CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
13%
Flag icon
Disk redundancies. Fault-tolerant disks, such as RAID-1 (mirroring), RAID-5 (striping with parity), and RAID-10 (striping with a mirror), allow a system to continue to operate even if a disk fails.
13%
Flag icon
Server redundancies. Failover clusters include redundant servers and ensure a service will continue to operate, even if a server fails.
13%
Flag icon
In a failover cluster, the service switches from the failed server in a cluster to an operational server in the same cluster. Virtualization can also increase availability of servers by reducing unplanned downtime.
13%
Flag icon
Load balancing. Load balancing uses multiple servers to support a single service, such as a high-volume web site.
13%
Flag icon
Site redundancies. If a site can no longer function due to a disaster, such as a fire, flood, hurricane, or earthquake, the organization can move critical systems to an alternate site.
13%
Flag icon
The alternate site can be a hot site (ready and available 24/7), a cold site (a location where equipment, data, and personnel can be moved to when needed), or a warm site (a compromise between a hot site and cold site).
13%
Flag icon
Backups. If personnel back up important data, they can restore it if the original data is lost.
13%
Flag icon
Alternate power. Uninterruptible power supplies (UPSs) and power generators can provide power to key systems even if commercial
13%
Flag icon
Availability ensures that systems are up and operational when needed and often addresses single points of failure.
13%
Flag icon
If this is possible, why not just encrypt all the data? The reason is that encryption consumes resources.
13%
Flag icon
As an example, the above paragraph is about 260 characters. Encrypted, it is about 360 characters. That’s an increase of about 40 percent, which is typical with many encryption methods. If a company decides to encrypt all data, it means that it will need approximately 40 percent more disk space to store the data.
13%
Flag icon
cost
13%
Flag icon
Risk is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.
13%
Flag icon
A threat is any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.
13%
Flag icon
vulnerability is a ...
This highlight has been truncated due to consecutive passage length restrictions.
13%
Flag icon
hardware, the software, the configuration, or even the users o...
This highlight has been truncated due to consecutive passage length restrictions.
13%
Flag icon
security incident is an adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization’s information technology (IT) systems and data.
13%
Flag icon
This includes intentional attacks, malicious software (malware) infections, accidental data loss, and much more.
13%
Flag icon
Risk mitigation reduces the chances that     a threat will exploit a vulnerability.
13%
Flag icon
You can’t prevent most threats.
13%
Flag icon
However, you can reduce risk by reducing vulnerabilities to the threat, or by reducing the impact of the threat.
13%
Flag icon
Risk is the likelihood that a threat will exploit a vulnerability. Risk mitigation reduces the chances that a threat will exploit a vulnerability, or reduces the impact of the risk, by implementing security controls.
13%
Flag icon
Technical controls use technology. •   Administrative controls use administrative or management methods. •   Physical controls refer to controls you can physically touch. •   Preventive controls attempt to prevent an incident from occurring. •   Detective controls attempt to detect incidents after they have occurred. •   Corrective controls attempt to reverse the impact of an incident. •   Deterrent controls attempt to discourage individuals from causing an incident. •   Compensating controls are alternative controls used when a primary control is not feasible.
13%
Flag icon
The first three control types in the list (technical, administrative, and physical) refer to how the security controls are implemented. The remaining control types refer to the goals of the security control.
13%
Flag icon
An administrator installs and configures a technical control, and the technical control then provides the protection automatically.
13%
Flag icon
Encryption. Encryption is a strong technical control used to protect the confidentiality of data.
13%
Flag icon
Antivirus software. Once installed, the antivirus software provides protection against malware infection.
13%
Flag icon
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs). IDSs and IPSs can monitor a network or host for intrusions and provide ongoing protection against various threats.
13%
Flag icon
Firewalls. Network firewalls restrict network traffic going in and out of a network.
13%
Flag icon
Least privilege. The principle of least privilege specifies that individuals or processes are granted only the privileges they need to perform their assigned tasks or functions, but no more.
13%
Flag icon
Administrative controls use methods mandated by organizational
13%
Flag icon
policies or other guidelines.
13%
Flag icon
Risk assessments. Risk assessments help quantify and qualify risks within an organization so that the organization can focus on the serious risks.
13%
Flag icon
Vulnerability assessments. A vulnerability assessment attempts to discover current vulnerabilities or weaknesses.
13%
Flag icon
Penetration tests. These go a step further than a vulnerability assessment by attempting to exploit vulnerabilities.
13%
Flag icon
Awareness and training. The importance of training to reduce risks cannot be overstated.
13%
Flag icon
Configuration and change management. Configuration management often uses baselines to ensure that systems start in a secure, hardened state.
13%
Flag icon
methods that help an organization plan and prepare for potential system outages.
13%
Flag icon
Media protection. Media includes physical media such as USB flash drives, external and internal drives, and backup tapes. •   Physical and environmental protection. This includes physical controls, such as cameras and door locks, and environmental controls, such as heating and ventilation systems.
13%
Flag icon
The National Institute of Standards and Technology (NIST) is a part of the U.S. Department of Commerce, and it includes a Computer Security Division hosting the Information Technology Laboratory (ITL).
13%
Flag icon
Special Publications (SPs) in the 800 series that are of general interest to the computer security community.
13%
Flag icon
SP 800-53 Revision 4, “Security and Privacy Controls for Federal Information Systems and Organizations,”
13%
Flag icon
the Access Control family (AC) includes 25 different groups (AC-1 through AC-25).
13%
Flag icon
It’s worth noting that SP 800-53 Revision 3 attempted to identify every control as technical, management, or operational.
13%
Flag icon
If you’re interested in pursuing other security-related certifications or making IT security a career, the SP 800 documents are well worth your time. You can download SP 800-53 Revision 4 and other SP 800 documents at http://csrc.nist.gov/publications/PubsSPs.html.
13%
Flag icon
Hardening. Hardening is the practice of making a system or application more secure than its default configuration.
13%
Flag icon
Security awareness and training. Ensuring that users are aware of security vulnerabilities and threats helps prevent incidents.
14%
Flag icon
guards. Guards prevent and deter many attacks.
14%
Flag icon
Change management. Change management ensures that changes don’t result in unintended outages.
14%
Flag icon
Account disablement policy. An account disablement policy ensures that user accounts are disabled when an employee leaves.