Security Basics and IT Professional 3
Security Basics and IT Professional 3
Samad
SECURITY BASICS
AND IT
PROFFESIONAL
Security Basics and IT Professional
PUBLISHED BY:
ISBN 978-967-0074-09-2
Preface
Acknowledgement
The highest gratitude to Allah SWT because with His permission, this
Security Basics and IT Professional Book was successfully published.
We hope that this book can be put to good use by all who use it.
Thank you.
Table of Contents
Chapter 4: IT Proffesional
4.1 Communication skill and IT professional 59
4.2 Practice Proper Attitude While Working with a Customer 60
4.3 Explain Employee Best Practice 66
4.4 Understand Ethical and Legal Issues in the IT Industry 69
4.5 Understand Call Center Technicians Task 71
Quiz Yourself 73
Security Basics and IT Professional
Chapter 1
Introduction to Security
Security Basics and IT Professional 1
Chapter 1
Introduction to
Security
Chapter 1
Goals of security:
CIA
Confidentiality, Integrity
and Availability
Security Basics and IT Professional 3
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
ATTACKERS
HACKERS
MALICIOUS CODE
NETWORK MEDIA
Malicious code is known as Malware. It is the term used to describe any
code in any part of a software system that is intended to cause security
breaches or damage to a system.
HACKING
NATURAL DISASTER
THEFT
EXTERNAL THREATS
NETWORK MEDIA
External threats can arise from individuals or organizations working
outside of a company. They do not have authorized access to the
computer systems or network. They work their way into a network
mainly from the Internet or dialup access servers.
INTERNAL THREATS
NETWORK MEDIA
Internal threats occur when someone has authorized access to the
network with either an account on a server or physical access to the
network.
UNSTRUCTURED THREATS
NETWORK MEDIA
Unstructured threats consist of mostly inexperienced individuals using
easily available hacking tools such as shell scripts and password crackers.
Even unstructured threats that are only executed with the intent of
testing and challenging a hacker’s skills can still do serious damage to a
company.
Virus
Worm
Trojan Horse
STRUCTURED THREATS
NETWORK MEDIA
Structured threats come from hackers that are more highly motivated
and technically competent. These people know system vulnerabilities,
and can understand and develop exploit-code and scripts. They
understand, develop and use sophisticated hacking techniques to
penetrate unsuspecting businesses. These groups are often involved with
the major fraud and theft cases reported to law enforcement agencies.
RECONNAISSANCE ATTACK
NETWORK MEDIA
Reconnaissance attacks are general knowledge gathering attacks. These
attacks can happen in both logical and physical approaches. Whether
the information is gathered via probing the network or through social
engineering and physical surveillance, these attacks can be preventable
as well. Some common examples of reconnaissance attacks are:
i. Phising
ii. Port scanning
iii. Social engineering
ACCESS ATTACK
NETWORK MEDIA
Access attacks require some sort of intrusion capability. These can
consist of anything as simple as gaining an account holder’s credentials
to plugging foreign hardware directly into the network infrastructure.
The sophistication of these attacks ranges just as far. Often these access
attacks can be compared to reconnaissance in being either logical or
physical, logical being over the net and physical usually leaning more
towards social engineering.
Security Basics and IT Professional 9
DISTRIBUTED DENIAL
NETWORK
OF SERVICE MEDIA
ATTACK
PRETEXTING
NETWORK MEDIA
Pretexting is a form of social engineering in which an individual lies to
obtain privileged data. A pretext is a false motive. Pretexting often
involves a scam where the liar pretends to need information in order to
confirm the identity of the person he is talking to.
PHISHING
NETWORK MEDIA
Phishing is the most common type of social engineering attack that
occurs today. At a high level, most phishing scams endeavor to
accomplish three things:
i) Obtain personal information such as names, addresses and Social
Security Numbers.
ii) Use shortened or misleading links that redirect users to suspicious
websites that host phishing landing pages.
iii) Incorporate threats, fear and a sense of urgency in an attempt to
manipulate the user into responding quickly.
VISHING
NETWORK MEDIA
Voice phishing or vishing is a form of criminal phone fraud, using social
engineering over the telephone system to gain access to private personal
and financial information for the purpose of financial reward.
NETWORK MAPPER
NETWORK MEDIA
Nmap, short for Network Mapper, is a free, open-source tool for
vulnerability scanning and network discovery. Network administrators
use Nmap to identify what devices are running on their systems,
discovering hosts that are available and the services they offer, finding
open ports and detecting security risks.
