Certifications
Security+

Security+ SY0-601

Domains

DomainPercentage
1.0 Attacks, Threats, and Vulnerabilities24%
2.0 Architecture and Design21%
3.0 Implementation25%
4.0 Operations and Incident Response16%
5.0 Governance, Risk, and Compliance14%

Ports

  • 80 - HTTP

  • 443 - HTTPS

  • 389 - LDAP

CIA Triad

Confidentiality, Integrity, Availability

OSI Model Layers

  1. The Physical Layer.
  2. The Data Link Layer.
  3. The Network Layer.
    • Devices: Router - allows different logical networks to communicate.
  4. The Transport Layer.
  5. The Session Layer.
  6. The Presentation Layer.
  7. The Application Layer.

Security Devices

All-in-one security Devices

  • Url Filtering
  • content inspection
  • malware inspection

Attacks

  • Replay attack -
    • protected against by -> Challenge Handshake Authentication Protocol (CHAP)
  • Mathematical Attack - attack on a cryptographic algorithm using brute force methods to encrypt text strings until the output matches the ciphertext

Terms

Multi-factor Authentication - Auth combining two or more authentication methods such as a password, smart card, fingerprint, etc. Audit - determines whether network security practices follow a company's security policy Business Continuity Plan Business Impact Analysis (BIA)

Disaster Recovery Plan (DRP) - Lists the steps to take in case of IT disaster on main IT site MTD (Maximum Tolerable Downtime) - Maximum time a business can have system downtime Integrity Measurement - monitoring a device to ensure it has not deviated from the secure baseline

Certificate Revocation List (CRL) - Cancelled certificate information list

Service Pack - a collection of hotfixes combined into a single patch

Malware

Pharming - traffic redirection to a website that looks identical to the intended website Trojan Horse - malware disguised as a file or useful utility, that is embedded with malicious code