Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
CompTIA Security+ Certification Guide
CompTIA Security+ Certification Guide

CompTIA Security+ Certification Guide: Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification

eBook
$9.99 $26.99
Paperback
$32.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

CompTIA Security+ Certification Guide

Conducting Risk Analysis

As a security professional, you will need to understand that identifying and managing risks can help to keep your company's environment safe from various types of attacks. In this chapter, we will look at types of threats and vulnerabilities and the roles that different threat actors play.

We will cover the following exam objectives in this chapter:

  • Explain threat actor types and attributes: Types of actors: script kiddies—hacktivists—organized crime—nation states/APT—insiders—competitors. Attributes of actors: internal/external—level of sophistication—resources/funding—intent/motivation. Use of open source intelligence
  • Explain the importance of policies, plans, and procedures related to organizational security: Standard operating procedure—agreement types—BPA—SLA—...

Risk Management

Risk management is the process of identifying risks within a company and making decisions about how to reduce the risks so that an incident does not cause harm to the company and its assets. You may not be able to eliminate the risk completely, but you may be able to put procedures in place to reduce it or keep it an acceptable level.

The first step in risk management is to identify the asset. Is it a top secret document? If that was the case you'd limit access to the document. The top secret document would be stored in a secure area at all times; nobody would be able to take copies or photographs of it.

For example, if you had 1 kg of trash and you placed it outside your front door at night, you would be certain that in the morning it would still be there; however, if the asset was 1 kg of 24-carat gold and you left it outside your house at night, it would...

Importance of Policy, Plans, and Procedures

Creating policies, plans, and procedures is a part of risk management and helps to reduce the attack surface and prevent incidents from happening. Let's look at the different type of policies that can be used.

Standard Operating Procedures

Standard Operating Procedures (SOP) give us step-by-step instructions about how an activity is to be carried out. An example would be how to back up data. The SOP will state which data needs to be backed up daily, weekly, or monthly. Critical data would be backed up every two hours, whereas archive data may be backed up monthly. The SOP would also state the medium to be used for the backup; it may be backed up to a NetApp or network share...

Role-Based Awareness Training

Role-based awareness training is mandatory training that an employee carries out on an annual basis; an example of this would be security awareness training that is used by companies to reduce their security risks. During the training, employees will learn about social engineering attacks where the employee is targeted, for example, a phishing email. There will be more information about attacks in Chapter 8, Protecting Against Attacks and Vulnerabilities.

Policy violation is where SOP and policies have been ignored. Transferring data from outside the company without using a VPN, this is policy violation because the data is not secure.

General Security Policies

General security policies affecting...

Business Impact Analysis Concepts

Business impact analysis (BIA) looks at the financial loss relating to an incident and does not look at how the threat or how an event occurred. It measures the additional cost due to various factors.

Financial loss factors include the following:

  • Loss of sales
  • Regulatory fines and contract penalties
  • Purchase of new equipment to return to an operational state
  • Additional labor required until returning to an operational state
  • Do we need to seek a new property to operate in?

Impact factors include the following:

  • Loss of company brand or reputation
  • Loss of life
  • Were safety procedures in place?
BIA looks at the financial loss but does not look at the threat.

Privacy Threshold Assessment/Privacy Impact Assessment

Personal data use, storage, and access are regulated, and a company will be fined if they do not handle data properly. There are two policies that we need to look at, and these are the privacy threshold assessment and the privacy impact assessment. Let's now look at these:

  • Privacy Threshold Assessment: This assessment is to help identify personal information, described as either Personally Identifiable Information (PII), Sensitive Personal Information (SPI), or Public Health Information (PHI), as used in information security and privacy laws.
  • Privacy Impact Assessment (PIA): A PIA is an analysis of how personally identifiable information is collected, used, shared, and maintained. Should you have a project that requires access to the PII, SPI, or PHI information, you may need to fill in a PIA screening form justifying...

Supply Chain Risk Assessment

Your supply chain is the companies that you totally rely upon to provide the materials for you to carry out a business function or make a product for sale. Let's say that you are a laptop manufacturer and Company A provides the batteries and Company B provides the power supplies. If either of these runs short of either batteries or power supplies it stops you from manufacturing and selling your laptops.

Example 2

Company C provides your broadband internet access and you are totally reliant upon them for the internet - you may mitigate the risk of the internet failing by adopting vendor diversity, where you purchase broadband from Company D so that if either of your suppliers fails you still...

Business Impact Analysis Concepts

The following concepts are used to carry out the business impact analysis:

  • Recovery Point Object (RPO): RPO is how much time a company can last without its data before it affects operations. This is also known as acceptable downtime; if a company agrees that it can be without data for three hours, then the RPO is three hours. If the IT systems in a company suffer a loss of service at 13:00 hours, then the RPO would be 16:00 hours. Any repair beyond that time would have an adverse impact on the business.
  • Recovery Time Object (RTO): RTO is the time that the company has been returned to an operational state. In the RPO scenario, we would like the RTO to be before 16:00 hours. If the RTO is beyond 16:00 hours, then once again it has an adverse impact on the business.
  • Mean Time to Repair (MTTR): MTTR is the average amount of time it takes to repair...

