SlideShare a Scribd company logo
1 of 6
Download to read offline
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Security Controls
Categories
Security Control
Functional Types
Preventive: Stop
incidents from happening;
e.g., ๏ฌrewalls, antivirus software
Corrective: Resolve incidents
after they occur; e.g., patches,
backups
Detective: Identify and alert
on incidents; e.g., intrusion
detection systems, log monitors
Administrative: Policies and
procedures; e.g., security
training, ackground checks
Physical: Physical barriers;
e.g., locks, security guards
Technical: Technology-based
controls; e.g., encryption,
authentication mechanisms
DOMAIN 1: GENERAL SECURITY CONCEPTS (12%)
DOMAIN
1
1.1 COMPARE AND CONTRAST VARIOUS TYPES OF SECURITY CONTROLS
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
DOMAIN 1: GENERAL SECURITY CONCEPTS (12%)
DOMAIN
1
1.2 SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS
Core Principles
Key Concepts
Con๏ฌdentiality: Ensuring
information is not disclosed to
unauthorized individuals;
e.g., encryption
Availability (CIA): Ensuring
information is accessible when
needed; e.g., redundancy
Integrity: Ensuring information
is not altered by unauthorized
individuals; e.g., hashing
Authentication, Authorization,
Accounting (AAA): Identifying users,
granting access, and tracking
actions; e.g., login systems
Non-repudiation: Preventing
denial of action; e.g., digital
signatures
Zero Trust Model: Assuming all
network traffic is untrusted;
e.g., microsegmentation, least
privilege access control
Physical Security: Protecting
physical assets; e.g., surveillance
cameras
Gap Analysis: Identifying differences
between current and desired
security postures; e.g., security
assessments, vulnerability scanning
Managing Business Process Changes:
Maintaining security; e.g., implementing
new software
Change
Management
in Security
Technical Implications: Understanding how
changes affect security; e.g., system upgrades,
patching
Integration of Security Measures: Ensuring new
changes adhere to security policies;
e.g., security reviews
Documentation: Keeping records of changes;
e.g., change logs
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
DOMAIN 1: GENERAL SECURITY CONCEPTS (12%)
DOMAIN
1
1.3 EXPLAIN THE IMPORTANCE OF CHANGE MANAGEMENT
PROCESSES AND THE IMPACT TO SECURITY
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
DOMAIN 1: GENERAL SECURITY CONCEPTS (12%)
1.4 EXPLAIN THE IMPORTANCE OF USING APPROPRIATE
CRYPTOGRAPHIC SOLUTIONS
DOMAIN
1
Encryption and Obfuscation: Protecting data
con๏ฌdentiality; e.g., AES encryption, VPNs
Public Key Infrastructure (PKI): Framework
for encryption and digital signatures; e.g.,
SSL certi๏ฌcates
Hashing and Salting: Protecting stored
passwords; e.g., password storage
Blockchain and Open Public Ledgers:
Ensuring data integrity in distributed
systems; e.g., Bitcoin
Certi๏ฌcates: Validating identities;
e.g., HTTPS websites
Digital Signatures: Ensuring data integrity
and on-repudiation; e.g., email signing
Key Stretching: Enhancing password
security; e.g., PBKDF2, bcrypt
Cryptographic
Solutions for
Security
To Get More Insights Through Our FREE
FOUND THIS USEFUL?
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE FOLLOW
SHARE

More Related Content

Similar to An Introduction of CompTIA Security+ (SY0-701) Domain 1.pdf

Information Security
Information SecurityInformation Security
Information Security
chenpingling
ย 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
ย 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
cherishwinsland
ย 

Similar to An Introduction of CompTIA Security+ (SY0-701) Domain 1.pdf (20)

Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
ย 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
ย 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
ย 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
ย 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
ย 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat Modelling
ย 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
ย 
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
ย 
Corporate Endpoint Security Training [Kaspersky]
Corporate Endpoint Security Training [Kaspersky]Corporate Endpoint Security Training [Kaspersky]
Corporate Endpoint Security Training [Kaspersky]
ย 
key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario
ย 
Information Security
Information SecurityInformation Security
Information Security
ย 
CHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxCHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptx
ย 
Computing safety
Computing safetyComputing safety
Computing safety
ย 
Cloud computing Security
Cloud computing SecurityCloud computing Security
Cloud computing Security
ย 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
ย 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
ย 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
ย 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
ย 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
ย 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
ย 

More from infosecTrain

Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
infosecTrain
ย 

More from infosecTrain (20)

SOC Specialist Online Training Course.pdf
SOC Specialist Online Training Course.pdfSOC Specialist Online Training Course.pdf
SOC Specialist Online Training Course.pdf
ย 
CISSP Domain 1 Security and Risk Management.pdf
CISSP Domain 1 Security and Risk Management.pdfCISSP Domain 1 Security and Risk Management.pdf
CISSP Domain 1 Security and Risk Management.pdf
ย 
THE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdf
THE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdfTHE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdf
THE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdf
ย 
Elevate your privacy knowledge with Cipt certification training.pdf
Elevate your privacy knowledge with Cipt certification training.pdfElevate your privacy knowledge with Cipt certification training.pdf
Elevate your privacy knowledge with Cipt certification training.pdf
ย 
Audit Scenario Based Interview Questions.pdf
Audit Scenario Based Interview Questions.pdfAudit Scenario Based Interview Questions.pdf
Audit Scenario Based Interview Questions.pdf
ย 
Understanding DNS Cache Poisoning: Threats and Countermeasures
Understanding DNS Cache Poisoning: Threats and CountermeasuresUnderstanding DNS Cache Poisoning: Threats and Countermeasures
Understanding DNS Cache Poisoning: Threats and Countermeasures
ย 
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
ย 
Top 10 Cyber Attacks of 2024: Trends, Impacts, and Responses
Top 10 Cyber Attacks of 2024: Trends, Impacts, and ResponsesTop 10 Cyber Attacks of 2024: Trends, Impacts, and Responses
Top 10 Cyber Attacks of 2024: Trends, Impacts, and Responses
ย 
Stay ahead in 2024 with These Cybersecurity.pdf
Stay ahead in 2024 with These Cybersecurity.pdfStay ahead in 2024 with These Cybersecurity.pdf
Stay ahead in 2024 with These Cybersecurity.pdf
ย 
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdfQuestions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
ย 
Cloud Vs. local Storage - Choose Your Data Destination.pdf
Cloud Vs. local Storage - Choose Your Data Destination.pdfCloud Vs. local Storage - Choose Your Data Destination.pdf
Cloud Vs. local Storage - Choose Your Data Destination.pdf
ย 
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
ย 
Data Privacy Challenges & Solution -InfosecTrain
Data Privacy Challenges & Solution -InfosecTrainData Privacy Challenges & Solution -InfosecTrain
Data Privacy Challenges & Solution -InfosecTrain
ย 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
ย 
GRC (Governance, Risk, and Compliance) Hands-On Online Training.pdf
GRC (Governance, Risk, and Compliance) Hands-On Online Training.pdfGRC (Governance, Risk, and Compliance) Hands-On Online Training.pdf
GRC (Governance, Risk, and Compliance) Hands-On Online Training.pdf
ย 
Roadmap to Certified Ethical Hacker (v12) Certification Training..pdf
Roadmap to Certified Ethical Hacker (v12) Certification Training..pdfRoadmap to Certified Ethical Hacker (v12) Certification Training..pdf
Roadmap to Certified Ethical Hacker (v12) Certification Training..pdf
ย 
PMPยฎ Certification Online training Course..pdf
PMPยฎ Certification Online training Course..pdfPMPยฎ Certification Online training Course..pdf
PMPยฎ Certification Online training Course..pdf
ย 
NIST Cybersecurity Framework building a checklist.pdf
NIST Cybersecurity Framework building a checklist.pdfNIST Cybersecurity Framework building a checklist.pdf
NIST Cybersecurity Framework building a checklist.pdf
ย 
Third-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdfThird-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdf
ย 
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
ย 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
ย 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
ย 

