CompTIA Security+ SY0-701 - DOMAIN 2 COMPLETE

CompTIA Security+ SY0-701 - DOMAIN 2 COMPLETE

Introduction to Domain 2: Threats, Vulnerabilities, and Mitigations

Overview of Domain 2

  • This section focuses on understanding threats, vulnerabilities, and mitigation strategies in cybersecurity.
  • The discussion will cover threat actors' motivations, threat vectors, attack surfaces, and indicators of malicious activity.
  • Emphasis is placed on how these components interrelate and affect an organization's security posture.

Resources for Exam Preparation

  • A PDF copy of the presentation is available for download to aid in exam preparation.
  • Clickable table of contents provided in the video description for easy navigation through topics.
  • Recommended study materials include Cybex's official study guide with practice questions and exams.

Understanding Threat Actors

Types of Threat Actors

  • Nation State: Government entities using cyber attacks to disrupt or steal information from other nations.
  • Unskilled Attackers (Script Kitties): Individuals with limited technical skills launching attacks out of curiosity or malice.
  • Hacktivists: Attackers motivated by political or social causes; their actions are mission-driven rather than profit-driven.

Insider Threat

  • Refers to authorized internal users who misuse their access intentionally or unintentionally to harm systems or organizations.

Organized Crime and Shadow IT

  • Organized Crime: Criminal syndicates that utilize cyber attacks for financial gain through data theft or fraud.
  • Shadow IT: Employees using unauthorized IT resources which can create security vulnerabilities within an organization due to lack of oversight.

Motivations Behind Cyber Attacks

Key Motivations

  • Data Exfiltration: Unauthorized removal of sensitive information from a system is a primary goal for many attackers.
  • Espionage: Conducted by nation-states or corporations aiming to steal confidential information from competitors or adversaries.
  • Service Disruption: Attacks aimed at causing outages in essential services can have significant impacts on operations.

Blackmail Attacks

  • These involve threatening exposure of sensitive information unless demands are met, often targeting individuals or organizations with potentially damaging data.

Understanding Cyber Threat Actors and Their Motivations

Types of Motivations Behind Cyber Attacks

  • Financial Gain: Cyber attacks can be motivated by a demand for money or valuable concessions, often through fraudulent activities.
  • Ethical Hacking: Authorized simulated attacks conducted by security researchers aim to identify vulnerabilities in systems to enhance security posture.
  • Revenge: Some attackers are driven by a desire to retaliate against perceived wrongs, aiming to cause public embarrassment or operational disruption.
  • Disruption or Chaos: This motivation seeks widespread disruption of normal operations, potentially driven by personal satisfaction or furthering an agenda.
  • Cyber Warfare: Military forces may use cyber attacks to disrupt enemy operations and gain advantages in armed conflicts, referred to as cyber warfare.

Overview of Threat Actor Categories

  • Nation State Actors: High skill level with motivations including espionage, disruption, and power dynamics; often depicted in spy movies and news reports.
  • Organized Crime: Typically high skill focused on financial gain through fraud and extortion; these actors conduct sophisticated operations for profit.
  • Insider Threat: Skill levels vary; common motives include financial gain or retaliation from disgruntled employees.
  • Activists (Hacktivists): Skill levels vary widely; they focus on social or political causes. A notable example is the group Anonymous.
  • Unskilled Attackers: Generally low skill level; may engage in malicious acts out of curiosity or malice rather than financial gain.

Examples of Cyber Threat Actors

  • Nation State Example: Engaging in espionage to steal intellectual property from foreign competitors for geopolitical advantage.
  • Unskilled Attacker Example: Launching phishing campaigns using readily available scripts found online or purchased on the dark web.
  • Insider Threat Example: Employees selling customer data on the black market or leaking sensitive information for personal benefit.
  • Organized Crime Example: Conducting ransomware attacks targeting major hospitals, demonstrating sophistication and calculated ROI analysis before selecting targets.
  • Shadow IT Example: Employees creating unauthorized cloud storage accounts for convenience, bypassing organizational controls while seeking productivity gains.

Impact of Skill Level on Cyber Threat

  • Highly skilled attackers can exploit complex vulnerabilities undetected over long periods, posing significant threats due to their ability to target specific systems effectively.

Understanding Threats and Attack Vectors in Cybersecurity

The Nature of Cyber Threats

  • Even low-skilled attackers can pose significant risks by targeting vulnerable systems or using social engineering tactics, such as phishing attacks, which are inexpensive and yield high returns.
  • Well-funded actors, like nation-states and organized crime groups, can invest in advanced tools and skilled personnel to launch complex attacks on a larger scale.
  • Low-funded attackers typically rely on free tools, limiting their capabilities but still allowing them to exploit basic vulnerabilities or conduct social engineering attacks.

Defense Strategies Against Cyber Threats

  • To defend against various levels of funding and skill among attackers, organizations should focus on three key strategies: good patch hygiene, employee awareness training, and layered defenses.
  • Employee training is crucial for helping staff recognize phishing attempts and make informed decisions when faced with potential security breaches.
  • A layered defense approach ensures that if initial network defenses fail, additional layers closer to sensitive data can stop the attack.

Ranking Threat Levels

  • High-skill and high-funded attackers represent the most dangerous threats due to their resources and ability to develop sophisticated attacks that are hard to defend against.
  • Attackers often exploit organizations lacking basic security measures like multi-factor authentication or proper system patching.

Common Threat Vectors & Attack Surfaces

Definitions of Key Concepts

  • The syllabus introduces common threat vectors (methods used by attackers to gain unauthorized access) and attack surfaces (total entry points available for exploitation).
  • Examples of threat vectors include phishing emails, malware attachments, unpatched software vulnerabilities, and social engineering tactics.

Relationship Between Threat Vectors & Attack Surfaces

  • A larger attack surface increases the number of potential threat vectors an attacker can utilize; thus reducing vulnerabilities is essential for improving security posture.
  • An analogy comparing a castle illustrates this relationship: stronger defenses reduce both the size of the attack surface and the effectiveness of threat vectors.

Message-Based Services Vulnerabilities

Email Security Risks

  • In message-based services like email, common threat vectors include phishing emails with malicious links or attachments as well as spam containing malware.
  • Attack surfaces in email security involve unprotected accounts, weak passwords, lack of multi-factor authentication (MFA), and poorly configured filters.

SMS Security Risks

Understanding Mobile Security Threats

SIM Swapping and User Awareness

  • SIM swapping is a prevalent attack where bad actors convince mobile shop clerks to issue a new SIM card, allowing them access to the victim's phone.
  • Attack surfaces include unsecured mobile devices, weak SMS verification processes, and user unawareness about smishing (SMS phishing).

Mitigating Smishing Threats

  • Most mobile providers offer free software to help identify and divert malicious text messages from users' inboxes.
  • Instant messaging platforms are also vulnerable to threats like malicious links or files shared through chats.

