CC- Mike Chapels Notes
CC- Mike Chapels Notes
Breakdown of Exam
Integrity Concerns
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 2/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● Unauthorized Modification
Published using Google Docs ○ Attackers make changes without permission (can be Report abuse Learn more
internal=employees or external
■ Follow the Rules of Least Privilege to
prevent unauthorized modification
CC- Mike Chapels Notes ● Impersonation Updated automatically every 5 minutes
○ Attackers pretend to be someone else
■ User education protects against
Impersonation
● Man-in-the-Middle (MITM)
○ Attackers place the themselves in the middle of
communication sessions
○ Intercepts network traffic as users are logging in to
their system and assumes their role.
○ Impersonation on an electronic/digital level.
■ Encryption prevents man-in-the-middle
attacks
● Replay
○ Attackers eavesdrop on logins and reuse the
captured credentials
■ Encryption prevents Replay attacks
_____
Availability Concerns
● Denial of Service (DoS)
○ When a malicious individual bombards a system
with an overwhelming amount of traffic.
○ The idea to is to send so many requests to a server
that it is unable to answer any requests from
legitimate users
■ Firewalls block unauthorized connections to
protect against Denial of Service attacks
● Power Outages
■ Having redundant power sources and back-
up generators protect against power outages
● Hardware Failures
○ Failure of servers, hard drives, network gear etc
■ Redundant components protect against
hardware failure
■ Building systems that have a built-in
redundancy, so that if one component fails,
the other will take over
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 3/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● Destruction
Published using Google Docs ■ Backup data centers protect against Report abuse Learn more
destruction (ex=cloud)
● Service Outages
○ Service outage may occur due to programming
CC- Mike Chapels Notes errors, failure of underlying equipment, and many Updated automatically every 5 minutes
more reasons
■ Building systems that are resilient in the fact
of errors and hardware failures protect
against service outages
_____
1) Identification
● Identification involves making a claim of identity
(Can be false)
○ Electronic identification commonly uses
usernames
2) Authentication
● Authentication requires proving a claim of identity
○ Electronic authentication commonly
uses passwords
3) Authorization
● Authorization ensures that an action is allowed
○ Electronic authorization commonly takes the
form of access control lists
■ Access Control Lists also provides
Accounting functionality
● Accounting allows to track
and maintain logs of user
activity
● Can track systems and web
browsing history
Password Security
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 4/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
Controls you can implement when setting password requirements:
Published using Google Docs ● Password length requirements Report abuse Learn more
● Password complexity requirements
● Password expiration requirements
○ Force password changes
CC- Mike Chapels Notes ● Password history requirements Updated automatically every 5 minutes
○ Cannot use previously used passwords
Password Managers
● Secured password vaults often protected by biometric
mechanisms (ex=fingerprints)
● Facilitates the use of strong, unique passwords
● Stores passwords
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 5/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● Organizations create SSO solutions within their
Published using Google Docs organizations to avoid users repeatedly authenticating Report abuse Learn more
_____
Non-repudiation
CC- Mike Chapels Notes ● Prevents someone from denying the truth Updated automatically every 5 minutes
○ Physical signatures can provide non-repudiation on
contracts, receipts etc
○ Digital signatures use encryption to provide non-
repudiation
○ Other methods can be biometric security controls,
Video-surveillance etc
_____
Privacy
1) Internal Risks
● Risks that arise from within the organization
○ Internal control prevents internal risks
2) External Risks
● Risks that arise outside the organization
○ Build controls that reduce the chance of
attack/risks being successful (ex= multi
factor authentication, or social engineering
awareness campaigns)
3) Multiparty Risks
● Risks that affect more than one organization
● Intellectual property theft poses a risk to
knowledge-based organizations
● If attackers are able to alter, delete or steal this
information, it would cause significant damage to the
organization and its customers/counterparties
● Software license agreements issues risk fines and
legal actions for violation of license agreements
_____
Risk Assessment
● Identifies and triages risks
Threat
● Are external forces that jeopardize security
● Threat Vector
○ Threat Vectors are methods used by
attackers to get to their target (ex= social
engineering, hacker toolkit, etc)
Vulnerabilities
● Are weaknesses in your security controls
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 7/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
○ Examples : Missing patches, Promiscuous Firewall
