Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
512 views
10 pages
CompTIA Security+ (Study Notes) .
CompTIA Security+ (Study Notes).
Uploaded by
Yovxy Ma
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save CompTIA Security+ (Study Notes). For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
512 views
10 pages
CompTIA Security+ (Study Notes) .
CompTIA Security+ (Study Notes).
Uploaded by
Yovxy Ma
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save CompTIA Security+ (Study Notes). For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save CompTIA Security+ (Study Notes). For Later
You are on page 1
/ 10
Search
Fullscreen
CompTIA Security+ (Study Notes) BON Overview of Security © Welcome © Domains (S¥O-501) + Threats, Attacks, and Vulnerabilities (21%) + Technologies and Tools (22%) + Architecture and Design (15%) + Identity and Access Management (16%) + Risk Management (14%) + Cryptography and PKI (12%) © 90 minutes to answer up to 90 questions © Minimum to Pass © Overview of Security Security Convenience © Information Security * Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction © Information Systems Security + Act of protecting the systems that hold and process our critical data hetps://www.DionTrai .come DION CompTIA Security+ (Study Notes) ©. Basics and Fundamentals © CIATriad S > # %, §& © &/ Data and a ¢/ Information oO Availability © Confidentiality + Information has not been disclosed to unauthorized people © Integrity * Information has not been modified or altered without proper authorization © Availability * Information is able to be stored, accessed, or protected at all times © AAA of Security © Authentication * When a person’s identity is established with proof and confirmed by a system '® Something you know ‘© Something you are ‘© Something you have ‘© Something you do ‘© Somewhere you are © Authorization + Occurs when a user is given access to a certain piece of data or certain areas of a building © Accounting + Tracking of data, computer usage, and network resources * Non-repudiation occurs when you have proof that someone has taken an action https://www.DionTraining.com 2CompTIA Security+ (Study Notes) BON © Security Threats © Malware + Short-hand term for malicious software © Unauthorized Access * Occurs when access to computer resources and data occurs without the consent of the owner © System Failure + Occurs when a computer crashes or an individual application fails © Social Engineering * Act of manipulating users into revealing confidenti performing other detrimental actions information or © Mitigating Threats © Physical Controls + Alarm systems, locks, surveillance cameras, identification cards, and security guards © Technical Controls + Smart cards, encryption, access control lists (ACLs), intrusion detection systems, and network authentication © Administrative Controls * Policies, procedures, security awareness training, contingency planning, and disaster recovery plans + User training is the most cost-effective security control to use © Hackers (© Five Types of Hackers + White Hats ‘© Non-malicious hackers who attempt to break into a company’s systems at their request + Black Hats ‘© Malicious hackers who break into computer systems and networks without authorization or permission + Gray Hats © Hackers without any affiliation to a company who attempt to break into a company’s network but risk the law by doing so + Blue Hats ‘© Hackers who attempt to hack into a network with permission of the company but are not employed by the company + Elite ‘© Hackers who find and exploit vulnerabilities before anyone else does https://www.DionTraining.come DION CompTIA Security+ (Study Notes) © 1 in 10,000 are elite © Script kiddies have limited skill and only run other people’s exploits and tools © Threat Actors © Script Kiddies * Hackers with little to no skill who only use the tools and exploits written by others © Hacktivists * Hackers who are driven by a cause like social change, political agendas, or terrorism © Organized Crime + Hackers who are part of a