Instant Messaging Vulnerabilities

  • Common attacks in instant messaging include social engineering tactics that impersonate contacts.
  • Unencrypted IM platforms and lack of user access controls increase vulnerability within messaging applications.

Image-Based Threat Vectors

  • Steganography is used to hide malware within images, while phishing attacks utilize fake images to lure victims.
  • The rise of image-based generative AI tools has made creating realistic fake images easier, expanding the threat landscape.

File-Based Malware Risks

  • Malware can be hidden within documents or executables; zero-day vulnerabilities are often exploited via file attachments.
  • Key attack surfaces include downloading files from untrusted sources and opening attachments without proper scanning.

Voice Call Attacks: Understanding Vishing

The Dangers of Vishing

  • Vishing involves attackers impersonating legitimate callers over the phone to steal sensitive information.
  • AI-based voice deep fakes pose significant risks, as demonstrated by a real-world incident resulting in a multi-million dollar loss due to an impersonation scam.

Importance of Verification

  • Proper training could have prevented financial losses if the victim had verified the caller's identity by contacting their manager directly.

Removable Device Security Concerns

Malware Spread Through USB Drives

  • Infected USB drives or external hard drives can spread malware; unrestricted use on work computers increases risk.
  • Implementing policies against personal USB drive usage at work can mitigate these risks significantly.

Vulnerable Software: A Major Threat Vector

Addressing Software Vulnerabilities

  • Unpatched software with known vulnerabilities poses serious security risks; outdated applications must be regularly updated for security patches.

Agentless Software Risks

  • Agentless software can exploit vulnerabilities without requiring separate agents for infection but comes with limited patching options and increased reliance on vendor security.

Legacy Systems: Challenges in Cybersecurity

Unsupported Applications as Targets

  • Legacy systems are often targeted due to known vulnerabilities when security patches are unavailable.

Understanding Network Vulnerabilities and Threat Vectors

Unsecure Networks Overview

  • Systems in manufacturing are often air-gapped to prevent exposure to attacks, minimizing their attack surfaces.
  • Wireless threat vectors include man-in-the-middle attacks on unencrypted Wi-Fi networks; using public Wi-Fi without a VPN increases vulnerability.
  • Wired network threats involve unauthorized physical access and malware spread; weak segmentation allows lateral movement for attackers.
  • Effective defenses include logical controls like network segmentation, ensuring only necessary systems communicate within the same segment.
  • Bluetooth vulnerabilities can lead to data theft or device takeover; users should only enable Bluetooth when needed.

Open Service Ports and Default Credentials

  • Attackers exploit known vulnerabilities through open service ports; leaving services like HTTP unencrypted on Port 80 is risky.
  • Inadequate network access control can expose unnecessary services; remote desktop protocols should be restricted to corporate networks via VPN.
  • Just-in-time (JIT) access allows temporary activation of ports, enhancing security by closing them when not in use.
  • Default credentials pose a significant risk as they can be easily guessed through brute force attacks; strong password policies are essential.

Supply Chain Risks

  • Compromised systems within a supplier's network can lead to client attacks; vendor risk management is crucial for mitigating these risks.
  • Cloud service providers offer audits (e.g., SOC 2 Type II, ISO 271), providing measurable compliance assurance but may still have inherent risks from third-party vendors.
  • The SolarWinds breach exemplifies how vulnerabilities in vendor software can impact clients on a large scale.

Principles of Social Engineering Attacks

  • Understanding social engineering principles is vital for defense against such attacks. Key tactics include:
  • Authority: Attackers leverage perceived authority to manipulate targets into compliance.
  • Intimidation: Suggesting negative consequences if requests are not fulfilled encourages cooperation from victims.

Understanding Social Engineering Tactics

Key Principles of Social Engineering

  • Scarcity: Refers to limited opportunities or resources, creating urgency. It is often linked to the quantity of something available.
  • Familiarity: Establishing personal connections through mutual acquaintances, also known as social proof or liking.
  • Trust: Building a relationship by demonstrating knowledge and experience, which helps in assisting targets with issues.
  • Urgency: Time-sensitive demands that require immediate action, often used alongside scarcity in social engineering attacks.

Types of Phishing Attacks

  • Phishing: Email-based attacks designed to trick users into revealing personal information or clicking malicious links.
  • Spear Phishing: Targets specific groups, making it harder to detect due to its tailored nature.
  • Whaling: Focuses on high-level executives or valuable targets within an organization.
  • Vishing and Smishing: Voice phishing (phone-based) and SMS phishing (text messaging), both aiming to deceive users into providing sensitive information.

Defense Against Social Engineering

  • The best defense against social engineering tactics is security awareness training for users, emphasizing user education about potential threats.
  • Regular training sessions can help users recognize deceptive emails, phone calls, and messages that aim to extract sensitive information.

Misinformation and Impersonation Risks

  • Misinformation/Disinformation: Spreading false information can manipulate public opinion; user education is crucial for discerning truth from fiction online.
  • Impersonation Attacks: Attackers use familiar names but unfamiliar addresses. Generative AI complicates detection by producing convincing communication styles.

Understanding Pretexting

  • In pretexting attacks, attackers create a fabricated scenario to gain trust and extract valuable information from victims.
  • The attack relies on establishing authority through a plausible character needing access to certain data.

Understanding User Awareness and Security Vulnerabilities

Importance of User Awareness Training

  • Emphasizes the need for users to pause and verify unusual requests, reducing risks associated with social engineering.
  • Suggests that users should confirm requests from superiors by calling back to ensure legitimacy, reinforcing the importance of verification in user awareness training.

Threat Vectors in Cybersecurity

Watering Hole Attacks

  • Describes watering hole attacks where attackers compromise legitimate websites frequented by target groups, leading to malware infections or credential theft.
  • Highlights the attack surface as user unfamiliarity with secure browsing practices; suggests web filtering as a preventive measure but acknowledges its limitations.

Brand Impersonation

  • Discusses brand impersonation tactics where attackers create fake websites or emails resembling legitimate brands to deceive victims into revealing personal information.
  • Stresses the importance of user attention to detail and implementing email banners in corporate environments to warn users about external emails.

Typo Squatting

  • Defines typo squatting as registering domain names with slight misspellings of popular sites, targeting users who mistype URLs.
  • Explains how these attacks can lead to drive-by downloads that infect devices without user interaction, emphasizing the need for careful URL checking.

Understanding Vulnerabilities in Cybersecurity

Key Terms Defined

  • Introduces foundational terms: vulnerability (a weakness), threat (potential event exploiting a vulnerability), exploit (method/tool used), and attack (actual attempt to exploit).

Relationship Between Terms

  • Illustrates how vulnerabilities can be exploited by threats using specific exploits, culminating in an attack that causes harm.

