Thor's+Study+Guide+ +CC+Domain+4
Thor's+Study+Guide+ +CC+Domain+4
2|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Introduction to Domain 4
➢ Domain 4: What we will be covering.
This is a GIANT domain.
We use defense-in-depth on our internal network and when our data traverses the
internet.
We do this by ensuring all our network devices, protocols, and traffic are as secure as
possible.
Simplex is a one-way communication (One system transmits, the other listens).
Half-duplex communication sends or receives at one time only (Only one system can
transmit at a time).
Full-duplex communication sends and receives simultaneously. (Both systems can
transmit/receive simultaneously).
Baseband networks have one channel and can only send one signal at a time.
▪ Ethernet is baseband: “1000base-T” STP cable is a 1000-megabit, baseband,
Shielded Twisted Pair cable.
Broadband networks have multiple channels and can send and receive multiple signals
at a time.
The Internet is a global collection of peered WAN networks, it really is a patchwork of
ISPs.
An Intranet is an organization's privately owned network, most larger organizations
have them.
An Extranet is a connection between private Intranets, often connecting business
partners' Intranets.
3|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
PAN (Personal Area Network) - A personal area network is a computer network used for
communication among computers and other information technological devices close to
one person (PCs, printers, scanners, consoles …).
▪ Can include wired (USB and FireWire) and wireless devices (Bluetooth and
infrared).
LAN (Local Area Network) - A network that connects computers and devices in a limited
geographical area such as a home, school, office building or campus.
▪ Each computer or device on the network is a node, wired LANs are most likely
based on Ethernet technology.
MAN (Metropolitan Area Network) – A large computer network that usually spans a
city or a large campus.
WAN (Wide Area Network) - A computer network that covers a large geographic area
such as a city, country, or spans even intercontinental distances. Combines many types
of media such as telephone lines, cables, and air waves.
GAN (Global Area Network) - A global area network, is a network used for supporting
mobile users across a number of wireless LANs, satellite coverage areas, … the transition
from one to the next can be seamless.
VPN (Virtual Private Network) - A VPN network sends private data over an insecure
network, most often the Internet.
▪ Your data is sent across a public network, but looks and feels private.
4|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
5|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
6|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
• The higher you go up the layers, the slower it is. Speed is traded for intelligence.
• Threats to Level 5-7: Virus, worms, trojans, buffer overflow, application, or OS
vulnerabilities.
7|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
8|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ The link and physical layer have the networking scope of the local
network connection to which a host is attached.
⬧ Used to move packets between the Internet layer interfaces of two
different hosts on the same network.
⬧ The process of transmitting and receiving packets on a given link can
be controlled both in the software device driver for the network
card, as well as on firmware or specialized chipsets.
⬧ These perform functions such as adding a packet header to prepare
it for transmission, then transmit the frame over a physical medium.
⬧ The TCP/IP model includes specifications of translating the network
addressing methods used in the Internet Protocol to link layer
addresses, such as Media Access Control (MAC) addresses.
⬧ The link and physical layer = OSI layer 1-2.
▪ Internet/Internetwork layer is responsible for sending packets across
potentially multiple networks.
⬧ Requires sending data from the source network to the destination
network (routing).
⬧ Internet/Internetwork layer = OSI layer 3.
⬧ The Internet Protocol performs two basic functions:
▫ Host addressing and identification: This is done with a
hierarchical IP address.
▫ Packet routing: Sending the packets of data (datagrams)
from the source to the destination by forwarding them to
the next network router closer to the final destination.
▪ The transport layer establishes basic data channels that applications use
for task-specific data exchange.
⬧ Its responsibility includes end-to-end message transfer independent
of the underlying network, along with error control, segmentation,
flow control, congestion control, and application addressing (port
numbers).
⬧ Data is sent connection-oriented (TCP) or connectionless (UDP).
⬧ The transport layer = OSI layer 4.
▪ The application layer includes the protocols used by applications for
providing user services or exchanging application data over the network
(HTTP, FTP, SMTP, DHCP, IMAP).
▪ Data coded according to application layer protocols are encapsulated
into transport layer protocol units, which then use lower layer protocols
for data transfer.
▪ The transport layer and the lower-level layers are unconcerned with the
specifics of application layer protocols.
9|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
10 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
• IP Addresses:
▪ First deployed for production in the ARPANet in 1983, ARPANet later
became the internet.
