SlideShare a Scribd company logo
Proprietary & Confidential
@GoCyberSec | January 2020
Chapter 1
Mastering Security Basics
CompTIA Security +
Proprietary & Confidential
@GoCyberSec | January 2020
Introduction
• Understanding core security goals
• Introducing basic risk concepts
• Understanding control types
• Implementing virtualization
• Using command-line tools
Proprietary & Confidential
@GoCyberSec | January 2020
CIA Triad
• Confidentiality
– Access to information, assets, etc. should be
granted only on a need to know basis
• Integrity
– Integrity makes sure that the information is not
tampered whenever it travels from source to
destination or at rest (storage)
• Availability
– Availability concept is to make sure that the
services of an organization are available at all
times
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding Core Security Goals
• Confidentiality
–Encryption
–Access Controls
–Steganography
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding Core Security Goals
• Integrity
–Hashing
–Digital Signatures
–Certificates
–Non-repudiation
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding Core Security Goals
• Availability
–Redundancy
–Fault tolerance
–Patching
Proprietary & Confidential
@GoCyberSec | January 2020
Introducing Risk Concepts
• Threats
• Vulnerabilities
–Any weakness
• Risk is
–The likelihood that a threat will
exploit a vulnerability
• Risk mitigation
–Reduces the chances that a threat will exploit a vulnerability by
implementing controls
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding Control Types
Overview
• Technical controls use technology.
• Administrative controls use administrative or management methods.
• Physical controls refer to controls you can physically touch.
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding Control Types
Technical Controls
• Use technology to reduce vulnerabilities
• Examples
– Encryption
– Antivirus Software
– Intrusion Detection Systems
– Firewalls
– Least Privilege.
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding Control Types
Administrative Controls
• Use administrative or management methods
• Examples
– Risk Assessment
– Information Security Policies, Procedures and Standards
– Awareness & Training
– Configuration & Change Management
– Contingency Planning
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding Control Types
Physical Controls
• Any controls that you can physically touch.
• Examples
– Light
– Signs
– Fences
– Security Guards
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding Sub-Control Types
• Preventive attempt to prevent an incident from occurring.
• Detective controls attempt to detect incidents after they
have occurred.
• Corrective controls attempt to reverse the impact of an
incident.
• Deterrent controls attempt to discourage individuals from
causing an incident.
• Compensating controls are alternative controls used
when a primary control is not feasible.
Proprietary & Confidential
@GoCyberSec | January 2020
Preventive and Detective Controls
Detective controls
• Attempt to detect incidents after they have
occurred
• Log monitoring, trend analysis, security audit,
video surveillance, motion detection
• Cannot predict when an incident will occur
• Cannot Prevent an incident
• Used after an incident
Proprietary & Confidential
@GoCyberSec | January 2020
Preventive and Detective Controls
Preventive controls
• Attempt to prevent an incident from occurring
• Hardening, training, guards, change management, disabling
accounts
• Stops the incident before it occurs.
Proprietary & Confidential
@GoCyberSec | January 2020
Corrective and Compensating Controls
Corrective controls
–Attempt to reverse the impact of an incident
–Active IDS, backups, system recovery
Compensating
–Alternative controls used when a primary control is not
feasible
–TOTP instead of smart card
Proprietary & Confidential
@GoCyberSec | January 2020
Deterrent Controls
Deterrent controls
–Attempt to discourage individuals from causing an Incident
–Cable locks, hardware locks, fences
Compare to prevention
– Deterrent encourages people to decide not to take an undesirable
action
–Prevention stops them from taking an undesirable action
–Security guard can be both
Proprietary & Confidential
@GoCyberSec | January 2020
Implementing Virtualization
• Terminology
–Hypervisor
–Host
–Guest
–Host elasticity
–Host scalability
One host appears as five
systems on a network
Proprietary & Confidential
@GoCyberSec | January 2020
Comparing Hypervisors
• Type I (bare-metal)
– Runs directly on hardware
– No host operating system required
• Type II
– Runs as software within an operating system
Proprietary & Confidential
@GoCyberSec | January 2020
Application Cell Virtualization
• Runs services or applications within isolated application
cells (or containers)
• Also called container virtualization
Proprietary & Confidential
@GoCyberSec | January 2020
Application Cell Virtualization
• Runs services or applications within isolated application
cells (or containers)
• Also called container virtualization
Proprietary & Confidential
@GoCyberSec | January 2020
Using Virtualization
• Snapshots
– Copy of a VM at a moment in time
– Can revert to a snapshot if necessary
• VDI/VDE
– A user’s desktop
– Persistent VDE – keeps user changes
– Non-persistent VDE – doesn’t keep user changes
Proprietary & Confidential
@GoCyberSec | January 2020
Risks Associated with Virtualization
• VMs are files
– Can be copied
• VM escape
– Allows attacker to access host from guest
• VM sprawl
– Uncontrolled VM creation (not managed)
• Loss of confidentiality
Proprietary & Confidential
@GoCyberSec | January 2020
Command- Line Tools
• Windows
– Launch Command Prompt
– Launch Command Prompt (Admin)
Proprietary & Confidential
@GoCyberSec | January 2020
Command- Line Tools
• Linux
– Launch terminal in Kali
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding Switches & Case
• Windows switches typically use slash /
– ipconfig /?
• Linux systems typically use dash –
– ifconfig -?
• Windows commands rarely case sensitive
• Linux commands are case sensitive
Proprietary & Confidential
@GoCyberSec | January 2020
Command Demo
• Windows
– Ipconfig
– ping
– Netstat
– Tracert
– ARP
– Systeminfo
• Linux
– ifconfig
– cd
– ls
– grep
– mkdir
– mv
Proprietary & Confidential
@GoCyberSec | January 2020
Chapter 1 Summary
• Understanding core security goals
• Introducing basic risk concepts
• Understanding control types
• Implementing virtualization
• Using command-line tools

