This blog is here to help those preparing for CompTIA exams. This is designed to help the exam candidate to understand the concepts, rather than trust a brain dump. CHECK OUT THE BLOG INDEXES!!!
CompTIA Security+ Exam Notes
Let Us Help You Pass
Wednesday, June 26, 2024
Tuesday, June 25, 2024
Having trouble closing an app - Taskkill
Close an app using Tasklist & Taskkill
Monday, June 24, 2024
Windows 10 - Record video on your screen
Record video using Windows 10 Game Bar
Sunday, June 23, 2024
Windows 10 & 11 Task View - Multiple Desktops
Task View - Multiple Desktops
This video shows you how you can use multiple virtual desktops.
Sunday, May 5, 2024
Access Control Methods
ABAC, DAC, MAC, Role-BAC, Rule-BAC
- Operating system
- IP address
- Up-to-date patches
- Up-to-date antimalware
- Employee's identity
- Time of day
- Location
- Type of device
- Based on the owner of the file or folder
- The owner decides who gets access and the type of access
- Windows, Linux, and UNIX use a DAC method
- Each object is assigned a classification label
- Each subject is assigned a clearance level (such as Confidential, Secret, or Top Secret)
- A subject with the label "Secret" would be unable to access "Top Secret" data as it would be above its clearance level.
- Also, based on "Need to know," in other words, not everything will they have access to at its security level.
- Based on your job function (role)
- Group-based security
- Group examples: Accounting, HR, IT, Sales. etc
- System enforced rules
- Some rule triggers the access control
- Time of day
- Conditional access is a form of rule-based access control
- UAC (User Account Control - Windows) and sudo - Linux are examples of conditional access
Wednesday, May 1, 2024
Netstat - Native to Linux / Windows
NETSTAT
- See what ports (services) are in a listening state, both TCP and UDP ports.
- See what files are being accessed and which computers are involved.
- See if any systems are connected before rebooting a server.
- See what process established the connection (such as Zoom, Firefox, Chrome, Edge, etc.)
- Display ethernet statistics
- Display the owning process ID
- Display the routing table
Thursday, April 25, 2024
Tokenization
Credit Cards - Tokenization
Tokenization
is a security technique that replaces sensitive data with a non-sensitive
substitute called a token. Tokens are unique identifiers that link to the
original data but cannot be deciphered to access the original information.
Tokenization
is used in many areas, including:
Payment
processing
Tokenization
protects credit card and bank account numbers by replacing them with
tokens. This removes the connection between the transaction and sensitive
data, making transmitting data over wireless networks safer.
Speech
recognition
Voice-activated
assistants like Siri or Alexa use tokenization to process spoken words. When
you ask a question or command, your spoken words are converted into
text, which is then tokenized.
Commodities
Tokenization
can turn ownership of commodities like oil, gold, or agricultural
products into on-chain tokens, making the market for these assets more
liquid and accessible.
Tokenization
is also known as "masking" or "obfuscation."