Security+ Week1
Security+ Week1
SY0-701
Attention Attendees:
Remember to type your messages to all panellists and attendees
Course Structure
Week / Module 1
Introduction & Security Fundamentals
Week / Module 2
Compliance & Operational Security
Week / Module 3
Threats & Vulnerabilities
Week / Module 4
Application, Data & Host Security
Attention Attendees:
Remember to type your messages to all panellists and attendees
CompTIA Security+
CompTIA Security+ certification is a global certification exam that validates
the baseline skills you need to perform core security functions and pursue
an IT security career.
Attention Attendees:
Remember to type your messages to all panellists and attendees
Study Guide
There is no mandatory text for this short course and all the assessments
will be covered in the material.
Attention Attendees:
Remember to type your messages to all panellists and attendees
Introduction
Information Security
Confidentiality
• Information should only be read by authorized persons
Integrity
• Data is stored and transferred as intended and any modification is authorized
Availability
Confidentiality
• Information is accessible to those authorized to view or modify it
Non-repudiation
• Persons cannot deny creating or modifying data
Information
Security
Integrity Availability
Attention Attendees:
Remember to type your messages to all panellists and attendees
Cyber Security Framework
Attention Attendees:
Remember to type your messages to all panellists and attendees
Gap Analysis
Attention Attendees:
Remember to type your messages to all panellists and attendees
Access Control
Attention Attendees:
Remember to type your messages to all panellists and attendees
Security Control Categories
• Managerial
• Give oversight of system
• Operational
• Relies on a person for implementation
• Technical
• Implemented in operating systems, software,
and security appliances
• Physical
• Devices that mediate access to premises
and hardware
Attention Attendees:
Remember to type your messages to all panellists and attendees
Security Control Functional Types
• Preventive
• Physically or logically restricts unauthorized
access
• Operates before an attack
• Detective
• Identifies attempted or successful intrusions
• Operates during an attack
• Corrective
• Responds to and fixes an incident and may
prevent its reoccurrence
• Operates after an attack
Attention Attendees:
Remember to type your messages to all panellists and attendees
Security Control Functional Types (cont’d)
• Directive
• Enforces a rule of behavior
• Deterrent
• Psychologically discourages intrusions
• Compensating
• Substitutes for a principal control
• Associated with framework compliance measures
Attention Attendees:
Remember to type your messages to all panellists and attendees
Information Security Roles & Responsibilities
• Overall responsibility
• Chief Information Officer (CIO)
• Chief Security Officer (CSO)
• Managerial
• Technical
• Information Systems Security Officer (ISSO)
• Non-technical
• Due care/liability
Image by rawpixel.com on Freepik
Attention Attendees:
Remember to type your messages to all panellists and attendees
Information Security Competencies
Attention Attendees:
Remember to type your messages to all panellists and attendees
Information Security Business Units
Attention Attendees:
Remember to type your messages to all panellists and attendees
Risk Management
What is Risk?
Attention Attendees:
Remember to type your messages to all panellists and attendees
Risk Identification and Assessment
Attention Attendees:
Remember to type your messages to all panellists and attendees
Risk Identification and Assessment (cont’d)
• Risk Analysis
• Describes identifying and evaluating potential risks and the characteristics that define
them
• Quantitative Analysis
• Assign tangible values to each risk
• Qualitative Analysis
• Assess risks based on subjective judgment
• Risk Assessment
• Estimates potential risk levels and their significance by interpreting data collected
during risk analysis
Attention Attendees:
Remember to type your messages to all panellists and attendees
Risk Identification and Assessment (cont’d)
• Inherent Risk
• Level of risk before any type of
mitigation has been attempted
• Heat Map
Attention Attendees:
Remember to type your messages to all panellists and attendees
Risk Management Strategies
Attention Attendees:
Remember to type your messages to all panellists and attendees
Risk Management Strategies
• Residual Risk
• The amount of risk left after mitigations are implemented
• Risk cannot be fully eliminated
• Risk Appetite
• Acceptable levels of risk
• Varies from one organization to another
• Sometimes defined in a formal risk appetite statement
Attention Attendees:
Remember to type your messages to all panellists and attendees
Risk Management Processes
Attention Attendees:
Remember to type your messages to all panellists and attendees
Risk Management Processes
• Risk Threshold
• Defines the limits or levels of acceptable risk
• Key Risk Indicators
• Predictive indicators for monitoring and predicting potential risks
• Risk Reporting
• Communicate an organization's risk profile
• Communicate the effectiveness of a risk management program
Attention Attendees:
Remember to type your messages to all panellists and attendees
Business Impact Analysis
Attention Attendees:
Remember to type your messages to all panellists and attendees
Vendor Selection
Attention Attendees:
Remember to type your messages to all panellists and attendees
Vendor Selection (cont’d)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Legal Agreements
• Initial Agreements
• Memorandum of Understanding (MOU)
• Nondisclosure Agreement (NDA)
• Memorandum of Agreement (MOA)
• Business Partnership Agreement (BPA)
• Master Service Agreement (MSA)
• Operational/Performance Agreements
• Service-level Agreement (SLA)
• Statement of Work (SOW)/Work Order (WO)
• Expectations
• Rules of Engagement (RoE)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Attestation & Assessments
• Attestation
• Verifying the accuracy, reliability, and effectiveness of security controls
• Internal Assessment
• Organization's own employees conduct an in-depth assessment
• Relatively simple to perform and customize
• External Assessment
• Independent Third-Party
• Impartial and objective evaluation of business practices
• Required for legal compliance
Attention Attendees:
Remember to type your messages to all panellists and attendees
Penetration Testing
Attention Attendees:
Remember to type your messages to all panellists and attendees
Questions
Attention Attendees:
Remember to type your messages to all panellists and attendees