Published using Google Docs rules, other security misconfiguration Report abuse Learn more
Threat + Vulnerability = Risk
Ranking of Risks
● We rank risks by likelihood and impact
Likelihood
● Probability a risk will occur
Impact
● Amount of damage a risk will cause
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 8/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
4) Risk Acceptance
Published using Google Docs ● Choice to continue operations in the face of a risk Report abuse Learn more
Risk Profile
● Combination of risks that an organization faces
CC- Mike Chapels Notes _____ Updated automatically every 5 minutes
Inherent Risk
● Initial level of risk, before any controls are put in place
Residual Risk
● Risk that is reduced and what is left of it is known as the
residual risk
Control Risk
● New risk that may have been introduced by the controls
applied to mitigate risk
○ Example : Controls Applied may be installing a
firewall. While that firewall may have mitigated the
inherent risk, the risk of that firewall failing is another
newly introduced risk
Risk Tolerance
● Is the level of risk an organization is willing to accept
_____
Security Controls
● Are procedures and mechanisms that reduce the likelihood
or impact of a risk and help identify issues
Defense in Depth
● Uses overlapping security controls
● Different methods of security with a common objective
Configuration Management
● Tracks the way specific devices are set up
● Tracks both operating system settings and the inventory of
software installed on a device
● Should also create Artifacts that may be used to help
understand system configuration (Legend, Diagrams, etc)
Baselines
● Provide a configuration snapshot
● Dual Net
● You can use the snapshot to assess if the settings are
outside of an approved change management process
system
● Basically the default configuration setting set by an
organization
Versioning/Version Controls
● Assigns each release of a piece of software and an
incrementing version number that may be used to identify
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 10/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
any given copy
Published using Google Docs ● These verison #s are written as three part decimals, with Report abuse Learn more
the
○ First number representing the major version of
software
CC- Mike Chapels Notes ○ Second number representing a major updates Updated automatically every 5 minutes
○ Third number representing minor updates
Ex= IPhone IOS 14.1.2
_____
Security Governance
You must first identify how domestic and international Laws and
Regulations apply to an organization
_____
Business Continuity
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 12/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
In Clouding, Business Continuity Planning requires collaboration
Published using Google Docs between cloud providers and customers Report abuse Learn more
Redundancy
CC- Mike Chapels Notes ● The level of protection and against the failure of a single Updated automatically every 5 minutes
component
1) High Availability
● Uses multiple systems to protect against service
failure (Different from AWS Cloud as in that it does
not just apply to AZs but rather everything including
multiple firewalls etc)
2) Fault-Tolerance
● Makes a single system resilient against technical
failures
Load Balancing
● Spreads demand across available systems
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 13/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
○ Power Distribution Units (PDUs) provide
Published using Google Docs power clearing and management for a rack Report abuse Learn more
2) Storage Media
● Protection against the failure of a single storage
divide
CC- Mike Chapels Notes ○ Redundant Array of Inexpensive Disks Updated automatically every 5 minutes
(RAID) : Comes in many different forms but
each is designed to provide redundancy by
having more discs than needed to meet
business needs
○ There are 2 RAID technologies
■ Mirroring
● Considered to be RAID Lvl 1
● Server contains 2 identical
synchronized discs
■ Striping
● Disc Striping with parity
● RAID Lvl 5
● Contains 3 or more discs
● Also includes an extra disc
called Parity Block
● When one of the disc fails, the
Parity Block is used to
regenerate the failed disc’s
content
■ RAID is a Fault-Tolerance
technique NOT a Back-up strategy
3) Networking
● Improve networking redundancy by having multiple
Internet service providers
● Improve networking redundancy by having dual-
network interface cards (NIC) or NIC Teaming
(similar to how you use multiple power supplies)
● Implement Multipath Networking
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 14/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
Always attempt to add Diversity in your infrastructure to improve
Published using Google Docs redundancy Report abuse Learn more
● Diversity in Technology Used
● Diversity of Vendors Diversity of Cryptography
● Diversity of Security Controls
CC- Mike Chapels Notes _____ Updated automatically every 5 minutes
Incident Response
NIST SP 800-61
● Assists organization mitigating the potential business
impact of information security incidents providing practical
guidance.
