9780138225575_Sample
9780138225575_Sample
Exam Cram
Companion Website and Pearson Test Prep Access Code
Access interactive study tools on this book’s companion website, including
practice test software, Key Term flash card application, the essential Cram
Sheet, and more!
To access the companion website, simply follow these steps:
1. Go to www.pearsonitcertification.com/register.
6. Under the book listing, click on the Access Bonus Content link.
When you register your book, your Pearson Test Prep practice test access code
will automatically be populated with the book listing under the Registered
Products tab. You will need this code to access the practice test that comes
with this book. You can redeem the code at PearsonTestPrep.com. Simply
choose Pearson IT Certification as your product group and log into the site
with the same credentials you used to register your book. Click the Activate
New Product button and enter the access code. More detailed instructions on
how to redeem your access code for both the online and desktop versions can
be found on the companion website.
If you have any issues accessing the companion website or obtaining your
Pearson Test Prep practice test access code, you can contact our support team
by going to pearsonitp.echelp.org.
This page intentionally left blank
CompTIA ®
Security+
SY0-701
Exam Cram
Robert Shimonski
Marty M. Weiss
CompTIA® Security+ SY0-701 Exam Cram GM K12, Early
Career and
Robert Shimonski and Marty M. Weiss Professional
Copyright © 2025 by Pearson Education, Inc. Learning
All rights reserved. This publication is protected by copyright, and Soo Kang
permission must be obtained from the publisher prior to any prohibited reproduc-
Director,
tion, storage in a retrieval system, or transmission in any form or
ITP Product
by any means, electronic, mechanical, photocopying, recording, or likewise. For
Management
information regarding permissions, request forms, and the appropriate
contacts within the Pearson Education Global Rights & Permissions Department, Brett Bartow
please visit www.pearson.com/permissions. Executive Editor
No patent liability is assumed with respect to the use of the information Nancy Davis
contained herein. Although every precaution has been taken in the preparation of
this book, the publisher and author assume no responsibility for errors or omis- Development
sions. Nor is any liability assumed for damages resulting from the use of the Editor
information contained herein. Ellie C. Bru
Microsoft and/or its respective suppliers make no representations about the
suitability of the information contained in the documents and related graphics Managing Editor
published as part of the services for any purpose all such documents and related Sandra Schroeder
graphics are provided “as is” without warranty of any kind. Microsoft and/or its
respective suppliers hereby disclaim all warranties and conditions with regard to Senior Project
this information, including all warranties and conditions of merchantability, Editor
whether express, implied or statutory, fitness for a particular purpose, title and Mandie Frank
non-infringement. In no event shall Microsoft and/or its respective suppliers
be liable for any special, indirect or consequential damages or any damages Copy Editor
whatsoever resulting from loss of use, data or profits, whether in an action of Bart Reed
contract, negligence or other tortious action, arising out of or in connection with
the use or performance of information available from the services. Indexer
The documents and related graphics contained herein could include technical inac- Erika Millen
curacies or typographical errors. Changes are periodically added to the information Proofreader
herein. Microsoft and/or its respective suppliers may make improvements and/or
Jennifer Hinchliffe
changes in the product(s) and/or the program(s) described herein at any time. Partial
screen shots may be viewed in full within the software version specified. Technical Editors
Microsoft® Windows®, and Microsoft Office® are registered trademarks of the Raymond Lacoste
Microsoft Corporation in the U.S.A. and other countries. This book is not
sponsored or endorsed by or affiliated with the Microsoft Corporation. Christopher Crayton
Please contact us with concerns about any potential bias at Publishing
https://www.pearson.com/report-bias.html. Coordinator
ISBN-13: 978-0-13-822557-5 Cindy Teeters
ISBN-10: 0-13-822557-5
Designer
Library of Congress Cataloging-in-Publication Data: 2024909527
Chuti Prasertsith
$PrintCode
Compositor
Trademarks codeMantra
All terms mentioned in this book that are known to be trademarks or service
marks have been appropriately capitalized. Pearson IT Certification cannot attest
to the accuracy of this information. Use of a term in this book should not be
regarded as affecting the validity of any trademark or service mark.
Special Sales
For information about buying this title in bulk quantities, or for special sales
opportunities (which may include electronic versions; custom cover designs; and
content particular to your business, training goals, marketing focus, or branding
interests), please contact our corporate sales department at
[email protected] or (800) 382-3419.
For government sales inquiries, please contact
[email protected].
For questions about sales outside the U.S., please contact
[email protected].
Contents at a Glance
Introduction
xxvi
CHAPTER 1:
Security Controls.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Nature of Controls. . . . . . . . . .............................. 3
Functional Use of Controls. . . .............................. 4
Preventive Controls. . . . .............................. 5
Deterrent Controls.. . . . .............................. 5
Detective Controls. . . . . .............................. 6
Corrective Controls. . . . .............................. 6
Compensating Controls. .............................. 6
Directive Controls. . . . . .............................. 7
What Next?. . . . . . . . . . . . . . .............................. 9
CHAPTER 2:
Fundamental Security Concepts.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Confidentiality, Integrity, and Availability (CIA). . . . . . ............ 12
Non-Repudiation. . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 13
Authentication, Authorization, and Accounting (AAA). . ............ 13
Gap Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 14
Zero Trust. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 15
Physical Security. . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 18
Bollards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 19
Access Control Vestibules. . . . . . . . . . . . . . . . . ............ 19
Signs, Fencing, and Gates. . . . . . . . . . . . . . . . . ............ 20
Video Surveillance. . . . . . . . . . . . . . . . . . . . . . . . . . ............ 20
Security Guards. . . . . . . . . . . . . . . . . . . . . . . . ............ 21
Access Badge. . . . . . . . . . . . . . . . . . . . . . . . . . ............ 21
Lighting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 21
Sensors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 22
Deception and Disruption Technology. . . . . . . . . . . . ............ 23
What Next?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 26
viii
CompTIA® Security+ SY0-701 Exam Cram
CHAPTER 3:
Change Management Processes and the Impact to Security. . . . . . . . . . . 27
Change Management. . . . . . . . . . . . . . . . . . . . . ............... 28
Business Processes Impacting Security Operations. ............... 28
Approval Process. . . . . . . . . . . . . . . . . . . . ............... 29
Ownership. . . . . . . . . . . . . . . . . . . . . . . . ............... 29
Stakeholders. . . . . . . . . . . . . . . . . . . . . . . ............... 29
Impact Analysis. . . . . . . . . . . . . . . . . . . . . ............... 30
Test Results. . . . . . . . . . . . . . . . . . . . . . . . ............... 30
Backout Plan. . . . . . . . . . . . . . . . . . . . . . . ............... 30
Maintenance Window. . . . . . . . . . . . . . . . . ............... 30
Standard Operating Procedure (SOP). . . . . . ............... 31
Technical Implications.. . . . . . . . . . . . . . . . . . . . ............... 31
Allow Lists/Deny Lists. . . . . . . . . . . . . . . . ............... 32
Restricted Activities. . . . . . . . . . . . . . . . . . ............... 32
Downtime. . . . . . . . . . . . . . . . . . . . . . . . . ............... 32
Service Restart. . . . . . . . . . . . . . . . . . . . . . ............... 33
Application Restart. . . . . . . . . . . . . . . . . . . ............... 33
Legacy Applications. . . . . . . . . . . . . . . . . . ............... 34
Dependencies. . . . . . . . . . . . . . . . . . . . . . ............... 34
Documentation. . . . . . . . . . . . . . . . . . . . . . . . . ............... 35
Version Control. . . . . . . . . . . . . . . . . . . . . . . . . ............... 36
