< All CompTIA A+ Notes

neler13 | CompTIA A+ | Module 2.1 - Security

By: neler13 | Related Course: CompTIA A+ | Published: February 6, 2018 | Modified: February 6, 2018
Join Cybrary

NotepadDigial Securiy

-Firewalls are important in our network

Blocks/allows connections for both inbound and outbound

Rules based on Source, Port, Protocol, or application.

Can create DMZ – Area 2 different firewalls 

Software firewall is installed on computer

Hardware firewall setting that allow or not allow files

Antispyware

   May be installed by user

    Monitor/ report  activity

    May sell information

 


NotepadDigital Security - Antivirus

Antivirus –

Protects from outside threats. 

Additional Utilities (Site protection)

Setup on removable media

Signature based antivirus – what the file looks like – it runs a scan and tries to detect if this is good or bad file.

Signature based vs heuristic(rule) Based antivirus

Cloud Antivirus requires a network connection

Update antivirus database- new viruses come out every day.  Database needs to be kept up to date.

Nice to have removable medial that boots to the media device and can scan the files and folders


NotepadPhysical Security

Privacy Filters are those filters are applied to a screen that prevent unauthorized people to be able to view confidential information.

Cut down the angle for privacy so unauthorized users can not access  confidential information.


NotepadPhysical Security - Biometrics

Physical Security: Biometrics, Retinal Scanner and Badges

Physical Security: Biometrics, Retinal Scanner and Badges

Now we explore other security measures but unlike physical security, these are tools that will validate who you say you really are.

There are a number of different types of Biometric authentication methods such as retinal scanning, facial recognition, etc.  This lesson presents an overview of the various types of biometric security methods and the other authentication methods that are paired/used with them, and explains why it is necessary to have a good secondary, 2-layer security authentication process.

 


NotepadPhysical Security:Lock Doors, Tail Gating and

Security – not just about using strong passwords and great firewall.  Need to make sure in order to have proper security.

Locking doors –

Locking down Laptops and computer cases

Server room locked and secured.

Make sure people who have access need access.

Equipment cases need to be locked. 

Passwords on BIOS or run a cd to get into our devices by cracking a password.

Server cases should have keys in secure areas.

Secure area –

Maintain curtesy and politeness, just don’t let people follow you into areas.  Let uses know we want to keep area secure.

Man interested – man traps = a situation where there is a server room and main hallway with secure door 1.  The person gets in by tail gaiting.  Ask questions and possible prevent tailgaters.  Don’t allow anyone in without badge in.

Keep Paper documents secured in a safe that access is limited.  Locking fire prof cabinet.

Shred all old media.  Hire a company that can take the old disposed equipment.  Hard drive| media, old computers and equipment. Make sure all is properly stored and disposed of in a way that just anyone can access.


NotepadRFID Badges

Uses a passive chip with information/Private keys and can be used with proximity or badge readers – keep / store in secure sleeve.

 

Key fobs – Sends a ”next sequence”  signal

May be used to refer to rsa tokens

Proximity reader to reads that chip to see if you are allowed to open that door.  This can be plugged into a computer to prevent unauthorized access to a computer or area. Back end data base.  They can go into the data base and revoke access to users that no longer have security to that area.

Computer with RFID badge also requires a password to gain access to the area.

Key fobs – Small device on a keychain that has a lock \unlock button.  Can be used for cars or doors.  Secures the signal.  RSA tokens can be kept on your key.  Random numbers that are based on Random algorithm. 

Can ask for code based on random seed/algorithm

Then synced with server.  


< All CompTIA A+ Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 566 / December 14, 2019
How do I Get MTA Certified?
Views: 1138 / December 12, 2019
How much does your PAM software really cost?
Views: 1582 / December 10, 2019
How Do I Get into Android Development?
Views: 1965 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel