Book Image

CompTIA Security+ Certification Guide

By : Ian Neil
Book Image

CompTIA Security+ Certification Guide

By: Ian Neil

Overview of this book

CompTIA Security+ is a worldwide certification that establishes the fundamental knowledge required to perform core security functions and pursue an IT security career. CompTIA Security+ Certification Guide is a best-in-class exam study guide that covers all of CompTIA Security+ 501 exam objectives. It is authored by Ian Neil, who is a world-class trainer of CompTIA Security+ 501. Packed with self-assessment scenarios and realistic exam questions, this guide will help you master the core concepts to succeed in the exam the first time you take it. Using relevant examples, you will learn all the important security fundamentals from Certificates and Encryption to Identity and Access Management concepts. You will then dive into the important domains of the exam; namely, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, and cryptography and Public Key Infrastructure (PKI). This book comes with over 600 practice questions with detailed explanation that is at the exam level and also includes two mock exams to help you with your study plan. This guide will ensure that encryption and certificates are made easy for you.
Table of Contents (18 chapters)
12
Mock Exam 1
13
Mock Exam 2
15
Acronyms

CIA Triad Concept

Most security books start with the basics of security by featuring the CIA triad—this is a model designed to guide policies for information security within an organization. It is a widely used security model and it stands for confidentiality, integrity, and availability, the three key principles that should be used to guarantee having a secure system:

Figure 1: CIA triad

We'll discuss these principles in more depth here:

  • Confidentiality: Prevents the disclosure of data to unauthorized people so that only authorized people have access to data, this is known as the need to know basis. Only those who should know the contents should be given access. An example would be that your medical history is only available to your doctor and nobody else.

We also tend to encrypt data to keep it confidential. There are two types of encryption known as symmetric and asymmetric. Symmetric encryption uses one key known as the private key or shared key. Asymmetric encryption uses two keys known as private key and the public key.

  • Integrity: This means that you know that data has not been altered or tampered with. We use a technique called hashing that takes the data and converts it into a numerical value. If you run the hash when you suspect changes have taken place, and if the numerical value has changed, then the data has been tampered with. Common hashing algorithms in the exam are Secure Hash Algorithm version 1 (SHA1) and Message Digest version 5 (MD5).
  • Availability: Availability could be using Redundant Array of Independent Disks (RAID) disks or maybe fail-over clustering. Availability ensures that data is always available; an example would be if you wanted to purchase an airplane ticket and the system came back with an error and you could not purchase it, this could be frustrating.