Analogy for Clarity

  • Uses a house analogy: a weak lock represents vulnerability, a burglar symbolizes threat, and a crowbar signifies exploit leading to an attack.

Types of Vulnerabilities

Buffer Overflows

Understanding Buffer Overflows and Security Vulnerabilities

Buffer Overflow Attacks

  • Input that exceeds memory space can lead to buffer overflow, which is prevented through input validation and software testing.
  • Memory injection is a malicious technique used in buffer overflow attacks, with integer overflow being a specific type where too much data is placed into a small numerical space.
  • Integer overflows are dangerous as they often result in unexpected behavior rather than errors, leading to potential security vulnerabilities.

Secure Coding Practices

  • To mitigate risks of overflows, secure coding practices should be employed, including validating data sizes and using appropriate variable types (e.g., long integers).

Race Conditions

  • Race conditions occur when system behavior depends on the timing of uncontrollable events; specifically, the time of check vs. time of use can create vulnerabilities if checks are done prematurely.

Malicious Updates

  • Attackers may deploy fake patches to compromise systems; code signing helps protect against this by ensuring only signed updates are accepted.

Operating System Vulnerabilities

Default Settings and Misconfigurations

  • Operating systems often have insecure default settings or unnecessary applications that can be exploited; establishing a secure configuration baseline is crucial.

Privilege Escalation Vulnerabilities

  • These vulnerabilities allow attackers to gain unauthorized higher privileges; requiring authentication for privilege elevation (e.g., user access control in Windows or sudo in Linux) mitigates this risk.

Zero-Day Vulnerabilities

  • Zero-day vulnerabilities are unknown to vendors and lack available patches, making them particularly dangerous. Defense-in-depth strategies using AI and advanced detection systems help identify these threats before they escalate.

Web-Based Threat Exploitation

SQL Injection Attacks

  • SQL injection exploits weaknesses in web applications by injecting unexpected input to access databases; prevention includes input validation and limiting account privileges.

Cross-Site Scripting (XSS)

  • XSS involves injecting malicious scripts into trusted websites via input fields. Effective defenses include validating data length/type and filtering out harmful scripts.

Analogy for Understanding XSS

Understanding Web Security Vulnerabilities

Client-Side Execution and Server Responsibilities

  • The analogy of a bakery illustrates client-side execution, where the server (bakery) must ensure safe ingredients (validated user input) before serving cookies (data) to clients.
  • Emphasizes the importance of server validation for web page inputs to prevent cross-site scripting attacks.

Hardware Vulnerabilities

  • Hardware vulnerabilities need attention during the design phase; compensating controls may be hardware-based.
  • Firmware is a common target for attacks, often occurring through updates or malicious downloads affecting the boot process. Trusted Platform Module (TPM) can facilitate secure boot processes.

End-of-Life and Legacy Systems

  • Organizations should have a replacement timeline for aging equipment to manage budget and effort effectively.
  • Legacy systems refer to unsupported hardware, software, or devices that pose security risks.

Virtualization Risks

Server Virtualization Overview

  • Server virtualization divides physical servers into multiple isolated virtual servers using hypervisors like VMware ESX/ESXi or Microsoft Hyper-V.

Key Vulnerabilities in Virtualization

  • VM escape is a critical vulnerability where attackers access VMs and potentially compromise host machines or other VMs. Keeping hypervisor patches up-to-date is essential.
  • Resource reuse by cloud providers can lead to data remnants if storage isn't securely erased. Full disk encryption methods like BitLocker (Windows) and DM Crypt (Linux) are recommended.

Cloud Security Concerns

Primary Cloud Vulnerability Insights

  • The internet-based model of cloud services exposes organizations to risks from attacks on their Cloud Service Providers (CSP), which may affect customers as collateral damage.

CSA Egregious 11 Threat List

  • Introduction of the "Egregious 11" list detailing top cloud-specific security threats from the Cloud Security Alliance, highlighting significant vulnerabilities organizations face in cloud environments.

Data Breaches vs. Data Leaks

  • A data breach involves loss of sensitive information due to security incidents, while a data leak refers to unintentional oversharing. Understanding this distinction is crucial for exam preparation.

Configuration Management Challenges

  • Misconfiguration can lead to severe security issues; proper change control management is necessary for remediation.

Shared Responsibility Model

Cloud Security Threats and Mitigations

Account Hijacking and Insider Threats

  • Credential Theft: Account hijacking is primarily executed through credential theft, with phishing being the most common method statistically.
  • Insider Threat Vulnerabilities: Insider threats can stem from disgruntled employees or unintentional mistakes, highlighting both intentional and unintentional risks.
  • Mitigation Strategies: Job rotation and privileged access management address intentional threats, while auditing and security training help identify unintentional risks.

Insecure Interfaces and Weak Control Planes

  • Insecure APIs: Customers often fail to secure access to systems gated by APIs, web consoles, etc., leading to vulnerabilities.
  • Control Plane Weaknesses: Weaknesses in cloud system elements (e.g., web console, APIs) can hinder configuration and management of cloud environments.
  • CSP Guidance: Major Cloud Service Providers (CSPs), like Amazon and Microsoft, offer reference architectures to help secure Dev, test, prod environments.

Tools for Monitoring Insider Threats

  • Proactive Monitoring Tools: CSP tools allow monitoring for real insider threats as well as potential ones.
  • Microsoft Compliance Portal Example: The portal provides features such as guided configuration for managing insider risk effectively.

Features of Insider Risk Management

  • Alerting Mechanisms: The alert portal helps track flagged user actions; cases can be created for investigation purposes.
  • Forensic Evidence Tracking: Forensic evidence tabs provide insights into captured user activity related to insider risks.

Meta Structure vs. App Structure Failures

  • Definitions of Structures:
  • Meta structure: Protocol mechanisms that interface between cloud layers for management/configuration.
  • App structure: Applications deployed in the cloud using underlying services (e.g., messaging services).

Responsibility in Cloud Security

  • Customer Responsibility: Customers must verify that their CSP has a secure software development lifecycle in place.
  • Audit Verification Importance: Downloading third-party audit reports (like SOC 2 Type 2 audits) ensures adequate security measures are implemented by the CSP.

Limited Visibility in Cloud Usage

  • Visibility Reduction Risks: Organizations may experience reduced visibility over their IT stack due to CSP ownership of certain components. Understanding shared responsibility is crucial here.

Abuse of Cloud Services

  • Exploitation Opportunities for Attackers: Low-cost high-scale compute resources make it easier for attackers to execute disruptive attacks at scale.

Understanding Cloud Security and Risk Mitigation

Approaches to Risk Mitigation in Cloud Environments

  • Understanding vulnerabilities and the changing attack surface is crucial for effective risk mitigation.
  • Selecting a qualified Cloud Service Provider (CSP) is essential, ensuring they have the necessary infrastructure, operations, and security measures in place.
  • Security should be integrated into every design step, referred to as DevSecOps; this includes encryption of data both at rest and in transit.
  • Ongoing monitoring is vital for maintaining security posture; major CSPs offer tools for managing configuration security and tracking usage.