▪ IP was developed in the 1970’s for secure closed networks (DARPA -
Defense Advanced Research Projects Agency). Security was not built in
but was bolted on later.
▪ IPv4 is a connectionless protocol for use on packet-switched networks.
▪ It operates on a best effort delivery model, it does not guarantee
delivery, it also does not assure proper sequencing or avoidance of
duplicate delivery. We have added protocols on top of IP to ensure those.
▪ IPv4 is the IT route's most Internet traffic today, but we are slowly
moving towards IPv6.
⬧ The move towards IPv6 is mainly dictated by IPv4 Addresses being
depleted years ago.
▪ IPv4 has around 4.2 billion IP addresses and of those ~4 billion are usable
internet addresses.
⬧ There are currently over 35 billion mobile devices on the internet, 75
billion is predicted by 2025.
⬧ All major cellphone carriers in the US use IPv6 for all cell phones.
⬧ IPv4 has 4,294,967,296 addresses where IPv6 has
340,282,366,920,938,463,463,374,607,431,768,211,456.
11 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
• Common Ports:
▪ 20 TCP FTP data transfer.
▪ 21 TCP FTP control.
▪ 22 TCP/UDP Secure Shell (SSH).
▪ 23 TCP Telnet unencrypted text communications.
▪ 25 TCP Simple Mail Transfer Protocol (SMTP) can also
use port 2525.
▪ 80 TCP/UDP Hypertext Transfer Protocol (HTTP) can also
use port 8008 and 8080.
▪ 110 TCP Post Office Protocol, version 3 (POP3).
▪ 137 UDP NetBIOS Name Service, used for name
registration and resolution.
▪ 138 TCP/UDP NetBIOS Datagram Service.
▪ 143 TCP Internet Message Access Protocol (IMAP).
▪ 443 TCP Hypertext Transfer Protocol over TLS/SSL
(HTTPS).
▪ 3389 TCP/UDP Microsoft Terminal Server (RDP).
12 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
• IPv6:
▪ IPv6 is 128bit in hexadecimal numbers (uses 0-9 and a-f).
▪ 8 groups of 4 hexadecimals, making addresses look like this:
⬧ fd01:fe91:aa32:342d:74bb:234c:ce19:123b
▪ The IPv6 address space is huge compared to IPv4.
340,282,366,920,938,463,463,374,607,431,768,211,456 addresses.
⬧ 34 with 37 0s
total or 79 with
27 0s as many
addresses as
IPv4.
⬧ Every square foot
on the planet can
have 65000 IP
addresses.
IP Support Protocols
• ARP (Address Resolution Protocol):
▪ Translates IP Addresses into MAC
Addresses.
⬧ OSI Data/Network Layer or
Network/Internet Layer.
▪ ARP is a simple and trusting protocol,
anyone can respond to an ARP
request.
▪ ARP (cache) Poisoning: An attacker
sends fake responses to ARP
requests, often done repeatedly for
13 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
• Traceroute:
▪ Uses ICMP to trace a
network route.
▪ Traceroute uses the TTL
value in somewhat reverse.
▪ We send a message with
TTL 1.
⬧ The first router
decrements the TTL
to 0 and sends an
ICMP Time Exceed
message back, First
Hop is now identified.
▪ We send message 2 with
TTL 2, 2nd router does the
same, it is identified.
▪ We do that over and over till the destination is reached (maximum 30
hops).
14 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
15 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Cables
• Networking Cables:
▪ When it comes to networking cables, most people think RJ45 Copper
Ethernet cables, many more types are
used though.
▪ Networking cables all come with pros and
cons, some are cheap, some more secure,
some faster, ...
▪ They can also pose different security
vulnerabilities depending on the cable
type and the environment.
▪ EMI (Electromagnetic Interference):
⬧ Magnetism that can disrupt data
availability and integrity.
▪ Crosstalk is the signal crossing from one cable to another, this can be a
confidentiality issue.
▪ Attenuation is the signal getting weaker the farther it travels.
⬧ Copper lines have attenuation, with DSL the farther you are
from the DSLAM (Digital Subscriber Line Access Multiplexer) the
lower speed you get.
16 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
• Fiber Optic Cables Use light to carry data (vs. electricity for copper cables):
▪ Pros: Speed 1 Petabit per second, 35miles/50 km over a single fiber.
⬧ Distance, it has no attenuation like copper, a
single uninterrupted cable can be 150 miles+
(240km+) long.
