CompTIA Security+ (SY0-601): Security Applications & Devices
This section outlines methods for detecting and preventing unauthorized activity, including Intrusion Detection Systems (IDS) and Data Loss Prevention (DLP) solutions. It also covers best practices for securing BIOS configurations and protecting network and storage systems like NAS/SAN from unauthorized access and data breaches.
IDS & IDS Alerts
Intrusion Detection System:
Passively monitors network and alerts/identifies attacks
HIDS = Host-based | NIDS = Network-based
Signature, Policy, Anomaly-based
True Positive: Malicious activity is identified as an attack
False Positive: Legitimate activity is identified as an attack
True Negative: Legitimate activity is identified as legitimate traffic
False Negative: Malicious activity is identified as legitimate traffic
Key Terms
IDS & IDS Alerts
Intrusion Detection System:
Passively monitors network and alerts/identifies attacks
HIDS = Host-based | NIDS = Ne...
DLP & 3 Types of DLPs
Data Loss Prevention (Software or Hardware):
Monitors the data of a system while in use, in transit, or at rest to de...
Securing BIOS
Flash the BIOS
Use a BIOS password
Securing NAS/SAN
Use data encryption
Use proper authentication
SED
Self-Encrypting Drive:
Storage device that performs whole disk encryption by using embe...
Disk Encryption Software
Apple: FileVault
Windows: BitLocker
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
IDS & IDS Alerts | Intrusion Detection System: True Positive: Malicious activity is identified as an attack |
DLP & 3 Types of DLPs | Data Loss Prevention (Software or Hardware): Also called Information Leak Protection (ILP) or Extrusion Prevention Systems (EPS) Network DLP System Storage DLP System Cloud DLP System |
Securing BIOS |
|
Securing NAS/SAN |
|
SED | Self-Encrypting Drive: Storage device that performs whole disk encryption by using embedded hardware |
Disk Encryption Software | Apple: FileVault |
TPM | Trusted Platform Module: If your motherboard doesn’t have TPM, you can use an external USB drive as a key |
HSM | Hardware Security Module: Physical devices that act as a secure cryptoprocessor during the encryption process |
EPP | Endpoint Protection Platform: |
EDR | Endpoint Detection & Response: Doesn’t use signature-based protection |
UEBA | User & Entity Behavior Analytics: UEBA solutions are heavily dependent on advanced computing techniques like artificial intelligence (AI) and machine learning Many companies are now marketing advanced threat protection (ATP), advanced endpoint protection (AEP), and NextGen AV (NGAV) which is a hybrid of EPP, EDR, and UEBA |