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 15/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● Physical Security
Published using Google Docs Report abuse Learn more
If your organization lacks personnels from these areas:
● Use incident response service providers to assist if
necessary
CC- Mike Chapels Notes _____ Updated automatically every 5 minutes
Incident Identification
Highest Priority
● The highest priority of a First Responder must be
containing damage through isolation
_____
Disaster Recovery
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 17/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
1) Contain the damage through isolation
Published using Google Docs 2) Recover normal operations Report abuse Learn more
Communications required for an effective DR
● Initial Report
CC- Mike Chapels Notes ● Status updates Updated automatically every 5 minutes
● Ad hoc messages
_____
Backups
● Provides an organization with a fail-safe way to recover
their data in the event of
○ Technology failure
○ Human error
○ Natural disaster
Backup Methods
1) Tape Backups
● Practice of periodically copying data from a primary
storage device to a tape cartridge
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 18/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● Traditional method - outdated
Published using Google Docs 2) Disk-to-disk Backups Report abuse Learn more
● Writes data from Primary Disks to special disks that
are set aside for backup purposes
● Backups that are sent to a storage area network or
CC- Mike Chapels Notes a network attached storage are also fitting in this Updated automatically every 5 minutes
category of backup
3) Cloud Backups
● AWS, Azure, GC
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 20/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● A change of an organization’s business protocols to match
Published using Google Docs the current Disaster Recovery Plan Report abuse Learn more
_____
CPTED
● Crime Prevention Through Environmental Design
○ Basically giving principles to design your crime
prevention mechanisms in a way that is appropriate
with your environmental surroundings
CPTED Goals
1) Natural Surveillance
● Design your security in a way that allows you to
observe the natural surroundings of your facility
○ Windows, Open Areas, Lightning
2) Natural Access Control
● Narrowing the traffic to a single point of entry
○ Gates, etc
3) Natural Territory Reinforcement
● Making it visually and physically obvious that the
area is closed to the public
○ Signs, Lightnings
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 22/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
Visitor Management
Published using Google Docs ● Visitor management procedures protect against intrusions Report abuse Learn more
Visitor Procedures
CC- Mike Chapels Notes ● Describe allowable visit purposes
Updated automatically every 5 minutes
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 23/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● Managing Account Lifecycle
Published using Google Docs ○ Ensuring that as employees move around an Report abuse Learn more
organization with different roles, that they are given
access to corresponding roles
_____
CC- Mike Chapels Notes Updated automatically every 5 minutes
Account Monitoring Procedures
1) Account Audits
● Completed by pulling all permission list, review, and
make adjustments
● Protects against Inaccurate Permissions
○ Inaccurate Permissions
■ Wrong permissions assigned that
results in too little access to do their
job or too much access (violates least
privilege)
■ Result of Privilege Creep
○ A condition that occurs when
users switch roles and their
previous role’s access to
system has not been revoked
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 24/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
_____
Published using Google Docs Report abuse Learn more
Provisioning and Deprovisioning
● Involves the process of creating, updating and deleting user
accounts in multiplace applications and systems
CC- Mike Chapels Notes ● Crucial to Identity and Access Management Task Updated automatically every 5 minutes
Provisioning
● After onboarding, administrators create authentication
credentials and grant appropriate authorization
Deprovisioning
● During the off-boarding process, administrators disable
accounts and revoke authorizations at the appropriate time.