⬧ Not susceptible to EMI.
⬧ More secure than copper since it can't be
sniffed as easily as copper.
▪ Cons: Price, more difficult to use, you can break
the glass in the cable if you are not careful.
▪ Single-Mode fiber - A Single strand of fiber carries
a single mode of light (down the center), used for
long distance cables (Often used in IP-Backbones).
▪ Multi-Mode fiber - Uses multiple modes (light
colors) to carry multiple data streams
simultaneously, this is done with WDM
(Wavelength Division Multiplexing).
17 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
LAN Topologies
• Network topology describes the layout and topologies of interconnections between
devices and network segments.
• Ethernet and Wi-Fi are the two most common transmission technologies in use for
local area networks.
• At the data link layer and physical layer, a wide variety of LAN topologies have been
used, including ring, bus, mesh, and star.
• At the higher layers, NetBEUI, IPX/SPX, and AppleTalk used to be common, but
TCP/IP is now the de facto standard.
• Bus:
▪ All nodes are connected in a line, each
node inspects traffic and passes it along.
▪ Not very stable, a single break in the
cable will break the signal to all nodes
past that point, including
communication between nodes way
past the break.
▪ Faulty NICs (Network Interface Card)
can also break the chain.
• Tree (Hierarchical):
▪ The base of the Tree topology controls
the traffic, this was often the
mainframe.
18 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
• Ring:
▪ All nodes are connected in a ring.
• Star:
▪ All nodes are connected to a
central device.
▪ This is what we normally use for
Ethernet, our nodes are
connected to a switch.
▪ Provides better fault tolerance, a
break in a cable or a faulty NIC
will only effect that one node.
▪ If we use a switch, no token
passing, or collision detection is
needed since each node is on its
own segment.
▪ If we use hubs, collisions will still
occur; but I hope none are
around anymore, not just how
slow they are, but more how
unsecure they are now.
• Mesh:
▪ Nodes are connected to
each other in either a partial
mesh or a full mesh.
▪ Partial Mesh:
⬧ Nodes are directly
connected to some
other nodes.
▪ Full Mesh:
⬧ All nodes are directly
connected to all other
nodes.
⬧ More redundant but
requires a lot more
cables and NICs.
⬧ Often used in HA (High
Availability)
environments, with
cluster servers for
keepalives.
19 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Wi-Fi
A wireless computer network that links two or
more devices using a wireless distribution
method within a limited area (a home, a
school, a coffee shop, or an office building).
Gives users the ability to move around within
a locally covered area and be connected to
the network.
Often multiple APs (Access Points) are set up
throughout an office building to give
seamless roaming coverage for the
employees.
WLAN normally also provides an Internet
connection, but not always.
Most modern WLANs are based on IEEE 802.11
standards and are marketed under the Wi-Fi brand name.
Wi-Fi makes us more mobile and our connection more seamless, but it is easier to
compromise than cabled internet connection.
Wi-Fi Attacks:
▪ Rogue Access Points:
An unauthorized access point
that has been added to our
network without our
knowledge.
This can be malicious by an
attacker or just an employee
wanting Wi-Fi somewhere
with bad coverage.
Without our security posture,
they are a very big concern.
Can be somewhat mitigated
with Port security on the
Switches and by scanning for
Rogue access points.
Can compromise confidentiality and
integrity.
▪ Jamming/Interference:
This can be a lot of traffic on the Wi-Fi frequencies or done by attackers
to disrupt our network (DOS).
20 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ Evil Twin:
An evil twin is used when
attackers are trying to
create rogue access points so
as to gain access to the network or
access to information that is being put through a network.
Can be done on your network or not,
the attacker simply names their
access point the same as ours but
with no security and user devices
automatically connect to them.
Can compromise confidentiality
and integrity.
Wireless Networks
Bluetooth:
▪ A wireless technology standard
for exchanging data over short
distances using 2.4 GHz from
fixed and mobile devices and
building personal area networks
(PANs).
▪ Bluetooth has three classes of
devices; while designed for short-distance
networking, Class 1 can reach up to 100 meters.
▪ Class 1: 100 meters, 2: 10 meters, 3: under 10 meters.
▪ Bluetooth implements confidentiality, authentication, and key derivation with
custom algorithms based on the SAFER+ block cipher.
21 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ Attacks:
Bluejacking: Sending unsolicited messages over Bluetooth, most often
harmless but annoying.