More Related Content

PPTX
501 ch 5 securing hosts and data
PPTX
501 ch 6 threats vulnerabilities and common attacks
PPTX
501 ch 2 understanding iam
PPTX
501 ch 7 protecting against advanced attacks
PPTX
501 ch 8 risk managment tool
PPTX
501 ch 4 securing your network
PPTX
501 ch 10 understanding cryptography and pki
PPTX
501 ch 9 implementing controls to protect assets
501 ch 5 securing hosts and data
501 ch 6 threats vulnerabilities and common attacks
501 ch 2 understanding iam
501 ch 7 protecting against advanced attacks
501 ch 8 risk managment tool
501 ch 4 securing your network
501 ch 10 understanding cryptography and pki
501 ch 9 implementing controls to protect assets

What's hot (20)

PPT
Ending the Tyranny of Expensive Security Tools: A New Hope
PPTX
CSA Presentation - Software Defined Perimeter
PPTX
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
PDF
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
PDF
CSA SV Threat detection and prediction
PPTX
Secure Your Web Applications and Achieve Compliance
PPTX
Plain talk about security public - ms1
PPTX
Threat Hunting at Scale
PPTX
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
PDF
PIE - BSides Vancouver 2018
PDF
Data Security for Project Managers
PDF
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
PDF
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
PDF
Microservices security CSA meetup ppt 10_21_2015_v2-2
PDF
Phishing Intelligence Engine - BlueHat v17
PPTX
application security basics
PPTX
The Key to Strong Cloud Security
PPTX
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
PPTX
Anomali Detect 2016 - Borderless Threat Intelligence
PPTX
IBM Secret Key management protoco
Ending the Tyranny of Expensive Security Tools: A New Hope
CSA Presentation - Software Defined Perimeter
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
CSA SV Threat detection and prediction
Secure Your Web Applications and Achieve Compliance
Plain talk about security public - ms1
Threat Hunting at Scale
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
PIE - BSides Vancouver 2018
Data Security for Project Managers
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
Microservices security CSA meetup ppt 10_21_2015_v2-2
Phishing Intelligence Engine - BlueHat v17
application security basics
The Key to Strong Cloud Security
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Anomali Detect 2016 - Borderless Threat Intelligence
IBM Secret Key management protoco
Ad

Similar to 501 ch 1 mastering security basics (20)

