CompTIA Security+ Study Guide (SY0-401)

Slides:



Advertisements
Similar presentations
Chapter 7: Physical & Environmental Security
Advertisements

Ethics, Privacy and Information Security
Computer Security Computer Security is defined as:
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
1 Telstra in Confidence Managing Security for our Mobile Technology.
General Security Principles and Practices Chapter 3.
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Information Security Principles and Practices
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Microsoft Technology Associate
Information Systems Security Physical Security Domain #4.
Physical Security Chapter 9.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
The Impact of Physical Security on Network Security
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Chapter 4.  Can technology alone provide the best security for your organization?
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BUSINESS B1 Information Security.
Information Systems Security Operations Security Domain #9.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Information Security What is Information Security?
Physical (Environmental) Security
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
P RINCIPLES OF N ETWORKING S ECURITY C HAPTERS 3 & 4 Matt Lavoie NST
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Physical security By Ola Abd el-latif Abbass Hassan.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Physical Security Concerns for LAN Management By: Derek McQuillen.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Access Control Jeff Wicklund Computer Security Fall 2013.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
3D Password.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Module 5: Designing Physical Security for Network Resources
Network Management Chapter 8 Semester 3 By Roger Lewis.
Onsite CRM Security
Information Systems Security
CompTIA Security+ Study Guide (SY0-401)
Risk management.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Understanding Security Layers
CompTIA Security+ Study Guide (SY0-401)
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security in Networking
CompTIA Security+ Study Guide (SY0-501)
Understand mechanisms to control organisational IT security
Chapter 10 Physical Security
Data integrity and security
INFORMATION SYSTEMS SECURITY and CONTROL
Objectives Telecommunications and Network Physical and Personnel
Physical Security.
Managing the IT Function
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

CompTIA Security+ Study Guide (SY0-401) “Chapter 10: Social Engineering and Other Foes”

Chapter 10: Social Engineering and Other Foes Compare and contrast physical security and environmental controls. Summarize social engineering attacks and the associated effectiveness with each attack. Analyze a scenario and select the appropriate type of mitigation and deterrent techniques. Given a scenario, select the appropriate solution to establish host security. Implement the appropriate controls to ensure data security. Given a scenario, select the appropriate authentication, authorization, or access control.

Social Engineering Social engineering is the process by which intruders gain access to your facilities, your network, and even to your employees by exploiting the generally trusting nature of people. Video 1 – Social Engineer a Business Video 2 - Social Engineer a person

Social Engineering Attacks Shoulder Surfing – watch someone enter their password Dumpster Diving – the importance of shredding BEFORE recycling or throwing away Tailgating (Hold the door)

Social Engineering Attacks Impersonation – pretending to be someone you are not Over the phone In person Example A, Example B

Social Engineering Attacks Hoaxes – e.g. “download this patch to protect you from the bone cancer virus that gives your computer cancer!” Whaling – targeted spear phishing for a “whale” a.k.a. someone with a lot of power Vishing – voice phishing

Principles Behind Social Engineering Authority – they pretend to be your boss Intimidation – threats (if you don’t do this… I need this done now, etc) Consensus/Social Proof – kill them with kindness Scarcity – I can do this now or a month from now Urgency – you’re putting X at risk Familiarity/Liking Trust – they do something for you first

Physical Security Access control is a critical part of physical security

Physical Security Physical barriers the objective of a physical barrier is to prevent access to computers and network systems

Lenel Onguard

Multiple barrier system Having more than one physical barrier to cross Systems should have a minimum of three physical barriers (perimeter, area, room)

Physical Security Hardware Locks and Security involves applying physical security modifications to secure the system(s)and prevent them from leaving the facility Mantraps require visual identification, as well as authentication, to gain access

Desktop Hardware Lock Prevents the case from being opened (HDD being stolen) or the tower from being stolen

Physical Security Video Surveillance – placement (mantraps, entrance/exit, loading dock, etc) Camera vs. Guard – who’s monitoring the camera vs human error Fencing/Perimeter Security – deterrent and your first line of defense Access Control List – e.g. Lenel Onguard badge access Proper Lighting - deterrent Signs – deterrent – authorized personnel only, violators will be pointed at Guards – expensive and prone to social engineering Barricades – think military, prevent someone from ramming through

Physical Security Biometrics Biometric systems use some kind of unique biological trait to identify a person, such as fingerprints, patterns on the retina, and handprints Protected Distribution Systems (PDS) Network is so physically secure (e.g. NSA, no cell phones allowed, no USBs, no unauthorized personnel) that network security is relaxed Alarms – divide buildings into security zones Motion Detection – turn on cameras, lights, sound an alarm, etc

Environmental Controls HVAC (includes humidity monitoring) EMI Shielding Faraday cage – Woven, grounded cable mesh that surrounds a room to “catch” (reduce) EMI

Environmental Controls Fire Suppression Fire Extinguisher Types Wood and Paper (water/chemical) Flammable Liquids (chemicals) Electrical (nonconductive chemicals) Flammable metals (varies) Annual inspections Fixed systems Overhead sprinklers HALON (gas emitting sprinklers, much better for electronic equipment!)

Hot and Cold Aisles

Products that Solve Most Electrical Line Problems: Surge Protectors protect electrical components from momentary or instantaneous increases (called spikes) in a power line Power Conditioners are active devices that effectively isolate and regulate voltage in a building Backup Power is generally used in situations where continuous power is needed in the event of a power loss

Chapter 10: Physical and Hardware-Based Security EMI Shielding Electromagnetic interference (EMI) frequency interference (RFI) Shielding refers to the process of preventing electronic emissions from your computer systems from being used to gather intelligence and preventing outside electronic emissions from disrupting your information-processing abilities

EMI Interference

Control Types Deterrent – signs, lights Preventative – door locks, training Detective – AV, audit logs Compensating – backup generator, physical lock in addition to fingerprint scanner Technical – firewalls, Lenel Onguard, etc Administrative – policies, procedures (e.g. when someone leaves, change all the codes/passwords that they knew)

Chapter Summary Social Engineering concepts Security Awareness training HVAC/environmental controls EMI shielding Fire Extinguisher types Control types