● Prompt Termination (quickly acting after off boarding) is
critical
○ Prevents users from accessing resources without
permission
○ More important if employee leaves in unfavorable
terms
_____
Authorization
● Final step in the Access Control Process
● Determines what an authenticated user can do
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 25/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● User should have the minimum set of permission
Published using Google Docs necessary to perform their job Report abuse Learn more
○ Protects against internal risks as a malicious
employee’s damage will be limited to their access
○ Protects against external risk as if an account was
CC- Mike Chapels Notes hacked, the damage they can do would be limited to Updated automatically every 5 minutes
the permissions on the stolen account.
Network
● Connect computers together
● Can connect computers within an office (LAN) or to the
global internet
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 26/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
1) Ethernet
Published using Google Docs ● Connecting a physical Ethernet cable to an internet Report abuse Learn more
jack behind the ball
● The Ethernet Cable is called the RJ-45 connectors
a.k.a 8 Pins Connector
CC- Mike Chapels Notes ● Super fast but requires physical cables Updated automatically every 5 minutes
● FYI: RJ-11 Cables are used for telephone
connections. They have 6 Pins
2) Wireless Networks (Wi-Fi)
● Create Wireless LANs
3) Bluetooth
● Creates a Personal Area Network (PANs)
● Designed to support a single person
● Main purpose is to create a wireless connection
between a computer and its peripheral devices
4) Near Field Communication (NFC) Technology
● Allows extremely short range wireless connections
(ex= wireless payment)
_____
Internet Protocols
● Main function is to provide an addressing scheme,
known as the IP address
● Routes information across networks
● Not just used on the internet
● Can be used at home or an office
● Deliver packets(chunks of information) from source →
destination
● Serves as a Network Layer Protocol
○ Supports Transport Layer Protocols - which have a
higher set of responsibilities
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 29/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
IP Addresses
CC- Mike Chapels Notes ● Uniquely identify systems on a network Updated automatically every 5 minutes
● Written in dotted quad notation (ex- 192.168.1.100). Also
known as IPv4
○ Means 4 numbers separated by periods
○ Each of these numbers may range between 0-255
■ Why 255?
● Each number is represented by 8-bit
binary numbers
● Those bits can represent 2 to the
power of 8 = 256 possible values
● But we start at 0 so 256-1=255
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 30/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● ex=
Published using Google Docs fd02:24c1:b942:01f3:ead2:123a:c3d2:cf2f Report abuse Learn more
Typically,
Servers are configured with Static IP Addresses
End-user devices are configured with Dynamically-Changing IP
Addresses
_____
Network Ports
● Like Apartment #s, guide traffic to the correct final
destination
● IP addresses uniquely identifies a system while the Network
Ports uniquely identifies a particular location of a system
associated with a specific application
● Think of it as
○ IP Addresses - Street # of an Apartment
○ Network Ports- Unit # of an Apartment
Port Ranges
● 0 - 1,023 = Well-known ports
■ Reserved for common applications that are
assigned by internet authorities
■ Ensures everyone on the internet will know
how to find common services such as : web
servers, email servers
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 31/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● Web-servers use the Well-known
Published using Google Docs port 80 Report abuse Learn more
● Secure Web-servers use the Well-
known port 443
CC- Mike Chapels Notes ● 1,024 - 49,151 = Registered ports Updated automatically every 5 minutes
■ Application vendors may register their
applications to use these ports
● Examples
○ Microsoft Reserve port 1433
for SQL Server database
connections
○ Oracle Reserve port 1521 for
Database
Important Port #s
Administrative Services
● Port 21 : File Transfer Protocol (FTP)
■ Transfers data between systems
Mail Services
● Port 25 : Simple Mail Transfer Protocol (SMTP)
■ Exchange email between servers
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 32/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
Wireless Encryption
Published using Google Docs ● A best practice for network security Report abuse Learn more
● Encryption hides the true content of network traffic from
those without the decryption key
● Takes, Radio Waves, and makes it secure
CC- Mike Chapels Notes The Original approach to Security was: Wired Equival7ent
Updated automatically every 5 minutes
Privacy (WEP)
● This is now considered insecure
In Summary,
CC- Mike Chapels Notes Important Commands Updated automatically every 5 minutes
1) ping
● Checks whether a remote system is responding or
accessible
● Works using the Internet Control Message Protocol
(ICMP)
○ Basically sending a request and
acknowledgement to confirm a connection
○ Troublingshooting with Ping:
■ You can ping the remote system:
● a) if you receive a response :
it is not a network issue and a
local web server issue
