CompTIA Security+ Study Guide (SY0-401) Chapter 7: Host, Data, and Application Security
Chapter 7: Host, Data, and Application Security Summarize risk management best practices. Explain the importance of application security controls and techniques. Summarize mobile security concepts and technologies. Given a scenario, select the appropriate solution to establish host security. Implement the appropriate controls to ensure data security.
Chapter 7: Host, Data, and Application Security Application Hardening Databases and Technologies NoSQL Big Data SAN Fuzzing Secure Coding OWASP CERT Secure Coding Standards Application Configuration Baselining Operating System Patch Management Application Patch Management
Host Security Permissions Access Control Lists (ACLs) Antimalware Host Software Baselining Hardening Web Servers Hardening Email Servers Hardening FTP Servers Hardening DNS Servers Hardening DHCP Services
Protecting Data Backups RAID Clustering and Load Balancing Full Differential Incremental RAID RAID 0 RAID 1 RAID 3 and 4 RAID 5 RAID 6 RAID 1+0 aka RAID 10 RAID 0 + 1 Clustering and Load Balancing
Application Security Key Management Credential Management Authentication Geo-Tagging Encryption Application White-Listing Transitive Trust/Authentication
Best Practices Data Loss Prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure key content is not deleted or removed Data Encryption Hardware-Based Encryption Devices