Search Header Logo
IT Fundamentals Module 5 Unit 1

IT Fundamentals Module 5 Unit 1

Assessment

Presentation

Computers

Professional Development

Practice Problem

Hard

Created by

willie reynolds

Used 4+ times

FREE Resource

19 Slides • 9 Questions

1

media
media

Module 5 / Unit 1 / Security Concerns

The Official CompTIA ITF+
(Exam FC0U61) Guide

2

media
media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Image by racorn © 123rf.com


Objectives

Distinguish threats to the

confidentiality, integrity, and availability
of information processing systems

Identify social engineering techniques

Describe the importance of business

continuity and how to make systems
fault tolerant

Explain the importance of disaster

recovery plans

2

3

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Controlling access to resources

Balance security with accessibility

Properties of secure information—“CIA Triad”

o
Confidentiality

o
Integrity

o
Availability

Security threats

3

Computer Security Basics

4

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Snooping

Eavesdropping/wiretapping/sniffing

Social engineering/dumpster diving

4

Confidentiality Concerns

5

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Man-in-the-Middle (MitM)

Replay

Impersonation

5

Integrity Concerns

6

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Denial of Service (DoS)

Power outage

Hardware failure

Destruction

Serviceoutage

6

Availability Concerns

7

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Access control system

Authentication

o
Prove that a user is who they say they are

o
Associate that person with a unique computer or network user account

Authorization

o
Create barriers around the resource such that only authenticated users can gain access

o
Resource permissions lists

Accounting

o
Recording when and by whom a resource was accessed

7

Authorization, Authentication, and Auditing

8

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Getting people to reveal confidential information

Attackers often build access with piecemeal steps

Any information about a company can be helpful in making social engineering

attacks more likely to succeed

8

Social Engineering

9

media
media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Impersonation, Trust, and Dumpster Diving

Gain access by pretending to be

someone else

o
Intimidate through false rank or spurious
technical jargon

o
Exploit trust - coax and persuade

Building trust is easier if you have

information that will convince your target
(or put them off-guard)

o
Department employee lists, job titles,
phone numbers, diary, invoices, or
purchase orders

“Dumpster diving” for discarded company

information

9

10

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Identity fraud

o
Masquerade as someone else

o
Control accounts that are supposed to be operated by someone else

o
Exploit stolen Personally Identifiable Information (PII)

“Shoulder surfing” to observe credentials

10

Identity Fraud and Shoulder Surfing

11

media
media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Defeating Social Engineering Attacks

Training and education

Security policies

o
Proper support procedures

o
Account and device protection—e.g.
using screen locks to prevent “lunchtime
attacks”

o
Identity badges, escorted visitors, and
secure doors

11

12

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Outages cost—financially and reputational damage

Business continuity plans minimize outages or the effect of outages

Fault tolerance

o
Design systems without single points of failure

o
Develop contingency plans to cope with failures

o
Provision redundant components and systems to allow failover

12

Business Continuity and Fault Tolerance

13

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Redundant Array of Independent Disks (RAID)

Configurations to allow the storage system to tolerate individual disk unit failures

o
RAID 1—disk mirroring

o
RAID 5—striping with parity

RAID cannot replace the need for backups

13

Data Redundancy

14

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Multiple adapter cards/ports for individual host

o
Also allows load balancing

Multiple network paths between nodes

Routers can detect failed links and choose alternative paths

14

Network Redundancy

15

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Dual power supplies

Redundant circuits

Uninterruptible Power Supply (UPS)

Backup power generator

15

Power Redundancy

16

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Providing redundancy at the site level

Replication can be used to synchronize data between multiple sites

16

Site Redundancy and Replication

17

media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Plans for specific scenarios rather than overall business continuity

o
Workflows and resources

o
Wide range of possible major and minor scenarios

Prioritization

Data restoration

Restoring access

17

Disaster Recovery

18

media
media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Review

Image by Wavebreak Media © 123rf.com

Review

Distinguish threats to the

confidentiality, integrity, and
availability of information processing
systems

Identify social engineering

techniques

Describe the importance of business

continuity and how to make systems
fault tolerant

Explain the importance of disaster

recovery plans

18

19

media
media
media

Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Image by racorn © 123rf.com

Examples of Common Threats

19

20

Multiple Choice

When you're sending a private message to a friend, which property of secure information ensures that only your friend can read the message?

1

Availability

2

Integrity

3

Confidentiality

4

Redundancy

21

Multiple Choice

Your favorite online game is suddenly inaccessible due to a high number of requests to the server. This is an example of an attack on which property of secure information?

1

Confidentiality

2

Integrity

3

Availability

4

Redundancy

22

Multiple Choice

You receive an email from a "friend" asking for your password to a shared streaming service. This is an example of what type of security threat?

1

Social engineering

2

Malware

3

Phishing

4

 Virus

23

Multiple Choice

You attend a workshop at work about how to identify suspicious emails. This is an example of which strategy to enhance the effectiveness of security technologies?

1

Redundancy

2

User education and training

3

Disaster recovery planning

4

Encryption

24

Multiple Choice

Your computer is set up to automatically back up your files to an external hard drive every night. This is an example of your system being:

1

Fault tolerant

2

Confidential

3

Available

4

Integrated

25

Multiple Choice

Your office building has multiple internet connections to ensure that if one goes down, the others will keep the network online. This is an example of:

1

Confidentiality

2

Redundancy

3

Integrity

4

Social engineering

26

Multiple Choice

After a power outage at work, a plan is activated to switch operations to another location. This is an example of:

1

Redundancy

2

Social engineering

3

Disaster recovery planning

4

User education and training

27

Multiple Choice

You receive an email from your bank asking you to confirm your account details. You're suspicious because the email address doesn't look right. This is an example of which strategy to identify security threats?

1

Disaster recovery planning

2

User education and training

3

Redundancy

4

Social engineering

28

Dropdown

CIA stands for ​
media
media

Module 5 / Unit 1 / Security Concerns

The Official CompTIA ITF+
(Exam FC0U61) Guide

Show answer

Auto Play

Slide 1 / 28

SLIDE