Bluesnarfing: Unauthorized access of information from a Bluetooth
device: phones, desktops, laptops,...
Bluebugging: The attacker gains total access and control of your device;
it can happen when your device is left in the discoverable state.
Only possible on older phones with outdated OSs, newer smartphones
constantly update their OS.
▪ Countermeasures:
Enable Bluetooth only when you needed it.
Enable Bluetooth discovery only when necessary and disable discovery
when your devices are paired.
Do not enter link keys or PINs when unexpectedly prompted to do so.
Remove paired devices when you do not use them.
Regularly update firmware on all Bluetooth enabled devices.
Li-Fi:
▪ Uses light to transmit data and position between devices.
▪ Can send high-speed data using visible light, ultraviolet, and infrared spectrums.
▪ Can be used in areas prone to EMI (Electromagnetic interference), such as
aircraft cabins, hospitals, and nuclear power plants.
▪ Speeds (currently) up to 100 Gbit.
▪ Light can reflect off walls and still reach 70 Mbit without requiring a direct line
of sight.
▪ Pros: Not the same capacity as Wi-Fi (radio frequency exhaustion) and can be
used in places where Wi-Fi is prohibited.
▪ Cons: Short-range, not always reliable, and high cost of implementation.
22 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Zigbee:
▪ Mesh wireless network with low power, low data rate, and close proximity.
▪ Simple and less complex compared to other WPANs (Wireless Personal Area
Networks) such as Bluetooth or Wi-Fi.
▪ It has a range of 10 to 100 meters, but it requires line-of-sight. Data rates vary
between 20 kbit/s (868 MHz band) and 250 kbit/s (2.4 GHz band).
Satellite:
▪ For many years, satellite internet was a relatively slow and expensive option.
▪ You have a modem, as with any other internet connection, as well as a satellite
dish (2-3 ft. or 60-90 cm).
▪ Typical satellite connections have had a latency of 500 ms and speeds ranging
from 10 to 50 Mbps.
▪ Starlink is currently testing speeds ranging from 20-200 Mbps down to 15-50
Mbps up, with latencies ranging from 15-40 ms.
Cellular networks/mobile networks are communication
networks where the last leg is wireless.
The network is divided into cells and distributed across
areas, with each cell containing at least one fixed-
location transceiver, if not more.
These base stations provide network coverage to the
cell, allowing it to transmit voice, data, and other types
of content.
To avoid interference and provide guaranteed service
quality within each cell, a cell typically uses a different
set of frequencies than neighboring cells.
3G:
▪ Bandwidth: 2 Mbps, latency: 100-500 ms,
average speed 144 kbps.
4G:
▪ Bandwidth: 200 Mbps, latency: 20-30 ms,
average speed 25 Mbps, 16km (10 miles).
5G:
▪ Bandwidth: 5-20 Gbps, latency: <10 ms, average
speed 200-400 Mbps, 500m (1500 ft).
▪ High frequency, short-range, and can be blocked by anything metal and even
just solid objects.
▪ A lot more 5G towers are needed to get coverage.
23 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
24 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Layer 3 Devices:
▪ Routers:
Normally have a few ports vs. a lot on switches.
For our organizations, they are in the data centers.
In your home, they are often combined with a switch and wireless in
one box.
Forward traffic based on source and destination IPs and ports.
Connecting our LANs to the WAN.
Send traffic to the most specific route in their routing table.
Static route is a preconfigured route, always sends traffic there for a
certain subnet.
Default gateway sends all non-local traffic to an ISP for instance.
Dynamic route is learned from another routing via a routing protocol
(OSPF, EIGRP, BGP, IS-IS).
Metric is used to determine the best route to a destination.
25 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Third-party Connectivity:
▪ Medium size enterprises typically have 20 or more third-party providers. I
believe the hospital where I worked in Hawaii had more than 200 third-party
providers.
▪ How do we ensure they are secure enough and conform to our policies and
procedures?
▪ Many never have direct contact with IT or IT-Security.
▪ We must conduct a thorough risk assessment to ensure that whatever they
provide does not jeopardize our security posture, or we must accept the risk.
▪ We should have MOUs/MOAs and ISAs (Interconnection Security Agreement).
26 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
27 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ Outsiders:
Unauthorized individuals - Trying to gain access; they launch the
majority of attacks but are often mitigated if the organization has good
Defense in Depth.
