CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Saturday, July 24, 2021

Passwordless Authentication: The Future of Secure and Seamless Logins

 Passwordless Authentication

Passwordless authentication replaces traditional passwords with alternative methods for verifying a user's identity, offering enhanced security and a more user-friendly experience. Instead of relying on something the user knows (a password), it utilizes factors like biometrics, possession of a device, or unique digital keys. This approach minimizes the risk of password-related vulnerabilities, such as phishing and theft, while also simplifying the login process.
 
How Passwordless Authentication Works:
Passwordless authentication leverages different methods to verify a user's identity without relying on passwords. Here's a breakdown of common approaches:
1. Biometrics:
  • This method uses unique biological traits like fingerprints, facial recognition, or iris scans to verify identity.
  • Users unlock their devices or access applications by simply scanning their fingerprint or using facial recognition, eliminating the need for passwords.
  • Examples include fingerprint sensors on smartphones or facial recognition features in laptops. 
2. Possession Factors:
  • This approach relies on something the user possesses, like a device or a security key. 
  • One-Time Passwords (OTPs): Users receive a unique, time-sensitive code via SMS or an authentication app, which they enter to log in. 
  • Magic Links: Users receive a link via email or other messaging app. Clicking the link grants access to the user, eliminating the need for a password. 
  • Hardware Security Keys: Users plug in a physical device (like a USB key) to authenticate. 
3. FIDO2/WebAuthn:
  • This standard utilizes public-key cryptography to generate a unique key pair for each website or application.
  • The private key remains securely stored on the user's device (e.g., smartphone, computer), while the public key is registered with the service.
  • When logging in, the service sends a challenge, which the user's device signs using the private key. The service then verifies the signature using the public key. 
Benefits of Passwordless Authentication:

Enhanced Security: Reduces the risk of phishing attacks, password theft, and other vulnerabilities associated with passwords.

Improved User Experience: Eliminates the hassle of remembering and typing complex passwords, making login faster and easier.

Reduced Support Costs: Password-related helpdesk calls decrease as users don't need to reset passwords as frequently.

Increased User Satisfaction: Removing password frustrations leads to a more positive user experience. 

Examples:
Windows Hello: Microsoft's solution for passwordless authentication using facial recognition, fingerprint scanning, or a PIN. 
Google Chrome's Passwordless Login: Chrome allows users to log in to websites using security keys or QR codes linked to their devices. 
Authenticator Apps: Apps like Google Authenticator or Microsoft Authenticator generate time-based one-time passwords (TOTPs) for various services. 

Passwordless authentication represents a significant shift in how we approach digital security, offering a more secure and user-friendly way to access online services. 

Monday, April 12, 2021

CompTIA A+ Questions

 Here are CompTIA A+ Questions, more to be added daily

Sunday, February 7, 2021

IPv4 Subnetting Videos

 Video 1. Intro to IPv4 Subnetting




Video 2.  Converting Dotted Decimal to Binary


Video 3. Subnetting Rules


Video 4. Basic Subnetting Part 1


Video 5. Basic Subnetting Part 2.










Saturday, November 28, 2020

Blue, Red, White, Purple & Yellow Teams explained

 Organization Security Exercise Types

In the context of cybersecurity, red, blue, white, purple, and yellow teams represent different roles focused on enhancing security. Red teams simulate attacks, blue teams defend against them, and purple teams bridge the gap between the two. Yellow teams focus on building secure systems, while white teams oversee the process and ensure compliance. 

Here's a more detailed breakdown:

Red Team: This team acts as the "attacker," simulating real-world cyberattacks to identify vulnerabilities and weaknesses in an organization's systems and defenses. They use techniques like penetration testing and social engineering to assess the effectiveness of security measures. 

Blue Team: This team focuses on defense, protecting the organization's systems and networks from cyberattacks. Their responsibilities include implementing security measures, monitoring for threats, and responding to security incidents. 

Purple Team: This team acts as a bridge between the red and blue teams, facilitating communication and collaboration. They combine red team attack tactics with blue team defense strategies to improve the overall security posture. 

Yellow Team: This team is focused on building secure systems and applications. They work closely with developers to ensure that security is integrated into the design and development process. 

White Team: This team oversees the red/blue/purple team exercises, ensuring that they adhere to rules of engagement, document findings, and provide objective assessments. They also facilitate lessons learned from the exercises. 

