have controller or stewardship responsibility.
- Data Processors : These are service providers that process personal information on behalf of a data controller. E.G. A credit card processing service for a retailer. The retailer remains a data controller while the service acts as a data processor.
- Data Protection Officer (DPO) : A specific individual who bears the overall responsible for an organization’s data privacy efforts. The chief privacy officer often holds this role.
- Continuous Integration (CI) is a software development practice where developers frequently merge code changes into a shared repository, often several times a day. Each integration is then automatically verified by building the software and running automated tests to detect issues early.
From Security Governance and Compliance, different agreement types
- Service-Level Agreements (SLA) : Written contracts that specify the conditions of service that will be provided by the vendor and the remedies available to the customer if the vendor fails to meet the SLA. Covered issues such as system availability, data durability, and response time.
- Memorandum of agreement (MOA) : This is a letter written to document aspects of a relationship. In simple term this is like a pre-contract where everyone involved agrees on certain terms, responsibilities, and rules before working together.
- Master Service Agreement (MSA) : This provides an umbrella contract for the work the vender does with an organization over an extended period of time. This agreement typically includes detailed security and privacy requirements
- Work Order (WO) / Statement of work (SOW) : When an organization have a MSA with a vendor, they may create a WO or SOW for new project. The SOW outlines the specific services to be provided by the vendor, along with associated timelines and costs.
- Non-Disclosure Agreement (NDA) : This is an agreement used to protect sensitive information. NDA are crucial when sharing confidential data with the vendors and should be included in the vender agreements.
- Business Partner Agreement (BPA) : It is an agreement outlining the terms of a partnership between two or more business entities.
Categories of modern encryption algorithms
- Symmetric Key Algorithms : These algorithms use single, shared secret key from encryption & decryption. All communicating parties possess a copy of this secret key.
- Data Encryption Standard (DES) : Published in 1977, it was once a standard but is no longer considered secure due to flaws in the algorithm and short key length . It has been superseded by AES
- Triple DES (3DES): An improvement over DES, but still considered less secure and efficient than AES
- Advanced Encryption Standard (AES) : This is a strong symmetric encryption algorithm and the successor to DES7 …. It is widely used in various applications, including wireless network security (WPA3), TLS, and file/disk encryption
Key management, including secure creation, distribution, storage, destruction, recovery and Escrow of secret keys , is crucial for symmetric cryptography . Key exchange is a significant challenge, with methods including offline distribution, public key encryption, and the Diffie-Hellman key exchange algorithm Symmetric encryption is generally fast and efficient for bulk encryption. However, it does not provide Non-Repudiation
- Asymmetric Key Algorithms : Also known as public key algorithms, these systems use two mathematically related keys for each user: a public key, which can be shared with anyone, and a private key, which is kept secret by the owner.
Asymmetric cryptography solves the key exchange problem of symmetric cryptography as public keys can be freely shared. It also provides Authentication and Non-Repudiation through the use of digital signatures.
Importance of Choosing Appropriate Cryptographic Solutions
- Meeting Security Goals
- Strength of the Algorithm
- Key Length
- Key Management Practices
- Resistance to Attacks
- Performance Requirements
- Compliance and Standards
Mitigation Techniques for Endpoints
Patching
- Ensure operating systems and software are up to date to remove known vulnerabilities.
- Timely patching reduces the window of opportunity for exploits.
- Implement patch management processes to control and streamline updates.
Encryption
- Encrypt data on endpoints (full disk or specific files) to prevent unauthorized access.
- Use tools like Trusted Platform Modules (TPM) and Hardware Security Modules (HSM) to manage encryption keys securely.
Configuration Enforcement
- Maintain secure baselines and enforce configurations to reduce vulnerabilities.
- Leverage tools like Group Policy (Windows) and SELinux (Linux) for policy enforcement.
Decommissioning
- Sanitize or destroy data on retired systems.
- Securely handle hardware to prevent exposure of sensitive data.
Hardening Techniques
Harden systems by reducing attack surfaces and enhancing security settings:
- Encryption: (Already covered above, but also part of hardening).
- Installation of endpoint protection: Deploy antivirus, antimalware, EDR, and XDR tools to detect, prevent, and remediate threats.
- Host-based firewall: Enable firewalls on endpoints to filter traffic by applications, ports, protocols, and services.
