Security+ Week 4
Security+ Week 4
SY0-701
Attention Attendees:
Remember to type your messages to all panellists and attendees
Course Structure
Week / Module 1
Introduction & Security Fundamentals
Week / Module 2
Compliance & Operational Security
Week / Module 3
Threats & Vulnerabilities
Week / Module 4
Application, Data & Host Security
Attention Attendees:
Remember to type your messages to all panellists and attendees
Application, Data & Host Security
Cryptographic Algorithms
Symmetric Encryption
Encryption uses a reversible process (algorithm) based on
a key that is only known by authorized persons
Substitution and transposition
Process should be too complex to unravel without the
key
Symmetric algorithms
Same secret key is used for encryption and decryption
Fast—suitable for bulk encryption of large amounts of
data
Problem storing and distributing key securely
Confidentiality only— sender and recipient know the
same key
Attention Attendees:
Remember to type your messages to all panellists and attendees
Key Length
Key ensures ciphertext remains protected even when the operation of the algorithm is known
Range of key values is the keyspace
Longer key bit length means a larger keyspace
Protects against brute force cryptanalysis
Advanced Encryption Standard (AES/AES256)
256-bit key is exponentially stronger than 128-bit key
Larger keys use more CPU/memory/power resources
Attention Attendees:
Remember to type your messages to all panellists and attendees
Asymmetric Encryption
Public/private key pair
If the public key encrypts, only the private key can
decrypt
Private key cannot be derived from the public key
Private key must be kept secret
Public key is easy to distribute (anyone can have it)
Used for small amounts of authentication data
Different ciphers have different recommended key lengths
Rivest, Shamir, Adelman (RSA) cipher (2,048-bit or
better)
Elliptic Curve Cryptography (ECC) cipher (256-bit or
better)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Hashing
Fixed length digest from variable string
with cryptographic properties
One-way (plaintext cannot be recovered from the
digest)
Anti-collision (no two plaintexts are likely
to produce the same digest)
Used for password storage and checksums (integrity)
Secure Hash Algorithm (SHA)
256-bit or better
Message Digest Algorithm (MD5)
128-bit only
Attention Attendees:
Remember to type your messages to all panellists and attendees
Digital Signatures
Using public key cryptography with hashing
Digital signatures provide integrity, authentication,
non-repudiation
Attention Attendees:
Remember to type your messages to all panellists and attendees
Application, Data & Host Security
Endpoint Security
Endpoint Hardening
• Operating System Security
• Workstations
• Servers
• Baseline Configuration
• Interfaces
• Services
• Ports
• Storage
• Many others
Attention Attendees:
Remember to type your messages to all panellists and attendees
Endpoint Protection
• Principle of Least Privilege
• Access Control Lists
• File System Permissions
• Application Allow Lists and Block Lists
• Monitoring
• Configuration Enforcement
• Group Policy
• SELinux
Attention Attendees:
Remember to type your messages to all panellists and attendees
Endpoint Configuration
• Principle of Least Privilege
• Access Control Lists
• File System Permissions
• Application Allow Lists and Block Lists
• Monitoring
• Configuration Enforcement
• Group Policy
• SELinux
Attention Attendees:
Remember to type your messages to all panellists and attendees
Hardening Techniques
• Protecting Physical Ports
• Encryption
• Full Disk Encryption (FDE)
• Removable Media Encryption
• Virtual Private Networks (VPNs)
• Email Encryption
• Host-Based Firewalls and IPS
• Endpoint Protection
• Changing Defaults
• Removing Unnecessary Software
Attention Attendees:
Remember to type your messages to all panellists and attendees
Application, Data & Host Security
Mobile Device Security
Mobile Device Hardening
Attention Attendees:
Remember to type your messages to all panellists and attendees
Full Device Encryption and External Media
Attention Attendees:
Remember to type your messages to all panellists and attendees
Location Services
Attention Attendees:
Remember to type your messages to all panellists and attendees
Wi-Fi and Tethering Connection Methods
Attention Attendees:
Remember to type your messages to all panellists and attendees
Application, Data & Host Security
Network Security
Hardening Switches and Routers
Attention Attendees:
Remember to type your messages to all panellists and attendees
Wireless Network Considerations
Attention Attendees:
Remember to type your messages to all panellists and attendees
Wireless Encryption
• Open
• WEP
• WPS
• WPA & WPA2
• WPA3
• Device Provisioning Protocol (DPP) a.k.a. “Easy Connect” to replace WPS
• Simultaneous Authentication of Equals (SAE)
• Enhanced Open
Attention Attendees:
Remember to type your messages to all panellists and attendees
Wi-Fi Authentication
Attention Attendees:
Remember to type your messages to all panellists and attendees
Network Access Control
Attention Attendees:
Remember to type your messages to all panellists and attendees
Intrusion Detection and Prevention Systems
• Host-based
• Network-based
• Both look for suspicious patterns or
activities that could indicate a network or
system intrusion
• They differ in their responses to
perceived threats
• Snort
• Suricata
• OSSEC
Attention Attendees:
Remember to type your messages to all panellists and attendees
IPS & IDS Detection Methods
• Signature-Based Detection
• Anomaly-based detection
• Trend Analysis
• Behavioral-based detection
• Network Behavior and Anomaly Detection (NBAD)
• User and Entity Behavior Analytics (UEBA)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Web Filtering
Attention Attendees:
Remember to type your messages to all panellists and attendees
Application, Data & Host Security
Application Security
Secure Protocols
Attention Attendees:
Remember to type your messages to all panellists and attendees
File Transfer Services
Attention Attendees:
Remember to type your messages to all panellists and attendees
Email Services
• SMTP
• Cleartext by default
• Transmit email between systems
• SMTPS is secure configuration
• Open Relay
• Improperly configured SMTP server
• Used to send SPAM
• POP & IMAP
• Used to access mailboxes
• Cleartext by default
• POPS & IMAPS are secure
Attention Attendees:
Remember to type your messages to all panellists and attendees
Email Security
Attention Attendees:
Remember to type your messages to all panellists and attendees
Email Security (cont’d)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Email Security (cont’d)
• Email Gateway
• Control point for all incoming and outgoing email
• Anti-spam filters and antivirus scanners
• Sophisticated threat detection algorithms
• Identify phishing attempts, Business Email Compromise (BEC) Attack
• Harmful attachments and malicious URLs
• URL Sanitization/Link Anonymization/Safe Linking/Web Link Transformation
• Secure/Multipurpose Internet Mail Extensions (S/MIME)
• Encrypts emails to provide the confidentiality and integrity protections
• Requires Public Key Infrastructure (PKI)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Email DLP
Attention Attendees:
Remember to type your messages to all panellists and attendees
Questions
Attention Attendees:
Remember to type your messages to all panellists and attendees