CompTIA Security Review
CompTIA Security Review
Review
Concepts
“Sua segurança é tão forte quanto o elo mais fraco” - o lado fraco
é o atrativo
Physical Security
Operational Security
Should also address how users should handle incidents and who they
contact
User management policies
Detection: identify events when they occur. May only be known with
post analisis
MAC
DAC
RBAC
Access control: MAC
When MAC is applied, labels are required and must exist for every
Access control: DAC
DAC != MAC since labels are not mandatory but can be applied as
needed
Dynamic in nature
Access control: RBAC
Proves that a user or system is actually who they claim they are
No true security
Server compares the values from client and if they match, grants
authorization
Authentication: Certificates
Availability: the data must be available when it’s need by who can
need it
VLANs:
Create groups of users and systems and segment them on the network
NAT:
cally. The DAC method allows the user to have some control over
what information and
resources are accessible. The RBAC method sets access levels and
permissions based on the
Asset Iden-
Is an active attack
Common attacks: replay attacks
DoS or DDoS
TCP/IP attacks: sequence number
attack
Smurf
ICMP tunneling
Multipartite: infects files, boot sector etc. Hope that you can’t
correct all of them
Phishing is an example
Chapter 3
Works like one or more of: packet filter, proxy firewall and
stateful inspection
Firewalls - packet filter
Are insecure
War driving is to drive around the town looking for WAPs that can
communicate
Remember Asterisk
Created by Microsoft
The negotiation between the two ends id done in clear text, and
therefore the data is encrypted
Created by Cisco
S/MIME and PGP are two popular methods for email security
SSL/TLS
7 categories:
3: 10Mbps ethernet
Tend to be slow
Uses RF spectrum
CDs, DVD
Hard Drivers
Sensor: component that collects data from the data source and
passes it to the analyzer
Types:
The IRP outlines the steps and who is responsible for deciding how
to handle the situation
Chain of custody: keep track of the evidency and show at all times
who has it, who seen it and where it has been
Incident response
Write down the steps used to identify, detect and repair the
system affected by the incident
Incident response
Common attacks:
Malicious code, trojans and DoS attacks can also be used against
IM
An attacker can query DNS servers and see the records to help
footprint your network
Scanning
Many concepts are shared with network security like perimeter and
security zones
Ex: a security zone would encompass one entire floor, while the
rooms are examples of partitions
Mantraps
Offers encryption
Wireless encryption
Tip: humidity can’t drop below 50%. eletrostatic damage may occur
To have fire: heat, fuel and oxygen. Most suppression systems work
with this concept
Fire supression
Is like eavesdroping
Project TEMPEST
Key components:
Phisical cryptography
Any method that doesn’t alter the value using mathematical process
Mathematical cryptography
Physical criptography
Example: “meet the mini me that ate later” meaning “meet me later”
Symetric algorithms
3DES
AES: based on Rijndael block cipher. Keys of 128, 192 and 256 bits
All ends should have the same key (think of 50 people to keep a
key secret)
RSA: Both encryption and signatures. SSL can use it. De facto
standard
A hash can be generated with the private key, and the public key
is sent to decrypt the hash. The receiver decrypts using your pub
key and see the hash. The hash proves the integrity of the
message.
Digital signatures, ex: