CompTIA Security+ (SY0-601): Security Applications & Devices
This section outlines methods for detecting and preventing unauthorized activity, including Intrusion Detection Systems (IDS) and Data Loss Prevention (DLP) solutions. It also covers best practices for securing BIOS configurations and protecting network and storage systems like NAS/SAN from unauthorized access and data breaches.
IDS & IDS Alerts
Key Terms
IDS & IDS Alerts
Intrusion Detection System:
Passively monitors network and alerts/identifies attacks
HIDS = Host-based | NIDS = Ne...
DLP & 3 Types of DLPs
Data Loss Prevention (Software or Hardware):
Monitors the data of a system while in use, in transit, or at rest to de...
Securing BIOS
Flash the BIOS
Use a BIOS password
Securing NAS/SAN
Use data encryption
Use proper authentication
SED
Self-Encrypting Drive:
Storage device that performs whole disk encryption by using embe...
Disk Encryption Software
Apple: FileVault
Windows: BitLockerRelated Flashcard Decks
Term Definition IDS & IDS Alerts
Intrusion Detection System:
Passively monitors network and alerts/identifies attacks
HIDS = Host-based | NIDS = Network-based
Signature, Policy, Anomaly-basedTrue Positive: Malicious activity is identified as an attack
False Positive: Legitimate activity is identified as an attack
True Negative: Legitimate activity is identified as legitimate traffic
False Negative: Malicious activity is identified as legitimate trafficDLP & 3 Types of DLPs
Data Loss Prevention (Software or Hardware):
Monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the dataAlso called Information Leak Protection (ILP) or Extrusion Prevention Systems (EPS)
Network DLP System
Software or hardware-based solution that is installed on the perimeter of the network to detect data in transitStorage DLP System
Software installed on servers in the datacenter to inspect the data at restCloud DLP System
Cloud software as a service that protects data being stored in cloud servicesSecuring BIOS
Flash the BIOS
Use a BIOS password
Configure the BIOS boot order
Disable the external ports and devices
Enable the secure boot option
Securing NAS/SAN
Use data encryption
Use proper authentication
Log NAS access
SED
Self-Encrypting Drive:
Storage device that performs whole disk encryption by using embedded hardware
Disk Encryption Software
Apple: FileVault
Windows: BitLockerTPM
Trusted Platform Module:
Chip residing on the motherboard that contains an encryption keyIf your motherboard doesn’t have TPM, you can use an external USB drive as a key
HSM
Hardware Security Module:
Physical devices that act as a secure cryptoprocessor during the encryption process
EPP
Endpoint Protection Platform:
A software agent and monitoring system that performs multiple security tasks such as anti-virus, HIDS/HIPS, firewall, DLP, and file encryptionEDR
Endpoint Detection & Response:
A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threatsDoesn’t use signature-based protection
Behavioral analysis, ML, process monitoring
Lightweight agent on the endpoint
Root cause analysisUEBA
User & Entity Behavior Analytics:
A system that can provide automated identification of suspicious activity by user accounts and computer hostsUEBA solutions are heavily dependent on advanced computing techniques like artificial intelligence (AI) and machine learning
Many companies are now marketing advanced threat protection (ATP), advanced endpoint protection (AEP), and NextGen AV (NGAV) which is a hybrid of EPP, EDR, and UEBA