What Next?. . . . . . . . . . . . . . . . . . . . . . . . . . . . ............... 38
CHAPTER 4:
Cryptographic Solutions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Public Key Infrastructure (PKI). . . . . . . ...................... 40
Public and Private Key Usage. . . . ...................... 41
Key Escrow. . . . . . . . . . . . . . . . . ...................... 42
Encryption. . . . . . . . . . . . . . . . . . . . . ...................... 43
Levels and Types. . . . . . . . . . . . . ...................... 44
Cryptographic Algorithms. . . . . . . ...................... 49
Symmetric Algorithms. . . . . . . . . ...................... 51
Asymmetric Algorithms.. . . . . . . . ...................... 53
Tools.. . . . . . . . . . . . . . . . . . . . . . . . . ...................... 55
Trusted Platform Module (TPM). . ...................... 55
Encryption and Data Obfuscation. ...................... 59
Steganography. . . . . . . . . . . . . . . ...................... 62
Hashing and Salting. . . . . . . . . . . ...................... 63
ix
Contents
CHAPTER 5:
Threat Actors and Motivations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Threat Actors.. . . . . . . . . . . . . . . . ......................... 84
Threat Actor Attributes.. . . . . ......................... 84
Types of Threat Actors. . . . . . ......................... 85
Motivations. . . . . . . . . . . . . . . . . . ......................... 90
Data Exfiltration. . . . . . . . . . ......................... 90
Espionage. . . . . . . . . . . . . . . ......................... 91
Service Disruption. . . . . . . . . ......................... 91
Blackmail. . . . . . . . . . . . . . . ......................... 92
Financial Gain. . . . . . . . . . . . ......................... 92
Philosophical/Political Beliefs. ......................... 92
Ethical. . . . . . . . . . . . . . . . . ......................... 93
Revenge. . . . . . . . . . . . . . . . ......................... 93
Disruption/Chaos.. . . . . . . . . ......................... 93
War. . . . . . . . . . . . . . . . . . . ......................... 94
What Next?. . . . . . . . . . . . . . . . . . ......................... 96
CHAPTER 6:
Threat Vectors and Attack Surfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Types of Threat Vectors and Attack Surfaces. . .................. 98
Message-Based.. . . . . . . . . . . . . . . . . . .................. 99
Image-Based. . . . . . . . . . . . . . . . . . . . .................. 101
File-Based. . . . . . . . . . . . . . . . . . . . . . .................. 101
Voice Call. . . . . . . . . . . . . . . . . . . . . . .................. 102
Removable Device. . . . . . . . . . . . . . . . .................. 102
Vulnerable Software. . . . . . . . . . . . . . . .................. 103
Unsupported Systems and Applications. . .................. 103
Unsecured Networks. . . . . . . . . . . . . . .................. 104
Open Service Ports.. . . . . . . . . . . . . . . .................. 104
x
CompTIA® Security+ SY0-701 Exam Cram
CHAPTER 7:
Vulnerability Types.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Application. . . . . . . . . . ................................. 116
Operating System-Based. ................................. 118
Web-Based. . . . . . . . . . ................................. 119
Hardware. . . . . . . . . . . ................................. 120
Virtualization. . . . . . . . . ................................. 121
Cloud-Specific. . . . . . . . ................................. 122
Supply Chain. . . . . . . . . ................................. 123
Cryptographic. . . . . . . . ................................. 125
Misconfiguration. . . . . . ................................. 126
Mobile Device. . . . . . . . ................................. 127
Zero-Day. . . . . . . . . . . ................................. 127
What Next?. . . . . . . . . . ................................. 130
CHAPTER 8:
Malicious Attacks and Indicators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Malware Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 132
Ransomware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 133
Trojan.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 133
Worm.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 134
Spyware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 134
Bloatware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 135
Virus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 136
Keylogger. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 136
Logic Bomb. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 136
Rootkit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 137
Physical Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 138
Brute-Force Attack. . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 138
Radio Frequency Identification (RFID) Cloning Attack.. ....... 138
Environmental Attack. . . . . . . . . . . . . . . . . . . . . . . . . ....... 139
Network Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 139
Distributed Denial of Service (DDoS).. . . . . . . . . . . . . ....... 140
Domain Name System (DNS) Attacks.. . . . . . . . . . . . . ....... 142
xi
Contents
CHAPTER 9
Mitigation Techniques for Securing the Enterprise.. . . . . . . . . . . . . . . . . . 161
Segmentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 162
Access Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 162
Application Allow List.. . . . . . . . . . . . . . . . . . . . . . . ............ 164
Isolation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 165
Patching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 165
Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 166
Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 167
Least Privilege. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 167
Configuration Enforcement. . . . . . . . . . . . . . . . . . . . ............ 167
Decommissioning. . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 168
Hardening Techniques. . . . . . . . . . . . . . . . . . . . . . . ............ 168
Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 168
Installation of Endpoint Protection.. . . . . . . . . . ............ 169
Host-based Firewall. . . . . . . . . . . . . . . . . . . . . ............ 170
Host-based Intrusion Prevention System (HIPS). ............ 170
Disabling Ports/Protocols. . . . . . . . . . . . . . . . . ............ 171
Default Password Changes. . . . . . . . . . . . . . . . ............ 173
Removal of Unnecessary Software. . . . . . . . . . . ............ 173
What Next?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............ 176
xii
CompTIA® Security+ SY0-701 Exam Cram
CHAPTER 10:
Security Implications of Architecture Models. . . . . . . . . . . . . . . . . . . . . . 179
Architecture and Infrastructure Concepts. . . . . . . . . . . . . . . . . . . . . . 180
Cloud. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Infrastructure as Code (IaC). . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Serverless. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Microservices.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Network Infrastructure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
On-Premises. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Centralized vs. Decentralized.. . . . . . . . . . . . . . . . . . . . . . . . . . 192
Containerization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Virtualization.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
IoT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Industrial Control Systems (ICS)/Supervisory Control and Data
Acquisition (SCADA). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Real-Time Operating System (RTOS). . . . . . . . . . . . . . . . . . . . 200
Embedded Systems.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
High Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Resilience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Cost. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Responsiveness.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Scalability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Ease of Deployment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Risk Transference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Ease of Recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Patch Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Inability to Patch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Power. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Compute.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
What Next?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
CHAPTER 11:
Enterprise Architecture Security Principles. . . . . . . . . . . . . . . . . . . . . . . . 211
Infrastructure Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Device Placement.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Security Zones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
xiii
Contents
CHAPTER 12:
Data Protection Strategies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Data Types. . . . . . . . . . . . . . . . . . . . . . . .................... 234
Regulated. . . . . . . . . . . . . . . . . . . . .................... 234
Trade Secret. . . . . . . . . . . . . . . . . . .................... 235
Intellectual Property. . . . . . . . . . . . . .................... 235
Legal Information. . . . . . . . . . . . . . .................... 236
Financial Information. . . . . . . . . . . . .................... 236
Human- and Non-Human-Readable.. .................... 236
Data Classifications.. . . . . . . . . . . . . . . . . .................... 237
General Data Considerations. . . . . . . . . . . .................... 238
Data States. . . . . . . . . . . . . . . . . . . .................... 239
Data Sovereignty. . . . . . . . . . . . . . . .................... 239
Geolocation.. . . . . . . . . . . . . . . . . . .................... 240
Methods to Secure Data. . . . . . . . . . . . . . .................... 240
Geographic Restrictions. . . . . . . . . . .................... 240
Encryption. . . . . . . . . . . . . . . . . . . .................... 241
Hashing. . . . . . . . . . . . . . . . . . . . . .................... 241
Masking. . . . . . . . . . . . . . . . . . . . . .................... 242
Tokenization. . . . . . . . . . . . . . . . . . .................... 242
Obfuscation. . . . . . . . . . . . . . . . . . . .................... 242
Segmentation.. . . . . . . . . . . . . . . . . .................... 243
Permission Restrictions. . . . . . . . . . . .................... 243
What Next?. . . . . . . . . . . . . . . . . . . . . . . .................... 246
xiv
CompTIA® Security+ SY0-701 Exam Cram
CHAPTER 13:
Resilience and Recovery in Security Architecture. . . . . . . . . . . . . . . . . . . 247
High Availability.. . . . . . . ................................ 248
Site Considerations.. . . . . ................................ 249
Platform Diversity. . . . . . ................................ 251
Multicloud Systems.. . . . . ................................ 252
Continuity of Operations.. ................................ 252
Capacity Planning. . . . . . ................................ 253
Testing. . . . . . . . . . . . . . ................................ 254
Backups.. . . . . . . . . . . . . ................................ 255
Onsite/Offsite. . . . . ................................ 257
Frequency. . . . . . . . ................................ 258
Encryption. . . . . . . ................................ 258
Snapshots. . . . . . . . ................................ 259
Recovery. . . . . . . . . ................................ 260
Replication. . . . . . . ................................ 260
Journaling. . . . . . . . ................................ 261
Power. . . . . . . . . . . . . . . ................................ 261
What Next?. . . . . . . . . . . ................................ 264
CHAPTER 14:
Securing Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Secure Baselines. . . . . . . . . . . . . . . . . . . . .................... 268
Hardening Targets. . . . . . . . . . . . . . . . . . .................... 270
Mobile Devices. . . . . . . . . . . . . . . . .................... 270
Workstations. . . . . . . . . . . . . . . . . . .................... 271
Switches. . . . . . . . . . . . . . . . . . . . . .................... 272
Routers. . . . . . . . . . . . . . . . . . . . . . .................... 273
Cloud Infrastructure. . . . . . . . . . . . . .................... 273
Servers. . . . . . . . . . . . . . . . . . . . . . .................... 274
ICS/SCADA. . . . . . . . . . . . . . . . . . .................... 275
Embedded Systems.. . . . . . . . . . . . . .................... 276
RTOS.. . . . . . . . . . . . . . . . . . . . . . .................... 277
IoT Devices.. . . . . . . . . . . . . . . . . . .................... 277
Wireless Devices. . . . . . . . . . . . . . . . . . . .................... 278
Mobile Solutions. . . . . . . . . . . . . . . . . . . .................... 281
Mobile Device Management (MDM). .................... 282
xv
Contents
CHAPTER 15:
Hardware, Software, and Data Asset Management. . . . . . . . . . . . . . . . . . 295
Acquisition/Procurement Process. . .......................... 296
Assignment/Accounting.. . . . . . . . .......................... 297
Ownership. . . . . . . . . . . . . .......................... 297
Classification. . . . . . . . . . . . .......................... 297
Monitoring and Asset Tracking.. . . .......................... 299
Inventory. . . . . . . . . . . . . . .......................... 300
Enumeration. . . . . . . . . . . . .......................... 300
Disposal/Decommissioning. . . . . . .......................... 300
Sanitization. . . . . . . . . . . . . .......................... 301
Destruction. . . . . . . . . . . . . .......................... 302
Certification. . . . . . . . . . . . .......................... 302
Data Retention. . . . . . . . . . .......................... 303
What Next?. . . . . . . . . . . . . . . . . .......................... 305
CHAPTER 16:
Vulnerability Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Identification Methods. . . . . . . . . . . . ....................... 308
Vulnerability Scan. . . . . . . . . . . ....................... 308
Application Security. . . . . . . . . . ....................... 309
Threat Feeds. . . . . . . . . . . . . . . ....................... 311
Penetration Testing. . . . . . . . . . ....................... 314
Responsible Disclosure Program. ....................... 316
System/Process Audit. . . . . . . . . ....................... 316
Analysis. . . . . . . . . . . . . . . . . . . . . . . ....................... 316
xvi
CompTIA® Security+ SY0-701 Exam Cram
CHAPTER 17:
Security Alerting and Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Monitoring Computing Resources. . . . . . . . . . . . . . ............. 330
Systems.. . . . . . . . . . . . . . . . . . . . . . . . . . . . ............. 330
Applications.. . . . . . . . . . . . . . . . . . . . . . . . . ............. 330
Infrastructure.. . . . . . . . . . . . . . . . . . . . . . . . ............. 331
Activities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............. 332
Log Aggregation. . . . . . . . . . . . . . . . . . . . . . ............. 332
Alerting. . . . . . . . . . . . . . . . . . . . . . . . . . . . ............. 333
Scanning. . . . . . . . . . . . . . . . . . . . . . . . . . . . ............. 334
Reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . ............. 334
Archiving. . . . . . . . . . . . . . . . . . . . . . . . . . . ............. 334
Alert Response and Remediation/Validation.. . . ............. 335
Tools.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............. 336
Security Content Automation Protocol (SCAP). ............. 336
Benchmarks.. . . . . . . . . . . . . . . . . . . . . . . . . ............. 337
Agents/Agentless. . . . . . . . . . . . . . . . . . . . . . ............. 337
xvii
Contents
CHAPTER 18:
Enterprise Security Capabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 350
Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 350
Access Lists. . . . . . . . . . . . . . . . . . . . . . . . . .............. 352
Ports/Protocols. . . . . . . . . . . . . . . . . . . . . . .............. 353
Screened Subnet. . . . . . . . . . . . . . . . . . . . . .............. 353
IDS/IPS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 354
Trends. . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 355
Signatures. . . . . . . . . . . . . . . . . . . . . . . . . . .............. 356
Web Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 357
Agent-Based. . . . . . . . . . . . . . . . . . . . . . . . .............. 358
Centralized Proxy.. . . . . . . . . . . . . . . . . . . . .............. 359
Universal Resource Locator (URL) Scanning.. .............. 360
Content Categorization.. . . . . . . . . . . . . . . . .............. 360
Block Rules. . . . . . . . . . . . . . . . . . . . . . . . . .............. 360
Reputation. . . . . . . . . . . . . . . . . . . . . . . . . .............. 361
Operating System Security.. . . . . . . . . . . . . . . . . . .............. 361
Group Policy. . . . . . . . . . . . . . . . . . . . . . . . .............. 362
SELinux. . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 363
Implementation of Secure Protocols. . . . . . . . . . . . .............. 363
Protocol Selection. . . . . . . . . . . . . . . . . . . . .............. 363
Port Selection. . . . . . . . . . . . . . . . . . . . . . . .............. 365
Transport Method. . . . . . . . . . . . . . . . . . . . .............. 365
DNS Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 366
Email Security. . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 367
DMARC, DKIM, SPF, and Gateway.. . . . . . . .............. 368
File Integrity Monitoring. . . . . . . . . . . . . . . . . . . .............. 369
Data Loss Prevention (DLP). . . . . . . . . . . . . . . . . .............. 370