● b) if you don’t receive a
response : you may next ping
another system located on the
internet : if that responds : this
will tell you your internet is
successful and the issue is
with the web server or
network connection
● c) if you ping many systems
on internet and there is no
response, it is likely that the
problem is on your end
● d) You can ping a system on
your Local Network : if that
responds, there's probably an
issue with your network’s
connection to the internet
● e) If a Local Network does not
respond : Either your Local
network is down or there is a
problem with your computer
● f) Last Resort : Repeat
process on another computer
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 35/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
○ Some systems do not respond to ping
Published using Google Docs requests Report abuse Learn more
■ Example : A firewall may block ping
requests
3) traceroute
● Determines the network path between two systems
● If you want to know how packets are traveling today
from my system Located in Toronto to a
LinkedIn.com webserver, wherever that is located
● Works only on Mac and Linux
● In Windows, it is : tracert
4) pathping
● Windows only command
● Combines ping and tracert functionality in a single
command
_____
Network Threats
Malware
● One of the most significant threats to computer security
● Short for Malicious Software
● Might steal information, damage data or disrupt normal use
of the system
● Malwares have 2 components:
○ 1) Propagation Mechanism
■ Techniques the malware uses to spread from
one system to another
○ 2) Payload
■ Malicious actions taken by malware
■ Any type of malware can carry any type of
payload
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 36/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
Published using Google Docs Types of Malware Report abuse Learn more
1) Virus
● Spreads after a user takes some type of user
CC- Mike Chapels Notes action Updated automatically every 5 minutes
○ Example : Opening an email attachment,
Clicking a Link, Inserting an infected USB
● Viruses do not spread unless someone gives them a
hand
● User education protects against viruses
2) Worms
● Spread on their own by exploiting vulnerabilities
● When a worm infects a system, it will use it as it’s
base for spreading to other parts of the Local Area
Network
● Worms spread because the systems are vulnerable
● Patching protects against worms
3) Trojan Horse
● Pretends to be a useful legitimate software, with
hidden malicious effect
● When you run the software, it may perform as
expected however will have payloads behind the
scene
● Application Control protects against Trojan Horses
○ Application Controls limit software that can
run on systems to titles and versions
_____
Botnets
● Are a collection of zombie computers used for malicious
purposes
● A network of infected systems
● Steal computing power, network bandwidth, and storage
capacity
● A hacker creating a botnet begins by
○ 1) Infecting a system with malware through any
methods
○ 2) Once the malware takes control of the system
(hacker gains control), he or she joins/adds it to the
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 37/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
preconceived botnet
Published using Google Docs Report abuse Learn more
How are Botnets Used
● Renting out computing power for profit
CC- Mike Chapels Notes ● Delivering spam Updated automatically every 5 minutes
● Engaging in DDoS attacks
● Mining Bitcoin and Cryptocurrencies
● Perform Brute Force Attacks - against passwords
In Summary Botnets:
1) Infect Systems
2) Convert to bots
3) Infect others
4) Check in through Command and Control Network
5) Get Instructions
6) Deliver payload
_____
Eavesdropping Attacks
● All eavesdropping attacks rely on a compromised
communication path between a client and a server
○ Network Device Tapping
○ DNS poisoning
○ ARP poisoning
Man-in-the-browser Attacks
● Variation of Man-in-the-Middle attack
● Exploit flaws in browsers and browser plugins to gain
access to web communications
Replay Attack
● Uses previously captured data, such as an encrypted
authentication token, to create a separate connection to the
server that’s authenticated but does not involve the real end
user
● The attacker cannot see the actually encoded credentials
● They can only see the encoded version of them
● Prevent Replay Attacks by including unique characteristics:
○ Token
○ Timestamp
SSL Stripping
● Tricks browsers into using unencrypted communications
● A variation of eavesdropping attack
● A hacker who has the ability to view a user’s encrypted web
communication exploits the vulnerability to trick the users
browser into reverting to unencrypted communications
for the world to see
● Strips the SSL or TLS protection
_____
Implementation of Attacks
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 39/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
Fault Injection Attacks
Published using Google Docs ● Use externally forced errors Report abuse Learn more
● Attacker attempts to compromise the integrity of a cryptic
device by causing some type of external fault
○ For example : Attacker might use high-voltage
CC- Mike Chapels Notes electricity to cause malfunction that undermines Updated automatically every 5 minutes
security
● These failures of security may cause systems to fail to
encrypt data property.
