This blog is here to help those preparing for CompTIA exams. This is designed to help the exam candidate to understand the concepts, rather than trust a brain dump. CHECK OUT THE BLOG INDEXES!!!
CompTIA Security+ Exam Notes
Thursday, April 23, 2020
Mission Essential Functions / Critical Systems
Wednesday, April 22, 2020
Media Sanitization Methods - Hard Drive / Paper
1. One method is shredding. You must disassemble the drive, take the platters, and run them through a shredder.
2. The other method is to use powerful magnets. This is typically done with specialized machinery that can be quite costly. If you have had several dives, the degaussing method is the fastest of the two options.
3. Another method is to use pulverizing, in which a machine crushes the drive to destroy all components, making the data unrecoverable.
If the plan is to repurpose the drives, the best method is to employ a disk wiping/overwriting program. It is better to use a program that writes random patterns of ones and zeroes. Even if all you use is the zero-filling approach, specialized tools can still recover data. Wiping is also known as purging.
Formatting will not help with wiping data. All it does is remove the reference to the data.
Solid State Drives sometimes come with a built-in data sanitization tool. Degaussing will not work on SSDs.
It is best to use a cross-cut shredder. Some of these devices are rated according to the size of the cut they make.
Another method is that some high-security organizations add water to the paper after it has been shredded. This displaces the ink, and it is known as "Pulling."
You can also burn paper documents. We did this in the military. Since the information we had was considered Top Secret, we burned the paper in an incinerator with a screen at the top to keep the ashes from floating off. Then, we pulverized the ashes.
Monday, April 20, 2020
Identity and Authentication Factors
Sunday, April 19, 2020
Certificates - PKI (Public Key Infrastructure)
Types of Certificates
Saturday, April 18, 2020
SSL/TLS Accelerator vs SSL Decryptor
Hashing Algorithms: MD5, SHA, RIPEMD, & HMAC
HASHING
Hashing is used for many reasons:
1. The most common and widely used methods are with passwords. When an individual login to the PC their password is hashed and matched against the hashes that are stored if it matches the user is authenticated.
2. Sometimes hashing is used to make sure financial records have not been changed. This process can be performed daily, weekly, or monthly. This is referred to as "file integrity monitoring."
3. File integrity monitoring can be used to check the hash value of image files. If the "hash value has changed" on website images, or other images being sent or stored at the organization, then the most likely explanation is someone is using "steganography" to hide stolen data.
4. Running a file integrity program to check configuration files on network devices to compare them to the previous week or months hashes to look for changes.
5. Vendors sometimes provide these for applications, patches, and updates to verify you received the entire download or that it has not been modified. You would need to run a hashing algorithm to see if the hash matches that on the website.