Security+ Certification/Compliance and Operational Security

Compliance and Operational SecurityEdit

Explain risk related conceptsEdit

  • Control types
    • Technical
    • Management
    • Operational
  • False positives
  • Importance of policies in reducing risk
    • Privacy policy
    • Acceptable use
    • Security policy
    • Mandatory vacations
    • Job rotation
    • Separation of duties
    • Least privilege
  • Risk calculation
    • Likelihood
    • ALE
    • Impact
  • Quantitative vs. qualitative
  • Risk-avoidance, transference, acceptance, mitigation, deterrence
  • Risks associated to Cloud Computing and Virtualization

Carry out appropriate risk mitigation strategiesEdit

  • Implement security controls based on risk
  • Change management
  • Incident management
  • User rights and permissions reviews
  • Perform routine audits
  • Implement policies and procedures to prevent data loss or theft

Execute appropriate incident response proceduresEdit

  • Basic forensic procedures
  • Order of volatility
  • Capture system image
  • Network traffic and logs
  • Capture video
  • Record time offset
  • Take hashes
  • Screenshots
  • Witnesses
  • Track man hours and expense
  • Damage and loss control
  • Chain of custody
  • Incident response: first responder

Explain the importance of security related awareness and trainingEdit

  • Security policy training and procedures
  • Personally identifiable information
  • Information classification: Sensitivity of data (hard or soft)
  • Data labeling, handling and disposal
  • Compliance with laws, best practices and standards
  • User habits
  • Password behaviors
  • Data handling
  • Clean desk policies
  • Prevent tailgating
  • Personally owned devices
  • Threat awareness
  • New viruses
  • Phishing attacks
  • Zero days exploits
  • Use of social networking and P2P

Compare and contrast aspects of business continuityEdit

  • Business impact analysis
  • Removing single points of failure
  • Business continuity planning and testing
  • Continuity of operations
  • Disaster recovery
  • IT contingency planning
  • Succession planning

Explain the impact and proper use of environmental controlsEdit

  • HVAC
  • Fire suppression
  • EMI shielding
  • Hot and cold aisles
  • Environmental monitoring
  • Temperature and humidity controls
  • Video monitoring

Execute disaster recovery plans and proceduresEdit

  • Backup / backout contingency plans or policies
  • Backups, execution and frequency
  • Redundancy and fault tolerance
  • Hardware
  • RAID
  • Clustering
  • Load balancing
  • Servers
  • High availability
  • Cold site, hot site, warm site

Mean time to restore, mean time between failures, recovery time objectives and recovery point objectives

Exemplify the concepts of confidentiality, integrity and availability (CIA)Edit

Last modified on 20 August 2011, at 17:16