Network Access Control (NAC). . . . . . . . . . . . . . . .............. 371
xviii
CompTIA® Security+ SY0-701 Exam Cram
CHAPTER 19:
Identity and Access Management.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Provisioning/De-provisioning User Accounts. . .................. 378
Permission Assignments and Implications. . . . .................. 379
Identity Proofing. . . . . . . . . . . . . . . . . . . . . .................. 381
Federation and Single Sign-On (SSO). . . . . . . .................. 382
Interoperability. . . . . . . . . . . . . . . . . . . . . . .................. 385
Attestation. . . . . . . . . . . . . . . . . . . . . . . . . . .................. 385
Access Controls. . . . . . . . . . . . . . . . . . . . . . .................. 386
Multifactor Authentication (MFA).. . . . . . . . . .................. 388
Implementations. . . . . . . . . . . . . . . . . .................. 389
Factors. . . . . . . . . . . . . . . . . . . . . . . . .................. 394
Password Concepts. . . . . . . . . . . . . . . . . . . . .................. 395
Password Managers. . . . . . . . . . . . . . . .................. 397
Passwordless. . . . . . . . . . . . . . . . . . . . .................. 397
Privileged Access Management Tools. . . . . . . .................. 397
What Next?. . . . . . . . . . . . . . . . . . . . . . . . . .................. 400
CHAPTER 20:
Security Automation and Orchestration. . . . . . . . . . . . . . . . . . . . . . . . . . 401
Use Cases of Automation and Scripting. . . . . . . . . . . . . . . . . . . . . ... 402
User and Resource Provisioning.. . . . . . . . . . . . . . . . . . . . . ... 402
Guard Rails. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... 403
Security Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... 403
Ticket Creation and Escalation. . . . . . . . . . . . . . . . . . . . . . ... 403
Enabling/Disabling Services and Access. . . . . . . . . . . . . . . . ... 404
Continuous Integration and Testing. . . . . . . . . . . . . . . . . . . ... 404
Integrations and Application Programming Interfaces (APIs). . ... 405
Benefits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... 405
Other Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... 406
What Next?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... 408
xix
Contents
CHAPTER 21:
Incident Response Activities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Incident Response Process. . ............................... 410
Training and Testing. . . . . . ............................... 411
Root Cause Analysis (RCA). ............................... 412
Threat Hunting. . . . . . . . . ............................... 413
Digital Forensics. . . . . . . . ............................... 414
What Next?. . . . . . . . . . . . ............................... 417
CHAPTER 22:
Data Sources for Supporting Investigations. . . . . . . . . . . . . . . . . . . . . . . 419
Log Data.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Data Sources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
What Next?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
CHAPTER 23:
Effective Security Governance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Governing Framework. . . . . . . . . . . . . . . . . . . . . .............. 428
Types of Governance Structures. . . . . . . . . . . .............. 430
Monitoring and Revision.. . . . . . . . . . . . . . . .............. 432
Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 433
Acceptable Use Policy (AUP).. . . . . . . . . . . . .............. 433
Information Security Policy. . . . . . . . . . . . . . .............. 435
Business Continuity Policies. . . . . . . . . . . . . .............. 437
Disaster Recovery Policies.. . . . . . . . . . . . . . .............. 438
Incident Response Policy.. . . . . . . . . . . . . . . .............. 440
Software Development Lifecycle Policy. . . . . .............. 441
Change Management Policy. . . . . . . . . . . . . .............. 443
Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 445
Procedures.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 447
Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 452
External Considerations. . . . . . . . . . . . . . . . . . . . .............. 453
Regulatory and Nonregulatory Requirements. .............. 455
Industry-Specific Frameworks. . . . . . . . . . . . .............. 458
Roles and Responsibilities for Systems and Data. . . . .............. 460
What Next?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. 464
xx
CompTIA® Security+ SY0-701 Exam Cram
CHAPTER 24:
Risk Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Risk Identification. . . . . . . . . . . . .......................... 466
Risk Assessment. . . . . . . . . . . . . . .......................... 466
Risk Analysis. . . . . . . . . . . . . . . . .......................... 468
Qualitative Risk Analysis. . . . .......................... 469
Quantitative Risk Analysis. . . .......................... 470
Single Loss Expectancy. . . . . .......................... 471
Annual Rate of Occurrence. . .......................... 471
Annual Loss Expectancy. . . . .......................... 472
Risk Register. . . . . . . . . . . . . . . . .......................... 472
Risk Appetite and Tolerance. . . . . . .......................... 474
Risk Management Strategies. . . . . .......................... 475
Risk Reporting. . . . . . . . . . . . . . . .......................... 477
Business Impact Analysis. . . . . . . . .......................... 478
RTO and RPO.. . . . . . . . . . .......................... 479
MTTF, MTBF, and MTTR.. .......................... 479
What Next?. . . . . . . . . . . . . . . . . .......................... 483
CHAPTER 25:
Third-Party Risk Assessment and Management. . . . . . . . . . . . . . . . . . . . 485
Third-Party Risk Management.. ............................ 486
Vendor Assessment. . . . . . ............................ 486
Vendor Selection. . . . . . . ............................ 488
Agreement Types. . . . . . . ............................ 489
Vendor Monitoring. . . . . ............................ 491
Rules of Engagement. . . . ............................ 492
What Next?. . . . . . . . . . . . . . . ............................ 494
CHAPTER 26:
Security Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Compliance Reporting and Monitoring. . . ..................... 496
Compliance Reporting. . . . . . . . . . ..................... 496
Consequences of Non-Compliance.. ..................... 497
Compliance Monitoring. . . . . . . . . ..................... 499
Privacy. . . . . . . . . . . . . . . . . . . . . . . . . ..................... 501
Privacy Data Roles. . . . . . . . . . . . . ..................... 501
Data Inventory and Retention. . . . . ..................... 503
xxi
Contents
CHAPTER 27:
Security Audits and Assessments.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Audits and Assessments. . . . . . . . . . . . . . . .................... 510
Attestation.. . . . . . . . . . . . . . . . . . . .................... 510
Internal Audits and Assessments. . . . . .................... 511
External Audits and Assessments.. . . . .................... 512
Penetration Testing.. . . . . . . . . . . . . . . . . .................... 513
Active and Passive Reconnaissance. . . .................... 516
Physical Tests.. . . . . . . . . . . . . . . . . .................... 517
Offensive, Defensive, and Integrated. . .................... 518
Penetration Test Environments. . . . . .................... 520
What Next?. . . . . . . . . . . . . . . . . . . . . . . .................... 523
CHAPTER 28:
Security Awareness Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
Security Awareness. . . . . . . . . . . . . . . . ...................... 526
Phishing Campaigns. . . . . . . . . . . ...................... 526
Anomalous Behavior Recognition.. ...................... 532
User Guidance and Training. . . . . ...................... 533
Reporting and Monitoring.. . . . . . ...................... 542
Development and Execution. . . . . ...................... 545
What Next?. . . . . . . . . . . . . . . . . . . . . ...................... 550
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
About the Authors
Robert Shimonski, CASP+, CySA+, PenTest+, Security+, is a technology
executive specializing in healthcare IT for one of the largest health systems
in America. In his current role, Rob is responsible for bringing operational
support and incident response into the future with the help of new technolo-
gies such as cloud and artificial intelligence. His current focus is on deploying
securely to the cloud (Azure, AWS, and Google), DevOps, DevSecOps, and
AIOps. Rob spent many years in the technology “trenches,” handling network-
ing and security architecture, design, engineering, testing, and development
efforts for global projects. A go-to person for all things security related, Rob
has been a major force in deploying security-related systems for 25+ years.
