0% found this document useful (0 votes)
125 views3 pages

Security Plus Syo701 Notes

The CompTIA Security+ (SY0-701) 2024 document outlines essential security concepts including the CIA triad, iAAA, and the three states of data. It discusses various security controls, threat actors, risk management strategies, gap analysis, and data sovereignty, emphasizing the importance of compliance with local laws. The document serves as a comprehensive guide for understanding foundational security principles and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views3 pages

Security Plus Syo701 Notes

The CompTIA Security+ (SY0-701) 2024 document outlines essential security concepts including the CIA triad, iAAA, and the three states of data. It discusses various security controls, threat actors, risk management strategies, gap analysis, and data sovereignty, emphasizing the importance of compliance with local laws. The document serves as a comprehensive guide for understanding foundational security principles and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CompTIA Security+ (SY0-701) 2024

Domain 1: General Security Concepts


1. Confidentiality, Integrity, and Availability (CIA Triad)

o Confidentiality: Refers to the protection of information from


unauthorized access. This is enforced through access control
mechanisms like passwords, multi-factor authentication, and
encryption techniques. Examples include file permissions and
secure encrypted communication like HTTPS.

o Integrity: Ensures that information remains unaltered during


transit or storage unless changed in an authorized manner.
Integrity is achieved through hashing (like SHA-256), digital
signatures, and version control. For example, checking hash
values before and after a file transfer confirms integrity.

o Availability: Guarantees reliable and timely access to data and


resources. It involves redundancy (RAID, failover systems),
backups, UPS systems, and disaster recovery plans to keep
services online during outages.

2. iAAA (Identification, Authentication, Authorization,


Accounting)

o Identification: Claiming an identity (e.g., username or ID


number).
o Authentication: Proving the claimed identity (e.g., password,
fingerprint, smart card).
o Authorization: Granting access to resources based on identity
and permissions.
o Accounting: Tracking user actions for auditing and forensic
purposes (e.g., log files).
3. Three States of Data

o Data at Rest: Information stored on physical media such as


hard drives, SSDs, or backups. Protection includes full disk
encryption and access controls.
o Data in Transit: Information moving between systems or
networks. Protected with encryption protocols like TLS or VPN
tunnels.
o Data in Use: Information currently being processed by
applications or systems. Protection may involve memory-level
encryption and secure enclaves.
4. Non-Repudiation

o Non-repudiation ensures that a party in a communication


cannot deny the authenticity of their signature or the sending of
a message. It is typically achieved through the use of digital
signatures, logging, and certificates. This is critical for auditing
and forensic investigations, especially in legal or contractual
contexts. For example, if a user digitally signs an email, they
cannot later claim they did not send it.
5. Security Controls

o Administrative Controls: Policies and procedures designed to


manage people. Examples: security training, background checks,
access control policies, and job rotation.
o Technical Controls: Implemented through hardware/software
to protect systems and data. Examples: firewalls, antivirus,
intrusion detection systems (IDS), and multi-factor authentication
(MFA).

o Physical Controls: Prevent physical access to systems and


facilities. Examples: door locks, biometric access, fencing, CCTV,
and security guards.

6. Threat Actors

o Nation-States: Highly skilled attackers funded by governments.


Objectives include espionage, cyberwarfare, and disruption.

o Hacktivists: Politically or socially motivated attackers. They


deface websites, leak sensitive information, or launch denial-of-
service (DoS) attacks.

o Insiders: People within the organization who exploit their


access. Can be malicious (disgruntled employees) or
unintentional (careless employees).

o Cybercriminals: Motivated by profit, they perform identity


theft, credit card fraud, ransomware attacks, and more.

o Script Kiddies: Inexperienced individuals using pre-built tools


with limited understanding, often for recognition or mischief.

7. Risk Management

o Risk Identification: Determine what threats and vulnerabilities


exist, and how they could impact assets.

o Risk Assessment:
Quantitative Assessment: Assigns monetary values to
risk factors (e.g., cost of a data breach).
 Qualitative Assessment: Uses scenarios and judgment
to prioritize risks based on likelihood and impact.
o Risk Response Strategies:

Accept: Recognize the risk and choose to live with it.


Avoid: Change plans to sidestep the risk.
Transfer: Outsource risk (e.g., buy insurance).
Mitigate: Take action to reduce risk, such as installing a
firewall.
8. Gap Analysis

o Gap Analysis is the process of comparing the current security


posture or state of an organization against a desired standard or
compliance framework (e.g., NIST, ISO 27001).
 Purpose: Identify missing controls, practices, or policies.
 Steps:
 Define compliance or security benchmark.
 Assess current environment.
 Identify gaps between current and required states.
 Develop a remediation plan to close the gaps.
 Outcome: A clear understanding of what must be done to
meet regulatory, compliance, or internal standards.
9. Data Sovereignty

o Data Sovereignty refers to the concept that data is subject to


the laws and governance structures within the nation where it is
collected or processed. This is critical in cloud computing and
international business operations.
 Key Considerations:
 Organizations must ensure compliance with local
data protection laws (e.g., GDPR in the EU, CCPA in
California).
 Data storage location must align with legal
requirements.
 Legal conflicts may arise when data crosses borders
and is subject to foreign jurisdiction.
 Example: A company storing EU citizens’ data in the U.S.
must ensure the data handling complies with GDPR, even if
the U.S. has different privacy standards.
…[remaining content unchanged]…

You might also like