NETSTAT
NETWORK MEDIA
Netstat is a common command line TCP/IP networking utility available
in most versions of Windows, Linux, UNIX and other operating systems.
Netstat provides information and statistics about protocols in use and
current TCP/IP network connections. The name derives from the words
network and statistics.
NETSCAN
NETWORK MEDIA
Netscan is a useful tool for checking network and Internet connections.
Some useful applications for the average PC user are considered,
including checking for malware connections.
DATA WIPING
NETWORK MEDIA
Deleting files from a hard drive does not remove them completely from
the computer. This data is not completely removed until the hard drive
stores other data in the same location, overwriting the previous data.
Hard drives should be fully erased (data wiped) to prevent the possibility
of recovery using specialized software.
Drilling holes through a drive’s platters is not the most effective method
of hard drive destruction. Data can still be recovered using advanced
data forensic software. To fully ensure that data cannot be recovered
from a hard drive, carefully shatter the platters with a hammer and safely
dispose of the pieces.
Security Basics and IT Professional 14
The only way to fully ensure that data cannot be recovered from a hard
drive is to carefully shatter the platters with a hammer and safely dispose
of the pieces. To destroy software media (floppy disks and CDs), use a
shredding machine designed for shredding these materials.
Hard Drive Recycling - Hard drives that do not contain sensitive data can
be reformatted and used in other computers. The drive can be
reformatted, and a new operating system can be installed. Two types of
formatting can be performed:
QUIZ YOURSELF!
ANSWER!
1. C
2. D
3. C
4. A
5. A
6. A
7. D
8. D
9. D
10. C
11. C
Security Basics and IT Professional
Chapter 2
Chapter 2
Security Policy
and
Procedures
2.1 Understanding Security Policy
SECURITY POLICY
Managers
Technical staff
Employees
REQUIREMENT 1
REQUIREMENT 2
REQUIREMENT 3
REQUIREMENT 4
REQUIREMENT 5
REQUIREMENT 6
REQUIREMENT 7
Do Dont’s
On NTFS volumes, you can set security permissions on files and folders.
These permissions grant or deny access to the files and folders.
Security Basics and IT Professional 23
FILE PERMISSION
•Full Control
•Modify
•Read & Execute
•Read
•Write
FOLDER PERMISSION
•Full Control
•Modify
•Read & Execute
•List Folder Contents
•Read
•Write
Procedures are considered the lowest level in the policy chain because
they are closest to the computers and users (compared to policies) and
provide detailed steps for configuration and installation issues.
Procedures spell out how the policy, standards and guidelines will
actually be implemented in an operating environment. If a policy states
that all individuals who access confidential information must be
properly authenticated, the supporting procedures will explain the
steps for this to happen by defining the access criteria for
authorization, how access control mechanisms are implemented and
configured and how access activities are audited.
SOFTWARE FIREWALL
You can control the type of data sent to another computer by selecting
which ports will be open and which will be blocked. You must create
exceptions to allow certain traffic or applications to connect to the
computer. Firewalls block incoming and outgoing network
connections, unless exceptions are defined to open and close the ports
required by a program.
Security Basics and IT Professional 25
STEP 1
Select Start > Control Panel > Windows Firewall > Advanced settings.
STEP 2
STEP 3
STEP 4
STEP 5
Choose All local ports or Specific local ports to define individual ports
or a port range and click Next.
STEP 6
STEP 7
STEP 8
Provide a name and optional description for the rule and click Finish.
Security Basics and IT Professional 26
A smart card is a small plastic card, about the size of a credit card, with
a small chip embedded in it.
DATA BACKUP
i) Frequency
a) Backups can take a long time. Sometimes it is easier to make a full
backup monthly or weekly, and then do frequent partial backups of
any data that has changed since the last full backup.
b) However, having many partial backups increases the amount of
time needed to restore the data.
ii) Storage
For extra security, backups should be transported to an approved
offsite storage location on a daily, weekly or monthly rotation as
required by the security policy.
iii) Security
Backups can be protected with passwords. The password is entered
before the data on the backup media can be restored.
iv) Validation
Backups need to be validate to ensure the integrity of the data.
Security Basics and IT Professional 29
DATA ENCRYPTION
Encrypting File System (EFS) is a Windows feature that can encrypt data.
EFS is directly linked to a specific user account. Only the user that
encrypted the data will be able to access it after it has been encrypted
using EFS.
a) cryptographic terminologies
i) Encryption
ii) Cipher Text
iii) Decryption
iv) Cryptanalysis
Encryption
A process of converting a data (plaintext) into a form that cannot be
easily understood (ciphertext) by unauthorized people.
