Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
CompTIA Security+ Certification Guide
CompTIA Security+ Certification Guide

CompTIA Security+ Certification Guide: Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification

eBook
€13.98 €19.99
Paperback
€24.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

CompTIA Security+ Certification Guide

Conducting Risk Analysis

As a security professional, you will need to understand that identifying and managing risks can help to keep your company's environment safe from various types of attacks. In this chapter, we will look at types of threats and vulnerabilities and the roles that different threat actors play.

We will cover the following exam objectives in this chapter:

  • Explain threat actor types and attributes: Types of actors: script kiddies—hacktivists—organized crime—nation states/APT—insiders—competitors. Attributes of actors: internal/external—level of sophistication—resources/funding—intent/motivation. Use of open source intelligence
  • Explain the importance of policies, plans, and procedures related to organizational security: Standard operating procedure—agreement types—BPA—SLA—...

Risk Management

Risk management is the process of identifying risks within a company and making decisions about how to reduce the risks so that an incident does not cause harm to the company and its assets. You may not be able to eliminate the risk completely, but you may be able to put procedures in place to reduce it or keep it an acceptable level.

The first step in risk management is to identify the asset. Is it a top secret document? If that was the case you'd limit access to the document. The top secret document would be stored in a secure area at all times; nobody would be able to take copies or photographs of it.

For example, if you had 1 kg of trash and you placed it outside your front door at night, you would be certain that in the morning it would still be there; however, if the asset was 1 kg of 24-carat gold and you left it outside your house at night, it would...

Importance of Policy, Plans, and Procedures

Creating policies, plans, and procedures is a part of risk management and helps to reduce the attack surface and prevent incidents from happening. Let's look at the different type of policies that can be used.

Standard Operating Procedures

Standard Operating Procedures (SOP) give us step-by-step instructions about how an activity is to be carried out. An example would be how to back up data. The SOP will state which data needs to be backed up daily, weekly, or monthly. Critical data would be backed up every two hours, whereas archive data may be backed up monthly. The SOP would also state the medium to be used for the backup; it may be backed up to a NetApp or network share...

Role-Based Awareness Training

Role-based awareness training is mandatory training that an employee carries out on an annual basis; an example of this would be security awareness training that is used by companies to reduce their security risks. During the training, employees will learn about social engineering attacks where the employee is targeted, for example, a phishing email. There will be more information about attacks in Chapter 8, Protecting Against Attacks and Vulnerabilities.

Policy violation is where SOP and policies have been ignored. Transferring data from outside the company without using a VPN, this is policy violation because the data is not secure.

General Security Policies

General security policies affecting...

Business Impact Analysis Concepts

Business impact analysis (BIA) looks at the financial loss relating to an incident and does not look at how the threat or how an event occurred. It measures the additional cost due to various factors.

Financial loss factors include the following:

  • Loss of sales
  • Regulatory fines and contract penalties
  • Purchase of new equipment to return to an operational state
  • Additional labor required until returning to an operational state
  • Do we need to seek a new property to operate in?

Impact factors include the following:

  • Loss of company brand or reputation
  • Loss of life
  • Were safety procedures in place?
BIA looks at the financial loss but does not look at the threat.

Privacy Threshold Assessment/Privacy Impact Assessment

Personal data use, storage, and access are regulated, and a company will be fined if they do not handle data properly. There are two policies that we need to look at, and these are the privacy threshold assessment and the privacy impact assessment. Let's now look at these:

  • Privacy Threshold Assessment: This assessment is to help identify personal information, described as either Personally Identifiable Information (PII), Sensitive Personal Information (SPI), or Public Health Information (PHI), as used in information security and privacy laws.
  • Privacy Impact Assessment (PIA): A PIA is an analysis of how personally identifiable information is collected, used, shared, and maintained. Should you have a project that requires access to the PII, SPI, or PHI information, you may need to fill in a PIA screening form justifying...

Supply Chain Risk Assessment

Your supply chain is the companies that you totally rely upon to provide the materials for you to carry out a business function or make a product for sale. Let's say that you are a laptop manufacturer and Company A provides the batteries and Company B provides the power supplies. If either of these runs short of either batteries or power supplies it stops you from manufacturing and selling your laptops.

Example 2

Company C provides your broadband internet access and you are totally reliant upon them for the internet - you may mitigate the risk of the internet failing by adopting vendor diversity, where you purchase broadband from Company D so that if either of your suppliers fails you still...