Risk Procedures and Concepts

Risk is the probability that an event will happen - it could bring profit to you. For example, if you place a bet in roulette at a casino then you could win money. It is, however, more likely that a risk will result in financial loss or loss of service. Companies will adopt a risk management strategy to reduce the risk they are exposed to, but may not be able to eliminate the loss completely. In IT, new technology comes out every day and poses new risks to businesses, and therefore risk management is ever evolving.

The main components are assets, risks, threats, and vulnerabilities:

  • Asset: The first stage in risk management is the identification and classification of the asset. If the asset is a top secret document, you will handle and store it differently than an asset that is unclassified and available for free on the internet.
  • Risk: Risk is the...

Risk Register

When we look at the overall risk for the company we will use a risk register. This is a list of all of the risks a company could face. The risk to the finance department with be assessed by the financial director and IT-related risk would be looked at by the IT manager. Each department can identify the assets, classify them, and decide on the risk treatment. The financial director and IT manager are known as risk owners - they are responsible for them:

Ser

Date

Owner

Description

Probability

Impact

Severity

Treatment

Contingency

Action taken

1

01/05/18

IT Manager

Loss of Switch

Low

High

High

Transfer. 2-hour fix SLA

Purchase spare switch

02/05/2018

Qualitative/Quantitative Risk Analysis

There are two different approaches to risk management and they are qualitative and quantitative risk assessments. Let's look at both of them:

  • Qualitative Risk Analysis: Qualitative risk analysis is when the risk is evaluated as a high, medium, or low risk.
  • Quantitative Risk Analysis: Quantitative risk analysis is where you look at the high qualitative risks and give them a number value so that you can associate them with a cost for the risk.

In this example, we are going to grade a risk and its probability from 1 - 9, with 1 being low and 9 being high. If we look at the impact of losing a mail server, the qualitative risk analysis would say that it is high, but the probability of losing it would be low:

Qualitative Probability Quantitative risk
9 3 9*3=27

Review Questions

  1. What is the purpose of standard operating procedures?
  2. What is the purpose of BPA?
  3. What is the difference between an MOU and an MOA?
  4. What is the purpose of an ISA?
  5. What is the benefit of introducing separation of duties into the finance department?
  6. What is the purpose of a risk register?
  7. What is the purpose of job rotation?
  8. What is the purpose of mandatory vacations?
  9. What is the first stage in risk assessment?
  10. Why would a company introduce a clean desk policy?
  11. If someone brought their own laptop to be used at work, apart from an on-boarding policy, what other policy should be introduced?
  12. What is the purpose of an exit interview?
  13. When would you adopt risk avoidance?
  1. What is the purpose of risk transference?
  2. What are rules of behavior?
  3. Why would a company run an annual security awareness training program?
  4. What is cognitive hacking and what should we avoid to mitigate...

Answers and Explanations

  1. Standard operating procedures are step-by-step instructions about how a task should be carried out so that employees know exactly what to do.
  2. A BPA is used by companies in a joint venture and it lays out each party's contribution, their rights and responsibilities, how decisions are made, and who makes them.
  3. A memorandum of understanding is a formal agreement between two parties but it is not legally binding, whereas the memorandum of agreement is similar but is legally binding.
  4. An Interconnection Security Agreement (ISA) states how connections should be made between two business partners. They decide on what type of connection and how to secure it; for example, they may use a VPN to communicate.
  5. If we adopted separation of duties in the finance department, we would ensure that nobody in the department did both parts of a transaction. For example...
Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Learn cryptography and various cryptography algorithms for real-world implementations
  • Discover security policies, plans, and procedures to protect your security infrastructure
  • Written by Ian Neil, one of the world’s top CompTIA Security+ (SY0-501) trainer

Description

CompTIA Security+ is a worldwide certification that establishes the fundamental knowledge required to perform core security functions and pursue an IT security career. CompTIA Security+ Certification Guide is a best-in-class exam study guide that covers all of CompTIA Security+ 501 exam objectives. It is authored by Ian Neil, who is a world-class trainer of CompTIA Security+ 501. Packed with self-assessment scenarios and realistic exam questions, this guide will help you master the core concepts to succeed in the exam the first time you take it. Using relevant examples, you will learn all the important security fundamentals from Certificates and Encryption to Identity and Access Management concepts. You will then dive into the important domains of the exam; namely, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, and cryptography and Public Key Infrastructure (PKI). This book comes with over 600 practice questions with detailed explanation that is at the exam level and also includes two mock exams to help you with your study plan. This guide will ensure that encryption and certificates are made easy for you.