Rob also worked for various companies reviewing and developing security
curriculum as well as other security-related books, technical articles, and pub-
lications based on technology deployment, testing, hacking, pen testing, and
many other aspects of security. Rob holds dozens of technology certifications,
including 20+ CompTIA certifications, SANS.org GIAC, GSEC, and GCIH,
as well as many vendor-based cloud-specialized certifications from Google,
Microsoft Azure, and Amazon AWS. Rob is considered a leading expert in
prepping others to achieve certification success.
Marty M. Weiss has spent his career serving in the U.S. Navy and as a civilian
helping large organizations with their information security. He has a Bachelor
of Science degree in computer studies from the University of Maryland
Global Campus and an MBA from the Isenberg School of Management at
the University of Massachusetts Amherst. He also holds several certifications,
including CISSP, CISA, and Security+. Having authored numerous acclaimed
books on information technology and security, he is now diving into his next
endeavor—a seductive romance novel where love and cybersecurity collide in a
high-stakes adventure.
Dedications
This book is dedicated to my dad, who passed during the writing of this book.
Thank you for being a great dad. You will always be remembered and missed.
—Robert Shimonski
Acknowledgments
Robert Shimonski: Thank you to the entire team that made this book a
reality. Countless people were involved, including Carole Jelen, Nancy Davis,
Ellie Bru, Chris Crayton, Mandie Frank, Bart Reed, and Raymond Lacoste.
Without your help, this book would never be as good as it is! Also, to my
co-author Marty, thanks for being a great teammate. I would also like to thank
you, the reader, for showing interest in not only growing through learning but
for trusting our brand. Thank you!
Marty Weiss: Thank you Carole, Nancy, Ellie, Mandie, Robert, Raymond,
Chris, Bart, and the entire team that helped to bring this book together. Big
thanks to everyone special and close to me—mom, dad, siblings, 5 a.m. dream
team, Kelly, Kobe, Max, Ollie, and Anabelle. Finally, thank you Elliott for
reminding us that they should not control the digital ledger.
About the Technical Reviewers
Raymond Lacoste has dedicated his career to developing the skills of those
interested in IT. In 2001, he began to mentor hundreds of IT professionals
pursuing their Cisco certification dreams. This role led to teaching Cisco courses
full time. Raymond is currently a master instructor for Cisco Enterprise Routing
and Switching, AWS, ITIL, and Cybersecurity at StormWind Studios. Raymond
treats all technologies as an escape room, working to uncover every mystery in
the protocols he works with. Along this journey, Raymond has passed more than
120 exams, and his office wall includes certificates from Microsoft, Cisco, ISC2,
ITIL, AWS, and CompTIA. If you were visualizing Raymond’s office, you’d
probably expect the usual network equipment, certifications, and awards. Those
certainly take up space, but they aren’t his pride and joy. Most impressive, at least
to Raymond, is his gemstone and mineral collection; once he starts talking about
it, he just can’t stop. Who doesn’t get excited by a wondrous barite specimen in a
pyrite matrix? Raymond presently resides with his wife and two children in eastern
Canada, where they experience many adventures together.
Chris Crayton is a technical consultant, trainer, author, and industry-leading
technical editor. He has worked as a computer technology and networking
instructor, information security director, network administrator, network
engineer, and PC specialist. Chris has authored several print and online books
on PC repair, CompTIA A+, CompTIA Security+, and Microsoft Windows.
He has also served as technical editor and content contributor on numerous
technical titles for several of the leading publishing companies. He holds
numerous industry certifications, has been recognized with many professional
and teaching awards, and has served as a state-level SkillsUSA final competition
judge.
We Want to Hear from You!
As the reader of this book, you are our most important critic and commentator.
We value your opinion and want to know what we’re doing right, what we
could do better, what areas you’d like to see us publish in, and any other words
of wisdom you’re willing to pass our way.
We welcome your comments. You can email or write to let us know what you
did or didn’t like about this book—as well as what we can do to make our
books better.
Please note that we cannot help you with technical problems related to the topic of this book.
When you write, please be sure to include this book’s title and author as well
as your name and email address. We will carefully review your comments and
share them with the author and editors who worked on the book.
Email: [email protected]
Reader Services
Register your copy of CompTIA Security+ SY0-701 Exam Cram at
www.pearsonitcertification.com for convenient access to downloads, updates,
and corrections as they become available. To start the registration process, go
to www.pearsonitcertification.com/register and log in or create an account.*
Enter the product ISBN 9780138225575 and click Submit. When the process
is complete, you will find any available bonus content under Registered
Products.
*Be sure to check the box to indicate that you would like to hear from us to
receive exclusive discounts on future editions of this product.
Introduction
Welcome to CompTIA Security+ SY0-701 Exam Cram. This book helps you get
ready to take and pass the CompTIA Security+ SY0-701 exam.
This book is designed to remind you of everything you need to know to pass
the SY0-701 certification exam. Each chapter includes a number of practice
questions that should give you a reasonably accurate assessment of your
knowledge, and, yes, we’ve provided the answers and their explanations for
these questions. Read this book, understand the material, and you’ll stand a
very good chance of passing the real test.
Exam Cram books help you understand the subjects and materials you need
to know to pass CompTIA certification exams. Exam Cram books are aimed
strictly at test preparation and review. They do not teach you everything you
need to know about a subject. Instead, the authors streamline and highlight the
pertinent information by presenting and dissecting the
questions and problems they’ve discovered that you’re likely to encounter on a
CompTIA test.
We strongly recommend that you spend some time installing and working
with security tools and experimenting with the many network and security-
related resources provided with the various operating systems. The Security+
exam focuses on such activities and the knowledge and skills they can provide
you. Nothing beats hands-on experience and familiarity when it comes to
understanding the questions you’re likely to encounter on a certification test.
Book learning is essential, but without a doubt, hands-on experience is the best
teacher of all!
Let’s begin by looking at preparation for the exam.
(and confidence) you need to succeed. You just need to make sure you read it
and follow the guidance it provides throughout your Security+ journey.
Practice Tests
This book is filled with practice exam questions to get you ready! Cram quiz-
zes end each chapter, and each question also includes a complete explanation.
In addition, the book includes two additional full practice tests in the Pearson
Test Prep software, available to you either online or as an offline Windows
application. To access the practice exams developed with this book, see the
instructions in the “Pearson Test Prep Practice Test Software” section.