_____
1) In-band Deployments
● IPS sits in the path of network traffic
● It can block suspicious traffic from entering the
network
● Risk : It is a single point of failure so it may disrupt
the entire network
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 41/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
Malware Prevention
● Antimalware software protects against many different
threats
● Antimalware software protects against viruses, worms,
Trojan Horses and spyware
1) Signature Detection
● Watches for known patterns of malware activity
2) Behavior Detection
● Watches for deviations from normal patterns of
activity
● This type of mechanism is found in advanced
malware protection tools like the Endpoint
Detection and Response (EDR)
■ Offer real-time, advanced protection
■ Goes beyond basic signature
detection and performs deep
instrumentation of endpoints
■ They analyze:
● Memory
● Processor use
● Registry Entries
● Network Communications
■ Installed on Endpoint devices
■ Can perform Sandboxing
● Isolates malicious content
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 42/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
Port Scanners
Published using Google Docs Report abuse Learn more
Vulnerability Assessment Tools
1) Port Scanner
● Looks for open network ports
CC- Mike Chapels Notes ● Equivalent of rattling all doorknobs looking for Updated automatically every 5 minutes
unlocked doors
● nmap
○ Popular port scanning tool /command
2) Vulnerability Scanner
● Looks for known vulnerabilities
● Scans deeper than Port Scanner, actually looks at
what services are using those ports
● Has a database for all known vulnerability exploits
and tests server to see if it contains any of those
vulnerabilities
● Nesssus
○ Popular vulnerability scanner
3) Application Scanner
● Tests deep into application security flaws
_____
Data Centers
● Have significant cooling requirements
● Current Standard of Temperatures
○ Maintain data center air temperatures between
64.6 F and 80.6 F = Expanded Environmental
Envelope
● Humidity is also important
○ Dewpoint says : Humidity 41.9 F and 50.0 F
■ This temperature prevents condensation and
static electricity
● HVAC is important (Heating, Ventilation and Air
Conditioning Systems)
● Must also look out for fire, flooding, electromagnetic
interference
Security Zones
Zero Trust Approach : Systems do not gain any trust based solely
upon their network location
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 44/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
3 Special-Purpose Networks
Published using Google Docs 1) Extranet Report abuse Learn more
● Special intranet segments that are accessible by
outside parties like business partners
2) Honeynet
CC- Mike Chapels Notes ● Decoy networks designed to attract attackers Updated automatically every 5 minutes
3) Ad Hoc Networks
● Temporary networks that may bypass security
controls
East-West Traffic
● Network traffic between systems located in data center
North-South Traffic
● Networks traffic between systems in the data center and
systems on the Internet
_____
Switches
● Connect devices to the network
● Has many network ports
● Reside in wiring closets and connect the computers in a
building together
● Ethernet jacks are at the other end of network cables
connected to switches
● Wireless access points (WAPs) connect to switches and
create Wi-Fi networks
○ The Physical APs itself has a wired connection back
to the switch
● Switches can only create Local Networks
● Layer 2 of OSI Model - Data Link Layer
● Some switches can be in the Layer 3 of OSI Model -
Network Layer (can interpret IP Addresses)
○ For this to happen, they must use Routers
Routers
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 45/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● Connect networks to each other, making intelligent packet
Published using Google Docs routing decisions Report abuse Learn more
● Serves as a central aggregation point for network traffic
heading to or from a large network
● Works as the air traffic controller of the network
CC- Mike Chapels Notes ● Makes best path decisions for traffic to follow Updated automatically every 5 minutes
● Use Access Control Lists to limit some traffic that are
entering or leaving a network, this type of filtering does not
pay attention to Connection states and are called
Stateless Inspection
_____
Configuring VLANs
