Security: Summarize various security measures and their purposes Flashcards
CompTIA A+ Core 2 Exam Criteria
What aspects of the Physical Security Measures do you need to consider?
Lighting – To have clear visual of faces
Bollards – Fortify surrounding premises, Prevent smash and grab.
Cameras – Visual aspects of security
Guards – to control and monitor (entry control rosters) - prevent social engineering
Another physical consideration are Access Control Vestibules. What does this do?
Also known as Man-traps: Will need to use smart card, pin, finger scan or fob entry.
This way of access have two way function where you need to go through one door and must be closed to open the next door which usually has a physical feature to open it. This prevents people from tail gating on unauthorized personnel’s.
What are the important consideration you need to implement in a server closet?
needs camera, locks on server rack, climate control systems and fire supression systems.
What is the CIA triad stand for?
Confidentiality, Integrity and availability
What physical locks can you implement?
Cable Locks / PC locks / Kensington lock
How can we prevent shoulder surfing?
Screen filter (dark screen) prevent shoulder surfing
What are the three types of Logical Security?
Administrative, Logical (or technical), and Physical. Administrative controls include policies, procedures, rules, standards, regulations, and frameworks. Physical security controls include doors, locks, fences, lighting, cameras, etc. Logical controls are typically software-based and are often found in endpoints, servers, networking devices, and security appliances such as firewalls, proxy servers, intrusion detection and prevention systems, and SIEM (Security information and event management) systems.
Physical Security for staff: Key Fob?
A key fob is a tiny remote control with an RFID chip and an antenna inside. It uses radio frequencies to communicate with another RFID tag inside a reader device, which is attached to a locking system. Each key fob chip is designed to transmit specific RFID tag information that matches what the reader device has been programmed to accept.
Physical Security for staff: Smart Cards
A smart card is a physical card that has an embedded integrated chip that acts as a security token
Physical Security for staff: Biometrics
Retina scanner
Fingerprint scanner
Palmprint scanner
Physical Security for staff: What is a magnetometers?
Metal Detectors
What is Principal of least Priveldge?
Principle of Least Privilege is the foundation for all access control systems and methods. The principle of least privilege requires users, devices, and applications to be given only the minimum level of privileges that are necessary to complete the task. The least privilege does not apply only to human users but also to systems and applications.
There is a closely related security control called Need to Know. In high security operations, especially in military and government systems, users or subjects are given clearance. Resources or objects are given a classification. Clearance, classification, and need to know are used to assign privileges in this type of environment.
How can you apply privileges to a work Windows Workgroup?
Privileges are assigned using Local Users and Groups. This is suitable for small network operations but can be difficult to manage. Each user needs to be given permission on every system they have access to. There is no central administrative console for the configuration of all systems.
How can you apply privileges to a Windows Domain?
In a Windows Domain, permissions are handled centrally on a Domain Controller server, using Active Directory and Group Policy.
Where do I go to configure policies in a Windows Group?
Control Panel> Users Account> Change account type:
In the User Accounts - Users tab, you can add or remove a user’s access to the device. You can also change the admin password by clicking the Reset Password button.
In the User Accounts - Advanced tab, you can manage passwords, as well as perform advanced user management tasks using Local Users and Groups. You can also enable secure sign-in by ticking the checkbox next to the Require users to press Ctrl+Alt+Delete field.
How can I get into Local Security Policy?
Control Panel (small icon) > Administrative tools (Windows Tool in Windows 11) > Local Security Policy> Expand Account polices on the left plane > Click Password Policies.
Other Measures:
Select Account Lockout Policy on the left pane.
The following Policies can be configured:
Account lockout duration
Account lockout threshold
Reset account lockout counter after
Note:
In a Windows Workgroup, these changes need to be made to each system individually and consequently can be difficult to configure and manage.
Where can I I find the Directory and Group Policy?
Server Manager
Where can I find the Active Directory Users and Computers? (domain user)
Control Panel > Administrative tools (or windows tool) > Click Active Directory Users and Computers.
In the Active Directory Users and Computers window, notice that you have two users on the right pane Administrator - User and Guest - User.
Everything else is standard Windows Security Group. Active Directory works with Group Policy as follows: Permissions are assigned to Groups, then users are added to one or more Groups. The User inherits their permissions from the Groups they belong to.
How can I assign a new user to a a domain group?
Control Panel: Back on the Administrative Tools window, double-click Group Policy Management.
In the Group Policy Management window, select Default Domain Policy on the left pane.
Select the Settings tab on the Default Domain Policy pane on the right.
Expand the Security Settings Policy.
What is the Access Control List? (ACL)
An Access Control List is a list of permissions associated with an object or resource. The ACL specifies which users or system processes are allowed to access the resource. For instance, if Amy has permissions to read/write and Bob only has permissions to read, Amy’s permissions are higher than Bob’s.
Access control lists are used in many places on a network. One of the most common is a network firewall. In firewalls, access control lists are commonly known as firewall rules. Firewall rules are written in order and are applied from the first rule to the last. If the first rule matches the traffic, all the other rules will be overridden. The rules will specifically ALLOW connections based on attributes such as Source IP address, Destination IP address, Source Port Number, and Destination Port Number. The final rule is the DENY REST rule. It blocks all traffic that is not specifically allowed in earlier rules.
Other resources that may use access control lists include file systems (read, write, modify, execute, delete), Active Directory and LDAP directories (user and group permissions, role-based access controls (RBAC)), network devices such as firewalls, routers, and switches (rules), and relational databases (permissions).
How can I change windows inbound outbound rules?
Control Panel> System and Sec> Windows Defender Firewall> Click advanced settings>
In the Windows Defender Firewall with Advanced Security window, select Inbound Rules on the left pane. > Select New Rule in the Actions pane
What is MFA?
In the beginning, if you were logging in to a system, resource, or network, all you needed was a user ID and password. Now, due to the threat of passwords being hacked using methods such as Brute Force and Dictionary attacks, a password on its own is not a very good form of security. Passwords need to be at least 15 characters to be able to withstand automated password cracking. But if you give your password away as the result of phishing or social engineering exploits, the length won’t matter.
Current solutions to this problem include “passwordless” and multifactor authentication. Multifactor authentication requires two or more different types of authentication from the list below. Two authentication methods from the same category are not considered to be valid. For instance, a password and a PIN number are both from the authentication type of something you know.
Something You know, Something You have, Something you are
What are the requirements factors for 2FA or MFA?
Knowledge-based - Something you know, such as a password, PIN, or challenge questions and answers.
Possession-based or physical device - Something you have, such as an ID card or badge, smart card, digital certificate, phone app, or RSA token or fob.
Biometrics or bodily characteristics - Something you are, such as a fingerprint, palm print, hand geometry, retina scan, iris scan, facial scan, or voice recognition.
Location - Somewhere you are, as determined by GPS devices, including a smartphone, IP address, MAC address, and machine name or Fully Qualified Domain Name (FQDN).
Behavioral - Something you do, such as keyboard typing cadence, mouse dynamics, EUBA or end-user behavior analytics, or even a written signature.