Tools for Monitoring Security Posture

  • Microsoft Defender for Cloud provides a score that quantifies current security posture, allowing users to track improvements or regressions.
  • Recommendations are prioritized based on impact and ease of implementation, focusing on significant quick wins first.
  • The tool offers detailed insights into deviations from best practices along with recommended actions for remediation.
  • Push-button remediation features simplify fixing issues but may take time to reflect changes in the health status.

Supply Chain Vulnerabilities

  • Sophisticated attackers may exploit supply chains by gaining access to hardware or software before it reaches end-users.
  • Attackers can compromise managed service providers to infiltrate networks associated with their customers.
  • Effective vendor management practices are critical to uncovering service provider security postures and reducing risks.

Cryptographic Vulnerabilities

  • Cryptographic vulnerabilities include weaknesses that can lead to severe consequences like unauthorized access or data exposure.
  • Examples of cryptographic concerns include weak encryption algorithms, improper key management, inadequate randomness, and insufficient key lifetimes.
  • Using outdated encryption methods (e.g., DES or small RSA keys) increases susceptibility to attacks; selecting secure algorithms is imperative.

Key Management Issues

Cryptographic Security Vulnerabilities

Key Storage and Randomness

  • Keys should be stored in a secure, access-restricted vault to prevent unauthorized access.
  • Cryptographic algorithms require adequate randomness; true random number generators are preferred over pseudo-random ones to enhance encryption strength.

Authentication Issues

  • Inadequate authentication can lead to man-in-the-middle attacks, where attackers intercept and alter communications.
  • Unauthenticated or anonymous access poses significant security risks.

Key Lifetimes and Public Key Length

  • The lifespan of cryptographic keys affects system security; longer key usage increases exposure risk.
  • Industry standards recommend x.509 certificates have a lifespan of approximately 390–395 days.

Asymmetric vs Symmetric Cryptography

  • Asymmetric cryptography (public key cryptography) is generally more vulnerable than symmetric key cryptography for the same key length.
  • Recommended public key length for x.509 certificates is 2048 bits; AES supports various lengths (128, 192, 256 bits).

Implementation Strength and Misconfiguration Risks

  • Proper implementation of cryptographic solutions is crucial for maintaining security against vulnerabilities.
  • Misconfigurations often arise from human error; using infrastructure as code and CI/CD practices can mitigate these risks.

Mobile Device Security Threats

Rooting and Jailbreaking

  • Rooting Android devices or jailbreaking iOS devices removes vendor restrictions, allowing unauthorized software installation which may include malicious applications.

Third-party Application Stores

  • Downloading apps from third-party stores poses security risks due to less rigorous vetting processes compared to official app stores.

Sideloading Applications

  • Sideloading allows installation of APK files on Android devices, enabling unauthorized software that could compromise device security.

Zero-Day Exploits

Understanding Zero-Day Vulnerabilities

  • Zero-day exploits target vulnerabilities unknown to the public or only known by a few individuals; basic security practices can help prevent these attacks.

Defense Mechanisms Against Zero-Day Attacks

  • AI-driven antivirus systems and behavior analysis tools provide defense against zero-day exploits by monitoring for malicious behaviors rather than relying solely on signature matches.

Indicators of Malicious Activity

Categories of Cyber Attacks

  • Understanding different types of cyber attacks—malware, physical attacks, network attacks, application attacks, cryptographic attacks, password attacks—is essential for effective mitigation strategies.

Importance of Indicators of Compromise

Understanding Cybersecurity Indicators and Attacks

Introduction to Indicators

  • The discussion begins with the importance of understanding indicators before delving into various cyber attacks, emphasizing their role in identifying malicious activity.

Definition of Key Terms

  • Indicators are defined as signs that suggest suspicious activity on a system or network, which can be technical (e.g., unusual login attempts) or behavioral (e.g., employees downloading suspicious files).
  • Malicious Activity refers to potential events that could exploit vulnerabilities, requiring deeper investigation beyond just indicators.
  • A Cyber Attack is described as a deliberate attempt to exploit a system's vulnerability for a specific goal, marking the execution of malicious activity.

Analogy for Understanding

  • An analogy compares indicators to smoke detectors: they may signal false positives (like burning toast) or true positives (a real fire). Malicious activity is likened to flames flickering in a window, while an attack represents the actual fire causing damage.

Types of Indicators

Account Lockout and Concurrent Session Usage

  • Account Lockout occurs when there are repeated failed login attempts, indicating possible brute force attacks or stolen credentials.
  • Concurrent Session Usage from geographically impossible locations suggests account compromise if multiple logins occur simultaneously.

Blocked Content and Impossible Travel Time

  • Frequent access attempts to blocked content may indicate malware trying to communicate with external servers.
  • Impossible Travel Time indicates stolen credentials if logins occur from distant locations within an implausible timeframe.

Resource Consumption and Inaccessibility

  • Sudden spikes in resource usage could signify malware operation or exploitation attempts by hackers.
  • Critical resources being inaccessible might point towards denial-of-service attacks or malware interference.

Logging Irregularities

  • Unscheduled logging activities can indicate tampering efforts by malicious actors attempting to cover their tracks.

Missing Logs

  • The absence of security logs can signify tampering aimed at avoiding detection during investigations.

Overview of Cyber Attacks: Ransomware

What is Ransomware?

  • Ransomware infects target machines using encryption technology, locking users out of their files until a ransom is paid. It often presents itself through pop-up messages threatening permanent deletion if payment isn't made promptly.

Countermeasures Against Ransomware

Reactive Measures:

  • Backing up data regularly and storing backups separately helps mitigate ransomware effects. Cloud storage solutions like OneDrive are commonly used for this purpose.

Proactive Prevention Techniques:

Understanding Cybersecurity Threats and Mitigations

Evaluating Links and Email Attachments

  • Organizations should implement functionality to evaluate links for safety, but users must exercise caution with email attachments. Many email filtering systems now use sandboxing techniques to test attachments before allowing access.
  • Emails from external sources are flagged with warnings (e.g., red banners), prompting users to proceed cautiously. Preventative software like EDR (Endpoint Detection and Response) or XDR (Extended Detection and Response) can help protect against ransomware.

Role of AI in Threat Prevention

  • Modern AI-driven cloud services enhance threat prevention by providing access to external threat intelligence, monitoring for emerging threats, and offering centralized visibility into security concerns.
  • High-quality solutions may include automated investigative capabilities that assist in identifying potential security breaches.