Business Impact Analysis Concepts

The following concepts are used to carry out the business impact analysis:

  • Recovery Point Object (RPO): RPO is how much time a company can last without its data before it affects operations. This is also known as acceptable downtime; if a company agrees that it can be without data for three hours, then the RPO is three hours. If the IT systems in a company suffer a loss of service at 13:00 hours, then the RPO would be 16:00 hours. Any repair beyond that time would have an adverse impact on the business.
  • Recovery Time Object (RTO): RTO is the time that the company has been returned to an operational state. In the RPO scenario, we would like the RTO to be before 16:00 hours. If the RTO is beyond 16:00 hours, then once again it has an adverse impact on the business.
  • Mean Time to Repair (MTTR): MTTR is the average amount of time it takes to repair...

Risk Procedures and Concepts

Risk is the probability that an event will happen - it could bring profit to you. For example, if you place a bet in roulette at a casino then you could win money. It is, however, more likely that a risk will result in financial loss or loss of service. Companies will adopt a risk management strategy to reduce the risk they are exposed to, but may not be able to eliminate the loss completely. In IT, new technology comes out every day and poses new risks to businesses, and therefore risk management is ever evolving.

The main components are assets, risks, threats, and vulnerabilities:

  • Asset: The first stage in risk management is the identification and classification of the asset. If the asset is a top secret document, you will handle and store it differently than an asset that is unclassified and available for free on the internet.
  • Risk: Risk is the...

Risk Register

When we look at the overall risk for the company we will use a risk register. This is a list of all of the risks a company could face. The risk to the finance department with be assessed by the financial director and IT-related risk would be looked at by the IT manager. Each department can identify the assets, classify them, and decide on the risk treatment. The financial director and IT manager are known as risk owners - they are responsible for them:

Ser

Date

Owner

Description

Probability

Impact

Severity

Treatment

Contingency

Action taken

1

01/05/18

IT Manager

Loss of Switch

Low

High

High

Transfer. 2-hour fix SLA

Purchase spare switch

02/05/2018

Qualitative/Quantitative Risk Analysis

There are two different approaches to risk management and they are qualitative and quantitative risk assessments. Let's look at both of them:

  • Qualitative Risk Analysis: Qualitative risk analysis is when the risk is evaluated as a high, medium, or low risk.
  • Quantitative Risk Analysis: Quantitative risk analysis is where you look at the high qualitative risks and give them a number value so that you can associate them with a cost for the risk.

In this example, we are going to grade a risk and its probability from 1 - 9, with 1 being low and 9 being high. If we look at the impact of losing a mail server, the qualitative risk analysis would say that it is high, but the probability of losing it would be low:

Qualitative Probability Quantitative risk
9 3 9*3=27

Review Questions

  1. What is the purpose of standard operating procedures?
  2. What is the purpose of BPA?
  3. What is the difference between an MOU and an MOA?
  4. What is the purpose of an ISA?
  5. What is the benefit of introducing separation of duties into the finance department?
  6. What is the purpose of a risk register?
  7. What is the purpose of job rotation?
  8. What is the purpose of mandatory vacations?
  9. What is the first stage in risk assessment?
  10. Why would a company introduce a clean desk policy?
  11. If someone brought their own laptop to be used at work, apart from an on-boarding policy, what other policy should be introduced?
  12. What is the purpose of an exit interview?
  13. When would you adopt risk avoidance?
  1. What is the purpose of risk transference?
  2. What are rules of behavior?
  3. Why would a company run an annual security awareness training program?
  4. What is cognitive hacking and what should we avoid to mitigate...

Answers and Explanations

  1. Standard operating procedures are step-by-step instructions about how a task should be carried out so that employees know exactly what to do.
  2. A BPA is used by companies in a joint venture and it lays out each party's contribution, their rights and responsibilities, how decisions are made, and who makes them.
  3. A memorandum of understanding is a formal agreement between two parties but it is not legally binding, whereas the memorandum of agreement is similar but is legally binding.
  4. An Interconnection Security Agreement (ISA) states how connections should be made between two business partners. They decide on what type of connection and how to secure it; for example, they may use a VPN to communicate.
  5. If we adopted separation of duties in the finance department, we would ensure that nobody in the department did both parts of a transaction. For example...
Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Learn cryptography and various cryptography algorithms for real-world implementations
  • Discover security policies, plans, and procedures to protect your security infrastructure
  • Written by Ian Neil, one of the world’s top CompTIA Security+ (SY0-501) trainer

Description

CompTIA Security+ is a worldwide certification that establishes the fundamental knowledge required to perform core security functions and pursue an IT security career. CompTIA Security+ Certification Guide is a best-in-class exam study guide that covers all of CompTIA Security+ 501 exam objectives. It is authored by Ian Neil, who is a world-class trainer of CompTIA Security+ 501. Packed with self-assessment scenarios and realistic exam questions, this guide will help you master the core concepts to succeed in the exam the first time you take it. Using relevant examples, you will learn all the important security fundamentals from Certificates and Encryption to Identity and Access Management concepts. You will then dive into the important domains of the exam; namely, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, and cryptography and Public Key Infrastructure (PKI). This book comes with over 600 practice questions with detailed explanation that is at the exam level and also includes two mock exams to help you with your study plan. This guide will ensure that encryption and certificates are made easy for you.

