Reader small image

You're reading from  CompTIA Security+ SY0-701 Certification Guide - Third Edition

Product typeBook
Published inJan 2024
PublisherPackt
ISBN-139781835461532
Edition3rd Edition
Right arrow
Author (1)
Ian Neil
Ian Neil
author image
Ian Neil

Ian Neil is one of the world's top trainers of Security+. He is able to break down information into manageable chunks so that people with no background knowledge can gain the skills required to become certified. He has recently worked for the US Army in Europe and designed a Security+ course that catered to people from all backgrounds (not just IT professionals), with an extremely successful pass rate. He is an MCT, MCSE, A+, Network+, Security+, CASP, and RESILIA practitioner that has worked with high-end training providers over the past 23 years and was one of the first technical trainers to train Microsoft internal staff when they opened their Bucharest Office in 2006.
Read more about Ian Neil

Right arrow

Introduction

This chapter covers the first objective of Domain 4.0 Security Program Management and Oversight of the CompTIA Security+ 701 exam and will teach you how to fortify computing resources against relentless cyber threats.

Early sections will examine secure baselines, their deployment and maintenance methods, and review methods to harden our network devices against attacks. We’ll also consider the planning and installation of wireless networks and mobile device management, including different models and security methods, and explore the processes of effective application security, sandboxing, and monitoring.

This chapter will give you an overview of applying common security techniques to computing resources. This will enable you to answer all exam questions related to exam objective 4.1, Given a scenario, apply common security techniques to computing resources on your certification exam.

Note

A full breakdown of Exam Objective 4.1 will be provided at the...

Secure Baselines

As technology continues to advance, so do the tactics of malicious actors seeking vulnerabilities to exploit. Whether it’s safeguarding sensitive information, preserving operational continuity, or upholding user trust, the application of common security techniques to computing resources is paramount.

A security baseline is the foundational set of security configurations and practices that establish a secure starting point for computing resources. They provide a standardized framework for configuring and managing computing resources. The following sections will consider each of the three phases of a secure baseline: establish, deploy, and maintain.

Establish

A security baseline is a predefined set of configurations and best practices meticulously designed to create a resilient and secure foundation for computing resources. Implemented secure baselines offer a reliable starting point from which to harden targets against potential vulnerabilities. Let...

Wireless Devices

Wireless devices have transformed the way we connect and communicate, and make access to networks easier and more mobile, but they also pose increased security challenges. Effective deployment and optimization require careful consideration of installation factors, site surveys that identify and rectify issues, and heat maps to visualize network performance. When deploying a wireless network, consider the following information:

  • Site Survey: Conducting site surveys is an essential step in optimizing wireless network performance. These surveys involve a comprehensive analysis of the environment, which includes identification of sources of interference, such as load-bearing walls, cordless phones, microwaves, elevators, metal frames, metal doors, and radio waves. A site survey will help to determine the best places to install the wireless access points that users connect to.
  • Heat Maps: A heat map is a valuable tool in the hands of a network administrator when...

Mobile Solutions

In today’s interconnected world, mobile devices have become ubiquitous as they play a pivotal role in both personal and professional spheres. With the increasing reliance on mobile solutions, the need for robust security measures to protect sensitive data and resources has never been greater. The following sections will explore common security techniques that can be applied to mobile solutions, beginning with mobile device management.

Mobile Device Management

A Mobile Device Management (MDM) solution provides centralized control and maintenance of mobile devices to ensure strict adherence to the security protocols established by an organization and empowers IT administrators to oversee, configure, and safeguard mobile devices from a remote location.

Among its primary responsibilities, MDM is set up by the IT staff to enforce security guidelines such as encryption, password prerequisites, and application whitelisting. These measures guarantee that all...

Wireless Security Settings

In the corporate world, wireless technology is an integral part of daily operations. Its frequent use is driven by the need for flexibility and mobility, in order to allow employees to work from various locations within the office and remotely. This versatility boosts productivity and collaboration.

However, with the convenience of wireless technology comes the risk of security breaches. Cyber threats, including unauthorized access and data interception, pose significant dangers to corporate networks. Consequently, the importance of robust wireless security measures cannot be overstated.

In the following sections, we will review four key concepts related to wireless security settings, starting with Wi-Fi Protected Access 3 (WPA3).

Wi-Fi Protected Access 3

WPA3 was released in 2018 to address the weaknesses in WPA2. WPA3 primarily relies on Simultaneous Authentication of Equals (SAE) for key establishment and encryption compared to WPA2’...