Understanding Trojans and Spyware

  • A Trojan is a deceptive software program that appears harmless but contains malicious payloads. Effective defense strategies involve restricting software installations to trusted sources only.
  • Spyware monitors user activity without consent, capturing sensitive information such as keystrokes and passwords. Mitigation strategies include installing anti-spyware software and educating users about the risks of free downloads.

Indicators of Malware Presence

  • Common indicators of malware presence include account lockouts due to brute force attempts, high resource consumption (CPU/memory/network), blocked content alerts, and tampered logs aimed at avoiding detection.

Worm Characteristics and Mitigation Strategies

  • Worms are self-replicating programs that exploit vulnerabilities across networks. To mitigate their impact, organizations should apply security patches promptly, disable unnecessary network services, and educate users on recognizing suspicious emails.
  • Indicators of worm activity may include spikes in logging related to propagation attempts or network inaccessibility due to overload caused by the worm's replication process.

Addressing Bloatware and Keyloggers

  • Bloatware refers to unnecessary pre-installed software that can degrade device performance. Users should research devices prior to purchase for pre-installed applications or utilize standardized images during setup processes.

Understanding Software Security and Malware

Best Practices for Software Downloads

  • Ensure that software downloads are from known, good sources and are signed to verify authenticity. Regularly scan downloaded software for malware.
  • Keep operating systems and applications updated to close known vulnerabilities.

Indicators of Malware

  • Bloatware may consume moderate system resources, while keyloggers often hide their activities by tampering with logs.
  • Blocking access to unauthorized USB devices can prevent keylogger installations, which frequently come via USB sticks.

Types of Computer Viruses

Definition and Characteristics

  • A computer virus is malicious code designed to alter a computer's operation and spread between systems.

Examples of Viruses

  • Multipartite viruses use multiple methods to penetrate defenses; stealth viruses hide themselves from antivirus programs; polymorphic viruses change their code as they spread.

Logic Bombs: Timing-Based Attacks

Understanding Logic Bombs

  • A logic bomb triggers specific actions at predetermined times or events, potentially erasing data or disabling systems.

Mitigation Strategies

  • Implement strong access controls, regularly review system logs for suspicious activity, automate security audits with XDR/SIM tools, and maintain backups for recovery.

Rootkits: Stealthy Threats

Characteristics of Rootkits

  • Rootkits provide attackers with privileged access while hiding files and processes, making them difficult to detect.

Mitigation Techniques

  • Use strong user authentication, regularly scan for rootkit infections with specialized tools, keep systems updated, be cautious about software downloads, and monitor system logs for unusual activity.

Physical Attacks: Brute Force Methods

Understanding Physical Attacks

  • Brute force attacks involve breaking locks or breaching secured areas. Preventative measures include alarms and high-security locks.

Indicators of Physical Breaches

  • Resource inaccessibility may occur due to physical damage; out-of-cycle logging can indicate unusual activity related to break-ins; attackers might tamper with security logs or cameras.

RFID Cloning Attacks

Mechanism of RFID Cloning

  • RFID cloning involves duplicating an RFID card without detection.

Prevention Strategies

  • Employ encryption or cryptographic authentication methods. Use shielded badge holders to prevent cloning through proximity detection. Monitor usage patterns for anomalies indicating cloned cards.

Environmental Attacks on Systems

Types of Environmental Attacks

  • Environmental attacks can target HVAC systems or trigger fire alarms through physical tampering.

Indicators of Environmental Threat

Environmental and Network Attacks Overview

Environmental Attacks

  • Environmental attacks can make resources inaccessible, such as flooding a server room or high heat damaging equipment, which can occur within hours.
  • Attackers may tamper with security logs to conceal their activities after causing environmental damage.

Network Attacks

  • A Denial of Service (DoS) attack aims to prevent legitimate activity on a victimized system by consuming resources like CPU, memory, or network bandwidth.
  • Distributed Denial of Service (DDoS) attacks utilize multiple compromised systems to generate attack traffic against a target.

Countermeasures for DDoS

  • Effective countermeasures include using firewalls, routers, intrusion detection systems (IDS), and disabling unnecessary broadcast packets.

Types of DDoS Attacks

  • Reflected DDoS involves sending requests to third-party servers with a spoofed IP address that points to the target, overwhelming it with unsolicited traffic.
  • Amplified DDoS uses small requests that generate larger responses from vulnerable servers; DNS amplification is a common variant.

Indicators of DDoS Attacks

  • Key indicators include massive spikes in network traffic and resource inaccessibility due to flooded networks.
  • Security systems may log unusual traffic patterns during an ongoing DDoS attack.

DNS Attacks and Their Indicators

Types of DNS Attacks

  • DNS poisoning alters domain name-to-IP mappings, potentially redirecting users to rogue systems or causing denial of service.
  • DNS spoofing sends false replies to requesting systems instead of valid responses from legitimate DNS servers.

Countermeasures for DNS Attacks

  • Implement measures such as restricting authorized changes to DNS records and logging privileged DNS activity for auditing purposes.

Domain Hijacking

  • Domain hijacking occurs when attackers change domain registration through technical vulnerabilities or social engineering tactics.
  • Countermeasures include using secure registrars with two-factor authentication and monitoring for malicious activity on websites and DNS servers.

Indicators of DNS Attacks

  • High resource usage on DNS servers can indicate an attack; successful attacks might render internet resources inaccessible.
  • Out-of-cycle logging may reveal suspicious queries or attempts at modifying DNS records; missing logs could suggest tampering by attackers.

Wireless Attacks: Bluetooth Vulnerabilities

Types of Bluetooth Attacks

  • Bluejacking involves sending unsolicited messages via Bluetooth as pranks targeting nearby devices through loopholes in messaging options.
  • Blue snarfing refers to data theft via Bluetooth from vulnerable devices set in discoverable mode in public spaces.

Understanding Wireless Attacks and Countermeasures

Types of Wireless Attacks

  • Bluejacking, Bluesnarfing, and Bluebugging:
  • Bluejacking is categorized as an annoyance.
  • Bluesnarfing focuses on data theft.
  • Bluebugging involves eavesdropping or hacking at the device level.
  • Prevention methods include using long PINs.
  • Evil Twin Attack:
  • An evil twin is a malicious access point mimicking a legitimate network.
  • Commonly seen in public places like airports with free Wi-Fi.
  • Once connected, attackers can provide internet access while pursuing malicious goals.
  • Rogue Access Points:
  • These are unauthorized access points added to a network, either intentionally or unintentionally.
  • They can serve as entry points for attackers or unwanted users.

Countermeasures Against Wireless Attacks

  • Network Security Measures:
  • Implement network monitoring and segmentation.
  • Use strong protocols like WPA2/WPA3 instead of legacy WEP.
  • Conduct periodic scans to identify rogue access points.
  • Indicators of Wireless Attacks:
  • Security systems may block unauthorized access attempts on wireless networks (e.g., MAC address filtering).
  • Monitor concurrent session usage for unauthorized devices accessing the network alongside legitimate ones.

