Module 1 Introduction To Security
Module 1 Introduction To Security
Module 1 Introduction To Security
to Network Security
Fundamentals, 7th Edition
Module 1: Introduction to
Security
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. A
ll Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in
Icebreaker: Class Introduction and Discussion
1. Question: Why is it important for all computer users, not just IT professionals, to
understand the importance of network and computer security?
2. Each student should introduce themselves, explain why they are taking the class, and give
their answer to the question.
3. If this is an online class, responses can be posted in the discussion board and each
student should respond with a minimum of 100 words.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Module Objectives
By the end of this module, you should be able to:
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
What is Information Security?
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Defining Information Security (1 of 2)
• Information security describes the tasks of securing digital information, whether it is:
• Manipulated by a microprocessor
• Preserved on a storage device
• Transmitted over a network
• There are three types of information protection (often called the CIA Triad) :
• Confidentiality
• Only approved individuals may access information
• Integrity
• Ensures information is correct and unaltered
• Availability
• Ensures information is accessible to authorized users
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Defining Information Security (2 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1: Answer
Answer: b. False
As security increases, users of computer systems and software are usually required to
perform additional tasks to abide by the security policies, making the use of they
systems less convenient but more secure.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Who Are the Threat Actors?
• A threat actor is an individual or entity responsible for cyber incidents against the
technology equipment of enterprises and users
• The generic term attacker is also commonly used
• Financial crime is often divided into three categories based on targets:
• Individual users
• Enterprises
• Governments
• There are three types of hackers
• Black hat hackers
• White hat hackers
• Gray hat hacker
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Script Kiddies
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Hacktivists
• Individuals that are strongly motivated by ideology (for the sake of their principles or beliefs)
are hacktivists
• The types of attacks by hacktivists often involved breaking into a website and changing its
contents as a means of a political statement
• Other attacks were retaliatory: hacktivists have disabled a bank’s website that didn’t allow
online payments deposited into accounts belonging to groups supported by hacktivists
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
State Actors
• Governments are increasingly employing their own state-sponsored attackers for launching
cyberattacks against their foes
• These attackers are known as state actors
• Many security researchers believe that state actors might be the deadliest of any threat
actors
• State actors are often involved in multiyear intrusion campaigns targeting highly sensitive
economic, proprietary, or national security information
• A new class of attacks called advanced persistent threat (APT)
• APTs are most commonly associated with state actors
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Insiders
• Employees, contractors, and business partners can pose an insider threat of manipulating
data from the position of a trusted employee
• These attacks are harder to recognize because they come from within the enterprise
• Six out of 10 enterprises reported being a victim of at least one insider attack during 2019
• The focus of the insiders was:
• Intellectual property (IP) theft – 43%
• Sabotage – 41%
• Espionage – 32%
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Other Threat Actors
Threat Actor Description Explanation
Competitors Launch attacks against an opponent’s system May steal new product research or a list
to steal classified information. of current customers to gain a competitive
advantage.
Criminal syndicates Move from traditional criminal activities to Usually run by a small number of
more rewarding and less risky online attacks. experienced online criminal networks that
do not commit crimes themselves but act as
entrepreneurs.
Shadow IT Employees become frustrated with the Installing personal equipment, unauthorized
slow pace of acquiring technology, so they software, or using external cloud resources
purchase and install their own equipment or can create a weakness or expose sensitive
resources in violation of company policies. corporate data.
Brokers Sell their knowledge of a weakness to other Individuals who uncover weaknesses do
attackers or governments. not report it to the software vendor but
instead sell them to the highest bidder who
is willing to pay a high price for the unknown
weakness.
Cyberterrorists Attack a nation’s network and computer Targets may include a small group of
infrastructure to cause disruption and panic computers or networks that can affect
among citizens. the largest number of users, such as the
computers that control the electrical power
grid of a state or region.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 2
Which type of threat actor is often involved in multiyear intrusion campaigns targeting highly
sensitive economic, proprietary, or national security information?
a. Insider
b. State actor
c. Hacktivist
d. Script kiddie
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 2: Answer
Which type of threat actor is often involved in multiyear intrusion campaigns targeting highly
sensitive economic, proprietary, or national security information?
b. State actor
A state actor differs from other threat actors in that their attacks are sponsored by
their government. The attacks are targeted at foreign governments and state
infrastructures with the goal of gaining a competitive advantage on the world stage
or in an actual warfare situation.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Vulnerabilities and Attacks
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Vulnerabilities (1 of 4)
• A vulnerability is the state of being exposed to the possibility of being attacked or harmed
• Cybersecurity vulnerabilities can be categorized into platforms, configurations, third parties,
patches, and zero-day vulnerabilities
• Platforms
• A computer platform is a system that consists of the hardware device and an OS that
runs software
• All platforms have vulnerabilities to some degree, some platforms have serious
vulnerabilities including:
• Legacy platforms
• On-premises platforms
• Cloud platforms
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Vulnerabilities (2 of 4)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Vulnerabilities (3 of 4)
• Third Parties
• Almost all businesses use external entities known as third parties
• Examples of third parties include: outsourced code development, data storage facilities
• Vendor management is the process organizations use to monitor and manage the
interactions with all of their external third parties
• Connectivity between the organization and the third party is known as system integration
• One of the major risks of third-party system integration involves the principle of the
weakest link
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Vulnerabilities (4 of 4)
• Patches
• As important as patches are, they can create vulnerabilities:
• Difficulty patching firmware
• Few patches for application software
• Delays in patching OSs
• Zero Day
• Vulnerabilities can be exploited by attackers before anyone else even knows it exists
• This type of vulnerability is called a zero day because it provides zero days of warning
• Zero-day vulnerabilities are considered extremely serious
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Attack Vectors
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Engineering Attacks (1 of 8)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Engineering Attacks (2 of 8)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Engineering Attacks (3 of 8)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Engineering Attacks (4 of 8)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Engineering Attacks (5 of 8)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Engineering Attacks (6 of 8)
• Physical Procedures
• Physical attacks take advantage of user actions that can result in compromised security
• Three of the most common physical procedures are dumpster diving, tailgating, and
shoulder surfing
• Dumpster Diving involves digging through trash receptacles to find information that can
be useful in an attack
• An electronic variation of physical dumpster diving is to use the Google search
engine to look for documents and data posted online that can be used in an attack
(called Google dorking)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Engineering Attacks (7 of 8)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Engineering Attacks (8 of 8)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 3
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 3: Answer
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Impacts of Attacks (1 of 3)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Impacts of Attacks (2 of 3)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Impacts of Attacks (3 of 3)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4
Which type of data impact would result if an attacker stole a list of customers for the purpose of
selling the list to a competitor?
a. Data loss
b. Data exfiltration
c. Data breach
d. Identity theft
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4: Answer
Which type of data impact would result if an attacker stole a list of customers for the purpose of
selling the list to a competitor?
b. Data exfiltration
Data exfiltration is the stealing of data for the purpose of distributing it or selling it to
other parties. Data exfiltration is a specific type of data breach but not all data
breaches involve data exfiltration. For example, a data breach might change or
corrupt data or deny access to the data by its owner.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Self-Assessment
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (2 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.