How Can We Help?

Section 2 Fundamentals of Security

You are here:
< All Topics

CompTIA IT Security Course

Section 2

Fundamentals of Security

convenience and security is always a trade-ff

important to distinguish between:

Information Security – protecting the actual data, ie content, not the system itself

Information Systems Security – protecting the system that holds the data – hardware and software systems, OS etc.

Remember the CIA triad:

Confidentiality – Integrity – Avaibility

confidentiality – unauthorized persons or systems cant access it
integrity means ensuring data remains accurate and not tampered with

non repudiation very important concept: guarantees an action has taken place and cant be denied.

2 new things added:

non repudiation

Authenticaion,

so we now have the CIANA – pentagon!

Authentication: verifying id of user or system

Authorization: defines what actions a user or system can perform, or access it has.

Accounting : tracking user activities and resource uses 0 often for audit security or billing purposes

 

Security Controls are put into place:

Technical
Managerial
Operational
Fiscal

Zero Trust is a new security model, means no-one is trusted by default.

Control plane

data plane

 

THREATS and VULNERABILITIES

we cant control all threats, but we do have the ability to control vulnerabilities as they are from internal factors – s/w bbugs, lack of physical security, misconfigurations, network weaknesses etc

where threats and vulnerabilities intersect is where the biggest risk to systems and organizations lies – v important

threat + no vulnerability = no risk

vulnerability + no threat = no risk

 

 

hashing – process of converting data into a fixed size value – indicates if data has been alterned

= result is a hash digest or digital sig

digital signature – uses encryption]]checsums, to verify data is still correct when in transit – sending and receipt can be compared

access controls and regular audits also used

integrity is best achieved via hashing – is necessary

 

system uptime of ” 5 9s ” = 99.999% means no more than 5 minutes downtime per year (99% means no more than 3.5 days of downtime per year.

best solution is redundancy

backup options to ensure uninterrupted service

4 types of redundancy:

server = multiple servers

data = storing data in multiple locations – raids, cloud services

network = multiple network paths

power = ups, etc backup power supplies, generators, battery systems etc

 

remember:
redundancy = increased availability

 

NONREPUDIATION:

providing undeniable proof in digital transactions: compare ordinary letter post with registered post

 

AUTHENTICATION of user – aims to verify id of users or entities

something you know eg password

something you have eg mobile phone with particular number for 2FA

something you are eg facial recognition or fingerprint id

something you do – action factor,

omewhere you are – location based factor, acc to where you are geographically

 

you can combine more than one:

2FA – 2 factor authentication

2 or more: MFA – multi factor authentication – safer

AUTHORIZATION:

refers to permissions granted to users or entitites once authenticated. About WHAT they can do once in the system.

thus even if 2 users have the same authentication, they need not have the same authorization

protects data – only those with sufficient authorization can do certain things to data, reading, writing, deleting etc

to maintain system integrity – only sysadmins can do root level actions

or dbase changes – only specific users can modify or write

 

SECURITY CONTROL CATEGORIES

multi faceted controls:

Technical: eg anti virus software, firewalls, IDS, encryption

managerial: strategic planning and governance side of security

operational:

physical

TYPES OF SECURTY CONTROLS:

preventative eg firewalls

deterrent – eg warnings on websites

detective – monitor for malicious activities, detect and nofify, does not try to directly stop break ins eg IDS

corrective – one a thread detective, we use a corrective cotnrol to mitigate potential damager, eg quarantine malware and remove it, so things can be in multiple categories, can be eg detective and corrective

compensating – eg using a different more simplier encryption or password system which is not the latest

directive controls – guide or mandate different action, eg user control policies or regulations

 

 

ZERO TRUST:

we trust no one, only as little permission as required

 

means trust nothing – verify everything, device, user ,transaction, regardless of origin.

 

GAP ANALYSIS:

id the diff between current performance and desired performance states of an organization or dept.

1. define scope – which areas are we talking about

2. gather data on current state of the scope under question

3. analyse the data to id the gaps

4. plan to bridge the gaps
include the goals, objectives, and a time line to achieve them

tech gap analysis
looks at the current tech infra

business gap analysis

looks at the biz processes and where they fall short eg data management requires extra cloud storage or servers

 

 

 

 

 

 

Tags:
Table of Contents