0% found this document useful (0 votes)
141 views13 pages

CompTIA Security + Chapter 1

Uploaded by

ALABI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
141 views13 pages

CompTIA Security + Chapter 1

Uploaded by

ALABI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

CompTIA Security+ :

SY0-601 Certification Exam

- CompTIA Security+ from SYBEX


- 17 Chapters
- 5 Domains
FIVE SECURITY+ OBJECTIVE DOMAINS
1.0 Threats, Attacks and Vulnerabilities
DOMAINS COVERED

24%

2.0 Architecture and Design


21%

3.0 Implementation
25%

4.0 Operations and Incident


Response 16%

5.0 Governance, Risk, and


Compliance 14%
CHAPTER I:Chapter 1 - Today's Security Professional
Domains Covered in Chapter
1
 Domain 1.0: Threats, Attacks, and Vulnerabilities
 1.6 Explain security concerns associated with
various types of vulnerabilities.
 Domain 2.0: Architecture and Design
 2.1 Explain the importance of security concepts
in an enterprise environment.
 Domain 5.0: Governance, Risk, and Compliance
 5.1 Compare and contrast various types of
controls.
The Role of Security
Professionals
- Security professionals safeguard organizations in
today’s complex threat landscape.

- Responsible for protecting confidentiality,


integrity, and availability of information systems.

- Requires understanding threat environment and


implementing effective controls.
CIA Triad of Information Security in Data Availability
CIA triad of information security in data availability such as confidentiality, integrity and availability is used
for securing data from breach and thefts in an organization.

Confidentiality Integrity
o Ensuring data security and protected
o Security of personal and
from any unauthorized threats or
confidential information from
harm
unauthorized individual or o Ensure if data is access by user, the
organization
o Includes data segregation according data remains undamaged and
Security unchanged
to data sensitivity for user access

CIA-
Availability
Confidentiality,
Integrity and o Monitoring system working and
Availability ensuring service is not died for any
authorized user due to system failure
Data Breach Risks
Security incidents compromise
confidentiality, integrity, and/or
availability of information.
Incidents may result from
malicious, accidental, or
natural causes. 01

02

Security professionals mitigate


risks and understand
impact on organization. 03
The DAD Triad

01 Disclosure: Exposure of sensitive information.

02 Alteration: Unauthorized modification of information.

03
Denial: Unintended disruption of legitimate access.

DAD Triad Complements CIA Triad in understanding


cybersecurity threats.
Impact of Breach
A security breach in cybersecurity is an unauthorized access or compromise of sensitive
information or resources.

Identity Theft: Risk of


Financial Risk: Monetary
sensitive information
damage due to breach.
exposure.

Strategic, Operational, and


Reputational Risk: Loss of Compliance Risks: Impact
goodwill among on organization's goals,
stakeholders. functions, and legal
obligations.
9

What is Cybersecurity?
The application of technology, techniques, and
controls to defend systems, networks, programs,
devices, and data against cyberattacks is known
as cybersecurity

Its objectives are to lower the number of incidents of cyberattacks and safeguard
against the unauthorized exploitation of technology, networks, and systems,
meant to create chaos and panic.
10

Implementing
Security Controls

Security controls fulfill


Control Types of controls include
objectives and are
objectives 02 03 preventive, detective,
01 categorized into
express desired corrective, deterrent, and
technical, operational,
security state. compensating.
and managerial types.
Operational Controls: Manage technology
securely (e.g., user access reviews,
vulnerability management).

Managerial Controls:
Technical Controls: Enforce
Procedural mechanisms for
security in digital space (e.g.,
risk management (e.g., risk
firewalls, encryption).
assessments, security
planning).

3 Types of Security Control


12

Data Protection Techniques

Data Minimization:
Data Loss Prevention
Data Encryption: Reduces risk by
(DLP): Enforces
Protects data in minimizing stored sensitive
information handling
transit and at rest. information.
policies.
Summary and Exam Essentials

The CIA-Confidentiality, Integrity, Availability triad,


represents desired security outcomes, while the DAD
triad-Disclosure, Alteration, Destruction/Denial,
highlights potential threats and attack vectors.

Controls are selected based on objectives and


categorized by mechanism and intent.

Data breaches have diverse impacts on organizations.

Protecting data involves encryption, DLP, and data


minimization techniques.

You might also like