In case you are interested in more practice exams than are provided with this
book, Pearson IT Certification publishes a Premium Edition eBook and Prac-
tice Test product. In addition to providing, you with two eBook files (EPUB
and PDF), this product provides you with two additional exams’ worth of
questions. The Premium Edition version also offers you a link to the
specific section in the book that presents an overview of the topic covered in
the question, allowing you to easily refresh your knowledge. Learn more at
www.pearsonitcertification.com.
ExamAlert
You’ll be spending a lot of time in the exam room. Plan on using the full 90 minutes
allotted for your exam and surveys. Policies differ from location to location regarding
bathroom breaks, so check with the testing center before beginning the exam.
Note
Reading this book from start to finish is not necessary; it is set up so that you can
quickly jump back and forth to find sections you need to study.
Use the Cram Sheet to remember last-minute facts immediately before the
exam. Use the practice questions to test your knowledge. You can always brush
up on specific topics in detail by referring to the table of contents and the
index. Even after you achieve certification, you can use this book as a rapid-
access reference manual.
Exam Objectives
Table I.1 lists the skills the SY0-701 exam measures and the chapter in which
each objective is discussed.
xxx
CompTIA® Security+ SY0-701 Exam Cram
▶▶ Cram Quizzes
xxxii
CompTIA® Security+ SY0-701 Exam Cram
▶▶ ExamAlerts
▶▶ Notes
Note
Bulleted lists, numbered lists, tables, and graphics are also used where appropriate.
A picture can paint a thousand words sometimes, and tables can help to associate
different elements with each other visually.
ExamAlert
Make sure you remember the different ways in which you can access a router
remotely. Know which methods are secure and which are not.
Note
This is a note.
xxxiii
Introduction
4. Click the Access Bonus Content link under the product listing.
Note
After you register your book, your code can always be found in your account on the
Registered Products tab.
Once you have the access code, to find instructions about both the Pearson Test
Prep web app and the desktop app, follow these steps:
Step 1: Open this book’s companion website, as shown earlier in this
Introduction, under the heading, “Other Book Elements.”
Step 2: Click the Practice Test Software button.
Step 3: Follow the instructions listed there for both installing the desktop app
and using the web app.
Note that if you want to use the web app only at this point, just navigate to
pearsontestprep.com, log in using the same credentials used to register your
book or purchase the Premium Edition, and register this book’s practice tests
using the registration code you just found. The process should take only a
couple of minutes.
xxxv
Introduction
Study Mode allows you to fully customize your exams and review answers as
you are taking the exam. This is typically the mode you use first to assess your
knowledge and identify information gaps. Practice Exam Mode locks certain
customization options, as it presents a realistic exam experience. Use this mode
when you are preparing to test your exam readiness. Flash Card Mode strips
out the answers and presents you with only the question stem. This mode is
great for late-stage preparation, when you really want to challenge yourself to
provide answers without the benefit of seeing multiple-choice options. This
mode will not provide the detailed score reports that the other two modes will,
so it should not be used if you are trying to identify knowledge gaps.
In addition to these three modes, you can select the source of your questions.
You can choose to take exams that cover all of the chapters, or you can narrow
your selection to just a single chapter or the chapters that make up specific
parts in the book. All chapters are selected by default. If you want to narrow
your focus to individual chapters, simply deselect all the chapters and then
select only those on which you wish to focus in the Objectives area.
You can also select the exam banks on which to focus. Each exam bank comes
complete with an exam of targeted questions that cover topics in every chapter.
The Cram Quizzes printed in the book are available to you and two additional
exams of unique questions. You can have the test engine serve up exams from
all banks or just from one individual bank by selecting the desired banks in the
exam bank area.
There are several other customizations you can make to your exam from the
exam settings screen, such as the time you are allowed for taking the exam, the
number of questions served up, whether to randomize questions and answers,
whether to show the number of correct answers for multiple-answer questions,
and whether to serve up only specific types of questions. You can also create
custom test banks by selecting only questions that you have marked or
questions on which you have added notes.
xxxvi
CompTIA® Security+ SY0-701 Exam Cram
Figure Credits
Figure 8.1: WannaCry
Figure 18.4: WatchGuard Technologies, Inc.
Figure 18.1, 18.2, 18.5-18.7, 19.1: Microsoft Corporation
Figure 19.2: Apple, Inc
CHAPTER 24
Risk Management
This chapter covers the following official Security+
exam objective:
▶▶ 5.2 Explain elements of the risk management process.
Risk Identification
Risk identification is the initial step in the risk management process, aimed
at identifying potential threats and vulnerabilities that could adversely affect an
organization. This ensures that the organization can proactively address risks
through planning and implementation of security measures.
A threat can be thought of as the potential that a vulnerability will be identi-
fied and exploited. Analyzing threats can help an organization develop security
policies and prioritize securing resources. Threat assessments are performed to
determine the best approaches to securing the environment against a threat or
class of threats. Threats might exist, but if an environment has no vulnerabili-
ties, it faces little or no risk. Likewise, little or no risk affects environments that
have vulnerability without threat. Consider the simple analogy of a hurricane.
Few would argue that a hurricane represents a threat. However, consider a
home on the coast in Florida and a home inland in the Midwest. The former is
certainly vulnerable to a hurricane, whereas the latter is not.
Probability is the likelihood that an event will occur. In assessing risk, it is impor-
tant to estimate the probability or likelihood that a threat will occur. Assessing
the likelihood of occurrence of some types of threats is easier than assessing
other types. For example, you can use frequency data to estimate the probabil-
ity of natural disasters. You might also be able to use the mean time to failure
(MTTF) and mean time to repair (MTTR), both covered later in this chapter, to
estimate the probability of component problems. Determining the probability of
attacks by human threat sources is difficult. Threat source likelihood is assessed
using skill level, motive, opportunity, and size. Vulnerability likelihood is assessed
using ease of discovery, ease of exploit, awareness, and intrusion detection.
Risk Assessment
Risk assessment is the process of analyzing identified risks to evaluate the
likelihood of their occurrence and their potential impact. This evaluation is
required for prioritizing risks and formulating strategies to mitigate them
effectively.
467
Risk Assessment
Risk is the possibility of, or exposure to, loss or danger from a threat. Risk
management is the process of identifying and reducing risk to a level that is
acceptable and then implementing controls to maintain that level. Risk comes
in various types. Risk can be internal, external, or multiparty. Banks provide a
great example of multiparty risk: Because of the ripple effects, issues at banks
have effects on other banks and financial systems.
To determine the relative danger of an individual threat or to measure the
relative value across multiple threats to better allocate resources designated for
risk mitigation, it is necessary to map the resources, identify threats to each,
and establish a metric for comparison. A business impact analysis (BIA) helps
identify services and technology assets as well as provides a process by which
the relative value of each identified asset can be determined if it fails one or
more of the CIA (confidentiality, integrity, and availability) requirements. The
failure to meet one or more of the CIA requirements is often a sliding scale,
with increased severity as time passes. Recovery point objectives (RPOs) and
recovery time objectives (RTOs) in incident handling, business continuity, and
disaster recovery must be considered when calculating risk. BIA, RPOs, and
RTOs are covered further later in this chapter.