- Host-based intrusion prevention system (HIPS): Monitor and block malicious endpoint activities.
- Disabling ports/protocols: Close unnecessary ports and protocols; limit interactions to essential services.
- Default password changes: Replace vendor defaults with strong, unique passwords.
- Removal of unnecessary software: Uninstall unused applications/services to minimize vulnerabilities.
Security controls
Categories
- Technical Controls
- Managerial Controls
- Operational Controls
- Physical Controls
Security Control Types
- Preventive controls
- Deterrent controls
- Detective controls
- Corrective controls
- Compensating controls
- Directive controls
Difference between stateful and stateless firewalls
Stateless Firewall
A stateless firewall filters packets based only on predefined rules like IP address, port, or protocol without keeping track of connection state.
Key Characteristics:
- Examines each packet individually
- Doesn’t remember past traffic
- Faster, but less secure
- Commonly used for simple packet filtering
Example Rule:
Allow TCP traffic from IP 192.168.1.5
on port 80
.
Stateful Firewall
A stateful firewall tracks the state of active connections and makes decisions based on the context of traffic (e.g., whether a packet is part of an existing connection).
Key Characteristics:
- Maintains a state table (connection tracking)
- Smarter, more secure
- Can detect and block unauthorized or suspicious traffic
- Used in modern firewalls and enterprise setups
Example Behavior:
Allows a response packet only if it matches a previously initiated and allowed connection.
Feature | Stateless Firewall | Stateful Firewall |
---|---|---|
Tracks connections | ❌ No | ✅ Yes |
Performance | ⚡ Faster | 🛡️ More resource-intensive |
Security | 🚧 Basic filtering only | 🔒 Context-aware filtering |
Use Case | Simple, low-risk networks | Enterprise, complex networks |
Podcast of Security Controls & Security Operations (AI Generated)
Practices
- Regulatory audit : A systematic examination of an organization’s compliance with regulations
- Sender Policy Framework (SPF) : A framework to prevent e-mail spoofing
- Network Access Control (NAC) : A security solution that enforces policies on device accessing the network
- Domain Based Message Authentication (DMARC) : Referring to email authentication techniques that verify if an email was genuinely sent from a domain it claims to come from
- Domain Key Identified Main (DKIM) : It is an email authentication method that allows the receiver of an email to verify that it was sent by an authorized mail server and was not altered in transit
- E-Discovery : The process of identifying, collecting and producing electronically stored information
- Supervisory Control and Data Acquisition (SCADA) : It is a control system architecture used to monitor and manage industrial processes. It combines hardware and software to collect real-time data from sensors and devices, process and analyze it, and provide operators with a graphical interface to supervise and control operations.
- Deauthentication : Commonly associated with wireless network. This attack mostly cause loss of connectivity.
- Federation : Allows members of an organization to authenticate using credentials from another organization
- Mean Time Before Failures (MTBF) : Prediction on how often a repairable system will fail
- Recovery Time Objectives (RTO) : Objectives required to restore a particular service level
- Mean Time To Restore (MTTR) : The amount of time requires to restore a component
- Segmenting : Segmenting the servers to their own protected network would allow for additional security controls while still maintaining the uptime and availability of the systems.
- Journaling : Writes data to a temporary journal before writing the information to the database. If power is lost, the system can recover the last transaction from the journal when power is restored.
- Mobile Device Management (MDM) : A centralized management system for mobile device.
- Corporately Owned and Personally Enabled (COPE) : Is commonly purchased by the corporation and allows the use of the mobile device for both business and personal use.
- Escalation : Automation can recognize a security event and security related ticket to the incident response team without any additional human interaction.
- Guard Rails : They are set by application developers to provide a set of automated validations to user input and behavior.
- 802.1X : A centralized authentication server, and this allows all users to use their corporate credentials during the login process.
- Pre-Shared Key (PSK) : A wireless authentication configuration that allows each user on the network to connect using same key / password
- Configuration enforcement : A posture assessment evaluates the configuration of a system to ensure all configurations and applications are up to date and secure as possible.
- Discretionary Access Model : This models allows the owner of the resource to control who has access.
- Mandatory Access Control : Allows access to the resource based on the security level assigned to an object. Only users with object’s assigned security clearance or above can access.
