SlideShare a Scribd company logo
1 of 6
Download to read offline
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Security Controls
Categories
Security Control
Functional Types
Preventive: Stop
incidents from happening;
e.g., firewalls, antivirus software
Corrective: Resolve incidents
after they occur; e.g., patches,
backups
Detective: Identify and alert
on incidents; e.g., intrusion
detection systems, log monitors
Administrative: Policies and
procedures; e.g., security
training, ackground checks
Physical: Physical barriers;
e.g., locks, security guards
Technical: Technology-based
controls; e.g., encryption,
authentication mechanisms
DOMAIN 1: GENERAL SECURITY CONCEPTS (12%)
DOMAIN
1
1.1 COMPARE AND CONTRAST VARIOUS TYPES OF SECURITY CONTROLS
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
DOMAIN 1: GENERAL SECURITY CONCEPTS (12%)
DOMAIN
1
1.2 SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS
Core Principles
Key Concepts
Confidentiality: Ensuring
information is not disclosed to
unauthorized individuals;
e.g., encryption
Availability (CIA): Ensuring
information is accessible when
needed; e.g., redundancy
Integrity: Ensuring information
is not altered by unauthorized
individuals; e.g., hashing
Authentication, Authorization,
Accounting (AAA): Identifying users,
granting access, and tracking
actions; e.g., login systems
Non-repudiation: Preventing
denial of action; e.g., digital
signatures
Zero Trust Model: Assuming all
network traffic is untrusted;
e.g., microsegmentation, least
privilege access control
Physical Security: Protecting
physical assets; e.g., surveillance
cameras
Gap Analysis: Identifying differences
between current and desired
security postures; e.g., security
assessments, vulnerability scanning
Managing Business Process Changes:
Maintaining security; e.g., implementing
new software
Change
Management
in Security
Technical Implications: Understanding how
changes affect security; e.g., system upgrades,
patching
Integration of Security Measures: Ensuring new
changes adhere to security policies;
e.g., security reviews
Documentation: Keeping records of changes;
e.g., change logs
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
DOMAIN 1: GENERAL SECURITY CONCEPTS (12%)
DOMAIN
1
1.3 EXPLAIN THE IMPORTANCE OF CHANGE MANAGEMENT
PROCESSES AND THE IMPACT TO SECURITY
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
DOMAIN 1: GENERAL SECURITY CONCEPTS (12%)
1.4 EXPLAIN THE IMPORTANCE OF USING APPROPRIATE
CRYPTOGRAPHIC SOLUTIONS
DOMAIN
1
Encryption and Obfuscation: Protecting data
confidentiality; e.g., AES encryption, VPNs
Public Key Infrastructure (PKI): Framework
for encryption and digital signatures; e.g.,
SSL certificates
Hashing and Salting: Protecting stored
passwords; e.g., password storage
Blockchain and Open Public Ledgers:
Ensuring data integrity in distributed
systems; e.g., Bitcoin
Certificates: Validating identities;
e.g., HTTPS websites
Digital Signatures: Ensuring data integrity
and on-repudiation; e.g., email signing
Key Stretching: Enhancing password
security; e.g., PBKDF2, bcrypt
Cryptographic
Solutions for
Security
To Get More Insights Through Our FREE
FOUND THIS USEFUL?
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE FOLLOW
SHARE

More Related Content

Similar to An Introduction of CompTIA Security+ (SY0-701) Domain 1.pdf

Information Security
Information SecurityInformation Security
Information Security
chenpingling
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
cherishwinsland
 

Similar to An Introduction of CompTIA Security+ (SY0-701) Domain 1.pdf (20)

Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat Modelling
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
 
Corporate Endpoint Security Training [Kaspersky]
Corporate Endpoint Security Training [Kaspersky]Corporate Endpoint Security Training [Kaspersky]
Corporate Endpoint Security Training [Kaspersky]
 
key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario
 
Information Security
Information SecurityInformation Security
Information Security
 
CHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxCHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptx
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Cloud computing Security
Cloud computing SecurityCloud computing Security
Cloud computing Security
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
 

More from infosecTrain

Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
infosecTrain
 

More from infosecTrain (20)

THE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdf
THE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdfTHE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdf
THE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdf
 
Elevate your privacy knowledge with Cipt certification training.pdf
Elevate your privacy knowledge with Cipt certification training.pdfElevate your privacy knowledge with Cipt certification training.pdf
Elevate your privacy knowledge with Cipt certification training.pdf
 
Audit Scenario Based Interview Questions.pdf
Audit Scenario Based Interview Questions.pdfAudit Scenario Based Interview Questions.pdf
Audit Scenario Based Interview Questions.pdf
 
Understanding DNS Cache Poisoning: Threats and Countermeasures
Understanding DNS Cache Poisoning: Threats and CountermeasuresUnderstanding DNS Cache Poisoning: Threats and Countermeasures
Understanding DNS Cache Poisoning: Threats and Countermeasures
 
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
 
Top 10 Cyber Attacks of 2024: Trends, Impacts, and Responses
Top 10 Cyber Attacks of 2024: Trends, Impacts, and ResponsesTop 10 Cyber Attacks of 2024: Trends, Impacts, and Responses
Top 10 Cyber Attacks of 2024: Trends, Impacts, and Responses
 
Stay ahead in 2024 with These Cybersecurity.pdf
Stay ahead in 2024 with These Cybersecurity.pdfStay ahead in 2024 with These Cybersecurity.pdf
Stay ahead in 2024 with These Cybersecurity.pdf
 
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdfQuestions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
 