Friday, November 27, 2020

DNS Record Types to know for the exam

 DNS RECORD TYPES

Make sure you know the following DNA record types for this exam and how they are used:

A: host (IPv4). Maps the name to an IPv4 address.

AAAA: host (IPv6) Maps the name to an IPv6 address.

CNAME: (Canonical Name): Alias. Example: Sites that use www as the hostname of a web server might internally call it something else, such as Dallwebserver1.

MX: Mail Exchanger. This is used for an email server.

NS: Name Server. Provides a list of the authoritative DNS servers responsible for the domain you are trying to query.

PTR: Pointer. This is a reverse record; it resolves IPv4 or IPv6 addresses to domain names.

SOA: Start of Authority. Keeps track of all of the DNS changes to help with replication.

TXT: Text. Stores descriptive information about the domain in a text format. 

SPF stands for Sender Policy Framework. It helps prevent spammers from sending emails from your domain using the email addresses of your email servers. 

Tuesday, November 24, 2020

WIRELESS AUTHENTICATION METHODS

WIRELESS AUTHENTICATION METHODS

These authenticate the device only. These devices do not use TLS, which is only used with certificates. Do not use a username; only use a password (PSK).

 WEP (Wired Equivalent Privacy)

·       Built on RC4 – uses a 24-bit IV – PSK (Pre-Shared Key)

·       Prone to IV (Initialization Vector) attack

 WPA (Wi-Fi Protected Access)

·       Built on RC4 – uses TKIP (Temporal Key Integrity Protocol)

·       Personal Mode (PSK) or Enterprise Mode (with RADIUS)

·       The PSK is prone to brute force attacks

 WPA2 (Wi-Fi Protected Access 2)

·       Built on AES – uses CCMP

·       Personal Mode (PSK) or Enterprise Mode (with RADIUS)

·       The PSK is prone to brute force attacks

·       AES replaced RC4, CCMP replaced TKIP

 WPA3 (Wi-Fi Protected Access 3)

  • Built on GCMP-256 (Galois/Counter Mode Protocol)
  • Replaces PSK with SAE (Simultaneous Authentication of Equals)

 WPS (Wi-Fi Protected Setup)

  • Connection is generally used with a pushbutton
  • If there is no push button, use the 8-digit PIN at the bottom of the AP
  • Prone to a brute force attack, can be broken in less than 11,000 attempt
  • Tools used for cracking WPS: Reaver, Wifite, Wash 

 The following authenticate the user and require certificates. When using certificates, you must use TLS.

 Enterprise Mode / 802.1x Authentication

  • Using this method requires a RADIUS server
  • Authentication can be accomplished with a username & password, smart card, or token
  • Authentication is used against an enterprise directory service / AAA server / RADIUS
  • 802.1x requires a Supplicant, Authenticator, and Authentication server (AAA / RADIUS) 

 EAP-TLS (Extensible Authentication Protocol-Transport Layer Security)

  • Certificates are needed on both the server and wireless device (Supplicant)
  • Provides mutual authentication
  • Authenticates the user – uses an enterprise directory service

 EAP-TTLS (Extensible Authentication Protocol – Tunneled Transport Layer Security)

  • Certificate on the server only
  • Authenticates the user - uses an enterprise directory service
  • End-to-end protection of authentication credentials

 PEAP (Protected Extensible Authentication Protocol)

  • Certificate on the server only
  • Uses TLS
  • Authenticates the user – uses an enterprise directory service
  • End-to-end protection of authentication credentials

 The following authenticates the user and do not use certificates

 LEAP (Lightweight Extensible Authentication Protocol)

  • Does not require certificates
  • Replaced with EAP-FAST

 EAP-FAST (Flexible Authentication via Secure Tunneling)

  • Do not use certificates
  • Replaced LEAP

 The following is the RADIUS federation

 Multiple organizations allow access to one another’s users

Uses the native 802.1x client (Supplicant)

Each organization has a RADIUS server and joins a mesh

Saturday, August 29, 2020

Facebook Group for study help.

 CompTIA Exam Certification Study Group

I have started a Facebook group to help individuals pass the CompTIA exams: A+, Network+, Security+, and the soon-to-come CySA+. The group will include explanations of different concepts. It will also be a place for questions that individuals need clarification on whether the answers are correct and explanations. 

Below is the link to join the group. 

  https://www.facebook.com/groups/2411609635806164/?epa=SEARCH_BOX