CompTIA Security Study Guide
CompTIA Security Study Guide
CompTIA Security Study Guide
6
Late 1970s: microprocessor expanded
computing capabilities and security threats
◦ From mainframe to PC
◦ Decentralized computing
◦ Need for sharing resources increased
◦ Major changed computing
7
Networks of computers became more common;
so too did the need to interconnect networks
8
The Internet brings millions of computer networks
into communication with each other—many of
them unsecured
9
“The quality or state of being secure—to be free
from danger”
A successful organization should have multiple
layers of security in place:
◦ Physical security
◦ Personal security
◦ Operations security
◦ Communications security
◦ Network security
◦ Information security
10
The protection of information and its critical
elements, including systems and hardware that use,
store, and transmit that information
Necessary tools: policy, awareness, training,
education, technology
C.I.A. triangle was standard based on confidentiality,
integrity, and availability
C.I.A. triangle now expanded into list of critical
characteristics of information
11
Confidentiality
◦ Is the concealment of information or resources. Only those with sufficient
privileges may access certain information. Confidentiality is about preventing
unauthorized users accessing information to which they are entitled. The
need for keeping information secret arises from the use of computers in
sensitive fields such as government and industry.
A crucial aspect of confidentiality is user identification and authentication.
Positive identification of each system user is essential to ensuring the
effectiveness of policies that specify who is allowed access to which data
items.
18
19
The value of information comes from the
characteristics it possesses:
◦ Timeliness
No value if it is too late
◦ Availability
No interference or obstruction
Required format
◦ Accuracy
Free from mistakes
◦ Authenticity
Quality or state of being genuine, i.e., sender of an email
◦ Confidentiality
Disclosure or exposure to unauthorized individuals or system is
prevented
20
Integrity
◦ Whole, completed, uncorrupted
◦ Cornerstone
◦ Size of the file, hash values, error-correcting codes,
retransmission
Utility
◦ Having value for some purpose
Possession
◦ Ownership
◦ Breach of confidentiality results in the breach of possession,
not the reverse
21
Information System (IS) is entire set of software, hardware,
data, people, procedures, and networks necessary to use
information as a resource in the organization
Software
◦ Perhaps most difficult to secure
◦ Easy target
◦ Exploitation substantial portion of attacks on information
Hardware
◦ Physical security policies
◦ Securing physical location important
◦ Laptops
◦ Flash memory
22
Data
◦ Often most valuable asset
◦ Main target of intentional attacks
People
◦ Weakest link
◦ Social engineering
◦ Must be well trained and informed
Procedures
◦ Threat to integrity of data
Networks
◦ Locks and keys won’t work
23
Computer can be subject of an attack and/or the
object of an attack
24
25
What is a Threat? In computer security a
threat is a possible danger that might
exploit a vulnerability to breach security
and thus cause possible harm.
A threat can be either "intentional" (i.e.,
intelligent; e.g., an individual cracker or a
criminal organization) or "accidental" (e.g.,
the possibility of a computer
malfunctioning
1971 The first worm Bob Thomas, a developer
working on ARPANET, a precursor to the
Internet, wrote a program called Creeper that
passed from computer to computer, displaying
a message
◦ Participant support
34
Systems development life cycle (SDLC) is
methodology and design for implementation of
information security within an organization
Methodology is formal approach to problem-solving
based on structured sequence of procedures
Using a methodology
◦ ensures a rigorous process
◦ avoids missing steps
Goal is creating a comprehensive security
posture/program
Traditional SDLC consists of six general phases
35
36
The same phases used in traditional SDLC may be
adapted to support specialized implementation of
an IS project
37
Investigation
◦ Identifies process, outcomes, goals, and constraints of the
project
Analysis
38
Logical Design
◦ Creates and develops blueprints for information security
Physical Design
◦ Needed security technology is evaluated, alternatives
generated, and final design selected
39
Implementation
◦ Security solutions are acquired, tested, implemented, and
tested again
◦ Personnel issues evaluated; specific training and education
programs conducted
◦ Entire tested package is presented to management for
final approval
40
Wide range of professionals required to support a
diverse information security program
41
Chief Information Officer (CIO)
◦ Senior technology officer
◦ Primarily responsible for advising senior executives
on strategic planning
42
Economic damage
Negative publicity
Loss of competitive advantage
Reduced organizational viability
Loss of customer confidence
Legal liability
Increased Internet Usage
Lack of awareness of threats and risks .
Unencrypted network traffic
Complexity of security measurements and
administration
Software bugs
Availability of cracking tools