1) Enable VLAN trunking
● Allow switches in different locations on the network
to carry the same VLANs
2) Configure VLANs for each switch port
_____
Firewalls
● Often sit at the network perimeter
● Between Router and Internet
Switch
I
I
I
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 46/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 47/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
get in as the door is always
Published using Google Docs closed Report abuse Learn more
VPNs
● Works by using encryption to create a virtual tunnel
between two systems over the internet
● Everything on one tunnel is encrypted and decrypted when
it exits
● VPNs require an endpoint that accepts VPN connections
● Endpoints can be many things:
■ Firewalls
■ Router
■ Server
■ Dedicated VPN Concentrators - Used for
High Volume
Published using Google Docs SSL/TLS VPNs Report abuse Learn more
● Works at the Application Layer over TCP port 443
● Works on any system on a web browser
● Port 443 = Almost bypass any firewall
CC- Mike Chapels Notes Updated automatically every 5 minutes
HTML5 VPNs
● Work entirely within the web browser
● A remote access VPN
Always on VPN
● Connects automatically
● Takes control from the user
● Always protected by strong encryption
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 50/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
results to authenticator → Authenticator → Supplicant → Access
Published using Google Docs Report abuse Learn more
NAC Roles
1) User and device authentication (what we discussed above)
CC- Mike Chapels Notes 2) Role-based access Updated automatically every 5 minutes
● Once authenticator learns the identity of requested
user it places the user in the network based upon
that user’s identity
3) Posture checking/Health Checking
● Before granting access, it check for compliance
requirements
○ Validating current signatures
○ Verifying for antivirus presence
○ Ensuring proper firewall configuration
○ If it Fails the posture check
■ It will be placed into a quarantine
VLAN where they will have limited
internet access and no access to
internal resources
○ Posture checking is done through an Agent
or Agentless
_____
Internet of Things
● Smart devices
Security of IOT
● Check for weak default passwords
● Make sure to regularly update and patch
● Some have Automatic Updates and some require Manual
Websites
● If worried get Firmware Version Control
○ Updates are applied in orderly fashion
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 51/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● Security Wrappers (For organizations that must run
Published using Google Docs vulnerable systems) Report abuse Learn more
○ Mini firewall for devices
○ Device is not directly reached through network
○ Only process vetted requests
CC- Mike Chapels Notes ● Most secure way is Network Segmentation - isolating Updated automatically every 5 minutes
network to a isolated section where they will not have
access to trusted networks
● Application firewalls provide added protection for embedded
devices
Cloud Computing
● Delivering computing resources to a remote customer over
a network
● Official Definition: A model for enabling ubiquitous,
convenient, on-demand network access to shared pool of
configurable computing resources (networks, servers,
storage, applications, services) that can be rapidly
provisioned and released with menial management effort or
service provider interaction
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 53/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
_____
Published using Google Docs Report abuse Learn more
Vendor Relationship Management
● Ensure that vendor security policies are at least as stringent
as your own
CC- Mike Chapels Notes ● Vendor lock-in makes it difficult to switch vendors down the Updated automatically every 5 minutes
road. So be careful
● Conduct due diligence
● Socialize with team
● Present to stakeholders
● Schedule weekly meetings
Vendor Agreements
Data Security
Encryption
● Uses math to make data unreadable to unauthorized
individuals
● Transforms text from plaintext to ciphertext
● Uses decryption algorithm key to read message
Symmetric Encryption
● You encrypt and decrypt with the same shared secret key
● It's like a password to a message
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 55/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● You will keep needing more keys as network populates
