CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Friday, October 11, 2024

RAM: DDR, DDR2, DDR3, DDR4, DDR5

Differences in PC RAM

1. DDR (Double Data Rate):

  • Speed: 200-400 MHz
  • Voltage: 2.5V
  • Pins: 184
  • Features: First generation of DDR memory, doubling the data rate of SDRAM by transferring data on both the rising and falling edges of the clock signal.

2. DDR2:

  • Speed: 400-1066 MHz
  • Voltage: 1.8V
  • Pins: 240
  • Features: Improved over DDR with higher speeds and lower power consumption. Uses a 4-bit prefetch buffer.

3. DDR3:

  • Speed: 800-2133 MHz
  • Voltage: 1.5V (standard) or 1.35V (low voltage)
  • Pins: 240
  • Features: Further improvements in speed and power efficiency. Uses an 8-bit prefetch buffer.

4. DDR4:

  • Speed: 2133-4800 MHz
  • Voltage: 1.2V
  • Pins: 288
  • Features: Higher speeds, lower power consumption, and increased capacity per module. Uses a 16-bit prefetch buffer.

5. DDR5:

  • Speed: 4800-8400 MHz (and potentially higher)
  • Voltage: 1.1V
  • Pins: 288
  • Features: Significant improvements in speed and efficiency. Supports higher capacity modules and includes features like on-die ECC (Error-Correcting Code) for improved reliability.
These versions of RAM are not interchangeable. For example, you cannot put a stick of DDR4 when the motherboard supports DDR3.

M.2 SSD

 M.2 SSD

M.2 solid-state drives (SSDs) have several features, including:

Size

M.2 SSDs are small and slim, resembling a chewing gum stick, and ideal for laptops, notebooks, and other portable devices. They are smaller than 2.5-inch SSDs and hard drives.

Performance

M.2 SSDs can read and write data faster than SATA or SAS SSDs, mainly if they use the NVMe protocol.

Power efficiency

M.2 SSDs are more power efficient than other SSDs, reducing heat generation and the risk of overheating.

Durability

M.2 SSDs are less likely to be damaged by vibrations and shock.

Flexible interface

M.2 SSDs support PCIe, SATA, USB 3.0, Bluetooth, and Wi-Fi.

Single- or double-sided

Single-sided M.2 boards are used in space-limited devices, while double-sided chips have greater storage capacity.

Physical size

M.2 drives come in different physical sizes, including 30 mm (2230), 42 mm (2242), 60 mm (2260), 80 mm (2280), and 110 mm (22110).

Logical interfaces

M.2 drives can connect to a system using a SATA controller or a PCI-E bus in x2 or x4 mode.

eSATA (External SATA)

 eSATA (External SATA)

An "eSATA" (External Serial ATA) standard allows for connecting external storage devices like hard drives to a computer using a cable that can be up to 2 meters (78 inches) long. This essentially brings the high speeds of internal SATA connections to external peripherals, making it a faster option than traditional USB connections at the time of its introduction.

Full form: External Serial ATA

Function: Enables connecting external storage devices to a computer using a dedicated external SATA port

Cable length: Standard eSATA cables can be up to 2 meters long

Benefit: Provides faster data transfer speeds compared to older external connection methods like USB 2.0

SATA (Serial Advanced Technology Attachment)

 SATA

Serial Advanced Technology Attachment (SATA) is a standard interface that connects a computer's motherboard to storage devices like hard disk drives, solid-state drives, and optical drives:

How it works

Uses a serial communication method to transfer data one bit at a time over a single data line

Advantages

Higher data transfer rates and more efficient use of cables and connectors

Compatibility

Different versions of the SATA standard are compatible with each other

Controller cards

Can fit into an open PCI, PCIe, or PCI Express slot on the motherboard

SATA replaced the earlier Parallel ATA standard to become the predominant interface for storage devices.



CASB (Cloud Access Security Broker)

 Cloud Access Security Broker

A Cloud Access Security Broker (CASB) is a type of enterprise management software that acts as a middle ground between users and cloud services. It essentially controls and monitors access to cloud applications across various devices, ensuring security policies are enforced regardless of where users access data.

Function:

It sits between users and cloud service providers. It acts as a security checkpoint to monitor user activity, enforce access controls, and detect potential security threats on cloud applications like Salesforce, Dropbox, etc.

Visibility:

CASBs provide visibility into all organization cloud service usage, including sanctioned and unsanctioned applications, allowing administrators to identify potential security risks.

Policy Enforcement:

It can enforce various security policies, such as data loss prevention (DLP), user authentication, device profiling, and encryption, to protect sensitive data across different cloud services.

Benefits:

Improved Cloud Security: Helps manage and protect data accessed through cloud applications.

Compliance Management: Enables organizations to adhere to data privacy regulations by monitoring cloud usage.

Threat Detection: Identifies suspicious activities and potential security breaches in cloud environments.

BCP (Business Continuity Plan)

 Business Continuity Plan

A business continuity plan (BCP) is a document that outlines how an organization should respond to and recover from unexpected events. BCPs are essential for helping businesses maintain critical functions and minimize downtime during disruptions.

BCPs should include:

Risk identification: Identify potential risks, such as cyberattacks, natural disasters, or human error

Risk mitigation: Consider how to prevent or reduce the impact of risks

Response and recovery: Outline how to respond to and recover from an incident or crisis

Key personnel: Identify who is needed to maintain critical operations and train them on their roles

Communication: Plan how to communicate with customers, regulators, and other stakeholders

Backup and recovery: Include plans for data backup and recovery and alternate physical locations for employees

BCPs should be regularly updated and tested. They should also be tailored to the organization's specific needs and scale.

BCPs differ from disaster recovery plans, which focus on restoring IT infrastructure and operations after a crisis. However, the two are often considered together and are sometimes abbreviated as BCDR.

OSINT (Open-Source Intelligence)

 Open-Source Intelligence (OSINT)

Open-Source Intelligence (OSINT) refers to the practice of gathering and analyzing information from publicly available sources like websites, social media, news articles, and public databases to gain insights about individuals, organizations, or situations, essentially performing "reconnaissance" without directly interacting with the target, which can be used for various purposes including threat assessment, competitor analysis, and investigative research.

Publicly accessible data:

OSINT only utilizes openly available information, meaning no illegal or unauthorized access is required.

Reconnaissance tool:

A primary use of OSINT is to gather information about a target before launching a more direct attack, similar to how a detective might research a suspect before an interrogation. One tool used to gather OSINT is theharvester.

Applications:

OSINT can be used by cybersecurity professionals to identify potential vulnerabilities in a company's online presence, law enforcement to investigate criminal activities, journalists to verify information, and intelligence agencies to monitor geopolitical situations.

Passive collection:

Unlike active reconnaissance techniques, which might involve directly probing a system, OSINT is considered passive because it only gathers information from publicly available sources.

How OSINT is used:

Social media analysis:

Examining social media profiles to gather personal information like location, employment details, and connections.

Domain and IP address research:

Using tools to identify who owns a domain, locate associated IP addresses, and determine server locations.

Website content analysis:

Extracting information from company websites such as employee lists, contact details, technology stacks, and press releases.

News aggregation:

Monitoring news articles and reports to identify emerging threats or potential incidents.

Data mining:

Using specialized tools to extract relevant information from large datasets collected from various public sources.

Ethical considerations:

Privacy concerns:

While information is publicly available, it's important to consider individual privacy when collecting and analyzing data.

Misuse potential:

Malicious actors can also leverage OSINT techniques to conduct targeted attacks by gathering personal information about individuals or identifying vulnerabilities in an organization's online presence.