Interception, malicious code (e.g. virus, logic bomb, trojan horse), sale
of personal information, system bugs, system intrusion, system
sabotage or unauthorized system access.
48-62% of risks are from outsiders.
▪ Insiders:
Authorized individuals - Not necessarily to the compromised system,
who intentionally or unintentionally compromise the system or data.
This could be assault on an employee, blackmail, browsing of
proprietary information, computer abuse, fraud and theft, information
bribery, input of falsified or corrupted data.
38-52% of risks are from insiders, another reason good Authentication
and Authorization controls are needed.
28 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ Governments:
State sponsored hacking is common;
often you see the attacks happening
between the hours of 9 and 5 in that
time zone; this is a day job.
Approximately 120 countries have
been developing ways to use the
internet as a weapon to target
financial markets, government
computer systems and utilities.
Famous attacks: US elections
(Russia), Sony websites (N. Korea),
Stuxnet (US/Israel), US Office of
Personnel Management (China), …
29 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Malware:
▪ Malware (Malicious Code) - This is the catch-all name for any malicious
software used to compromise systems or data.
Viruses - require some sort of human interaction and are often
transmitted by USB sticks or other portable devices.
When the program is executed, it replicates itself by inserting its own
code into other programs.
Macro (document) Viruses: Written in Macro Languages,
embedded in other documents (Word, Outlook).
Boot Sector Viruses: Infect the boot sector or the Master Boot
Record, ensuring they run every time the PC boots.
Stealth Viruses: Try to hide themselves from the OS and
antivirus software.
Polymorphic Viruses: Change their signature to avoid the
antivirus signature definitions.
Multipart (Multipartite) Viruses: Spread across multiple
vectors. They are often hard to get rid of because even if you
clean the file infections, the virus may still be in the boot sector
and vice-versa.
30 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
31 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
32 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ Honeynets:
A network (real or simulated) of honeypots,
can be a full server farm simulated with
applications, OSs, and fake data.
Best practice segments the honeynet from our
actual network by a DMZ/firewall.
33 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
The SIEM/SOAR systems collect the data from our internal systems as
well as the honeynet.
Firewalls
Firewalls: A firewall typically establishes a barrier between a trusted, secure internal
network, and another outside network, like the Internet.
▪ Packet filtering firewalls, OSI Layer 1-3.
Packet filters act by inspecting the
"packets" which are transferred
between clients.
If a packet does not match the packet
filter's set of filtering rules, the packet
filter will drop the packet or reject it and
send error responses to the source.
Any packet that matches one of the
Permits is allowed to pass.
Rules are checked in order; the
attacker's traffic is dropped on the 3rd
filter rule. Drop anything trying to access
100.1.1.100.
The internal machines can access the
server since their IPs are whitelisted in
the first rule.
34 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Firewalls Design:
▪ DMZs:
Normal DMZs use 2 firewalls in a screened
subnet, but they can also be three-legged
DMZs which only use 1 firewall.
Physical or logical subnetwork that
contains and exposes an organization's
external-facing services to an untrusted
network, like the Internet.
35 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
36 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Vulnerability Scanning/Testing
Vulnerability Scanning/Testing:
▪ A vulnerability scanning tool is used to scan a network or system for a list of
predefined vulnerabilities such as system misconfiguration, outdated software,
or a lack of patching.
▪ It is very important to understand the output from a vulnerability scan, they can
be 100's of pages for some systems, and how do the vulnerabilities map to
Threats and Risks (Risk = Threat x Vulnerability).
▪ When we understand the true Risk, we can then plan our mitigation.
37 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ Hypervisor - Controls the access between the virtual guest/clients and the host
hardware.
Type 1 hypervisor (Bare Metal) is a part of a Virtualization OS that runs
on top of the host hardware (Think Data Center).
Type 2 hypervisor runs on top of a regular OS like Windows 10 - (Think
your PC).
▪ Virtualization also poses new vulnerabilities because the technology is new-ish
and very complex.
▪ Clients on the same host should be on the same network segment
(Internal/DMZ). A host should never house both zones.
▪ Clients should be logically separated on the network like physical servers would
be (HR, Accounting, IT VLANs).
▪ VM Escape (Virtualization escape) is when an attacker can jump from the host
or a client to another client, this can be even more of a concern if you have
different Trust Level Clients on the same host. They should ideally be on
separate hosts.
▪ Hypervisor Security - If an attacker can get access to the hypervisor, they may
be able to gain access to the clients.