- Supervisor Control and Data Acquisition (SCADA) : Is a data
Hardning
process for industrial system might include network segmentation, additional firewall and access control list. - Configuration enforcement : Many organizations will perform a posture assessment during the login process to verify the proper security controls are in place. If the device does not pass the assessment, the system can be quarantined and any missing security updates can then be installed.
- Account lockout : In this example, there were no errors or notifications regarding the account or authentication status.
- Decommissioning : The decommissioning process is often used to permanently remove devices from the network. In this example, the laptop mitigation would allow the device to return to the network once the updates were complete.
- Sideloading : Sideloading describes the installation of software on a mobile device through the use of third-party operating systems or websites.
- Compensating Security Control : This control does not prevent an attack but does restore from attack using other means
- Responsibility matrix : A cloud responsibility matrix is usually published by the provider to document the responsibilities for all cloud-based services.
- Playbook : A playbook provides conditional steps to follow when managing an organization’s processes and procedures. Well from time to time, you can see my thoughts pouring here or just raw opinions. Well its my dam blog, I can write what ever tf I want but I do make sure the information I write here are accurate because I am also studying from them for this dam exam …
- Instant messaging : Instant messaging is commonly used as an attack vector, and one way to help protect against malicious links delivered by instant messaging is a host-based firewall.
- Web Application Firewall (WAF) : Protects against web application attacks like XSS, SQL Injection
- Content Delivery Network (CDN) : Helps to distribute and absorb large volume of traffic (DDOS attack), mitigating its impact and keeping web server available to legitimate users.
- Diffie-Hellman key exchange : Key exchange is a cryptographic protocol that allows two parties to securely exchange cryptographic keys over an unsecured communication channel
- Cross-site request forgery (CSRF) : Exploits the trust that a web application has in the user’s browser. It tricks the user into submitting a request, such as clicking a link or loading a page, that performs an action on a site where the user is authenticated.
- Enable remote wipe : Allows the data on a mobile device to be erased remotely in case the device is lost or stolen, thus preventing unauthorized access to sensitive information.
- Secure/Multipurpose Internet Mail Extensions (S/MIME) : Provides end-to-end encryption for email messages.
- Kerberos protocol : Kerberos is a network authentication protocol designed to provide strong authentication for user access to network services, often implemented as a single sign-on (SSO) system. It uses secret-key cryptography to authenticate users and services.
- File Integrity Monitoring (FIM) : Detects and reports unauthorized changes to critical files.
- Public Key Infrastructure (PKI) : Provides a framework for managing digital certificates and encryption keys, ensuring secure communications.
- Hardware tokens generate OTPs that do not rely on an internet connection, providing a reliable MFA method for remote employees with unreliable internet access.
- Trusted Platform Module (TPM) : Is a hardware component that provides secure generation and storage of cryptographic keys. It ensures that keys are stored securely and can only be accessed by authorized software.
- Steganography : Hiding messages within other non-secret text or data to avoid detection.
- Obfuscation : Makes data difficult to understand but does not hide it.
- Deprovisioning : It is the process of removing or deactivating users access rights when there are no longer needed.
- Spraying attack is a type of password attack that involves trying common passwords against multiple accounts.
- Fileless malware operates in memory, often leveraging legitimate system tools to evade detection. It might adjust registry values for persistence and can run within its own process or use tools like PowerShell to achieve its objectives.
- In digital forensics, the acquisition process refers to the methodical steps taken to collect digital evidence from a device or system in a way that ensures its integrity and usability in an investigation. This involves creating a bit-by-bit copy (or forensic image) of the original data to preserve its content while preventing any alterations during analysis.
- Risk register is a comprehensive record that lists all identified risks, their potential impacts, assigned risk owners, and current risk status. It serves as a central repository for tracking and monitoring risks over time.
- Exposure factor (EF) is the fraction of the asset value that is at risk in the event of a security incident. Asset impact can refer to the general effect on an asset but doesn’t provide a quantifiable percentage like the exposure factor does.
- Real-Time Operating System (RTOS) prioritize performance, sometimes at the expense of security features like buffer overflow protections, potentially leaving the system susceptible to certain attacks. While cloud access can pose risks, it’s not an inherent security implication of using an RTOS. RTOSs are designed for efficiency and generally don’t involve the overheads from virtualization layers.