crime group that is well-funded and highly sophisticated © Advanced Persistent Threats * Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal APTs Organized Crime Hacktivists Skill Level Script Kiddies https://www.DionTraining.com 4Boon Malware 0 Malware # Software designed to infiltrate a computer system and possibly damage it without the user's knowledge or consent Viruses CompTIA Security+ (Study Notes) Malware Viruses Worms Trojan horses Ransomware Spyware Rootkits Spam ‘= Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed "Viruses require a user action in order to reproduce and spread Boot sector © Boot sector viruses are stored in the first sector of a hard drive and are loaded into memory upon boot up Macro © Virus embedded into a document and is executed when the document is ‘opened by the user Program (© Program viruses infect an executable or application Multipartite © Virus that combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer Encrypted Polymorphic ‘© Advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection https://www.DionTraining.com 5e DION CompTIA Security+ (Study Notes) © Metamorphic © Virus that is able to rewrite itself entirely before it attempts to infect a file (advanced version of polymorphic virus) © Stealth © Armored © Armored viruses have a layer of protection to confuse a program or person analyzing it © Hoax © Worms © Worm "Malicious software, like a virus, but is able to replicate itself without user interaction Worms self-replicate and spread without a user's consent or action "Worms can cause disruption to normal network traffic and computing, activities = Example ‘* 2009: 9-15 million computers infected with conficker © Trojans © Trojan Horse "Malicious software that is disguised as a piece of harmless or desirable software "Trojans perform desired functions and malicious functions 0 Remote Access Trojan (RAT) "Provides the attacker with remote control of a victim computer and is the most commonly used type of Trojan + Ransomware © Ransomware "Malware that restricts access toa victim's computer system until ransom is received = Ransomware uses a vulnerability in your software to gain access and then encrypts your files = Example ‘* $17 million: SamSam cost the City of Atlanta https://www.DionTraining.com 6BON CompTIA Security+ (Study Notes) Spyware © Spyware "Malware that secretly gathers information about the user without their consent "Captures keystrokes made by the victim and takes screenshots that are sent to the attacker © Adware Displays advertisements based upon its spying on you © Grayware Rootkits Software that isn’t benign nor mali without serious consequences us and tends to behave improperly © Rootkit Software designed to gain administrative level control over a system. without detection DLL injection is commonly used by rootkits to maintain their persistent control © DLL Injection Malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime ©. Driver Manipulation ‘An attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level A shim is placed between two components to intercept calls and redirect them © Rootkits are activated before booting the operating system and are difficult to detect Spam © Spam Activity that abuses electronic messaging systems, most commonly through email Spammers often exploit a company’s open mail relays to send their messages CAN-SPAM Act of 2003 https://www.DionTraining.com 7e DION CompTIA Security+ (Study Notes) ‘Summary of Malware ° Virus "Code that infects a computer when a file is opened or executed Worm Acts likea Trojan "Appears to do a desired function but also does something malicious Ransomware ‘Takes control of your computer or data unless you pay Spyware "Software that collects your information without your consent Rootkit * Gains administrative control of your system by targeting boot loader or kernel us but can self-replicate Spam "Abuse of electronic messaging systems https://www.DionTraining.come DION CompTIA Security+ (Study Notes) Malware Infections © Malware Infection ©. Threat Vector = Method