Security Plus Unit 5
Security Plus Unit 5
Virtualization Overview
Term Definition
Virtualization Technology used within data centers to host one or more virtual systems or
virtual machines (VMs) on a single physical system, reducing costs and
physical resource use.
Host The physical system hosting the VMs, requiring A server with 64GB RAM,
high-speed multi-core processors, large amounts 1TB SSD, and a 10-core
of RAM, fast and abundant disk space, and one processor running VMware
or more fast network cards. ESXi.
1
Guest Operating systems running on the host system. Windows 10 VM, Ubuntu
Hypervisors support various operating systems, 20.04 VM
including different Microsoft OS and Linux
distributions, in both 32-bit and 64-bit versions.
2
Cloud Concepts
Term Definition Examples
Cloud The ability to manually resize the Increasing a VM's RAM from
Scalability computing capacity of a VM by assigning 4GB to 8GB, requiring a restart
more memory, processors, disk space, or to apply changes.
network bandwidth, often requiring a
reboot.
Benefits of Virtualization
Aspect Explanation
Cost Reduction Virtualization reduces the need for multiple physical systems,
lowering hardware, electricity, cooling, and physical space costs.
3
Return on Virtualization provides better ROI when consolidating underutilized
Investment (ROI) servers into fewer physical hosts.
Example Scenario
Scenario Explanation
Underutilized An organization has nine physical servers, each using less than 20% of
Servers processing power, memory, and disk space. By virtualizing, all servers
could run as guest VMs on two or three physical servers, sharing
resources efficiently and saving money.
Summary
Term Definition
Thin Client A computer with minimal resources, used to An office workstation with
connect to a server to run applications or basic hardware used to
desktops. It typically includes a keyboard, access applications
mouse, screen, and may support hosted on a central
peripherals like speakers and USB ports. server.
4
Server A powerful system, either on-site or in the A data center server
cloud, that supports multiple thin clients. running multiple virtual
desktops for employees.
Containerization
Term Definition Examples
Benefit Uses fewer resources and can be more ISPs using containerization
efficient than traditional Type II hypervisor for specific customer
virtualization. applications, leading to
lower resource
consumption.
Drawback Containers must use the operating system All containers on a Linux
of the host. host must run Linux.
5
Example Scenarios
Scenario Explanation
Thin Client Setup An office with thin clients connected to a powerful central server,
allowing employees to run applications with minimal local
resources.
Mobile VDI Access Employees using their mobile devices to access their virtual
desktops hosted on a VDI, facilitated by a VPN for remote access.
Summary
Term Definition
6
Containerization Virtualization running services/apps in isolated containers without
hosting an entire OS.
VM Escape Protection
Term Definition Examples
Patch Regular updates and patches to both Applying the latest security
Management physical and virtual servers to protect patches released by the
against VM escape vulnerabilities. hypervisor vendor to prevent
VM escape attacks.
VM Sprawl Avoidance
Term Definition Examples
Resource Unauthorized VMs consuming system Multiple VMs created without proper
Overload resources, potentially causing management, resulting in server
slowdowns or crashes. performance issues.
7
Resource Reuse
Term Definition Examples
Resource The potential for data or resources to Data from a previous tenant not
Reuse remain on shared infrastructure, being securely erased, accessible
accessible to other cloud service users, by a new tenant on the same cloud
leading to data leakage or exposure. infrastructure.
Replication
Term Definition Examples
Replication Copying VM files from one physical server Creating a backup of VM files to
to another, allowing easy restoration of a restore quickly in case of server
failed VM. failure.
Snapshots
Term Definition Examples
Example Scenarios
Scenario Explanation
VM Escape Attack An attacker uses a VM vulnerability to gain control over the host
system and other VMs.
Unmanaged VMs A developer creates a VM for testing without informing IT, leaving it
unpatched and vulnerable.
Resource Overload Multiple unauthorized VMs cause server performance issues due to
high resource consumption.
Data Leakage in Previous tenant's data not securely erased, accessible by new
Cloud tenant on the same cloud infrastructure.
VM Replication A VM's files are copied to another server, allowing quick restoration
in case of failure.