On-path Attack (Man-in-the-Middle)

  • Description of On-path Attack:
  • The attacker intercepts traffic between two endpoints, capturing and potentially altering information in transit.
  • Countermeasures for On-path Attacks:
  • Utilize encrypted secure Wi-Fi connections, VPN, HTTPS, and multi-factor authentication to mitigate risks.

Credential Replay Attacks

  • Mechanism of Credential Replay:
  • Involves stealing legitimate login credentials (username/password/session tokens).
  • Consequences of Successful Credential Replay:
  • Unauthorized access leading to account takeover or privilege escalation.

Indicators and Countermeasures for Credential Replay

  • Key Indicators:
  • Impossible travel patterns when stolen credentials are used from unusual locations.
  • Account lockouts due to multiple failed login attempts from various locations.
  • Preventive Measures:
  • Implement multi-factor authentication, regular password rotation, secure login protocols, session timeouts, and security awareness training.

Malicious Code in Network Context

  • Types of Malicious Code Attacks:
  • Includes denial-of-service attacks targeting communication channels rather than individual devices.

Application Layer Vulnerabilities

  • Directory Traversal Attack Explained:
  • Gaining unauthorized access to restricted directories on a server via HTTP requests.

Understanding Web Application Vulnerabilities

Directory Traversal and Command Injection

  • The command line uses ".." to navigate up one directory level, which is often exploited in vulnerability scans for weaknesses like directory traversal and command injection.
  • Monthly vulnerability scans can identify these issues, as they typically do not require authentication and can be detected through unauthenticated scans.

Securing Systems Against Vulnerabilities

  • To secure systems, it is essential to run scanners regularly and keep web server software patched. Proper configuration is also necessary to lock down the server.

Injection Attacks

  • Injection attacks compromise web applications by exploiting improper input handling; SQL injection allows unauthorized access to databases through unexpected inputs.
  • Countermeasures include input validation, using stored procedures, limiting account privileges, and deploying a web application firewall that implements OWASP's top 10 protections against SQL injection.

Buffer Overflow Attacks

  • Buffer overflow attacks exploit poorly written software by overflowing memory buffers due to lack of input validation. This can lead to application crashes or malicious code execution.
  • Modern operating systems mitigate these attacks with techniques like Address Space Layout Randomization (ASLR), which randomizes memory locations of key components.

Indicators of Exploitation Attempts

  • Common indicators of exploitation attempts include resource consumption during attacks, out-of-cycle logging showing unusual requests, and missing logs where attackers may tamper with records.

Session Replay Attacks

Mechanism of Session Replay

  • Session replay attacks target applications relying on session tokens or cookies; attackers intercept legitimate sessions and replay them to gain unauthorized access.

Countermeasures for Session Replay

  • Effective countermeasures include implementing short-lived session tokens, invalidating sessions upon logout, protecting against Cross-Site Request Forgery (CSRF), and employing multi-factor authentication.

Indicators of Session Replay Attacks

  • Signs of session replay include concurrent session usage from distant geographical locations and sudden spikes in successful logins or data transfer outside normal patterns.

Privilege Escalation Vulnerabilities

Understanding Privilege Escalation

  • Privilege escalation vulnerabilities allow attackers to gain higher system privileges than intended, potentially leading to sensitive data access or malware installation.

Mitigation Strategies

Understanding Attacks on Web Applications and Cryptography

Log Tampering and Request Forgery

  • Attackers may attempt to tamper with logs to conceal their activities, especially after successfully elevating privileges, allowing them to delete logs.
  • Cross-Site Request Forgery (CSRF) exploits the trust a website has in a user's browser, enabling attackers to execute unauthorized code on the user's computer.
  • Server-Side Request Forgery (SSRF) targets web applications that fetch data from user-provided URLs, exploiting the server's trust in these URLs.
  • Defense against SSRF includes input validation and sanitation, as well as implementing allow or deny lists for acceptable URLs.
  • Indicators of forgery attacks include blocked content by security systems and logging suspicious activity related to forgery attempts.

Cryptographic Attacks Overview

Collision Attacks

  • A collision attack seeks two different inputs that produce the same hash value; this is mitigated by using collision-resistant hashing algorithms.
  • Vulnerable hashing algorithms like MD5 are less commonly used due to their susceptibility to collision attacks, which can be identified through vulnerability scans.

Downgrade Attacks

  • Downgrade attacks involve forcing a protocol downgrade from a secure version (like TLS 1.2/1.3) to an insecure one (like TLS 1.0/1.1).
  • Security systems log unusual attempts at negotiating weaker cryptographic protocols as indicators of downgrade attacks.

Birthday Attacks

  • The birthday attack leverages the birthday paradox in probability theory to find collisions in hash functions more easily than expected.
  • This type of attack often targets digital signatures and can consume significant resources during its calculation phase.

Insights on Cryptographic Attack Indicators

  • Common indicators such as account lockout or missing logs are not typically associated with cryptographic attacks since they often occur behind the scenes without affecting user accounts directly.

Password Attacks: An Introduction

Password Attacks and Mitigation Techniques

Understanding Brute Force and Password Spraying Attacks

  • When attackers perform a brute force attack on a single account, lockouts occur quickly. However, password spraying—trying one password across many accounts—can evade detection longer.
  • Effective countermeasures against these attacks include multi-factor authentication (MFA), CAPTCHA, and enforcing password changes upon first login.
  • Indicators of password spraying include account lockouts, high volumes of failed login attempts from various accounts, increased resource consumption during login processes, and unusual patterns in logs.
  • A brute force attack systematically tries all possible combinations to find the correct password. The effectiveness is influenced by password complexity and available computational resources.
  • Rainbow tables can enhance brute force attacks by providing pre-computed hashes for quick access. Countermeasures like cryptographic salts make these tables ineffective.

Mitigation Techniques for Password Attacks

  • Cryptographic salts add random values to passwords before hashing them, which helps protect against rainbow table attacks. Platforms like Microsoft Entra ID utilize this method effectively.
  • Implementing throttling rates for repeated logins can help mitigate brute force attacks. Policies can be applied even on older identity platforms such as Active Directory.
  • Key indicators of brute force attacks include account lockouts due to repeated failed attempts, spikes in resource consumption, and unusual logging patterns that can be monitored through centralized log facilities.

Overview of Security Mitigation Techniques

  • Section 2.5 focuses on mitigation techniques aimed at securing enterprises. This includes strategies ranging from segmentation and access control to encryption practices.
  • Mitigation refers to reducing the severity or consequences of risks rather than eliminating them entirely; it involves implementing security controls as safeguards against potential threats.