used by an attacker to access a victim’s machine © Attack Vector = Method used by an attacker to gain access toa victim's machine in order to infect it with malware ‘* Common Delivery Methods © Malware infections usually start within software, messaging, and media © Watering Holes "Malware is placed on a wel access © DionTraining.com Q DionTrainings.com that you know your potential victims will ‘© Botnets and Zombies © Botnet = Acollection of compromised computers under the control of a master node Zombie . [Ea >! Zombie Victim Victim Command L and Control Zombie "om ig (2) we i Victim Zombie Attack Method https://www.DionTraining.come DION CompTIA Security+ (Study Notes) * Botnets can be utilized in other processor intensive functions and activities ‘* Active Interception & Privilege Escalation © Active Interception "Occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them lege Escalation "Occurs when you are able to exploit a design flaw or bug in a system to gain access to resources that anormal user isn’t able to access ‘+ Backdoors and Logic Bombs © Backdoors are used to bypass normal security and authentication functions © Remote Access Trojan (RAT) is placed by an attacker to maintain persistent access © Logic Bomb "Malicious code that has been inserted inside a program and will execute only when certain conditions have been met o Easter Egg. *Non-malicious code that when invoked, displays an insider joke, hidden message, or secret feature © Logic bombs and Easter eggs should not be used according to secure coding standards https://www.DionTraining.com 10
You might also like
Messersectoprint
PDF
No ratings yet
Messersectoprint
48 pages
CompTIA+A++220-1101 StudyGuide
PDF
No ratings yet
CompTIA+A++220-1101 StudyGuide
143 pages
SY0-701 Practice Questions & Answers
PDF
100% (1)
SY0-701 Practice Questions & Answers
52 pages
Test
PDF
No ratings yet
Test
708 pages
220-1102 - Premium File 488 Questions & Answers. Last Update Apr 16, 2024
PDF
No ratings yet
220-1102 - Premium File 488 Questions & Answers. Last Update Apr 16, 2024
128 pages
DojoLab CompTIA Security Ebook Updated
PDF
No ratings yet
DojoLab CompTIA Security Ebook Updated
72 pages
Chapter 3 Attack Types and Protection Schemes
PDF
100% (1)
Chapter 3 Attack Types and Protection Schemes
41 pages
CompTIA Network+ Cert (N10-007) Practice Exam
PDF
100% (1)
CompTIA Network+ Cert (N10-007) Practice Exam
26 pages
Downloadable Official CompTIA A+ Core 1 and Core 2 Instructor Guide Copy 3
PDF
100% (3)
Downloadable Official CompTIA A+ Core 1 and Core 2 Instructor Guide Copy 3
844 pages
CompTIA PenTest+ Practice Exam
PDF
100% (1)
CompTIA PenTest+ Practice Exam
21 pages
CompTIA Security Plus Study Notes
PDF
No ratings yet
CompTIA Security Plus Study Notes
80 pages
SY0-701 Dumpsbase
PDF
100% (1)
SY0-701 Dumpsbase
180 pages
CompTIA Security Plus SY0-601 - Studylib
PDF
No ratings yet
CompTIA Security Plus SY0-601 - Studylib
221 pages
CompTIA Security+ Exam PDF
PDF
75% (4)
CompTIA Security+ Exam PDF
82 pages
220-1102 CompTIA A+ Exam Updated Questions From Itfreedumps
PDF
No ratings yet
220-1102 CompTIA A+ Exam Updated Questions From Itfreedumps
47 pages
Comptia Cysa cs0 003 Exam Objectives 2 0
PDF
No ratings yet
Comptia Cysa cs0 003 Exam Objectives 2 0
13 pages
Comptia 220 1101 Dumps by Gilbert 15-04-2024 10qa Vceexamstest
PDF
No ratings yet
Comptia 220 1101 Dumps by Gilbert 15-04-2024 10qa Vceexamstest
10 pages
SY0 601 EXAMTOPICS - Edit
PDF
50% (2)
SY0 601 EXAMTOPICS - Edit
74 pages
CompTIA Security+ Study Guide SY0-501
PDF
No ratings yet
CompTIA Security+ Study Guide SY0-501
37 pages
CompTIA Security Plus SY0 701 Acronym List
PDF
No ratings yet
CompTIA Security Plus SY0 701 Acronym List
4 pages
SY0-601 Exam - Free Actual Q&as, Page 1 - ExamTopics
PDF
No ratings yet
SY0-601 Exam - Free Actual Q&as, Page 1 - ExamTopics
188 pages
CompTIA 220-701 A+ Essentials
PDF
100% (3)
CompTIA 220-701 A+ Essentials
253 pages
SY0-701 Lab Setup Guide
PDF
100% (2)
SY0-701 Lab Setup Guide
14 pages
SY0 701 Demo
PDF
100% (1)
SY0 701 Demo
25 pages
