Back to AI Flashcard MakerInformation Technology /CompTIA Security+ (SY0-601): Security Applications & Devices

CompTIA Security+ (SY0-601): Security Applications & Devices

Information Technology11 CardsCreated 8 months ago

This section outlines methods for detecting and preventing unauthorized activity, including Intrusion Detection Systems (IDS) and Data Loss Prevention (DLP) solutions. It also covers best practices for securing BIOS configurations and protecting network and storage systems like NAS/SAN from unauthorized access and data breaches.

IDS & IDS Alerts

Intrusion Detection System:
Passively monitors network and alerts/identifies attacks
HIDS = Host-based | NIDS = Network-based
Signature, Policy, Anomaly-based

True Positive: Malicious activity is identified as an attack
False Positive: Legitimate activity is identified as an attack
True Negative: Legitimate activity is identified as legitimate traffic
False Negative: Malicious activity is identified as legitimate traffic

Rate to track your progress ✦

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/11

Key Terms

Term
Definition

IDS & IDS Alerts

Intrusion Detection System:
Passively monitors network and alerts/identifies attacks
HIDS = Host-based | NIDS = Ne...

DLP & 3 Types of DLPs

Data Loss Prevention (Software or Hardware):
Monitors the data of a system while in use, in transit, or at rest to de...

Securing BIOS

  1. Flash the BIOS

  2. Use a BIOS password

  3. Securing NAS/SAN

    1. Use data encryption

    2. Use proper authentication

    3. SED

      Self-Encrypting Drive:

      Storage device that performs whole disk encryption by using embe...

    Disk Encryption Software

    Apple: FileVault
    Windows: BitLocker

    Related Flashcard Decks

    TermDefinition

    IDS & IDS Alerts

    Intrusion Detection System:
    Passively monitors network and alerts/identifies attacks
    HIDS = Host-based | NIDS = Network-based
    Signature, Policy, Anomaly-based

    True Positive: Malicious activity is identified as an attack
    False Positive: Legitimate activity is identified as an attack
    True Negative: Legitimate activity is identified as legitimate traffic
    False Negative: Malicious activity is identified as legitimate traffic

    DLP & 3 Types of DLPs

    Data Loss Prevention (Software or Hardware):
    Monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data

    Also called Information Leak Protection (ILP) or Extrusion Prevention Systems (EPS)

    Network DLP System
    Software or hardware-based solution that is installed on the perimeter of the network to detect data in transit

    Storage DLP System
    Software installed on servers in the datacenter to inspect the data at rest

    Cloud DLP System
    Cloud software as a service that protects data being stored in cloud services

    Securing BIOS

    1. Flash the BIOS

    2. Use a BIOS password

    3. Configure the BIOS boot order

    4. Disable the external ports and devices

    5. Enable the secure boot option

    Securing NAS/SAN

    1. Use data encryption

    2. Use proper authentication

    3. Log NAS access

    SED

    Self-Encrypting Drive:

    Storage device that performs whole disk encryption by using embedded hardware

    Disk Encryption Software

    Apple: FileVault
    Windows: BitLocker

    TPM

    Trusted Platform Module:
    Chip residing on the motherboard that contains an encryption key

    If your motherboard doesn’t have TPM, you can use an external USB drive as a key

    HSM

    Hardware Security Module:

    Physical devices that act as a secure cryptoprocessor during the encryption process

    EPP

    Endpoint Protection Platform:
    A software agent and monitoring system that performs multiple security tasks such as anti-virus, HIDS/HIPS, firewall, DLP, and file encryption

    EDR

    Endpoint Detection & Response:
    A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats

    Doesn’t use signature-based protection
    Behavioral analysis, ML, process monitoring
    Lightweight agent on the endpoint
    Root cause analysis

    UEBA

    User & Entity Behavior Analytics:
    A system that can provide automated identification of suspicious activity by user accounts and computer hosts

    UEBA solutions are heavily dependent on advanced computing techniques like artificial intelligence (AI) and machine learning

    Many companies are now marketing advanced threat protection (ATP), advanced endpoint protection (AEP), and NextGen AV (NGAV) which is a hybrid of EPP, EDR, and UEBA