Exam Essentials: Chapter 8

Chapter 8: Principles of Security Models, Designs & Capabilities (WIP) Know details about each of the access control models Know the access control models and their functions The state machine model ensures that all instances of subjects accessing objects are secure. A state transition occurs when accepting input or producing output, and always results inContinue reading “Exam Essentials: Chapter 8”

Exam Essentials: Chapter 7

Chapter 7: PKI & Cryptographic Applications Understand the key types used in asymmetric cryptography Public keys are freely shared, private keys are kept secret. Encrypt with recipient’s public key, decrypt with your own private key. Sign a message with your own private key. Validate a signature using the sender’s public key. Know the fundamental requirementsContinue reading “Exam Essentials: Chapter 7”

Exam Essentials: Chapter 6

Chapter 6: Cryptography & Symmetric Key Algorithms Understand the role that confidentiality, integrity & non-repudiation play in cryptosystems Symmetric & asymmetric crypto can provide confidentiality & integrity. Only asymmetric crypto can provide non-repudiation; symmetric cannot. Know how cryptosystems can be used to achieve authentication goals One possible scheme is the challenge-response protocol: the remote userContinue reading “Exam Essentials: Chapter 6”

Exam Essentials: Chapter 5

Chapter 5: Protecting Security of Assets Understand the importance of data & asset classifications Data owners are responsible for defining data and asset classifications and ensuring that data & systems are properly marked. Additionally, data owners define requirements to protect data at different classifications, such as encrypting sensitive data at rest and in transit. DataContinue reading “Exam Essentials: Chapter 5”

Exam Essentials: Chapter 4

Chapter 4: Laws, Regulations & Compliance Understand the difference between criminal law, civil law & administrative law Criminal law protects society against acts that violate the basic principles we believe in. Violations of criminal law are prosecuted by federal & state governments. Civil law provides the framework for the transaction of business between people &Continue reading “Exam Essentials: Chapter 4”

Exam Essentials: Chapter 3

Chapter 3: Business Continuity Planning Understand the four steps of the business continuity planning process BC planning involves four distinct phases: project scope & planning business impact assessment continuity planning approval & implementation Each task contributes to the overall goal of ensuring that business operations continue uninterrupted in the face of an emergency situation. DescribeContinue reading “Exam Essentials: Chapter 3”

Exam Essentials: Chapter 2

Chapter 2: Personnel Security & Risk Management Concepts Understand the security implications of hiring new employees To properly plan for security, you must have standards in place for: job descriptions job classification work tasks job responsibilities preventing collusion candidate screening background checks security clearances employment agreements non-disclosure agreements By deploying such mechanisms, you ensure thatContinue reading “Exam Essentials: Chapter 2”

Exam Essentials: Chapter 1

Chapter 1: Security Governance Through Principles & Policies (WIP) Understand the CIA Triad elements of confidentiality, integrity & availability Confidentiality is the principle that objects are not disclosed to unauthorised subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by only authorised subjects. Availability is the principle that authorised subjectsContinue reading “Exam Essentials: Chapter 1”

Tough Questions 161-170

You need to reduce the likelihood that an unauthorised person can piggyback their way into your data centre. Which of the following is the BEST way to ensure this? (a) Retina scanners(b) Security awareness training(c) Magnetically locked doors with PIN pad access(d) Fingerprint activated locks(e) Mantrap Answer:(e) Explanation:(a), (c) & (d) would not prevent an adversary piggybacking anContinue reading “Tough Questions 161-170”

Tough Questions 151-160

Which of the following would NOT be considered an indicator of attack? (Choose two) (a) Detection of an ongoing spear phishing campaign against employees(b) A NIDS identifies a buffer overflow exploit in an inbound packet(c) Unusual amounts of SSH traffic leaving the network(d) Log files show the same username attempted to log into 20 different serversContinue reading “Tough Questions 151-160”

Design a site like this with WordPress.com
Get started