Risk assessments should rarely if ever be a one-time event for an organization. The
frequency with which these are conducted, however, can vary depending on various
factors regarding the organization’s risk landscape, regulatory requirements, and
level of change across their environments. For example, a small, stable private orga-
nization may find an annual risk assessment sufficient. On the other hand, a large,
dynamic organization operating across high-risk environments, where emerging
risks may pose challenges, should opt for more frequent assessments. Generally,
risk assessments are conducted adopting the following frequencies:
▶▶ Ad hoc
▶▶ One-time
▶▶ Recurring
▶▶ Continuous
Risk Analysis
Risk analysis helps align security objectives with business objectives. It is a pro-
cess that deals with the calculation of risk and the return on investment for secu-
rity measures. By identifying risks, estimating the effects of potential threats, and
identifying ways to mitigate these risks in a cost effective manner, organizations
can ensure that the cost of prevention does not outweigh the benefits.
The risk analysis process involves several key steps to assess and manage risk
effectively:
1. Identify threats: Recognize potential threats that could exploit
vulnerabilities.
2. Identify vulnerabilities: Determine weaknesses within the system that
could be exploited by threats.
3. Determine the likelihood of occurrence: Evaluate how probable it is
for a threat to occur and exploit a vulnerability.
4. Determine the magnitude of impact: Assess the potential severity of
the damage or loss if a threat materializes.
5. Determine the risk: Calculate the level of risk using the simple equation
Risk = Threat × Vulnerability × Impact.
469
Risk Analysis
ExamAlert
Risk is the product of threat, vulnerability, and impact.
The preceding matrix underscores the principle that risk is not just about the
potential for a threat to occur but also about the significance of its impact. By
categorizing risks into these levels, organizations can prioritize their risk man-
agement efforts more effectively, focusing on mitigating the most important
risks first.
Despite its subjective nature, and the need for expert judgment, qualitative
analysis provides essential insights into risk prioritization, especially when
quantitative data is unavailable.
ExamAlert
Remember the difference between quantitative (numeric) and qualitative (subjective/
relative) measures. Quantitative (think “quantity”) measures are expressed numeri-
cally, whereas qualitative (think “quality”) measures are expressed as “good” or
“bad.”
calculate the SLE, you can calculate the ALE, which gives you the probability
of an event happening over a single year.
ExamAlert
Remember the following for the exam:
▶▶ S
LE is the expected monetary loss every time a risk occurs, and it equals Asset
Value × Exposure Factor.
▶▶ A
RO is a numeric representation of the estimated possibility of a specific threat
taking place in a 1-year time frame.
▶▶ A
LE is the monetary loss that can be expected for an asset from risk over a
1-year period, and it equals SLE × ARO.
Risk Register
As mentioned earlier, risk assessments should not be a one-time event. As an
organization evolves, change is inevitable. Risk management needs to be part
of a framework from which risk can easily be communicated and adapted on an
ongoing basis.
A risk register gives an organization a way to record information about identi-
fied risks, and it’s usually implemented as a specialized software program, cloud
service, or master document. Risk registers often include enterprise- and IT-
related risks. With threats and vulnerabilities identified, the organizations can
then implement controls to manage the risk appropriately. (The next section
discusses these techniques.) The risk register should contain specific details
about the risks, especially any residual risks the organization faces as a result of
473
Risk Register
▶▶ Mitigating controls
▶▶ Residual risk
The items listed here are fundamental components of a risk register, provid-
ing a comprehensive overview of the organization’s potential and actual risk
landscape. However, to address the dynamic nature of risks, and to ensure an
effective and proactive approach to risk management, some other elements are
crucial and warrant further exploration.
These elements, namely key risk indicators (KRIs), risk owners, and risk
thresholds, enhance the risk register’s depth and effectiveness, ultimately
providing a more nuanced understanding of the organization’s risks.
KRIs function as early warning signs for potential increases in risk. By moni-
toring KRIs, organizations can catch and handle risk escalations before they
worsen and have an impact. KPIs measure and showcase trend lines of risk
exposure, offering a quantitative means to keep track of risk movements over
time. These KRIs, along with other features of a risk register, are an important
tool in the risk reporting process across key stakeholders.
Risk owners are individuals or teams designated with the responsibility of
managing specific risks. Assigning risk owners is valuable because it not only
encourages accountability but also ensures there’s a specific point of contact
and decision maker for each risk. It guarantees that the management of each
identified risk is streamlined and focused.
Finally, risk thresholds help an organization determine the maximum amount
of risk it can tolerate. This is a measure of the acceptable level of risk expo-
sure for the company. Once a risk crosses its respective threshold, it calls for
immediate attention. It triggers a response that could include escalated report-
ing, contingency plans, or mitigation strategies. Understanding risk thresholds
474
CHAPTER 24: Risk Management
helps in laying out a clear roadmap for when and what action needs to be taken
against the identified risks.
These items play a significant part in shaping the risk strategy of an organiza-
tion and provide more context and depth to the typical components of a risk
register.
ExamAlert
A risk register provides a single point of entry to record and report on information
about identified risks to the organization. Ad hoc and scheduled reports from a risk
register, along with KPIs and heat maps, provide useful tools for risk reporting. An
organization might have one risk register for information systems and another risk
register for enterprise risks, but the two are increasingly being combined.
The risk register serves as a strategic component for an organization and helps
ensure that an organization’s risk appetite and risk tolerance are correctly
aligned with the goals of the business.
These concepts are not unlike one’s own personal behavior and risk appetite,
even if subconscious. Consider, for example, your own personal values, goals,
and objectives. Consider what activities you may or may not participate in, or
how you personally choose to invest your savings and so forth.
Risk tolerance is the specific maximum risk that an organization is ready to
handle. While risk appetite is about the overall amount of risk an organization
is willing to accept, risk tolerance drills down to more specific scenarios or risk
categories. Risk tolerance is the degree of variability in outcomes that an orga-
nization is willing to withstand.
For example, an organization might have a high risk tolerance for financial
risks if it has strong cash reserves, but a low risk tolerance for reputational risks
that could harm its brand in the marketplace.
Understanding these two concepts enables organizations to effectively manage
risk in line with their strategic goals. They can select projects or make decisions
that align with their appetite and tolerance for risk. The risk appetite and toler-
ance also guide the organization’s risk management activities, determining how
they identify, assess, analyze, and mitigate risk.
Together with the risk register, an organization’s appetite and tolerance for risk
plays an important role in helping align risk with the goals of the business. The
risk register can then provide valuable information and help drive the strategic
decision-making process to achieve those goals. It is important that the report-
ing from a risk register be clear and understandable. The outputs should be
available and visible across the business, including to management and senior
executives responsible for strategy, budget, and operations.
ExamAlert
Remember that risk can be avoided, transferred, accepted, or mitigated. Be sure you
understand the different examples of when each would apply.
Risk Reporting
Risk reporting is needed for communicating risk information to stakeholders
across the organization. Risk reporting involves the regular and ad hoc dissemi-
nation of risk-related information, from the operational level to senior manage-
ment and the board of directors, ensuring that all parties are informed about
current risks, their potential impact, and the actions taken to mitigate them.
This process provides an up-to-date picture of the organization’s risk profile to
support strategic decision-making and help foster a proactive risk management
culture.
This process benefits from the use of the risk register, which acts as a central
repository of all identified risks, their assessment, and management plans. The
risk register, as detailed previously, contains critical information that forms the
backbone of risk reporting, which includes the following:
▶▶ Risk categorization helps in understanding the types of risks (strategic,
operational, financial, compliance) the organization faces.