PPTX
501 ch-1-mastering-security-basics
PPTX
Disruptionware-TRustedCISO103020v0.7.pptx
PPTX
Assessment and Threats: Protecting Your Company from Cyber Attacks
PDF
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
PDF
Computer Security 3rd Edition Dieter Gollmann
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
PPT
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
PDF
Network and System Security John R. Vacca
DOCX
Security architecture principles isys 0575general att
PDF
Network Defense and Countermeasures: Principles and Practices, 4th Edition Wi...
DOCX
Comparing Security Roles and Security Controls Lesson 1
PPTX
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
PDF
Risk Mitigation Plan Based On Inputs Provided
PDF
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
PPT
Control system including PLC cybersecurity
501 ch-1-mastering-security-basics
Disruptionware-TRustedCISO103020v0.7.pptx
Assessment and Threats: Protecting Your Company from Cyber Attacks
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
Computer Security 3rd Edition Dieter Gollmann
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Network and System Security John R. Vacca
Security architecture principles isys 0575general att
Network Defense and Countermeasures: Principles and Practices, 4th Edition Wi...
Comparing Security Roles and Security Controls Lesson 1
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
Risk Mitigation Plan Based On Inputs Provided
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
Control system including PLC cybersecurity
Ad

More from gocybersec (12)

PPTX
501 ch 3 network technologies and tools
PPTX
501 ch 3 network technologies tools
PPTX
501 ch 7 advanced attacks
PPTX
501 ch 11 operational security
PPTX
501 ch 9 implementing controls
PPTX
501 ch 8 risk management tools
PPTX
501 ch 6 threats vulnerabilities attacks
PPTX
501 ch 7 advanced attacks
PPTX
501 ch 5 securing hosts and data
PPTX
501 ch 4 securing your network
PPTX
501 ch 3 network technologies tools
PPTX
501 ch 2 understanding iam
501 ch 3 network technologies and tools
501 ch 3 network technologies tools
501 ch 7 advanced attacks
501 ch 11 operational security
501 ch 9 implementing controls
501 ch 8 risk management tools
501 ch 6 threats vulnerabilities attacks
501 ch 7 advanced attacks
501 ch 5 securing hosts and data
501 ch 4 securing your network
501 ch 3 network technologies tools
501 ch 2 understanding iam

Recently uploaded (20)

PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Computing-Curriculum for Schools in Ghana
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Lesson notes of climatology university.
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Trump Administration's workforce development strategy
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Cell Structure & Organelles in detailed.
PDF
Weekly quiz Compilation Jan -July 25.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
Practical Manual AGRO-233 Principles and Practices of Natural Farming
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Computing-Curriculum for Schools in Ghana
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Final Presentation General Medicine 03-08-2024.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
STATICS OF THE RIGID BODIES Hibbelers.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Lesson notes of climatology university.
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Anesthesia in Laparoscopic Surgery in India
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Trump Administration's workforce development strategy
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Cell Structure & Organelles in detailed.
Weekly quiz Compilation Jan -July 25.pdf