38 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ Resource Exhaustion -
Admins oversubscribe the
CPU/Memory and do not
realize more is needed
(availability).
Cloud Computing:
▪ Cloud Computing - (There is
no 'Cloud', it is just another
computer somewhere else).
When we use cloud
computing we build
or outsources some
part of our IT
Infrastructure,
storage, applications.
This can be done for
many good reasons,
but most are cost related.
Cloud Computing can be divided into 4 main types:
Private Cloud Computing - Organizations build and run their
own cloud infrastructure (or they pay someone to do it for
them).
Public Cloud Computing - Shared tenancy – A company builds
massive infrastructures and rents it out to anyone who wants it.
(Amazon AWS, Microsoft, Google, IBM).
Hybrid Cloud Computing – A mix of Private and Public Cloud
Computing. An organization can choose to use Private Cloud for
sensitive information and Public Cloud for non-sensitive data.
Community Cloud Computing – Only for use by a specific
community of consumers from organizations that have shared
concerns. (Mission, policy, security requirements, and/or
compliance considerations.)
▪ As with any other outsourcing, make sure you have the right to audit, pen test
(clearly agreed upon criteria), conduct vulnerability assessment, and check that
the vendor is compliant with your industry and the standards you adhere to.
39 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Distributed Systems:
▪ Can also be referred to as:
Distributed computing environment (DCE),
concurrent computing, parallel computing, and
distributed computing.
▪ A collection of individual systems that work together to
support a resource or provide a service.
▪ Most end-users see the DCE as a single entity and not as
multiple systems.
▪ Why do we use DCEs?
They can give us horizontal scaling (size,
geography, and administration), modular
growth, fault tolerance, cost-effectiveness,
low latency (users connect to the closest
node).
▪ Where do we use DCEs?
All over the place (The internet, websites, cell
networks, research, P2P networks, blockchain, …).
40 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
41 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Electricity
Electricity:
▪ Electricity - It is important to have clean, reliable power for our servers, disk
arrays, network equipment.
▪ Loss of power can affect our availability and the Integrity of our data.
Nothing can be accessed, and power fluctuations can damage hardware
and corrupt data.
▪ Power Fluctuation Terms:
Blackout - Long loss of power.
Fault - Short loss of power.
Brownout - Long low voltage.
Sag - Short low voltage.
Surge - Long high voltage.
Spike - Short high voltage.
42 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Backups
Fault Tolerance:
▪ To ensure our internal SLAs and provide as high availability as possible we use as
high degree of redundancy and resiliency as makes sense to that particular
system and data set.
▪ Backups:
One of the first things that comes to mind when talking about fault
tolerance is backups of our data, while it is very important it is often like
log reviews an afterthought and treated with "Set it and forget it"
mentality.
For backups we use Full, Incremental, Differential and Copy backups,
and how we use them is determined on what we need from our
backups.
How much data we can stand to lose and how fast we want the backup
and restore process to be.
In our backup solution we make backup policies of what to back up,
what to exclude, how long to keep the data of the Full, Incremental and
Differential backups.
All these values are assigned dependent on what we back up, and
normal organizations would have different backup policies and apply
those to the appropriate data.
This could be Full 3, 6, 12, 36, 84 months and infinity, the retention is
often mandated by our policies and the regulations in our field of
business.
It is preferable to run backups outside of business hours, but if the
backup solution is a little older it can be required to run around the
clock, in that case we put the smaller and less important backups in the
daytime and the important larger ones after hours.
We often want to exclude parts of the system we are backing up, this
could be the OS, the trashcan, certain program folders, ... we just
backup what is important and rarely everything.
If a system is compromised and the issue is a rootkit, the rootkit would
persist on the backup if we did a full mirror restore, by eliminating some
of the system data we not only backup a lot less data, we also may
avoid the infection we are trying to remedy.
For very important data we may do hourly incremental or use another
form of data loss prevention (covered later in this chapter).
Full Backup:
This backs everything up, the entire database (most often), or
the system.
A full backup clears all archive bits.
Dependent on the size of the data we may do infrequent full
backups, with large datasets it can take many hours for a full
backup.
43 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Full Backup:
• Everything in the backup policy is backed up.
Incremental Backup:
Backs up everything that has changed since the last backup.
Clears the archive bits.
Incremental are often fast to do, they only backup what has
changed since the last incremental or full.
