Content
Content
Microsoft Technology
Associate
98-367: Security Fundamentals
• Target Audience
• IT Help Desk staff interested in moving into Network/Systems Administration
• Anyone interested in learning more about networking
Module 1
Understanding Security Layers
• Confidentiality
• Integrity
• Availability
Confidentiality, Integrity, Availability (CIA)
• Confidentiality
• Confidentiality is the characteristic of a resource ensuring access is restricted to
only permitted users, applications or computer systems.
• Confidentiality deals with keeping information, networks, and systems secure
from unauthorized access. This can be achieved by using encryption,
authentication, and access control.
• There are several technologies that support confidentiality in an enterprise
security implementation.
➢ Strong encryption
➢ Strong authentication
➢ Strong access controls
Confidentiality, Integrity, Availability (CIA)
• Integrity
• Availability
• After you have prioritized your risks, you are ready to choose from
among the four generally accepted responses to these risks.
• Responses include:
• Avoidance
• Acceptance
• Mitigation
• Transfer
Risk Management
Risk
Analyze and
Identify Statement
Prioritize
(If/then)
Master Risk
ListN Plan and
Control Top
Schedule
risks
• Least Privilege
• The principle of least privilege is a security discipline that requires that a particular
user, system, or application be given no more privilege than necessary to
perform its function or job.
Least Privilege, Attack Surface, and Social Engineering
• Attack Surface
• An attack surface consists of the set of methods and avenues an attacker can use
to enter a system and potentially cause damage.
• The larger the attack surface of a particular environment, the greater the risk of a
successful attack.
Least Privilege, Attack Surface, and Social Engineering
• Social Engineering
• This technique typically relies on the trusting nature of the person being attacked.
Security and Cost
• That way, even if an attacker breaches one layer of your defense, you
have additional layers to keep that person out of the critical areas of
your environment.
Defense in Depth
External Perimeter
Internal Perimeter
Secure Area
Servers
Racks
Goals in Physical Security
• For the purposes of this lesson, we will break the physical premises into
three logical areas:
• The external perimeter
• The internal perimeter
• Secure areas
External Perimeter Security
• The internal security perimeter starts with the building walls and exterior doors and includes any internal
security measures, with the exception of secure areas within the building.
• Some of the features you may use to secure an internal perimeter include the following:
• Locks (on exterior doors, internal doors, office doors, desks, filing cabinets, etc.)
• Keypads
• Security cameras
• Badge readers (on doors and elevators)
• Guard desks
• Guard patrols
• Smoke detectors
• Turnstiles
• Mantraps
Secure Areas
• Areas that not only to restrict external attackers, but also to limit
internal employee access.
• Servers
• Locked in data centers (secure area)
• Desktops
• Secured to desks
• Mobile Devices
• Docking stations
• Laptop security cables
• Laptop safes
• Theft recovery software
• Laptop alarms
Mobile Devices
• Mobile Devices are one of the largest challenges facing many security
professionals today.
• Mobile devices such as laptops, PDAs, and smartphones are used to
process information, send and receive mail, store enormous amounts
of data, surf the internet, and interact remotely with internal networks
and systems.
• Docking stations
• Laptop security cables
• Laptop safes
• Theft recovery software
• Laptop alarms
Removable Devices
• Include memory cards, flash drives, floppy disks, CDs, and DVDs.
• There are three basic types of security issues associated with removable
storage:
➢Loss
➢Theft
➢Espionage
Keylogger
• An attacker will either place a device between the keyboard and the
computer or install a software program to record each keystroke taken,
and then he or she can use software to replay the data and capture
critical information like user IDs and passwords, credit card numbers,
social security numbers, or even confidential emails or other data.
Summary
• Before you can start securing your environment, you need to have a
fundamental understanding of the standard concepts of security.
• CIA, short for confidentiality, integrity, and availability, represents the core
goals of an information security program.
• Once you have prioritized your risks, there are four generally accepted
responses to these risks: avoidance, acceptance, mitigation, and transfer.
Summary
• Physical premises can be divided into three logical areas: the external
perimeter, the internal perimeter, and secure areas.
• Mobile devices and mobile storage devices are among the biggest
challenges facing many security professionals today because of their
size and portability.