Security+ Domain 5.0: Risk Management: Chapter 22

This is post 21 of 31 in the series “[ Security+ Certification ]” Chapter 22: Risk Management and Business Impact Analysis Business Impact Analysis RTO / RPO MTBF MTTR Mission-critical functions Identification of critical systems Single point of failure Impacts on Life Property Safety Finance Reputation Privacy Impact Assessment Privacy Threshold Assessment Risk Management Concepts …

Security+ Domain 3.0: Architecture and Design: Chapter 11

This is post 9 of 31 in the series “[ Security+ Certification ]” Chapter 11: Architecture Frameworks and Secure Network Architectures Industry-Standard Frameworks and Reference Architectures Regulatory NERC CIP – https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx Non-regulatory NIST CSF – https://www.nist.gov/cyberframework Framework Core Implementation Tiers Framework Profiles National vs International FedRAMP – https://www.fedramp.gov/ US-EU Safe Harbor Framework (old) – https://www.ftc.gov/tips-advice/business-center/privacy-and-security/u.s.-eu-safe-harbor-framework …

Security+ Domain 5.0: Risk Management: Chapter 23

This is post 23 of 31 in the series “[ Security+ Certification ]” Chapter 23: Incident Response, Disaster Recovery and Continuity of Operations (Business Continuity) Incident Response Plan Documented incident types Roles and responsibilities Reporting Escalation Cyber-incident response teams Incident Response Process Preparation Identification Containment Eradication Recovery Lessons Learned (Postmortem) Disaster Recovery (when the meteor …

Security+ Domain 5.0: Risk Management: Chapter 24

This is post 25 of 31 in the series “[ Security+ Certification ]” Chapter 24: Digital Forensics Capturing Evidence You have two major concerns: Capturing the right evidence before it disappears Keeping evidence valid and admissible Order of Volatility CPU, cache and registers Routing tables, ARP cache, process tables, kernel statistics Live network connections, data …

Security+ Domain 2.0: Technologies and Tools, Chapter 7

This is post 5 of 31 in the series “[ Security+ Certification ]” Chapter 7: Security Tools and Technologies Protocol Analyzers Wireshark tcpdump Switched Port Analyzers Port mirroring Port monitoring Network Scanners nmap Rogue system detection Network mapping WiFi Scanners/Crackers Kismet Netstumbler CoWPAtty Password Crackers John the Ripper Cain and Abel Hydra Hashcat Vulnerability Scanners …

Security+ Domain 5.0: Risk Management: Chapter 25

This is post 26 of 31 in the series “[ Security+ Certification ]” Chapter 25: Data Security and Privacy Practices Data Destruction / Media Sanitization FIPS-compliant wiping (digital media) D-BAN Eraser Burning (paper and digital media) Shredding (paper and yes, drives) Pulping (paper) Pulverizing (drives) Degaussing (media and drives) Purging (data) Certificate of Data Destruction …

Security+ Domain 2.0: Technologies and Tools, Chapter 8

This is post 6 of 31 in the series “[ Security+ Certification ]” Chapter 8: Troubleshooting Common Security Issues Unencrypted Credentials FTP (20,21) –> FTPS (SSL/TLS) or SFTP (SSH, 22) HTTP (80) –> SHTTP or HTTPS (443) Telnet (23) –> SSH SNMPv1 –> SNMPv3 Logs / Event Anomalies Things that shouldn’t be happening. Permission Issues …

Security+ Domain 5.0: Risk Management: Chapter 27

This is post 28 of 31 in the series “[ Security+ Certification ]” Chapter 27: Cryptographic Algorithms Symmetric DES, 3DES (block) AES (block) Blowfish, Twofish (block) RC2, RC4 (stream), RC5 (block), RC6 (block) Asymmetric RSA DSA Elliptic Curve (ECC – requires less power, good for mobile) PGP / GPG Digital Signatures RSA DSA Key Exchange …