Network Segmentation Benefits

  • Network segmentation involves controlling traffic between different zones within an environment using strict rules based on IP address ranges and specific ports allowed for ingress traffic.
  • Segmentation enhances performance by grouping frequently communicating systems together while isolating those that rarely interact, thus reducing overall network congestion.
  • Security benefits arise from segmentation as it isolates user access to authorized segments only, protecting sensitive data and limiting the scope of issues when they arise (performance or security-related).

Understanding Cloud Security and Segmentation

The Importance of Security in Network Segmentation

  • Effective security measures can reduce the risk of a security breach by isolating incidents to specific network segments, allowing for better containment.
  • Micro-segmentation enhances logical segmentation by dividing applications or workloads into smaller segments, each with tailored policies and security controls.
  • This approach limits the impact of outages or breaches by reducing lateral movement within the network, effectively shrinking the "blast radius."

Virtual Private Clouds (VPCs)

  • A Virtual Private Cloud (VPC) is a virtual network that isolates cloud resources for one company from another, ensuring data privacy and security.
  • VPC configurations include public and private subnets that communicate by default; however, inter-VPC communication requires additional configuration like VPN or peering.
  • Security groups act as virtual firewalls within VPCs, controlling traffic through defined rules based on IP addresses and port ranges.

Visualizing Cloud Segmentation

  • A typical cloud segmentation example includes a large address pool with server and database subnets that can communicate unless restricted by security groups.
  • On-premises endpoints generally cannot communicate with cloud resources without hybrid connectivity setups due to default isolation settings.

Network Security Groups

  • Network security groups function similarly to firewall tables, where rules dictate whether traffic is allowed or denied based on priority levels.
  • The lowest numbered rule has the highest priority; if no allow rule is found during evaluation, traffic is denied.

Additional Segmentation Strategies

  • Mobile Device Management (MDM) solutions help separate personal and business data in BYOD scenarios while enabling selective wipes when employees leave an organization.
  • Vulnerable devices can be quarantined using VLAN configurations until they are remediated to ensure overall network integrity.

Access Control Models and Techniques

Overview of Access Control Models

  • Mandatory Access Control (MAC): The access policy is determined by the system rather than the object owner, relying on classification labels that represent security domains.
  • Discretionary Access Control (DAC): Allows the owner or creator of an object to control its accessibility. A common example is NTFS file permissions in Windows.
  • Non-discretionary Access Control: Enforces system-wide restrictions that override specific access controls. It includes rule-based access control, often found in firewall systems.

Rule-Based and Role-Based Access Control

  • Rule-Based Access Control: Utilized in routers and firewalls, it defines rules within access control lists for network traffic management.
  • Role-Based Access Control (RBAC): Assigns permissions based on defined job roles, ensuring users can access necessary resources to perform their jobs effectively. Commonly seen in Windows and public cloud platforms.

Application Security Controls

  • Application Allow List: Only explicitly allowed applications can run; everything else is denied by default. This feature is available in firewalls, IDS/IPS systems, and endpoint detection tools.
  • Application Deny List: Opposite of an allow list; any application not explicitly denied is permitted. This approach is less secure due to its permissive nature.

Isolation Techniques

  • Isolation Strategy: Involves blocking access entirely to protect sensitive data. For instance, air-gapped endpoints are used for classified data to prevent network-based attacks.
  • Faraday Cage Usage: Phones must be placed inside a Faraday cage during confidential meetings to block electromagnetic signals from entering or exiting the area.

Importance of Patch Management

  • Patch Management Overview: Ensures systems are updated with current patches through testing, approval, and deployment processes while auditing compliance with patch policies.
  • Comprehensive Patching Needs: Emphasizes the necessity of patching both operating systems and third-party applications like Adobe alongside native OS updates for comprehensive security coverage.
  • Critical Patch Deployment: Organizations must be prepared for out-of-band updates for critical vulnerabilities such as zero-day threats promptly to mitigate risks effectively.

Overlooked Areas in Patch Management

  • Firmware Updates: Often neglected in IoT devices and embedded systems like VoIP phones; these should be treated as computers with IP addresses on trusted networks needing regular updates.

Mobile Device Security and Encryption Strategies

Importance of Mobile Device Management

  • Systems are frequent targets for threat actors; thus, it's crucial to restrict access to mobile devices that are rooted, jailbroken, or unmanaged.
  • Apple emphasized the need for a minimum iOS version (iOS 16.3.1) to avoid vulnerabilities, prompting swift updates across corporate devices.

Challenges in Application Patching

  • Non-Microsoft applications often lack adequate patching due to management tools not covering third-party apps effectively.
  • Decisions regarding patch management tools must be made to ensure comprehensive coverage beyond Microsoft software.

Hardware Root of Trust and Encryption

  • A hardware root of trust acts as a defense against unauthorized firmware execution; it verifies keys during secure boot processes using TPM (Trusted Platform Module).
  • The TPM chip on motherboards manages encryption keys and prevents data access if an encrypted drive is removed from the system.

Boot Integrity and Secure Boot Processes

  • Boot integrity ensures protection during the boot process, starting with UEFI (Unified Extensible Firmware Interface), which is essential for secure OS booting.
  • Measured boot logs all components' measurements during startup; if drivers aren't signed, the boot sequence fails, indicating compromised integrity.

Drive Encryption Techniques

  • BitLocker provides full disk encryption on Windows systems using TPM for key storage; Linux has a similar feature called DM Crypt.
  • Self-encrypting drives automatically encrypt data at rest through hardware solutions, offering security advantages over software-based methods.

Monitoring Privileged Operations

Understanding Log Monitoring and Security Principles

The Importance of Log Monitoring

  • Systems, services, and devices record activity details on networks; multiple logs are necessary for a comprehensive view of security breaches.
  • Automated log monitoring is essential to detect and investigate potential incidents efficiently, especially in the face of evolving threats.
  • Centralized log collection strategies like SIEM (Security Information and Event Management) provide real-time monitoring, analysis, correlation, and notifications of attacks.
  • SOAR (Security Orchestration Automation and Response) enhances alert response automation with threat-specific playbooks that can be fully automated or executed with a single click.
  • These solutions often utilize AI and machine learning alongside external threat intelligence feeds managed by Security Operation Center (SOC) analysts.

Log Data Collection Techniques

  • Many SIEM systems include built-in log collectors that gather information from various servers through agents or APIs for aggregation.
  • Log aggregation helps filter out duplicates, providing clearer insights into network events to identify potential attacks effectively.
  • Standardizing data to a common event schema allows querying across diverse log sources for better visibility into the environment.
  • Data inputs can come from identity management systems, mobile device management tools, cloud access security brokers, etc., highlighting the extensive nature of data collection in security practices.

Core Security Principles: Least Privilege & Need to Know

  • The principle of least privilege limits user access to only what is necessary for their job functions to minimize potential damage during security incidents.
  • "Need to know" further restricts access based on genuine requirements for job duties, enhancing accountability while reducing risks of data leaks.
  • Separation of Duties ensures no single individual controls all aspects of critical functions or systems, reducing collusion risk among employees.