- A proxy server stands between the user’s computer and the internet, intercepting requests and potentially reducing the public-facing attack surface by masking the internal server, meeting the scenario requirements.
- Session Initiation Protocol (SIP), port 5060, is used for signaling in Voice over IP (VoIP) services. Unauthorized access to this port can result in toll fraud or unauthorized call control. Simple Network Management Protocol (SNMP), port 161, is used for collecting and organizing information about managed devices, and it’s unrelated to VoIP services. NetBIOS, port 139, is used for file and print sharing over local networks, not for VoIP signaling. Post Office Protocol (POP3), port 110, is used for retrieving emails from a mail server, unrelated to VoIP services.
- Risk appetite refers to an organization’s willingness to take on risk in pursuit of its business objectives. It reflects the organization’s strategic approach to risk and how much risk it is willing to undertake to achieve specific goals. Risk acceptance means that an organization understands the level of risk that in involved in an activity and is willing to accept the outcomes of taking the risk. The risk is either accepted or not, there aren’t levels of risk acceptance. In this case they are not making a decision about a level of risk for a specific activity. Risk tolerance is the extent to which an organization is comfortable with the level of risk it is willing to take. It represents the organization’s ability to withstand potential losses or disruptions. Risk deterrence involves taking measures to reduce or mitigate the impact of an event.
- ARO (Annualized rate of occurrence) quantifies the expected frequency of a risk occurring within a one-year time frame. While SLE (Single loss expectancy) calculates the cost of a single occurrence of a risk event, it does not account for the frequency of that event over time, which is necessary to calculate ALE. Exposure Factor (EF) determines the proportion of asset value lost per risk event, a component of SLE calculation, but not directly related to the annualized expected loss. Annualized Loss Expectancy (ALE) represents the yearly financial loss a company can expect from a specific risk, factoring in both the severity and frequency of the event.
- Next Generation Firewall (NGFW) has several improvements over the company’s previous stateful firewall, such as application awareness that can distinguish between different types of traffic, can conduct deep packet inspection and use signature-based intrusion detection, and has the ability to be integrated with various other security products. Tracking of connections and requests, allowing return traffic for outbound requests, and improving awareness of connection states on layer 4 were already features on the stateful firewall that was replaced.
- Data at rest, such as that found in databases, archived media, or configuration files, can be vulnerable to unauthorized access. To protect this data, organizations commonly employ encryption methods. This can range from whole disk encryption to database or individual file/folder encryption. Additionally, by setting up access control lists (ACLs), organizations can ensure that only authorized individuals can access or modify the stored data.
- Adaptive identity allows for more flexible and dynamic access control by using contextual data to make dynamic access control decisions. For example, the system might grant access to a sensitive resource based on the user’s location or the time of day.
- Policy-driven access control allows for more flexible and dynamic access control by using pre-defined policies to make access control decisions, but it does not necessarily adapt to changing user behavior and access patterns.
- Agentless posture assessment in NAC solutions, while beneficial for supporting a broad range of devices, often provides less granular data about the client compared to agent-based solutions. This can limit the depth of assessment and control. Agentless solutions don’t require storage on the client device for an agent, so this isn’t a disadvantage of agentless posture assessment. Agentless posture assessment in NAC solutions, while beneficial for supporting a broad range of devices, often provides less granular data about the client compared to agent-based solutions. This can limit the depth of assessment and control. Agentless solutions don’t require storage on the client device for an agent, so this isn’t a disadvantage of agentless posture assessment.
- A backout plan is crucial when deploying updates or changes to a system. It provides a predefined strategy to revert changes and restore a system to its prior state if complications arise, ensuring system stability and minimizing downtime.
- A standard operating procedure is a set of detailed instructions that describes how specific routine tasks should be carried out.
- Ephemeral credentials are temporary and designed for short-lived purposes, thus reducing the risk of those credentials being misused or compromised.
- Principle of least privilege ensures minimal access rights, it does not provide short-lived credentials.
- Static access tokens are long-lived and don’t automatically expire after a short task, posing a higher security risk.
- Serverless is an architecture model that allows running code without managing any underlying infrastructure. It can offer benefits such as flexibility, scalability, cost-efficiency, and security.
- Infrastructure as code (IAC) is a method of managing and provisioning IT infrastructure through code, not running code without managing any underlying infrastructure.