▶▶ Risk description and scoring provide a snapshot of each risk’s nature and
its relative priority.
▶▶ Impact, likelihood, and mitigation plans offer insights into the potential
consequences of risks and the steps taken to manage them.
▶▶ Residual risk levels highlight the remaining risk after mitigation efforts,
guiding ongoing management and monitoring.
478
CHAPTER 24: Risk Management
▶▶ Key risk indicators (KRIs) and heat maps serve as visual tools for tracking
and communicating risk status and trends over time.
Effective risk reporting ensures that this information is available and presented
in a manner that is accessible and actionable for all stakeholders, allowing for
informed discussions about risk tolerance, appetite, and strategic risk manage-
ment priorities. Risk reports should not only highlight where risks align or
deviate from the organization’s risk appetite but also signal when risk levels
approach or exceed predefined tolerance thresholds. This alignment ensures
that risk management efforts are strategic, targeted, and effective in supporting
the organization’s objectives.
ExamAlert
Be certain that you understand the distinction between RPO and RTO. RPO desig-
nates the amount of data that will be lost or will have to be re-entered because of
network downtime. RTO designates the amount of time that can pass before the
disruption begins to seriously impede normal business operations.
ExamAlert
Mean time between failures (MTBF) is the average time before a product requires
repair. Mean time to repair (MTTR) is the average time required to fix a failed com-
ponent or device and return it to production status. On the other hand, mean time
to failure (MTTF) is the average time before a product fails and cannot be repaired.
MTBF and MTTR consider a component that can be repaired, whereas MTTF con-
siders a component that cannot be repaired.
Cram Quiz
Answer these questions. The answers follow the last question. If you cannot answer
these questions correctly, consider reading this chapter again until you can.
1. Which of the following is the monetary loss that can be expected for an asset
from risk over a year?
mm A. ALE
mm B. SLE
mm C. ARO
mm D. BIA
2. Your manager needs to know, for budgetary purposes, the average life span for
each of the firewall appliances. Which of the following should you provide?
mm A. MTBF
mm B. RPO
mm C. RTO
mm D. MTTF
6. Which type of risk assessment uses a risk matrix/heatmap that plots the probabil-
ity of risks using a scale of low, medium, or high?
mm A. Quantitative
mm B. Adversarial
mm C. Qualitative
mm D. Environmental
7. If a single loss expectancy is $25,000 and the annual rate of occurrence is .5,
what is the annual loss expectancy?
mm A. $12,500
mm B. $25,000
mm C. $5,000
mm D. $2,500
What Next?
If you want more practice on this chapter’s exam objective before you move on,
remember that you can access all of the Cram Quiz questions on the Pearson
Test Prep software online. You can also create a custom exam by objective with
the Online Practice Test. Note any objective you struggle with and go to that
objective’s material in this chapter.
This page intentionally left blank
Index
Numbers
3DES (Triple DES), 166
802.1X, 221, 288–289
A
AAA framework, 13–14, 286–287
ABAC (attribute-based access control),
387–388
acceptable use policy (AUP), 433–435
acceptance of risk, 476
access badges, 21
access control, 386–388. See also
identity and access management
AAA framework, 13–14, 286–287
access badges, 21
access logs, 333
ACLs (access control lists), 12,
162–163, 352
deception and disruption technology,
23
overview of, 162–164
permissions, 164
physical security, 18–23
policy-driven, 16–17
standards, 446
vestibules, 19
Zero Trust, 15–18
access logs, 333
accounting, 14, 297
acknowledgement, 500
ACLs (access control lists), 12,
162–163, 352
acquisition, 296, 414
active devices, 215–216, 229
active reconnaissance, 516–517
activity monitoring, 332–336
alert response and remediation/
618
activity monitoring
algorithms, cryptographic
definition of, 216
asymmetric, 53–55 IDS (intrusion detection system),
218–219, 229
definition of, 43
IPS (intrusion prevention system),
key exchange, 50 218–219, 229
key length, 50–51 jump servers, 216–217, 229
key stretching, 49–50 load balancers, 219, 229
overview of, 49–50 proxy servers, 217–218, 229
symmetric, 51–53 sensors, 220, 229
619
automation and orchestration
SLTT (State, Local, Tribal, and Territorial) SSL (Secure Sockets Layer), 48, 67, 366
government sectors, 313–314 SSO (single sign-on), 382–385
S/MIME (Secure/Multipurpose Internet stakeholders, 29
Mail Extensions), 74, 367
standard operating procedures (SOPs),
smishing, 108 31
SMS (Short Message Service), 100, 108 standards, 428, 445–447
SMTP (Simple Mail Transfer Protocol), stapling, OCSP, 78
364, 365
State, Local, Tribal, and Territorial (SLTT)
smurfing, 140 government sectors, 313–314
snapshots, 259 stateful protocol analysis, 219
SNMP (Simple Network Management statement of work (SOW), 490
Protocol), 342–343, 364, 365
states, data, 239
snooping, DHCP (Dynamic Host
static analysis, 290, 310
Configuration Protocol), 221
steganography, 62–63, 242
Snowden, Edward, 87
stewards, 460–461
SOC (Service Organizational Control),
458 STIX (Structured Threat Information
eXpression), 312
social engineering, 106–112, 539–540
storage root key (SRK), 56
Society for Worldwide Interbank
Financial Telecommunication (SWIFT), strategies, risk management, 475–477
454 stream ciphers, 52
soft authentication tokens, 391–393 stretching, key, 49–50
software as a service (SaaS), 182 Structured Threat Information
software development lifecycle (SDLC) eXpression (STIX), 312
policy, 441–443 subjects, 17, 502
software providers, 125 subnets, screened, 353–354
software updates. See updates Supervisory Control and Data
software-defined networking (SDN), Acquisition (SCADA), 198–199, 275, 459
191–192 supply chain, 105–106, 123–125, 488, 492
software-defined wide area network supportability, 407
(SD-WAN), 227–228, 230
surveillance, video, 20
sophistication of threat actors, 84
SWG (secure web gateway), 228
SOPs (standard operating procedures),
SWIFT (Society for Worldwide Interbank
31
Financial Telecommunication), 454
sovereignty, data, 239–240
switches, securing, 272–273
SOW (statement of work), 490
symmetric algorithms, 51–53
SOX (Sarbanes-Oxley Act), 235, 455
SYN floods, 141
spam filtering, 369
synchronous replication, 260
SPF (Sender Policy Framework), 368
systems, 17
spyware, 134–135
monitoring, 330
SQL injection, 120, 149
roles and responsibilities, 460–462
SRK (storage root key), 56 system event logs, 332
SSH (Secure Shell), 272 system or process audits, 316
SSID (service set identifier), 280 unsupported, 103–104
647
threat vectors
V audits, 326
confirmation, 317
variables, environmental, 321
CVSS (Common Vulnerability
vein/blood vessel biometics, 390 Scoring System), 318–322
vendors environmental variables, 321
agreement types, 489–491 exploiting vulnerabilities, 315
assessment of, 486–488 exposure factors, 321
monitoring, 491–492 identification methods, 308
selection of, 488–489 industry/organizational impact,
version control, 36 321–322
vestibules, access control, 19 penetration testing, 314–315
prioritization, 317–318
video surveillance, 20
reporting, 326
650
vulnerabilities