Comptia Security+, Security, Technology

Security+ Course – 5.4 Incident Response

1. Security Incidents Security Incident Terminology Security Event: these occur anytime that an observable action takes place on a system that has security implications. This may be a user accessing a web page, a file being written to disk by a process, a connection being established through a firewall, or any other security related event. Thousands of security events take…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 5.3 Business Continuity and Disaster Recovery

1. Business Continuity Planning Business continuity efforts are a collection of activities designed to keep a business running in the face of adversity. This adversity may come in the form of a small-scaled incident such as a single system failure or a catastrophic incident, such as an earthquake or tornado. Business continuity plans may also be activated by man-made disasters…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 5.2 Supply Chain Risks

1. Managing Vendor Relationships Security professionals must pay careful attention to managing these vendor relationships in a way that protects the confidentiality, integrity, and availability of their organisation’s information and IT systems. This is known as Supply Chain Assessment. Perhaps, the most important rule of thumb is that you should always ensure that vendors follow security policies and procedures that…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 4.4 Account Management

1. Understanding account and privilege management Account Management Tasks: implement the principles of least privilege: An individual should only have the minimum set of privileges necessary to complete their assigned job duties Implement separation of duties: Performing sensitive actions should require the collaboration of two individuals implementing job rotation schemes: regularly move people between jobs to prevent fraud managing the…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 4.3 Authorisation

1. Understanding Authorisation Authorisation is the final step in the access control process. Once an individual successfully authenticates to a system, authorisation determines the privileges that individual has to access resources and information. 2 Principles of Authorisation Principal of Least Privilege: This principle states that an individual should have only the minimum set of permissions necessary to accomplish his or…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 4.1 Identification

1. Identification, authentication, authorisation and accounting As security professionals, one of the most important things that we do is ensure that only authorised individuals gain access to the information, systems, and networks under our protection. The access control process consists of three steps: Identification: this is a claim of who the person is. In electronic system this when you enter…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 3.9. Physical Security

1. Site and Facility Design Sites to be protected: – Data Centre – Server rooms – Media storage facilities (where you keep your offsite backup media) – Evidence storage locations – Wiring/Switch cabinets/closets (could be used for eavesdropping or getting access to the network) You should perform inventory of all sensitive sites and audit the security controls.     2.…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 3.8 Cloud Computing and Virtualisation

1. Virtualisation There is lots information out there about virtualisation, this is just the cliffsnotes. For more: https://en.wikipedia.org/wiki/Virtualization Host machines run on physical hardware Host machines provide services to several virtualised guest machines They hypervisor tricks each guest into thinking it is running on dedicated hardware. The guest doesn’t know it’s a virtual machine.   Types of Hypervisor There are…

Continue Reading