Who is this book for?

This book is designed for anyone who is seeking to pass the CompTIA Security+ SY0-501 exam. It is a stepping stone for anyone who wants to become a security professional or move into cyber security. This certification guide assumes no prior knowledge of the product.

What you will learn

  • Get to grips with security fundamentals from Certificates and Encryption to Identity and Access Management
  • Secure devices and applications that are used by your company
  • Identify the different types of malware and virus and take appropriate actions to protect against them
  • Protect your environment against social engineering and advanced attacks
  • Implement PKI concepts
  • Learn about secure coding techniques, quality control, and testing
  • Troubleshoot common security issues

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Sep 29, 2018
Length: 532 pages
Edition : 1st
Language : English
ISBN-13 : 9781789348019

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Sep 29, 2018
Length: 532 pages
Edition : 1st
Language : English
ISBN-13 : 9781789348019

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 90.97
CompTIA Linux+ Certification Guide
€32.99
CompTIA Security+ Certification Guide
€24.99
CompTIA Network+ Certification Guide
€32.99
Total 90.97 Stars icon

Table of Contents

17 Chapters
Understanding Security Fundamentals Chevron down icon Chevron up icon
Conducting Risk Analysis Chevron down icon Chevron up icon
Implementing Security Policies and Procedures Chevron down icon Chevron up icon
Delving into Identity and Access Management Chevron down icon Chevron up icon
Understanding Network Components Chevron down icon Chevron up icon
Understanding Cloud Models and Virtualization Chevron down icon Chevron up icon
Managing Hosts and Application Deployment Chevron down icon Chevron up icon
Protecting Against Attacks and Vulnerabilities Chevron down icon Chevron up icon
Implementing the Public Key Infrastructure Chevron down icon Chevron up icon
Responding to Security Incidents Chevron down icon Chevron up icon
Managing Business Continuity Chevron down icon Chevron up icon
Mock Exam 1 Chevron down icon Chevron up icon
Mock Exam 2 Chevron down icon Chevron up icon
Preparing for the CompTIA Security+ 501 Exam Chevron down icon Chevron up icon
Acronyms Chevron down icon Chevron up icon
Assessment Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.6
(90 Ratings)
5 star 85.6%
4 star 2.2%
3 star 4.4%
2 star 4.4%
1 star 3.3%
Filter icon Filter
Top Reviews

Filter reviews by




phillip prater Apr 09, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is what you need to get the essential information to pass the SY0-601 Security Plus Exam By comptia. I know this because I used this book and passed on my first try!
Amazon Verified review Amazon
JohnCollins051994 Oct 29, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
While I was studying for my Sec+ certification test, I was looking for some decent materials. One of my friends turned me on to this book so I gave it a shot. I must say, I am not disappointed. Mr. Neil did an excellent job with breaking down material in his book to a level that was easily understandable by all. The questions at the end of each chapter were crafted in such a way that you had to actually think about each answer. They were very challenging and straight to the point. I'd venture to say that if you can answer his open ended questions at each chapter, then you have a very good chance of passing the exam. Needless to say, with the help of his guidance in this book, I passed my exam and am now CompTIA Security+ certified! To anyone that is looking to make sense of an otherwise complicated subject, this book is well worth the buy!
Amazon Verified review Amazon
Clifford Dennie Jun 01, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The Security+ exam was one of the hardest tests that I have EVER TAKEN. If it wasn’t for this book I never would have passed. It is very well written to help you understand the different aspects that you need to know to pass the exam. Don’t waste your money on brain dumps that you hope are the questions that will be on the test. This book helped me understand not only the fundamentals that I needed to know, but all of the topics needed for me to successfully pass the exam. This guy really knows what he is talking about when it comes to the Security+ subject matter.I also studied my knowledge that I learned from this book with his other book “CompTIA Security+ Practice Tests SY0-501.” One I was able to answer the practice tests, it made me feel more confident when it was time to take the actual exam. I have looked at a lot of other study material that is on the market today and the reason that I chose this authors books is because my friends and coworkers all used his material for their exams and were very satisfied. When I read the material, it was easier to read, comprehend and absorb.This book is a MUST HAVE to pass!
Amazon Verified review Amazon
Roberto Reyes Oct 30, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
A group of us went and bought this book because it was recommended to us and we were all successful in passing because of the correct content and straight to the point information material this book had. I really enjoyed the tips the book had and I will continue to share it with more people so they can also learn even though my IT knowledge was low I read this book and have left with more knowledge than when I first began. Highly recommend
Amazon Verified review Amazon
Jacob Jul 26, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book really helped me out. It’s really big on know the concepts so learn everything about the different subjects in a way that makes sense
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.