Application Security

In addition to networks and devices, we also need to ensure the applications are secure. The software we rely on is vulnerable to breaches, putting sensitive data at risk. There are several key features of application security, including the following:

  • Input validation: Input validation ensures that all data, (whether entered via a web page or a wizard), complies with predefined rules, formats, and permissible ranges. Imagine filling out a web form swiftly, only to mistakenly place your zip code in the wrong field. Input validation steps in like a helpful guide, promptly detecting and highlighting such errors in a vivid red, signaling that certain parameters require correction. Once these inaccuracies are rectified, the form will graciously accept and process the submission. But input validation’s role extends far beyond the user interface. Input validation protects against attacks such as SQL injection, buffer overflow, and integer overflow attacks...

Sandboxing

Sandboxing an application means isolating it from the network for testing, patching, or complete malware inspection. We can create an isolated virtual machine by using containers such as Docker or a third-party tool such as Cuckoo, which is the leading open source sandbox for automated malware inspection. Most modern web browsers (including Google Chrome, Mozilla Firefox, and Microsoft Edge) use sandboxes to isolate individual browser tabs or processes. If one tab or website contains malicious code, it is confined to that sandbox and cannot affect the entire browser or computer.

Monitoring

Secure coding extends its role to detection and response through enhanced monitoring. Using logging and alerting systems, systems responsible for monitoring can detect threats and malicious activity. Enhanced monitoring enables security analysts to act swiftly on the detailed information provided. Commercial applications such as SolarWinds Security Event Manager and Splunk offer robust monitoring and alerting solutions for businesses to help them detect and respond to potential security threats. They use methods such as data collection, real-time analysis, and alerts.

Splunk, in particular, performs several key tasks as part of this solution. These are described in Table 14.1:

Summary

This chapter covered secure baselines and their importance to device security. This included an exploration of deployment and maintenance methods, as well as the aspects of hardening our network devices to protect them against attacks. Later sections discussed the planning and maintenance of a wireless network, mobile device management considering various models and security methods, and a review of application security, sandboxing, and monitoring methodologies.

The knowledge gained in this chapter will prepare you to answer any questions relating to Exam Objective 4.1 in your CompTIA Security+ certification exam.

The next chapter of the book is Chapter 15, Explain the security implications of proper hardware, software, and data asset management.

Exam Objectives 4.1

Given a scenario, apply common security techniques to computing resources.

  • Secure baselines: Fundamental security configuration standards:
    • Establish: Define security measures
    • Deploy: Implement security measures
    • Maintain: Sustain and update security measures
  • Hardening targets: Making targets more secure:
    • Mobile devices: Secure smartphones and tablets
    • Workstations: Enhance security on desktop computers
    • Switches: Secure network switches for data protection
    • Routers: Strengthen security on network routers
    • Cloud infrastructure: Secure cloud-based resources
    • Servers: Enhance security on server systems
    • ICS/SCADA: Secure industrial control systems and SCADA
    • Embedded systems: Strengthen security for embedded devices
    • RTOS: Secure real-time operating systems
    • IoT devices: Enhance security for Internet of Things devices
  • Wireless devices: Mobile and wireless technology equipment:
    • Installation considerations: Factors for successful setup
    • Site surveys: Assess location for optimal...

Chapter Review Questions

The following questions are designed to check that you have understood the information in the chapter. For a realistic practice exam, please check the practice resources in our exclusive online study tools (refer to Chapter 29, Accessing the online practice resources for instructions to unlock them). The answers and explanations to these questions can be found via this link.

  1. During software development and distribution, what multifaceted purpose does code signing primarily serve?
    1. Validating the software’s source and integrity while enhancing trustworthiness
    2. Improving code performance and execution speed for an optimal user experience
    3. Simplifying the software installation process for end users
    4. Ensuring compatibility with legacy systems and reducing system resource overhead
  2. You are a systems administrator for a large multinational corporation and have recently failed a third-party audit, due to two outdated mail servers’ patches. The audit...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
CompTIA Security+ SY0-701 Certification Guide - Third Edition
Published in: Jan 2024Publisher: PacktISBN-13: 9781835461532
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Ian Neil

Ian Neil is one of the world's top trainers of Security+. He is able to break down information into manageable chunks so that people with no background knowledge can gain the skills required to become certified. He has recently worked for the US Army in Europe and designed a Security+ course that catered to people from all backgrounds (not just IT professionals), with an extremely successful pass rate. He is an MCT, MCSE, A+, Network+, Security+, CASP, and RESILIA practitioner that has worked with high-end training providers over the past 23 years and was one of the first technical trainers to train Microsoft internal staff when they opened their Bucharest Office in 2006.
Read more about Ian Neil

Step

Description

Data Collection

Gather data from various IT sources (logs, network, etc.)

Data Aggregation

...