The downside to them is if we do a monthly full backup and
daily incremental, we have to get a full restore and could have
to use up to 30 tapes, this would take a lot longer than with 1
Full and 1 Differential.
IF we need to restore on Thursday:
Restore with the full Sunday backup and Monday,
Tuesday, and Wednesday’s incremental tapes.
4 tapes.
Incremental Backup:
• Anything changed since the last backup is backed up.
• The archive bit is cleared.
Differential Backup:
Backs up everything since the last Full backup.
Does not clear the archive bit.
Faster to restore since we just need 2 tapes for a full restore,
the full and the differential.
Backups take longer than the incremental, we are backing
everything since the last full.
44 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Differential Backup:
• Anything changed since the last Full backup is backed up.
• The archive bit is not cleared.
▪ Copy Backup:
This is a full backup with one important difference, it does not clear the
archive bit.
Often used before we do system updates, patches, and similar
upgrades.
We do not want to mess up the backup cycle, but we want to be able to
revert to a previous good copy if something goes wrong.
▪ Archive Bit:
For Windows the NTFS has an archive bit on file, it is a flag that indicates
if the file was changed since the last Full or Incremental backup.
45 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ There are many different types of RAID, for the exam I would know the above
terms and how RAID 0, 1 and 5 works.
▪ RAID 0:
Striping with no mirroring or parity, no fault tolerance, only provides
faster read write speed, requires at least 2 disks
▪ RAID 1:
Mirror set, 2 disks with identical data, and write function is written to
both disks simultaneously.
RAID 0 RAID 1
46 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
▪ RAID 5:
Block level striping with distributed parity, requires at least 3 disks.
Combined speed with redundancy.
RAID 5
▪ RAID will help with data loss when we have a single disk failure if we use a fault
tolerant RAID type, if more than one disk fails before the first is replaced and
rebuilt, we will need to restore from our tapes.
▪ Most servers have the same disks with the same manufacturer date, they will
hit their MTBF (Mean time between failures) around the same time.
▪ Larger data centers often have SLAs with the hard disk/server vendor, which
also includes MTTR (Mean time to repair).
▪ This could be within 4 or 8 hours the vendor has to be onsite with a
replacement disk.
System Redundancy:
▪ On top of the RAID and the backups we also try to provide system redundancy
as well as redundant parts on the systems.
▪ The most common system failures are from pieces with moving parts, this could
be disks, fans, or PSU (power supplies).
▪ Most servers have redundant power supplies, extra fans, redundant NIC’s.
▪ The NIC and PSU serve a dual purpose, both for internal redundancy and
external. If a UPS fails, the server is still operational with just the 1 PSU getting
power.
▪ Redundant disk controllers are also reasonably common, we design and buy the
system to match the redundancy we need for that application.
▪ Often, we have spare hardware on hand in the event of a failure, this could
include hard disks, PSU's, fans, memory, NICs.
▪ Many systems are built for some hardware to be hot-swappable, most
commonly HDD's, PSU’s, and fans.
47 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Fire Suppression
Fire Suppression is done by removing one of the 3
requirements a fire has.
▪ A fire needs Oxygen, Heat, and Fuel to burn.
▪ Removing any of the 3 will put the fire out.
▪ Removing Oxygen is done by replacing the
oxygen in the room with something else or
covering the fire, so the burning material
doesn’t have oxygen access (Halon, FM200,
Argon).
▪ Removing Heat is done by adding chemicals
or water to the fire, cooling it down.
▪ Removing Fuel is rarely done since the fuel is
our equipment.
Fire Classes:
▪ Answer all questions from a right point of view and in a top-down security
organization.
48 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
49 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
Wet Pipe: Sprinkler heads are closed. The pipes for the sprinkler
system have water until the sprinkler.
Dry Pipe: Sprinkler heads are closed.
The pipe contains compressed air and a valve that stays shut as
long as the air is present.
Fire Suppression:
▪ Fire Extinguishers:
A fire extinguisher is an active fire protection device used to extinguish
or control small fires, often in emergency situations.
All portable fire extinguishers should be marked with the type of fire
they are designed to extinguish.
Never use a fire extinguisher on a fire it was not intended for.
Use the PASS method to extinguish a fire with a portable fire
extinguisher:
Pull the pin in the handle.
Aim at the base of the fire.
Squeeze the lever slowly.
Sweep from side to side.
50 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
51 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 4
52 | P a g e
https://thorteaches.com/