8
Snapshot Before An administrator takes a snapshot before applying patches, enabling
Patching easy rollback if problems occur post-patch.
Summary
Term Definition
VM Escape Attack accessing the host system from a virtual guest system.
Secure Ensures computing systems are deployed and Implementing firewalls and
Systems maintained securely. Applies to servers, encryption before
Design workstations, laptops, network devices, and deploying a server.
mobile devices.
Antivirus Scans endpoints for viruses, worms, Trojan horses, McAfee, Norton,
Software and other malicious code, and can automatically Kaspersky.
resolve issues.
9
Extended Goes beyond the endpoint to include network Palo Alto Cortex
Detection and devices, cloud infrastructure, and IoT devices, XDR.
Response (XDR) providing a comprehensive view of the entire IT
environment.
Host Intrusion Applies intrusion prevention techniques at the host McAfee Host IPS.
Prevention level, using behavior analysis, file integrity
Systems (HIPS) monitoring, and application control to prevent
unauthorized access.
Disk Encryption Encrypting disks as part of the Using BitLocker for full disk
hardening process to protect data. encryption.
Configuration Enforcement
Term Definition Examples
10
Secure Baseline and Integrity Measurements
Term Definition Examples
Secure Baseline A known starting point for system Initial secure configuration of a
configurations to ensure security. new server.
Step 1: Create Install and configure the OS, Setting up a Windows Server with
Source applications, and security settings necessary applications and security
System on a blank system. configurations.
Step 3: Deploy Deploy the captured image to Installing the captured image on new
the Image multiple systems, ensuring office desktops.
consistent and secure setups.
Change Management
Term Definition Examples
11
Application Allow and Block Lists
Term Definition Examples
Example Scenarios
Scenario Explanation
Implementing Endpoint Installing antivirus, EDR, XDR, and HIPS on all endpoints to
Security protect against various threats.
Deploying Master Creating and deploying master images to ensure consistent and
Images secure system setups.
Effective Patch Regularly updating systems with the latest patches to protect
Management against known vulnerabilities.
Application Control Using allow and block lists to control which applications can run
on systems.
12
Disk Encryption
Term Definition Examples
Full Disk Encrypts the entire disk using Windows BitLocker, macOS FileVault,
Encryption (FDE) software or hardware VeraCrypt, Self-Encrypting Drives
solutions. (SEDs).
Boot Integrity
Term Definition Examples
Boot Verifies the integrity of the operating Measured boot processes that prevent
Integrity system and boot loading systems. booting if the system has lost integrity.
BIOS Basic Input/Output System providing Legacy systems using BIOS for
basic instructions for starting a booting.
computer.
UEFI Unified Extensible Firmware Interface, Systems using UEFI for booting larger
providing enhancements over BIOS. disks and being CPU-independent.
Secure Boot TPM captures and verifies the Blocking the boot process if key
Attestation signatures of key boot files to ensure files have been modified by
they haven't been tampered with. malware.
Remote Verifies boot files against a report sent Using remote attestation to
Attestation to a remote system. confirm the integrity of a system
during boot.
13
Hardware Unique encryption key burned into the TPM ensuring the private key
Root of Trust TPM chip, providing a secure starting remains private and supports
point. authentication.
End-of-Life (EOL) Hardware that has reached the end Devices that no longer receive
Hardware of its useful life and no longer software updates or security
receives updates or support. patches.
Example Scenarios
Scenario Explanation
Using Full Disk Encrypting an entire disk with BitLocker or FileVault to protect
Encryption data on a laptop.
Upgrading Firmware Flashing the UEFI firmware to the latest version to improve
security and functionality.
14
TPM for Secure Boot Using TPM to verify and ensure the integrity of key boot files
before allowing the system to boot.
HSM for Key Using an external HSM to securely generate, store, and manage
Management cryptographic keys for a server.
Secure Wiping data from an old server and physically destroying the
Decommissioning hard drive to prevent data leakage.
Summary
Term Definition
Protecting Data
Aspect Description Examples
15
Removable Media Storage devices that can be easily USB flash drives, external
attached to a computer to copy data, hard drives, SD cards.
which can be restricted.