Decryption
A process to convert the ciphertext into the plaintext. Decryption
requires a secret key or password.
Ciphertext
The disguised (encrypted) file or message that could not been read
directly.
CIPHERTEXT
Plaintext
Plaintext is an original text.
Cryptanalysis
Cryptanalysis is the science of cracking codes and decoding secrets.
PLAINTEXT
ENCRYPTION
CIPHER TEXT
User can encrypt the plaintext to the ciphertext using the ciphertext
table.
ENCRYPTION TYPES
SYMMETRIC ENCRYPTION
ADVANTAGES
i) Fast
ii) Relatively Secure : Symmetric key ciphers can be composed to produce
stronger ciphers
iii) Widely understood
DISADVANTAGES
ASSYMMETRIC ENCRYPTION
Asymmetric encryption use two keys to encrypt and decrypt data. These
asymmetric keys are referred to as public key and private key. The public
key can be used by the sender to encrypt a message and the private key
can be used by the receiver to decrypt the message.
Types of encryption:
i) Symmetric
(same key to encrypt and decrypt)
ii) Assymetric
(different key to encrypt and decrypt))
Security Basics and IT Professional 36
ADVANTAGES
DISADVANTAGES
i) It is a slow process
ii) Its public keys are not authenticated
iii) It risks loss of private key, which may be irreparable
iv) It risks widespread security compromise
Symmetric
i) Both parties share the same key for encryption and decryption.
ii) Key needs to be kept secret.
iii) Not consuming too much computing power.
Assymetric
i) Use pairs of keys. One is used for encryption and the other one for
decryption.
ii) Decryption key is typically kept secret, therefore called ‘private key’ or
‘secret key’, while the encryption key is spread to all who might want to
send encrypted messages, therefore called ‘public key’.
iii) Are much slower than symmetric key encryption.
Security Basics and IT Professional 37
HASH ENCODING
Hash functions, also referred to as message digests that do not use a key,
Hashes cannot be used to discover the contents of the original message,
or any of its other characteristics, but can be used to determine whether
the message has changed.
Security Basics and IT Professional 38
SHA 1 VS MD5
QUIZ YOURSELF!
3. Identify X
a. The type of algorithm used
b. The level of security provided
c. The level of security provided
d. The speed of encryption and decryption
8. Identify the type of encryption uses the same key for both
the encryption and decryption of data
a. Hybrid encryption
b. Public-key encryption
c. Symmetric encryption
d. Asymmetric encryption
ANSWER!
1. D
2. B
3. C
4. C
5. C
6. D
7. B
8. C
9. D
10. D
11. A
Security Basics and IT Professional
Chapter 3
Security Troubleshooting
and Solutions
Security Basics and IT Professional 43
Chapter 3
Security
Troubleshooting
and Solutions
3.1 Apply the troubleshooting process to security
The troubleshooting process is used to help resolve security issues. The
troubleshooting steps can be used as a guideline to diagnose and repair
problems.
STEP 1
Security Basics and IT Professional 44
STEP 2
After you have talked to the customer, you can establish a theory of
probable causes and create a list of the most common causes of security
problems.
STEP 3
Test theories of probable cause one at a time, starting with the quickest
and easiest.
If the exact cause of the problem has not been determined after all
theories have been tested, establish a new theory of probable cause and
test it.
Security Basics and IT Professional 45
STEP 4
STEP 5
STEP 6
List of the tasks required to document the problem and the solution.
VIRUS PROTECTION
SPYWARE
PROTECTION
ADWARE
PROTECTION
PHISHING
PROTECTION
For example:
Cable locks and security screws for hardware devices
Wireless detection for unauthorized access points
Hardware firewalls
Network management system that detects changes in wiring and
patch panels
Two-factor authentication
Two - factor Authentication use an overlapping protection techniques
to prevent unauthorized access to sensitive data. An example of two-
factor authentication is using a password and a smart card to protect an
asset.
Security Basics and IT Professional 52
QUIZ YOURSELF!
ANSWER!
1. D
2. D
3. C
4. D
5. D
6. D
7. D
8. A
9. C
10. D
11. D
Security Basics and IT Professional
Chapter 4
IT PROFESSIONAL
Security Basics and IT Professional 59
Chapter 4
IT
Professional
4.1 Communication skill and IT professional
An IT professional must be familiar with the legal and ethical issues
that are inherent in this industry. They also need to learn on how to use
a good communication skills to handle the customer.
i) Talkative Customer
ii) Rude Customer
iii) Angry Customer
iv) Knowledgeable Customer
v) Inexperienced Customer
TALKATIVE CUSTOMER
RUDE CUSTOMER
ANGRY CUSTOMER
KNOWLEDGEABLE CUSTOMER
INEXPERIENCED CUSTOMER
Proper netiquette
For email and text communications, there is a set of personal and
business etiquette rules called Netiquette.