Published using Google Docs Report abuse Learn more
Asymmetric Encryption
● You encrypt and decrypt with different keys from the same
pair
CC- Mike Chapels Notes Updated automatically every 5 minutes
Keys used for Asymmetric encryption and decryption (public &
private) must be from the same pair
Hash Functions
● One-way function that transforms a variable length input
into a unique, fixed-length output
You must know which functions are considered insecure and which
remain secure
2) SHA-1
● Produces a 160-bit hash value
● Contains security flaws
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 56/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
● SHA-1 is no longer secure
Published using Google Docs Report abuse Learn more
3) SHA-2
● Replaced SHA-1
● Consists of a family of 6 has functions
CC- Mike Chapels Notes ● Produces output of 224, 256, 384 and 512 bits Updated automatically every 5 minutes
● Uses a mathematically similar approach to SHA-1
and MD5
● SHA-2 is no longer secure
4) SHA-3
● Designed to replace SHA-2
● Uses a completely different has generation
approach than SHA-2
● Produces hashes of user-selected fixed strength
● Some people do not trust SHA algorithms because
NSA created it
5) RIPEMD
● Created as an alternative to government-sponsored
hash functions
● Produces 128, 160, 256, and 320-bit hashes
● Contains flaws in the 128-bit version
● 160 bit is widely used. Even in Bitcoin
Data Lifecycle
● Explains the different stages of data in the cloud
Cycle
1) Create
2) Store
3) Use
4) Share
5) Archive
6) Destroy
● Must be done in a secured manner
● Data Sanitization Techniques
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 57/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
○ Clearing overwrites sensitive information to
Published using Google Docs frustrate causal analysis Report abuse Learn more
○ Purging
○ Destroying, shredding, pulverization, melting
and burning
CC- Mike Chapels Notes _____ Updated automatically every 5 minutes
Data Classification
● Assign information into categories, known as classification,
that determine storage, handling, and access
requirements
Classification Levels
1) High, Medium, Low
2) Public vs Private
Labeling Requirements
● Requirement to identify sensitive information
Logging establishes:
1) Accountability
● Who caused the event
● A.K.A Identity Attribution
2) Traceability
● Uncover all other related events
3) Auditability
● Provide clear documentation of the events
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 58/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
Realistically, logging data of a company can be overwhelming.
Published using Google Docs Artificial Intelligence can help solve security data overload Report abuse Learn more
Security Information and Event Management (SIEM) has
2 functions:
CC- Mike Chapels Notes 1) They act as a central secure collection point Updated automatically every 5 minutes
● All systems send log entries directly to the
SIEM
● Firewall log, Web server log, Database log,
Router log, they are all sent to to SIEM
where it will provide an overall picture
2) Source of Artificial Intelligence
_____
Security Awareness and Training
Social Engineering
● Manipulating people into divulging information or performing
an action that undermines security.
Impersonation Attacks
Spam
● Unsolicited commercial email
● Phishing
○ Phishing is a category of spam
○ Steales credentials
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 59/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
○ Spear Phishing
Published using Google Docs ■ Highly target phishing Report abuse Learn more
■ Customized phishing attacks
○ Whaling
■ Phishing targeted on executives
CC- Mike Chapels Notes ○ Pharming Updated automatically every 5 minutes
■ Using fake websites
○ Vishing
■ Voice phishing
● Sda
○ Smishing and Spim
■ SMS and IM spam
○ Spoofing
■ Faking an identity
_____
Security Training
● Provides users with the knowledge they need to protect the
organization’s security
Security Awareness
● Keeps the lessons learned during security training top of
mind for employees. Reminder
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 60/61
5/12/25, 12:39 PM CC- Mike Chapels Notes
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD2zXJstcJYsNbiOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub 61/61