Data in Use Protecting data that is being Using secure enclaves for
processed or accessed by a system or sensitive data processing.
application.
Network-Base Examines outgoing network traffic to Blocking emails with Social Security
d DLP prevent unauthorized data transfers. numbers from leaving the network.
Full Disk Encryption Encrypts the entire disk to Windows BitLocker, macOS
(FDE) protect data at rest. FileVault, VeraCrypt.
Database Column Encrypts specific columns in Encrypting the credit card number
Encryption a database table. column in a customer database.
Removable Media
16
Aspect Description Examples
Types of Various storage devices that can be USB flash drives, external hard
Removable easily attached to a computer. drives, SD cards, CDs, DVDs.
Media
Secure Provides a secure and isolated area within Intel’s Software Guard
Enclave a system for processing sensitive data Extensions (SGX) creating a
(TEE) using hardware-based security trusted execution environment.
mechanisms.
Example Scenarios
Scenario Explanation
Using Full Disk Encrypting an entire laptop's hard drive with BitLocker to
Encryption protect data if the laptop is stolen.
Preventing Data Loss Implementing USB data blockers to prevent data from being
with USB Blockers copied to USB drives in a secure facility.
Protecting Data in Use Using secure enclaves to process sensitive data securely,
even in potentially insecure environments.
17
Summary
Term Description
Removable Media Storage devices that can easily be attached to a computer, posing
a data security risk.
Secure Enclave (TEE) Isolated area within a system for secure processing of sensitive
data using hardware-based security.
Cloud Concepts
Aspect Description Examples
Cloud Accessing computing resources via the Using Gmail for email, storing
Computing Internet from a remote location. files on Google Drive.
Cloud Storage Storing data on the cloud provided by Apple iCloud, Microsoft
various service providers. OneDrive, Google Drive.
18
Infrastructure as a Provides virtualized computing Renting virtual servers from
Service (IaaS) resources over the Internet. Amazon EC2, Microsoft Azure.
Customers manage the OS and
software.
Public Cloud Services available to any Amazon Web Services (AWS), Google
customer willing to pay, hosted Cloud Platform (GCP), Microsoft Azure.
by third-party providers.
Private Cloud Cloud services used exclusively Shelbyville Nuclear Power Plant hosting
by a single organization. its own servers for internal use.
Hybrid Cloud Combines two or more different A company using both public cloud
cloud models (public, private, services for general tasks and a private
community). cloud for sensitive data processing.
Multi-Cloud Systems
Aspect Description Examples
Multi-Cloud Combines resources from multiple Using IaaS from both AWS and
Systems cloud service providers. Microsoft Azure.
Example Scenarios
Scenario Explanation
Using SaaS for Email Accessing email through Gmail using a web browser without
needing to manage email servers.
19
Deploying PaaS for Using a cloud provider's platform to develop and test applications
Development without managing the underlying hardware.
Adopting IaaS for Renting virtual servers to handle peak load times, such as during
Scalability Black Friday sales, without owning physical servers.
Public Cloud for Using AWS to host a company's website accessible to all internet
General Use users.
Private Cloud for A financial institution using a private cloud to handle sensitive
Security customer data securely.
Hybrid Cloud for A business using a private cloud for secure data and a public
Flexibility cloud for less sensitive operations.
Multi-Cloud for A company using both AWS and Azure to ensure service
Redundancy availability even if one provider faces an outage.
Summary
Term Description
SaaS Software provided over the Internet accessible via web browsers.
Hybrid Cloud Combines two or more cloud models to create a flexible cloud
environment.
20
Application Programming Interfaces (APIs)
Aspect Description Examples
Definition Software components that allow developers Using APIs for web
access to features or data within another applications, IoT devices, and
application, service, or OS. cloud-based services.
Common APIs are commonly used for data access, Amazon's package tracking,
Uses package tracking, and controlling IoT wireless thermostat
devices. adjustments.
API Considerations
Aspect Description Examples
Authentication Ensuring only authorized entities can use Using passwords with an
the APIs, often using strong methods like authenticator app for API
two-factor authentication. access.