Recently uploaded (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ย 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
ย 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
ย 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ย 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
ย 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
ย 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
ย 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
ย 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
ย 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
ย 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
ย 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
ย 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
ย 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
ย 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
ย 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
ย 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
ย 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
ย 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
ย 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
ย 

An Introduction of CompTIA Security+ (SY0-701) Domain 1.pdf

  • 2. Security Controls Categories Security Control Functional Types Preventive: Stop incidents from happening; e.g., ๏ฌrewalls, antivirus software Corrective: Resolve incidents after they occur; e.g., patches, backups Detective: Identify and alert on incidents; e.g., intrusion detection systems, log monitors Administrative: Policies and procedures; e.g., security training, ackground checks Physical: Physical barriers; e.g., locks, security guards Technical: Technology-based controls; e.g., encryption, authentication mechanisms DOMAIN 1: GENERAL SECURITY CONCEPTS (12%) DOMAIN 1 1.1 COMPARE AND CONTRAST VARIOUS TYPES OF SECURITY CONTROLS www.infosectrain.com # l e a r n t o r i s e
  • 3. www.infosectrain.com # l e a r n t o r i s e DOMAIN 1: GENERAL SECURITY CONCEPTS (12%) DOMAIN 1 1.2 SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS Core Principles Key Concepts Con๏ฌdentiality: Ensuring information is not disclosed to unauthorized individuals; e.g., encryption Availability (CIA): Ensuring information is accessible when needed; e.g., redundancy Integrity: Ensuring information is not altered by unauthorized individuals; e.g., hashing Authentication, Authorization, Accounting (AAA): Identifying users, granting access, and tracking actions; e.g., login systems Non-repudiation: Preventing denial of action; e.g., digital signatures Zero Trust Model: Assuming all network traffic is untrusted; e.g., microsegmentation, least privilege access control Physical Security: Protecting physical assets; e.g., surveillance cameras Gap Analysis: Identifying differences between current and desired security postures; e.g., security assessments, vulnerability scanning
  • 4. Managing Business Process Changes: Maintaining security; e.g., implementing new software Change Management in Security Technical Implications: Understanding how changes affect security; e.g., system upgrades, patching Integration of Security Measures: Ensuring new changes adhere to security policies; e.g., security reviews Documentation: Keeping records of changes; e.g., change logs www.infosectrain.com # l e a r n t o r i s e DOMAIN 1: GENERAL SECURITY CONCEPTS (12%) DOMAIN 1 1.3 EXPLAIN THE IMPORTANCE OF CHANGE MANAGEMENT PROCESSES AND THE IMPACT TO SECURITY
  • 5. www.infosectrain.com # l e a r n t o r i s e DOMAIN 1: GENERAL SECURITY CONCEPTS (12%) 1.4 EXPLAIN THE IMPORTANCE OF USING APPROPRIATE CRYPTOGRAPHIC SOLUTIONS DOMAIN 1 Encryption and Obfuscation: Protecting data con๏ฌdentiality; e.g., AES encryption, VPNs Public Key Infrastructure (PKI): Framework for encryption and digital signatures; e.g., SSL certi๏ฌcates Hashing and Salting: Protecting stored passwords; e.g., password storage Blockchain and Open Public Ledgers: Ensuring data integrity in distributed systems; e.g., Bitcoin Certi๏ฌcates: Validating identities; e.g., HTTPS websites Digital Signatures: Ensuring data integrity and on-repudiation; e.g., email signing Key Stretching: Enhancing password security; e.g., PBKDF2, bcrypt Cryptographic Solutions for Security
  • 6. To Get More Insights Through Our FREE FOUND THIS USEFUL? Courses | Workshops | eBooks | Checklists | Mock Tests LIKE FOLLOW SHARE