501 ch 1 mastering security basics

  • 1. Proprietary & Confidential @GoCyberSec | January 2020 Chapter 1 Mastering Security Basics CompTIA Security +
  • 2. Proprietary & Confidential @GoCyberSec | January 2020 Introduction • Understanding core security goals • Introducing basic risk concepts • Understanding control types • Implementing virtualization • Using command-line tools
  • 3. Proprietary & Confidential @GoCyberSec | January 2020 CIA Triad • Confidentiality – Access to information, assets, etc. should be granted only on a need to know basis • Integrity – Integrity makes sure that the information is not tampered whenever it travels from source to destination or at rest (storage) • Availability – Availability concept is to make sure that the services of an organization are available at all times
  • 4. Proprietary & Confidential @GoCyberSec | January 2020 Understanding Core Security Goals • Confidentiality –Encryption –Access Controls –Steganography
  • 5. Proprietary & Confidential @GoCyberSec | January 2020 Understanding Core Security Goals • Integrity –Hashing –Digital Signatures –Certificates –Non-repudiation
  • 6. Proprietary & Confidential @GoCyberSec | January 2020 Understanding Core Security Goals • Availability –Redundancy –Fault tolerance –Patching
  • 7. Proprietary & Confidential @GoCyberSec | January 2020 Introducing Risk Concepts • Threats • Vulnerabilities –Any weakness • Risk is –The likelihood that a threat will exploit a vulnerability • Risk mitigation –Reduces the chances that a threat will exploit a vulnerability by implementing controls
  • 8. Proprietary & Confidential @GoCyberSec | January 2020 Understanding Control Types Overview • Technical controls use technology. • Administrative controls use administrative or management methods. • Physical controls refer to controls you can physically touch.
  • 9. Proprietary & Confidential @GoCyberSec | January 2020 Understanding Control Types Technical Controls • Use technology to reduce vulnerabilities • Examples – Encryption – Antivirus Software – Intrusion Detection Systems – Firewalls – Least Privilege.
  • 10. Proprietary & Confidential @GoCyberSec | January 2020 Understanding Control Types Administrative Controls • Use administrative or management methods • Examples – Risk Assessment – Information Security Policies, Procedures and Standards – Awareness & Training – Configuration & Change Management – Contingency Planning
  • 11. Proprietary & Confidential @GoCyberSec | January 2020 Understanding Control Types Physical Controls • Any controls that you can physically touch. • Examples – Light – Signs – Fences – Security Guards
  • 12. Proprietary & Confidential @GoCyberSec | January 2020 Understanding Sub-Control Types • Preventive attempt to prevent an incident from occurring. • Detective controls attempt to detect incidents after they have occurred. • Corrective controls attempt to reverse the impact of an incident. • Deterrent controls attempt to discourage individuals from causing an incident. • Compensating controls are alternative controls used when a primary control is not feasible.
  • 13. Proprietary & Confidential @GoCyberSec | January 2020 Preventive and Detective Controls Detective controls • Attempt to detect incidents after they have occurred • Log monitoring, trend analysis, security audit, video surveillance, motion detection • Cannot predict when an incident will occur • Cannot Prevent an incident • Used after an incident
  • 14. Proprietary & Confidential @GoCyberSec | January 2020 Preventive and Detective Controls Preventive controls • Attempt to prevent an incident from occurring • Hardening, training, guards, change management, disabling accounts • Stops the incident before it occurs.
  • 15. Proprietary & Confidential @GoCyberSec | January 2020 Corrective and Compensating Controls Corrective controls –Attempt to reverse the impact of an incident –Active IDS, backups, system recovery Compensating –Alternative controls used when a primary control is not feasible –TOTP instead of smart card
  • 16. Proprietary & Confidential @GoCyberSec | January 2020 Deterrent Controls Deterrent controls –Attempt to discourage individuals from causing an Incident –Cable locks, hardware locks, fences Compare to prevention – Deterrent encourages people to decide not to take an undesirable action –Prevention stops them from taking an undesirable action –Security guard can be both
  • 17. Proprietary & Confidential @GoCyberSec | January 2020 Implementing Virtualization • Terminology –Hypervisor –Host –Guest –Host elasticity –Host scalability One host appears as five systems on a network
  • 18. Proprietary & Confidential @GoCyberSec | January 2020 Comparing Hypervisors • Type I (bare-metal) – Runs directly on hardware – No host operating system required • Type II – Runs as software within an operating system
  • 19. Proprietary & Confidential @GoCyberSec | January 2020 Application Cell Virtualization • Runs services or applications within isolated application cells (or containers) • Also called container virtualization
  • 20. Proprietary & Confidential @GoCyberSec | January 2020 Application Cell Virtualization • Runs services or applications within isolated application cells (or containers) • Also called container virtualization
  • 21. Proprietary & Confidential @GoCyberSec | January 2020 Using Virtualization • Snapshots – Copy of a VM at a moment in time – Can revert to a snapshot if necessary • VDI/VDE – A user’s desktop – Persistent VDE – keeps user changes – Non-persistent VDE – doesn’t keep user changes
  • 22. Proprietary & Confidential @GoCyberSec | January 2020 Risks Associated with Virtualization • VMs are files – Can be copied • VM escape – Allows attacker to access host from guest • VM sprawl – Uncontrolled VM creation (not managed) • Loss of confidentiality
  • 23. Proprietary & Confidential @GoCyberSec | January 2020 Command- Line Tools • Windows – Launch Command Prompt – Launch Command Prompt (Admin)
  • 24. Proprietary & Confidential @GoCyberSec | January 2020 Command- Line Tools • Linux – Launch terminal in Kali
  • 25. Proprietary & Confidential @GoCyberSec | January 2020 Understanding Switches & Case • Windows switches typically use slash / – ipconfig /? • Linux systems typically use dash – – ifconfig -? • Windows commands rarely case sensitive • Linux commands are case sensitive
  • 26. Proprietary & Confidential @GoCyberSec | January 2020 Command Demo • Windows – Ipconfig – ping – Netstat – Tracert – ARP – Systeminfo • Linux – ifconfig – cd – ls – grep – mkdir – mv
  • 27. Proprietary & Confidential @GoCyberSec | January 2020 Chapter 1 Summary • Understanding core security goals • Introducing basic risk concepts • Understanding control types • Implementing virtualization • Using command-line tools