Authorization Controlling access levels to the API, Different access levels for
often using services like OAuth. developers and web
applications.
Transport Level Encrypting API traffic to protect data from Using TLS to secure data
Security (TLS) unauthorized access. transmitted by wireless
thermostats.
Data Leaks Data leaked onto the Internet, Unauthorized access to sensitive
indicating a potential attack. information.
API Inspection and Testing APIs for security and usability Conducting security tests
Integration to discover vulnerabilities. before deploying APIs.
21
Microservices and APIs
Aspect Description Examples
API vs. APIs are tied to specific businesses or An Amazon API for a specific
Microservice services, while microservices are shipper vs. a microservice that
more versatile and reusable. works with any shipper.
Example Scenarios
Scenario Explanation
Using APIs for Data A developer uses an API to retrieve package tracking data
Access from a shipping company.
Detecting Data Leaks Monitoring for data leaked onto the Internet as an indicator of
potential API attacks.
Summary
Term Description
22
Transport Level Security Encrypts API traffic to protect data.
(TLS)
Spam and Virus Filtering out malicious emails and Blocking phishing emails and
Filtering viruses from the network. email-borne malware.
Data Loss Prevention Preventing unauthorized transfer Blocking sensitive data from
(DLP) of data out of the organization. being sent via email or USB
drives.
23
Virtual Private Network Secure connections over the Employees accessing the
(VPN) internet for remote access. company network securely
from remote locations.
Proxy Services Web content filtering to block Filtering web traffic to prevent
access to malicious or access to harmful websites.
inappropriate websites.
Unified Threat Integrated security devices that Devices that combine firewall,
Management (UTM) provide multiple security antivirus, and IDS/IPS
Appliances functions. functionalities.
Next-Generation Advanced firewalls with additional Firewalls that can detect and
Firewalls (NGFWs) features like application block complex threats and
awareness and intrusion unauthorized access.
prevention.
Cloud Service An entity offering one or more cloud AWS, Google Cloud
Provider (CSP) services through various deployment Platform, Microsoft Azure.
models.
24
Software as a Provides software Maintaining and Using strong passwords,
Service (SaaS) applications over the securing the managing user access.
Internet. software, ensuring
availability.
25
Example Scenarios
Scenario Explanation
Using MSSP for A small company hires an MSSP to handle patch management,
Security Services vulnerability scanning, and spam filtering to enhance security
without hiring in-house security experts.
Adopting PaaS for A company uses a PaaS provider to host its development
Development environment, allowing developers to focus on coding without
managing the underlying infrastructure.
Securing SaaS A company using SaaS applications like Gmail ensures strong
Applications password policies and manages user access to protect data.
26
Summary
Term Description
CSP Offers cloud services through different deployment models (IaaS, PaaS, SaaS).
SaaS Software provided over the Internet, with the provider handling maintenance and
security.
IaaS Virtual or physical servers with basic infrastructure, with the customer managing
OS and applications.
Cost Balancing the cost of cloud services Comparing different CSPs to find
with budget and requirements. the best value for money.
27
Segmentation Isolating sensitive data and Using VLANs and screened
applications from other parts of the subnets in cloud-based networks.
network for security and compliance.
Centralized Equipment located in one or a few large A single large data center
Approach data centers, reducing costs and hosting the company’s IT
simplifying management. infrastructure.
Decentralized Equipment spread across many smaller Multiple small data centers
Approach data centers, reducing the impact of a across different locations.
single facility failure.
Cloud-Based DLP Implements policies for data stored Detecting and managing PII
in the cloud to prevent data loss. or PHI in cloud storage.
Cloud Firewall Virtual networks in the cloud need Using security groups to
Considerations firewalls to prevent unauthorized write firewall rules that the
access. cloud service provider
enforces.
28
Infrastructure as Code (IaC)
Aspect Description Examples
Example Scenarios
Scenario Explanation
Balancing Cost and Selecting a CSP that offers the best value for the
Requirements organization’s budget and needs.
Optimizing Responsiveness Using caching and load balancing to improve the speed
and reliability of a cloud service.
