CompTIA Security+ Study Guide (SY0-501)

Slides:



Advertisements
Similar presentations
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Advertisements

1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Database Administration and Security Transparencies 1.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Security Controls – What Works
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
PCI Compliance Technical Overview RM PCI Calendar Sept 2006: Official 15.1 PCI Release Sept 2006: 15.1 certified PCI Compliant Jan 2007: VISA approves.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.
Controls for Information Security
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
COEN 252 Computer Forensics
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 6 of the Executive Guide manual Technology.
Information Systems Security Operations Security Domain #9.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
OWASP Cambridge 2 nd December Agenda Networking, food and refreshments Welcome Colin Watson Global Application Security Survey & Benchmarking John.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
New Techniques in Application Intrusion Detection Al Huizenga, Mykonos Product Manager May 2010.
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
Snakes and Ladders OWASP Newcastle 24 th November 2015.
Security fundamentals Topic 10 Securing the network perimeter.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Presentation Layer (Graphical User Interface) AppGUI Logic Layer (Business Logic and data access) Network Discovery Device Information Extraction Network.
OWASP London 4 th December Agenda Networking, food and refreshments Welcome Justin Clark Offensive OSINT Christian Martorella and Zigor Zumalde.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Click to edit Master subtitle style Chapter 15: Physical Security and Risk.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Securing Network Servers
PCI-DSS Security Awareness
CompTIA Server+ Certification (Exam SK0-004)
Domain 4 – Communication and Network Security
Click to edit Master subtitle style
Threat Intelligence Solutions. Table Of Contents 1.Company Overview 2.Threat Intelligence Solutions 3.Certifications.
CompTIA Security+ Study Guide (SY0-401)
Joe, Larry, Josh, Susan, Mary, & Ken
Relevance of the OWASP Top 10
CompTIA Security+ Study Guide (SY0-401)
Network monitoring service pricing. Table Of Contents 1.Company Overview 2.Network monitoring service pricing 3.Certifications.
Threat Intelligence Solutions. Table Of Contents 1.Company Overview 2.Threat Intelligence Solutions 3.Certifications.
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
Software Development Costs
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501)
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Chapter 9 E-Commerce Security and Fraud Protection
امنیت در شبکه NetSecurity
IS3440 Linux Security Unit 8 Software Management
Security Overview: Honeypots
Presentation transcript:

CompTIA Security+ Study Guide (SY0-501) Chapter 2: Monitoring and Diagnosing Networks

Chapter 2: Monitoring and Diagnosing Networks Explain use cases and purpose for frameworks, best practices, and secure configuration guides Given a scenario, implement secure network architecture concepts Given a scenario, implement secure systems design Explain the importance of secure staging Deployment concepts

Frameworks, Best Practices, and Configuration Guides ISO Standards North American Electric Reliability Corporation (NERC) National Institute of Standards and Technology (NIST) ISA/IEC-62443 Payment Card Industry Data Security Standard (PCI-DSS)

Payment Card Industry Data Security Standard (PCI-DSS)

Open Web Application Security Project (OWASP) 1. Verify for security early and often 2. Parameterize queries 3. Encode data 4. Validate all inputs 5. Implement identity and authentication controls 6. Implement appropriate access controls 7. Protect data 8. Implement logging and intrusion detection 9. Leverage security frameworks and libraries 10. Error and exception handling

Secure Network Architecture Concepts Zones Demilitarized zone (DMZ) Extranet and intranet Wireless

Network Segmentation

Honeypots and Honeynets Honeypot: A separate system that appears to be an attractive target but is in reality a trap for attackers Honeynet: A fake network segment that appears to be a very enticing target (a logical extension of a honeypot)

Tunneling/VPN

Security Devices Firewalls Software-defined networking (SDN) IDS/IPS

Secure Systems Design Hardware and firmware Operating systems Peripherals