Comptia 220-701: Exam Name: Comptia A+ Essentials (2009) Q & A: 511 Q&As
PDF
No ratings yet
Comptia 220-701: Exam Name: Comptia A+ Essentials (2009) Q & A: 511 Q&As
5 pages
CompTIA A+ 220-1001 Core 1 Course Notes by Professor Messers - 019-021
PDF
No ratings yet
CompTIA A+ 220-1001 Core 1 Course Notes by Professor Messers - 019-021
3 pages
CompTIA Security Cert Prep Plan
PDF
No ratings yet
CompTIA Security Cert Prep Plan
6 pages
(IT) Information Technology Certifications - CompTIA IT Certifications
PDF
No ratings yet
(IT) Information Technology Certifications - CompTIA IT Certifications
3 pages
Comptia Practicetest 220-1102 Vce Dumps 2023-Jan-01 by Barton 73q Vce
PDF
No ratings yet
Comptia Practicetest 220-1102 Vce Dumps 2023-Jan-01 by Barton 73q Vce
10 pages
CompTIA Network+ (N10-008) Dumps
PDF
No ratings yet
CompTIA Network+ (N10-008) Dumps
5 pages
CompTIA - SY0-701.vJun-2024.by .Davac .94q
PDF
100% (1)
CompTIA - SY0-701.vJun-2024.by .Davac .94q
51 pages
Cs Threats 1
PDF
No ratings yet
Cs Threats 1
30 pages
Ain Dumps 2023-Aug-31 by Martin 0q Vce
PDF
100% (1)
Ain Dumps 2023-Aug-31 by Martin 0q Vce
30 pages
Dumpsarena SY0-701 Dumps PDF
PDF
No ratings yet
Dumpsarena SY0-701 Dumps PDF
9 pages
SY0-701 Updated Dumps - CompTIA Security+ Certification
PDF
100% (3)
SY0-701 Updated Dumps - CompTIA Security+ Certification
34 pages
Aindumps 2023-Aug-05 by Kevin 224q Vce
PDF
No ratings yet
Aindumps 2023-Aug-05 by Kevin 224q Vce
13 pages
All Actual Tests PDF
PDF
No ratings yet
All Actual Tests PDF
138 pages
Security
PDF
No ratings yet
Security
57 pages
Trupanion Pet Insurance Sample Policy 510
PDF
No ratings yet
Trupanion Pet Insurance Sample Policy 510
13 pages
CompTIA A 220-1102 Study Guide
PDF
100% (1)
CompTIA A 220-1102 Study Guide
128 pages
Comptia Cysa+ Certification Cs0-001 Exam: New Vce and PDF Exam Dumps From Passleader
PDF
No ratings yet
Comptia Cysa+ Certification Cs0-001 Exam: New Vce and PDF Exam Dumps From Passleader
21 pages
SLO Assignment 1
PDF
No ratings yet
SLO Assignment 1
3 pages
SEcurity+ Questions
PDF
No ratings yet
SEcurity+ Questions
17 pages
SY0-701 CompTIA Security+ Certification Exam Questions and Answers PDF - PDF Room
PDF
No ratings yet
SY0-701 CompTIA Security+ Certification Exam Questions and Answers PDF - PDF Room
30 pages
Technical University
PDF
No ratings yet
Technical University
847 pages
SY0-601 (630 Questions)
PDF
No ratings yet
SY0-601 (630 Questions)
14 pages
SY0-701 CompTIA Security Exam Dumps
PDF
50% (2)
SY0-701 CompTIA Security Exam Dumps
31 pages
Sy0-701 1
PDF
No ratings yet
Sy0-701 1
32 pages
Sy0-701 3
PDF
100% (1)
Sy0-701 3
18 pages
Comptia Security+ Examtopics All Questions
PDF
100% (1)
Comptia Security+ Examtopics All Questions
256 pages
CompTIA - SY0-701.vAug-2024.by .Akio .107q
PDF
100% (1)
CompTIA - SY0-701.vAug-2024.by .Akio .107q
56 pages
CompTIA Security+ SY0-501 - Marks4Sure - Mansoor
PDF
No ratings yet
CompTIA Security+ SY0-501 - Marks4Sure - Mansoor
4 pages
Websaver Coupons 20231101
PDF
No ratings yet
Websaver Coupons 20231101
2 pages
Security - 30 Day Study Plan
PDF
No ratings yet
Security - 30 Day Study Plan
4 pages
R/Comptia: Advertise
PDF
No ratings yet
R/Comptia: Advertise
4 pages
Comprehensive Notes For CompTIA Security+ (SY0-701) Based On Professor Messer's Video Course
PDF
No ratings yet
Comprehensive Notes For CompTIA Security+ (SY0-701) Based On Professor Messer's Video Course
9 pages
Security+ (SY0-701) - Quiz Questions
PDF
100% (2)
Security+ (SY0-701) - Quiz Questions
33 pages
France Buying Guide
PDF
No ratings yet
France Buying Guide
16 pages
Sy0-701 0
PDF
No ratings yet
Sy0-701 0
25 pages
CompTIA Security+ SY0-601 Exam
PDF
100% (2)
CompTIA Security+ SY0-601 Exam
150 pages
Security+ 601 Practice Questions Sample Questions Training CompTIA
PDF
No ratings yet
Security+ 601 Practice Questions Sample Questions Training CompTIA
2 pages
CompTIA SY0-701 Vjan-2024 by - Koanxy 37q
PDF
No ratings yet
CompTIA SY0-701 Vjan-2024 by - Koanxy 37q
17 pages
Sy0-701 5
PDF
No ratings yet
Sy0-701 5
31 pages
Sy0 701
PDF
No ratings yet
Sy0 701
8 pages
Sy0-701 4
PDF
No ratings yet
Sy0-701 4
31 pages