Segmenting Cloud Networks Using VLANs to isolate sensitive data and applications
from other parts of the network.
Deploying CASB for Security Using a CASB to enforce security policies across multiple
cloud services.
Using Cloud-Based DLP Implementing policies to detect and manage PII stored in
the cloud.
29
Configuring a Setting up an SWG to filter Internet traffic and prevent
Next-Generation SWG threats.
Writing Firewall Rules with Using security groups to create and manage firewall
Security Groups rules for virtual networks in the cloud.
Summary
Term Description
Cloud-Based DLP Data loss prevention solutions for data stored in the cloud.
Next-Generation SWG Secure web gateway combining proxy and firewall services to
filter Internet traffic.
Cloud Firewall Virtual network security through managed firewall rules using
Considerations security groups.
Infrastructure as Code Managing virtual infrastructure through code for automation and
(IaC) efficiency.
30
Software-Defined Networking (SDN)
Aspect Description Examples
Data Plane Logic used to forward or block traffic. Software-based data plane
rules replacing hardware ACLs.
Control Logic used to identify the path to take. Using routing protocols like
Plane OSPF and BGP.
Routing Protocols
Protocol Description Examples
Open Shortest Path Helps routers determine the best Sharing routing information to
First (OSPF) path to route traffic. create a network map.
Border Gateway Used for routing between Determining the best paths for
Protocol (BGP) autonomous systems on the data across the internet.
internet.
SD-WAN
Aspect Description Examples
Edge Storing and processing data close to the Autonomous car systems
Computing devices that generate and use it. processing data onboard for quick
responses.
Fog Uses a network close to the device with A network of sensors and
Computing multiple nodes for sensing and processors near IoT devices to
processing data. reduce latency.
31
Aspect Description Examples
SP-800-53 Security and privacy controls for Used for all types of computing
Revision 5 information systems and organizations, systems, not limited to
applicable to all computing systems. cloud-based resources.
Example Scenarios
Scenario Explanation
Using OSPF in SDN Utilizing the OSPF protocol to determine the best path for
routing traffic within a software-defined network.
Setting Up Fog Computing Implementing a fog network to process IoT sensor data near
the devices for faster response times.
Adopting CSA Practices Following best practices recommended by the Cloud Security
Alliance to enhance cloud security.
Using CCM for Cloud Implementing security controls from the CSA Cloud Controls
Security Matrix to secure cloud-based resources.
32
Summary
Term Description
OSPF and BGP Routing protocols used in SDN for path determination.
Fog Computing Similar to edge computing but uses a network of nodes for data
processing.
CSA Promotes best practices for cloud security and offers the CCSK
certification.
SP-800-53 Revision Comprehensive security and privacy controls for all computing
5 systems.
Wireless Network At least one interface for Wi-Fi, Bluetooth, cellular network.
Interface connecting to wireless networks.
Local Data Storage Ability to store data locally on the Internal flash storage, microSD
device. cards.
33
Corporate-owned Devices are purchased and Company-issued smartphones
issued by the organization. for employees.
BYOD (Bring Your Employees bring their own Personal smartphones used to
Own Device) personal devices and connect access work emails.
them to the network.
CYOD (Choose Your Employees can choose from a list Employees selecting from a list
Own Device) of approved devices and of pre-approved smartphones
purchase them for work use. for work purposes.
Connection Methods
Method Description Examples
Wi-Fi Wireless network interface for connecting Connecting to office or home Wi-Fi
to Wi-Fi networks. networks.
Bluetoot Wireless protocol for personal area Using a Bluetooth headset with a
h networks. smartphone.
Full Device Encrypts the entire device to Enabling full disk encryption on
Encryption protect data. corporate smartphones.
34
Containerization Runs applications in isolated, Running corporate apps in a
encrypted containers. secure container on BYOD
devices.
Screen Locks Locks the device after a period Automatic screen lock with a
of inactivity. passcode after 5 minutes of
inactivity.
Remote Wipe Sends a signal to erase all Using MDM to remotely wipe a
data on a lost or stolen device. stolen smartphone.