Configuration Management Strategies

  • Effective configuration enforcement prevents security incidents; it involves documenting known configurations and ensuring uniformity across systems.
  • Baseline configuration techniques ensure consistent deployment standards; imaging is a common method used both historically in desktops/servers and currently in cloud environments.
  • Change management processes require changes to be requested, approved, tested, documented with rollout/rollback plans to mitigate unauthorized alterations.

Best Practices in Configuration Management

  • Detailed diagrams illustrating interconnected devices enhance visibility for the security team regarding existing protections in place.
  • Standard naming conventions help identify device types easily; prefixes like RTR (router), PR (printer), SVR (server), etc., streamline asset recognition.

Importance of Standardization and Automation in Device Management

Baseline Configurations and Cloud Deployment

  • Emphasizes the significance of baseline configurations as a standardized starting point for device management, particularly in cloud environments.
  • Discusses the role of firewalls in blocking traffic to reduce attack surfaces, alongside using MDM solutions like Microsoft Intune or group policy for endpoint configuration automation.

Mobile Device Management (MDM)

  • Highlights the use of MDM solutions to enforce minimum OS versions and security policies on mobile devices, such as requiring six-digit PINs and preventing rooted/jailbroken devices.
  • Stresses the importance of filtering harmful content through appliances like Unified Threat Management (UTM) systems to maintain endpoint integrity.

Data Security and Hardware Decommissioning

  • Explains that UTM is popular among smaller businesses due to its bundled features including web filtering, email antivirus, and intrusion prevention.
  • Addresses secure data deletion methods like crypto shredding when decommissioning hardware to prevent data recovery through forensic means.

Endpoint Protection Techniques

Types of Endpoint Protection

  • Describes antivirus software's evolution from signature-based detection to AI-driven threat intelligence for identifying unique malware threats.
  • Introduces Endpoint Detection and Response (EDR), which focuses on detecting threats at the endpoint level using behavioral analysis techniques.

Advanced Detection Technologies

  • Defines Extended Detection and Response (XDR), which provides a comprehensive view across various IT environments for improved threat detection and response capabilities.
  • Discusses Host Intrusion Prevention Systems (HIPS), which utilize behavior analysis and file integrity monitoring to detect threats locally on endpoints.

Intrusion Detection vs. Prevention

  • Clarifies the difference between Intrusion Detection Systems (IDS), which log events upon detection, versus Intrusion Prevention Systems (IPS), which actively block malicious packets.

Best Practices for Endpoint Hardening

Layered Defense with Intrusion Prevention Systems

  • Host-based and network-based intrusion prevention systems are essential components of a layered defense strategy, complementing each other in various respects.

Closing Unused Ports and Disabling Services

  • It's crucial to restrict listening ports to only those necessary, filtering traffic accordingly. Unused services should be disabled or closed entirely to minimize vulnerabilities. For instance, remote desktop protocol can be blocked through a firewall while keeping the underlying service disabled unless needed temporarily.

Registry Access Control

  • Access to the Windows registry must be restricted, and updates should be managed through policy whenever possible. This helps eliminate human error during modifications. Always back up the registry before making any changes.

Operating System Hardening Techniques

  • OS hardening can be achieved using security baselines applied via imaging or Active Directory Group Policies. Management tools like Microsoft Intune or AirWatch facilitate enterprise endpoint management across various devices including Windows and Mac systems.

Configuration Management and Software Removal

  • All configuration items (restricted ports, disabled services, firewalls) should be compiled into a baseline for implementation through imaging or scripts. Default passwords on pre-created users must be changed prior to deployment, and unnecessary software should be removed to reduce attack surfaces effectively. Utilize OS imaging over third-party uninstallers to avoid potential issues with unwanted software remnants from bloatware removal efforts.

Conclusion of Domain 2 in Security Plus Exam Series

Video description

This video covers DOMAIN 2 of the Security+ Exam Cram series, which will cover EVERY TOPIC in the SY0-701 exam syllabus. Security+ Exam Cram 2024 series playlist https://youtube.com/playlist?list=PL7XJSuT7Dq_UDJgYoQGIW9viwM5hc4C7n&si=VO6psgHa3MchJjLf Exam Prep Flashcards Over 1,100 cards for Security+ SY0-701 https://insidethemicrosoftcloud.com/flashcards/ Official Study Guide and Practice Test Bundle https://amzn.to/46aa2W3 PDF Presentation Download - Security+ SY0-701 DOMAIN 2 https://1drv.ms/b/s!AmhtzcmYt5AVip8qPj9wI63WLBtqUA?e=eu3Wej Chapters 00:00 Introduction 02:21 DOMAIN 2 - Threats, Vulnerabilities, and Mitigations 02:35 2.1 Security Control Categories and Types 03:17 Dynamics of "Money vs Mission" 04:15 Threat Actors 06:09 Motivations 08:39 Actor, Skill-level, Motivation 11:03 Actor, Attributes, Motivations, Examples 13:04 Impact of Skill and Funding 15:58 Combined Impact 17:14 2.2 Threat Vectors and Attack Surfaces 18:08 Threat Vector and Attack Surfaced Defined 19:52 Message-based 22:15 Image-based 23:00 File-based 23:40 Voice Call 24:55 Removable Devices 25:35 Vulnerable Software 26:38 Unsupported Apps and Systems 27:44 Unsecure Networks 29:52 Open Ports 31:23 Default Credentials 31:51 Supply Chain 33:27 Social Engineering Principles 36:40 Human Vector/Social Engineering 44:53 2.3 Vulnerabilities 45:32 Know these 4 important terms 47:25 Application 50:00 OS-based 52:14 Web-based 54:39 Hardware 55:42 Virtualization 57:22 Cloud-specific 01:11:18 Supply Chain 01:12:21 Cryptographic 01:16:40 Misconfiguration 01:17:25 Mobile Device 01:18:53 Zero-Day 01:19:53 2.4 Indicators of Malicious Activity 01:21:08 Know these 3 important terms 01:22:46 Indicators 01:25:38 Malware Attacks 01:38:41 Physical Attacks 01:41:39 Network Attacks 01:53:40 Application Attacks 02:02:43 Cryptographic Attacks 02:07:04 Password Attacks 02:10:25 2.5 Mitigation Techniques 02:11:22 Important terms 02:11:57 Segmentation 02:14:50 Segmentation in the Cloud 02:20:10 Access Control 02:22:00 Application Allow List 02:22:52 Isolation 02:24:18 Patching 02:27:32 Encryption 02:32:10 Monitoring 02:36:06 Least Privilege 02:37:41 Configuration Enforcement 02:41:52 Decommissioning 02:42:34 Hardening Techniques Exam Syllabus Get exam objectives at https://www.comptia.org/certifications/security#examdetails Music by @musicforvideolibrary