Cloud Vs. local Storage - Choose Your Data Destination.pdf
Cloud Vs. local Storage - Choose Your Data Destination.pdfCloud Vs. local Storage - Choose Your Data Destination.pdf
Cloud Vs. local Storage - Choose Your Data Destination.pdf
 
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
 
Data Privacy Challenges & Solution -InfosecTrain
Data Privacy Challenges & Solution -InfosecTrainData Privacy Challenges & Solution -InfosecTrain
Data Privacy Challenges & Solution -InfosecTrain
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
 
GRC (Governance, Risk, and Compliance) Hands-On Online Training.pdf
GRC (Governance, Risk, and Compliance) Hands-On Online Training.pdfGRC (Governance, Risk, and Compliance) Hands-On Online Training.pdf
GRC (Governance, Risk, and Compliance) Hands-On Online Training.pdf
 
Roadmap to Certified Ethical Hacker (v12) Certification Training..pdf
Roadmap to Certified Ethical Hacker (v12) Certification Training..pdfRoadmap to Certified Ethical Hacker (v12) Certification Training..pdf
Roadmap to Certified Ethical Hacker (v12) Certification Training..pdf
 
PMP® Certification Online training Course..pdf
PMP® Certification Online training Course..pdfPMP® Certification Online training Course..pdf
PMP® Certification Online training Course..pdf
 
NIST Cybersecurity Framework building a checklist.pdf
NIST Cybersecurity Framework building a checklist.pdfNIST Cybersecurity Framework building a checklist.pdf
NIST Cybersecurity Framework building a checklist.pdf
 
Third-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdfThird-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdf
 
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
 
ALL YOU WANT TO KNOW ABOUT Certified Ethical Hacker
ALL YOU WANT TO KNOW ABOUT Certified Ethical HackerALL YOU WANT TO KNOW ABOUT Certified Ethical Hacker
ALL YOU WANT TO KNOW ABOUT Certified Ethical Hacker
 
TOP CHALLENGES IN OT SECURITY IN 2024.pdf
TOP CHALLENGES IN OT SECURITY IN 2024.pdfTOP CHALLENGES IN OT SECURITY IN 2024.pdf
TOP CHALLENGES IN OT SECURITY IN 2024.pdf
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

An Introduction of CompTIA Security+ (SY0-701) Domain 1.pdf

  • 2. Security Controls Categories Security Control Functional Types Preventive: Stop incidents from happening; e.g., firewalls, antivirus software Corrective: Resolve incidents after they occur; e.g., patches, backups Detective: Identify and alert on incidents; e.g., intrusion detection systems, log monitors Administrative: Policies and procedures; e.g., security training, ackground checks Physical: Physical barriers; e.g., locks, security guards Technical: Technology-based controls; e.g., encryption, authentication mechanisms DOMAIN 1: GENERAL SECURITY CONCEPTS (12%) DOMAIN 1 1.1 COMPARE AND CONTRAST VARIOUS TYPES OF SECURITY CONTROLS www.infosectrain.com # l e a r n t o r i s e
  • 3. www.infosectrain.com # l e a r n t o r i s e DOMAIN 1: GENERAL SECURITY CONCEPTS (12%) DOMAIN 1 1.2 SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS Core Principles Key Concepts Confidentiality: Ensuring information is not disclosed to unauthorized individuals; e.g., encryption Availability (CIA): Ensuring information is accessible when needed; e.g., redundancy Integrity: Ensuring information is not altered by unauthorized individuals; e.g., hashing Authentication, Authorization, Accounting (AAA): Identifying users, granting access, and tracking actions; e.g., login systems Non-repudiation: Preventing denial of action; e.g., digital signatures Zero Trust Model: Assuming all network traffic is untrusted; e.g., microsegmentation, least privilege access control Physical Security: Protecting physical assets; e.g., surveillance cameras Gap Analysis: Identifying differences between current and desired security postures; e.g., security assessments, vulnerability scanning
  • 4. Managing Business Process Changes: Maintaining security; e.g., implementing new software Change Management in Security Technical Implications: Understanding how changes affect security; e.g., system upgrades, patching Integration of Security Measures: Ensuring new changes adhere to security policies; e.g., security reviews Documentation: Keeping records of changes; e.g., change logs www.infosectrain.com # l e a r n t o r i s e DOMAIN 1: GENERAL SECURITY CONCEPTS (12%) DOMAIN 1 1.3 EXPLAIN THE IMPORTANCE OF CHANGE MANAGEMENT PROCESSES AND THE IMPACT TO SECURITY
  • 5. www.infosectrain.com # l e a r n t o r i s e DOMAIN 1: GENERAL SECURITY CONCEPTS (12%) 1.4 EXPLAIN THE IMPORTANCE OF USING APPROPRIATE CRYPTOGRAPHIC SOLUTIONS DOMAIN 1 Encryption and Obfuscation: Protecting data confidentiality; e.g., AES encryption, VPNs Public Key Infrastructure (PKI): Framework for encryption and digital signatures; e.g., SSL certificates Hashing and Salting: Protecting stored passwords; e.g., password storage Blockchain and Open Public Ledgers: Ensuring data integrity in distributed systems; e.g., Bitcoin Certificates: Validating identities; e.g., HTTPS websites Digital Signatures: Ensuring data integrity and on-repudiation; e.g., email signing Key Stretching: Enhancing password security; e.g., PBKDF2, bcrypt Cryptographic Solutions for Security
  • 6. To Get More Insights Through Our FREE FOUND THIS USEFUL? Courses | Workshops | eBooks | Checklists | Mock Tests LIKE FOLLOW SHARE