Geolocation Uses GPS to track and locate Locating a lost phone using GPS
the device. tracking.
35
Sideloading Installing apps by copying them Developers testing apps by
directly to the device. sideloading APK files on Android
devices.
Hardware Control
Aspect Description Examples
Unauthorized Connections
Aspect Description Examples
Mobile Devices that provide Internet access Using a mobile hotspot to connect
Hotspots to multiple systems. various devices to the Internet.
Summary
Term Description
Mobile Device Smartphones and tablets with wireless interfaces, local storage,
and the ability to install apps.
36
Embedded Systems
Aspect Description Examples
ICS Systems within large facilities for Power plants, water treatment facilities.
control and automation.
Isolation Ideally isolated networks to prevent Isolated VLANs with network intrusion
internet access and external attacks. prevention systems (NIPS).
37
System-on-Chip Integrates many computer system Processors, memory,
(SoC) components onto a single chip. input/output interfaces.
38
Example Scenarios
Scenario Explanation
IoT in Home Security Smart cameras and motion sensors connected to a home
security app.
Managing Remote Regular maintenance and updates for industrial IoT devices
Embedded Systems deployed in remote locations.
Summary
Term Description
Internet of Things (IoT) Technologies interacting with the physical world, often using
embedded systems.
Industrial Control Systems within large facilities for control and automation.
Systems (ICS)
39
Hardening Systems Applying patches and segmentation to protect specialized
systems.
Virtualization Concepts
Concept Description Examples
VM Escape Attack An attacker gains access to the host Regularly updating VMs
system from a VM; primary protection and hypervisors to prevent
is keeping systems patched. exploits.
40
Master Image Provides a secure starting point for Deploying a pre-configured and
systems, typically created with tested system image to new
templates. machines.
Change Defines the process for making Requiring approval for changes
Management changes to reduce unintended to production systems.
outages.
Application Controls which applications can or Allow list for approved business
Allow/Block List cannot run on a system. applications; block list for
unauthorized software.
Full Disk Encrypts the entire disk to protect Using BitLocker on Windows
Encryption (FDE) data. systems.
Trusted Platform A hardware chip that supports full TPM used for BitLocker
Module (TPM) disk encryption, secure boot, and encryption and platform integrity
remote attestation. checks.
Data Loss Prevents data loss by blocking Blocking USB ports and
Prevention (DLP) unauthorized transfers and scanning emails for sensitive
monitoring outgoing data. information.
Cloud Concepts
Aspect Description Examples
Cloud Computing Provides additional resources via Using AWS for scalable
the Internet or a hosting provider. computing resources.
41
SaaS (Software as a Web-based applications provided Google Workspace, Microsoft
Service) over the Internet. Office 365.
IaaS (Infrastructure Provides hardware resources via Amazon EC2, Google Cloud
as a Service) the cloud, reducing hardware Platform.
footprint and personnel costs.
Cloud Deployment Public, private, community, and Using a private cloud for
Models hybrid clouds. internal services, a public
cloud for customer-facing
applications.
Mobile Devices
Aspect Description Examples
42
Mobile Devices Includes smartphones and iPhones, Android tablets.
tablets running a mobile OS.
BYOD (Bring Your Employees connect personal Employees using personal laptops
Own Device) devices to the organization’s for work purposes.
network.
CYOD (Choose Your List of approved devices Employees selecting from a list of
Own Device) employees can purchase and company-approved smartphones.
connect to the network.
VDI (Virtual Desktop Virtual desktops that can be Accessing a virtual Windows
Infrastructure) accessed from mobile desktop from an iPad.
devices.
Mobile Device Tools to ensure devices meet Enforcing device encryption, remote
Management (MDM) security requirements, wipe capabilities, application
monitor devices, and enforce control.
policies.
43
Embedded Systems
Aspect Description Examples
IoT (Internet of Devices interacting with the physical Smart thermostats, security
Things) world, often with embedded systems. cameras, medical monitoring
devices, smart meters.
ICS and SCADA Industrial control systems managed by Power plants, water treatment
Systems SCADA systems in large facilities. facilities.
44