Who is this book for?

This book is designed for anyone who is seeking to pass the CompTIA Security+ SY0-501 exam. It is a stepping stone for anyone who wants to become a security professional or move into cyber security. This certification guide assumes no prior knowledge of the product.

What you will learn

  • Get to grips with security fundamentals from Certificates and Encryption to Identity and Access Management
  • Secure devices and applications that are used by your company
  • Identify the different types of malware and virus and take appropriate actions to protect against them
  • Protect your environment against social engineering and advanced attacks
  • Implement PKI concepts
  • Learn about secure coding techniques, quality control, and testing
  • Troubleshoot common security issues

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Sep 29, 2018
Length: 532 pages
Edition : 1st
Language : English
ISBN-13 : 9781789346688

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Sep 29, 2018
Length: 532 pages
Edition : 1st
Language : English
ISBN-13 : 9781789346688

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 120.97
CompTIA Linux+ Certification Guide
$43.99
CompTIA Security+ Certification Guide
$32.99
CompTIA Network+ Certification Guide
$43.99
Total $ 120.97 Stars icon
Banner background image

Table of Contents

17 Chapters
Understanding Security Fundamentals Chevron down icon Chevron up icon
Conducting Risk Analysis Chevron down icon Chevron up icon
Implementing Security Policies and Procedures Chevron down icon Chevron up icon
Delving into Identity and Access Management Chevron down icon Chevron up icon
Understanding Network Components Chevron down icon Chevron up icon
Understanding Cloud Models and Virtualization Chevron down icon Chevron up icon
Managing Hosts and Application Deployment Chevron down icon Chevron up icon
Protecting Against Attacks and Vulnerabilities Chevron down icon Chevron up icon
Implementing the Public Key Infrastructure Chevron down icon Chevron up icon
Responding to Security Incidents Chevron down icon Chevron up icon
Managing Business Continuity Chevron down icon Chevron up icon
Mock Exam 1 Chevron down icon Chevron up icon
Mock Exam 2 Chevron down icon Chevron up icon
Preparing for the CompTIA Security+ 501 Exam Chevron down icon Chevron up icon
Acronyms Chevron down icon Chevron up icon
Assessment Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.6
(90 Ratings)
5 star 85.6%
4 star 2.2%
3 star 4.4%
2 star 4.4%
1 star 3.3%
Filter icon Filter
Top Reviews

Filter reviews by




phillip prater Apr 09, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is what you need to get the essential information to pass the SY0-601 Security Plus Exam By comptia. I know this because I used this book and passed on my first try!
Amazon Verified review Amazon
JohnCollins051994 Oct 29, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
While I was studying for my Sec+ certification test, I was looking for some decent materials. One of my friends turned me on to this book so I gave it a shot. I must say, I am not disappointed. Mr. Neil did an excellent job with breaking down material in his book to a level that was easily understandable by all. The questions at the end of each chapter were crafted in such a way that you had to actually think about each answer. They were very challenging and straight to the point. I'd venture to say that if you can answer his open ended questions at each chapter, then you have a very good chance of passing the exam. Needless to say, with the help of his guidance in this book, I passed my exam and am now CompTIA Security+ certified! To anyone that is looking to make sense of an otherwise complicated subject, this book is well worth the buy!
Amazon Verified review Amazon
Clifford Dennie Jun 01, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The Security+ exam was one of the hardest tests that I have EVER TAKEN. If it wasn’t for this book I never would have passed. It is very well written to help you understand the different aspects that you need to know to pass the exam. Don’t waste your money on brain dumps that you hope are the questions that will be on the test. This book helped me understand not only the fundamentals that I needed to know, but all of the topics needed for me to successfully pass the exam. This guy really knows what he is talking about when it comes to the Security+ subject matter.I also studied my knowledge that I learned from this book with his other book “CompTIA Security+ Practice Tests SY0-501.” One I was able to answer the practice tests, it made me feel more confident when it was time to take the actual exam. I have looked at a lot of other study material that is on the market today and the reason that I chose this authors books is because my friends and coworkers all used his material for their exams and were very satisfied. When I read the material, it was easier to read, comprehend and absorb.This book is a MUST HAVE to pass!
Amazon Verified review Amazon
Roberto Reyes Oct 30, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
A group of us went and bought this book because it was recommended to us and we were all successful in passing because of the correct content and straight to the point information material this book had. I really enjoyed the tips the book had and I will continue to share it with more people so they can also learn even though my IT knowledge was low I read this book and have left with more knowledge than when I first began. Highly recommend
Amazon Verified review Amazon
Jacob Jul 26, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book really helped me out. It’s really big on know the concepts so learn everything about the different subjects in a way that makes sense
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.