- Software-defined networking (SDN) is a network technology that involves dynamically configuring and managing network devices and services through software, not creating multiple isolated environments on a single physical device.
- Remote Desktop Protocol (RDP) port is a type of open service port that is commonly used for remote desktop servers and can be exploited by attackers to perform screen capture, keystroke logging, or malware delivery attacks. It is the default port for RDP, the protocol used to remotely control a Windows based system’s desktop.
- Replication involves creating copies of data in real-time or near-real-time to another location. This ensures data availability even if one location fails and can also aid in load balancing.
- Differential backups store all changes made since the last full backup. They provide a medium between full and incremental backups but do not provide real-time data duplication.
- Snapshots capture the state of a system at a specific point in time. While they offer quick recovery options.
- Journaling monitors and records all transactions and changes to a system.
- Human-Machine Interface (HMI) is a critical component in an ICS that allows operators to interact directly with the system. Its security is paramount to prevent unauthorized access and potential manipulation of the system.
- 802.1x is a standard developed by the IEEE to govern port-based network access. When used with a RADIUS based authentication server it provides authentication services, checking user credentials to ensure that the user is a legitimate part of the organization and granting access to only those areas of the system that the user is allowed to access.
- FMEA (Failure mode and effects analysis) is a proactive method to identify possible failures, separate from quantifying time between failures.
- Audit trails are detailed records that log sequential activities within a system, providing crucial data for detecting, examining, and understanding the nature of security breaches. While incident logs are related, they typically refer to records of incidents that have already been identified, rather than the broader spectrum of activity that audit trails encompass.
- Event monitoring is a process that involves real-time tracking of system events, which may utilize audit trails, but it is not synonymous with the comprehensive recording function of audit trails
- End-of-life vulnerability can allow a hardware attack that involves exploiting vulnerabilities in devices that are no longer supported or updated by the manufacturer. It can allow an attacker to compromise the security or functionality of the device, or use it as a gateway to access other systems or networks.
- Insecure Interfaces and APIs are a type of vulnerability that arises when the interaction between users and cloud services through interfaces and APIs is not secure, exposing systems to potential unauthorized access and manipulation of data.
- Side loading refers to the practice of installing applications on a device without using the official app store, which can lead to various security concerns, including the installation of malicious software.
- Policy-driven access control in the Zero Trust approach emphasizes making access determinations rooted in established and well-defined security policies. This ensures consistency and adherence to security best practices when granting or denying access.
- Network segmentation is a strategy that isolates different parts of a network to contain potential threats or breaches. While it can be a component of a Zero Trust approach, it doesn’t directly align with the concept of making access decisions based on specific policies.
- Relying on continuous user behavior assessment involves evaluating the actions and patterns of users consistently to detect anomalies or potentially malicious activities. While behavior assessment can be part of a comprehensive security strategy, Policy-driven access control specifically centers around using defined policies for granting or denying access. Ensuring secure data transfer post-access decision deals with securing data during its transmission after an access decision has been made. While ensuring secure data transfer is crucial for protecting information in transit, it doesn’t directly correlate with making access decisions based on preset policies.
- Port security, a feature of managed network switches, allows an organization to limit which devices can connect to a network based on their physical addresses (MAC addresses), thus meeting the requirements of this scenario.
- Fail-open is a failure mode that permits network traffic to continue even when a device fails. It doesn’t directly control which devices can connect to a network.
- A jump server primarily provides secure access to devices in a different security zone but doesn’t specifically control network connectivity based on devices’ physical addresses.
- Common Vulnerability Scoring System (CVSS) is an industry standard for assessing the severity of security vulnerabilities. It provides a technique for scoring each vulnerability on a variety of measures.
- Record-level encryption is commonly used with databases to encrypt individual columns within the database.
- Resource provisioning can be automated during the on-boarding and off-boarding process to quickly create or remove rights and permissions.
- Enumeration describes the detailed listing of all parts in a particular device.
So much is there, the thing is its not tough just that so much information … I do love this subject and all the information … But since I am changing my career at so late age, i believe that getting this cert might confirm my entry into cyber security field. Maybe its just a false hope, maybe it’s the right step … Time will answer the questions !!!
💡 Join the discussion:
For questions or collaboration opportunities, visit our ZeroDayMindset Discussion Board