Please enable JavaScript.
Coggle requires JavaScript to display documents.
CompTIA Security+ Chapter 1 (Virtualization (Secure Network Architecture…
CompTIA Security+ Chapter 1
Security Goals
Confidentiality
Encryption
Access Controls
Identification
Authentication
Authorization
Steganography &
Obfuscation
Integrity
Hashing
Digital Signatures & Certificates
Non-Repudiation
Availability
Redundancy & Fault Tolerance
Disk Redundancies
Server Redundancies
Load Balancing
Site Redundancies
Backups
Alterate Power
Cooling Systems
Patching
Use Case
Actors
Precondition
Trigger
Postcondition
Normal flow
Alternate flow
Basic Risk Concepts
Risk
Threat
Vulnerability
Security Incident
Risk Mitigation
Control Types
Implemented
Administrative
Tools
Risk Assessments
Vulnerability Assessments
Penetration tests
Operational Controls
Awareness & Training
Configuration & Change Management
Contingency Planning
Media protection
Physical / Environmental protection
Physical
Technical
encryption
Antivirus
IDSs & IPSs
firewalls
least privilege
Goals
Preventive
Hardening
Security Awareness & Training
Security Guards
Change Management
Account disablement policy
Detective
Log monitoring
Trend Analysis
Security audit
Video surveillance
Motion detection
Corrective
IPS (Intrusion prevention system)
Backups & system recovery
Deterrent
Cable Locks
Hardware Locks
Compensating
When an alternate control is used in place of one that is needed. (Sometimes temporary)
Virtualization
Hypervisor
Type I - Run directly on system
hardware
.
Type II - Run as
software
within host.
Host
Guest
Host elasticity and scalability
to resize computing capacity based on the load.
Application Cell / Container
Pros: fewer resources/ efficient
Cons: each cell must use parent OS.
share kernel, Isolated service or app
Secure Network Architecture
Snapshots
virtual desktop infrastructure (VDI) /
virtual desktop environment (VDE)
Persistence and non-persistence
Risks with Virtualization
VM Escape
VM Sprawl
Loss of confidentiality
stolen VM files
Command Line Tools
Ping
Internet Control Message Protocol (ICMP)
echo
Ping to check Name Resolution
Firewalls can block pings
can use ping to test security posture, verify firewall, IPSs
Ipconfig
ipconfig (Windows)
ipconfig /all
ipconfig
/displaydns
ipconfig
/flushdns
ifconfig (Linux - Depreciated)
ifconfig eth0 (cfg interface)
ifconfig eth0
promisc
(promiscuous = process all traffic)
ifconfig eth0 allmulti (multicast?)
ip (Linux)
ip link show (shows interfaces)
ip link set eth0 up
ip -s link (show stats)
Netstat
netstat
netstat -a (lists all TCP and UDP ports, open connections)
netstat -r (routing table)
netstat -r (bytes sent / recieved)
netstat -s (sent/recieved sorted)
netstat -n (numerical order)
netstat -p 80 (specified protocol)
combine: netstat -anp 80
States
ESTABLISHED
LISTEN
CLOSE_WAIT (termination request)
TIME_WAIT (wait for time to pass)
SYN_SENT (sync handshake step 1 //steps: SYN -> SYN-ACK ->ACK)
SYN_RECIEVED (sync recieved SYN, sent SYN-ACK)
Tracert
tracert (win)
traceroute (linux)
tracert -d derp.com (dont resolve to hostname -- faster to run)
Arp
Address Resolution Protocol (ARP);
arp (the command) and ARP (the protocol) are related but not the same thing.
arp (Win -brings up help)
- arp -a (Win - actually runs and shows MAC)
arp (linux - runs and shows MAC)
Do I need to know all the switches?!?!