Please enable JavaScript.
Coggle requires JavaScript to display documents.
CompTIA Security+ Chapter 9 (Defense in Depth (Layered security)…
CompTIA Security+ Chapter 9
Defense in Depth
(Layered security)
Control Diversity
Vendor Diversity
Physical controls:
perimeter
buildings
restricted work areas
server / network rooms
hardware (locks)
airgap (physical separation between systems)
signs
Securing doors
Proximity cards (RFID, smart cards, tokens)
Cipher locks = enter numerical code
Biometrics
Tailgating
mantrap
Security Guards
check ID, access list, deter tailgating
Cameras
record in public areas
notify employees of surveillance
dont record audio
Fencing, lighting, alarms, barricade (bollards)
Hardware locks
key management
cable locks
locking cabinets
office safes
Asset Management
reduce architecture and design weaknesses
system sprawl
asset-tracking
Environmental Controls
HVAC
Hot and Cold aisles
HVAC dampers
Fire Suppression
Shielded twisted-pair (STP)
Unshielded twisted-pair (UTP)
shield from capture induction field
Cable troughs, wiring ducts
Availability
Five Nines = 99.999%
Backups
Full & differential
Full & incremental
Business Continuity Plan (BCP)
Business Impact Analysis (BIA)
identifies core business req, but not recommendations
determine
maximum allowable outage
based on
money lost / time interval
Privacy
Privacy threshold assessment
Privacy impact assessment
Recovery objectives
Recovery Time Objective (RTO)
Recovery Point Objective (RPO)
Predict
Mean time between failures (MTBF)
Mean time to recover (MTTR)
Disaster Recovery Plan (DRPs)
can be multiple in a BCP
disaster recovery steps
Continuity of Operations Planning (COOP)
Hot site, cold site, warm site
mobile site, mirror site
restore least critical functions back to the primary site first, since critical functions are running on the second site.
Testing Plans
tabletop exercise
functional exercise