Security Basics and IT Professional 66
WORKSTATION
ERGONOMICS
TIME MANAGEMENT
STRESS
MANAGEMENT
Most call centers have very specific rules on how to handle customer
calls:
i) Maximum time on call (example: 15 minutes)
ii) Maximum call time in queue (example: 3 minutes)
iii) Number of calls per day (example: minimum of 30)
iv) Passing calls on to other technicians (example: only when absolutely
necessary and not without that technician’s permission)
v) What you can and cannot promise to the customer (see that
customer’s SLA for details)
vi) When to follow the SLA and when to escalate to management
CUSTOMER SATISFACTION
There are two basic types of data that need to be collected when
conducting computer forensics procedures which is persistent data
and volatile data.
i) Persistent data - Stored on local drive, when computer turned off this
data is preserved
ii) Volatile data - Stored in Ram and cache, disappears when computer
is turned off.
Cyber law
Cyber law is a term to describe the international, regional, country
and state laws that affect computer security professionals.
Cyber laws explain the circumstances under which data (evidence)
can be collected from computers, data storage devices, networks,
and wireless communications.
IT professionals should be aware of the cyber laws in their country,
region or state.
Documentation
The documentation required by a system administrator and a
computer forensics expert is extremely detailed.
They must document not only what evidence was gathered, but how
it was gathered and with which tools.
Document as much information about the security incident as
possible. These best practices provide an audit trail for the
information collection process.
The following, at a minimum, should be documented if illegal activity
is discovered:
Intial reason for accessing the computer or network
Time and date
Peripherals that are connected to the computer
All network connections
Physical area where the computer is located
Illegal material found
Illegal activity that you have witnessed (or you suspect has occurred)
Which procedures you have executed on the computer or network
Security Basics and IT Professional 71
Chain of custody
For evidence to be admitted, it must be authenticated. A system
administrator should be able to prove how this evidence was collected,
where it has been physically stored and who has had access to it
between the time of collection and its entry into the court proceedings
Each call center has business policies regarding call priority. A sample
chart of how calls can be named, defined, and prioritized.
TECHNICIANS LEVELS
There are two level of technicians which is level one technician and level
two technician.
QUIZ YOURSELF!
10. Identify the common task for a level one technician when
dealing with software-related issues
a. Monitoring network traffic
b. Setting up an entire data center
c. Debugging complex software code
d. Installing and updating software applications
ANSWER!
1. D
2. D
3. B
4. D
5. A
6. C
7. D
8. B
9. C
10. D
11. B
Security Basics and IT Professional
Appendix
References
Security Basics and IT Professional
References
1. Ciampa, M. (2020). CompTIA Security+ Guide to Network Security
Fundamentals. United States: Cengage Learning.
2. Chapple, M., Seidl, D. (2021). CompTIA Security+ Study Guide: Exam
SY0-601. United Kingdom: Wiley.
3. Whitman, M. E., Mattord, H. J. (2021). Principles of Information
Security. United States: Cengage.
4. Docter, Q. (2018). CompTIA IT Fundamentals (ITF+) Study Guide:
Exam FC0-U61. United States: Wiley.
5. https://www.tripwire.com/state-of-security/vulnerability-
management/3-types-of-network-attacks/
6. https://www.youtube.com/watch?v=4t4kBkMsDbQ
7. https://www.youtube.com/watch?v=PSA8D4kxmeI
8. Krutz, R. L., Vines, R. D. (2003). Advanced CISSP Prep Guide: Exam
Q&A. Germany: Wiley.
9. Small, M. J. (2019). A Quick Guide To Understanding IT Security
Basics For IT Professionals. (n.p.): Amazon Digital Services LLC -
Kdp.
10. Swanson, C. (2020). Professional Security Management: A Strategic
Guide. United Kingdom: Taylor & Francis.
11. Miller, A. (2022). Cybersecurity Career Guide. United Kingdom:
Manning.
12. Barker, J. (2020). Confident Cyber Security: How to Get Started in
Cyber Security and Futureproof Your Career. United Kingdom:
Kogan Page.
13. Viega, J., McGraw, G. (2001). Building Secure Software: How to
Avoid Security Problems the Right Way. India: Pearson Education.
14. Nagelhout, R. (2016). Digital Era Encryption and Decryption. United
States: Rosen Publishing Group.