CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Monday, October 14, 2024

The Diamond Model of Intrusion Analysis

 The Diamond Model of Intrusion Analysis

The Diamond Model of Intrusion Analysis is a cybersecurity framework that helps analysts understand and analyze cyber threats and attacks. It uses four components to visualize the relationship between the attacker, victim, and infrastructure during a cyber-attack:

  • Adversary: The actor who uses a capability against the victim
  • Capability: The tools, techniques, and procedures used by the adversary to attack the victim
  • Infrastructure: The underlying infrastructure
  • Victim: The target of the attack

The Diamond Model uses mathematical and cognitive reasoning to trace and authenticate cyber threats. It's a simple yet powerful model that helps analysts create a comprehensive view of cyber attacks.

Here are some ways the Diamond Model is used:

  • Documenting, analyzing, and correlating intrusions: The Diamond Model can document, analyze, and correlate intrusions into an organization's digital, network, and physical environments.
  • Describing threat actor behaviors: The Diamond Model can describe the behaviors of threat actors.
  • Ordering events: The Diamond Model can help order events because threat actors don't take actions in isolation.
  • Creating activity threads: Activity threads can be constructed as adversary-victim pairs.
  • Creating pivots: The logical deductions from traversing the Diamond are called pivots. 

SLO (Service Level Objective)

 SLO (Service Level Objective)

A service level objective (SLO) is a measurable goal for a service's performance over a set period. SLOs are part of a service level agreement (SLA), a formal customer-service provider contract. They set customer expectations and help align the goals of both parties.

Here are some examples of SLOs:

Availability

A web application might have an SLO of 99.9% availability over time.

Response time

A help desk might have an SLO of responding to 90% of requests in less than three minutes.

SLOs are measured using service level indicators (SLIs), quantitative metrics of a service's performance. SLOs should be realistic and achievable while reflecting the desired service quality level. They should also be regularly monitored and reviewed to identify areas for improvement.

Adversary Emulation

 Adversary Emulation

Adversary emulation, also known as adversary simulation, is a cybersecurity practice in which security experts imitate the actions of cyber threat actors to attack an organization's systems. The goal is to improve people, processes, and technology through ethical hacking engagements.

Adversary emulation involves:

  • Penetration testing: This includes network mapping, vulnerability scanning, phishing assessments, and web application testing.
  • Tactics, techniques, and procedures (TTPs): Security experts use the same TTPs that real-world adversaries to target organizations.
  • Training: The goal is to train and improve people, processes, and technology.

Adversary emulation plans (AEPs) include an overview of the plan, the adversary group, the emulation phases, and a biography of sources.

NAT vs. PAT: Understanding IP Address Translation for Secure Networking

 NAT vs PAT

Network Address Translation (NAT) and Port Address Translation (PAT) are both methods used to map private IP addresses to public IP addresses, but they operate differently:

 NAT (Network Address Translation)

  • Function: NAT translates private IP addresses to public IP addresses. This can be done in a one-to-one or many-to-one relationship.
  • Types: There are two main types of NAT:
  • Static NAT: Maps a private IP address to a public IP address.
  • Dynamic NAT: Maps a private IP address to a public IP address from a pool of public addresses.
  • Use Case: NAT is typically used to allow devices within a private network to access the internet by translating their private IP addresses to public ones.

PAT (Port Address Translation)

  • Function: PAT, also known as NAT overload, extends NAT by mapping multiple private IP addresses to a single public IP address using different port numbers.
  • Mechanism: PAT uses the transport layer port numbers to distinguish between multiple private IP addresses sharing a single public IP address.
  • Use Case: PAT is commonly used in home and small office networks to allow multiple devices to share a single public IP address for internet access.

Key Differences

Translation Basis:

  • NAT: Translates IP addresses only.
  • PAT: Translates both IP addresses and port numbers.

Address Mapping:

  • NAT: Can be one-to-one or many-to-one.
  • PAT: Always many-to-one, using port numbers to differentiate traffic.

Usage:

  • NAT: Suitable for scenarios where a direct mapping of IP addresses is needed.
  • PAT: Ideal for conserving public IP addresses by allowing multiple devices to share one public IP address.


RFC 1918 Addresses

 RFC 1918 Addresses

RFC 1918 addresses are IP addresses reserved for private use within internal networks. They are not routable on the public internet, meaning they are used exclusively within private networks. The primary purpose of these addresses is to alleviate the shortage of IPv4 addresses and enhance network security by isolating internal network traffic from the public internet.
 
RFC 1918 specifies three ranges of IPv4 addresses for private use:
 
Class A Private:
10.0.0.0 to 10.255.255.255 (10.0.0.0/8)
Class B Private:
172.16.0.0 to 172.31.255.255 (172.16.0.0/12)
Class C Private
192.168.0.0 to 192.168.255.255 (192.168.0.0/16)

These address ranges are commonly used in home, office, and enterprise networks. Devices within these networks can communicate with each other using these private IP addresses but require a Network Address Translation (NAT) device to communicate with external networks or the internet.

Why Your PC Gets an APIPA Address: Common Causes and Solutions

 APIPA

A PC gets an Automatic Private IP Addressing (APIPA) address when it cannot obtain an IP address from a Dynamic Host Configuration Protocol (DHCP) server. This typically happens due to one of the following reasons: 

DHCP Server Unavailability: If the DHCP server is down or unreachable.

Network Issues: Problems with network connectivity, such as faulty cables or switches, can prevent the PC from contacting the DHCP server.

DHCP Server Exhaustion: If the DHCP server has run out of available IP addresses to assign, the PC will not receive one.

New router: One that isn’t RFC1542 compliant or a new router that doesn’t have DHCP relay (IP Helper) enabled.

When a PC cannot get an IP address from the DHCP server, it assigns itself an IP address from the APIPA range (169.254.0.1 to 169.254.255.255). This allows the PC to communicate with other devices on the same local network that may have an APIPA address, but it won’t be able to access the internet or other networks.

Sunday, October 13, 2024

WAF (Web Application Firewall)

 Web Application Firewall

A web application firewall (WAF) is a security tool that monitors and filters data packets to and from web applications to protect them from threats. WAFs are a critical defense for online businesses that need to protect sensitive data, such as retailers, banks, healthcare, and social media.

Here's how a WAF works:

  • Analyzes HTTP requests: A WAF examines the headers, query strings, and body of HTTP requests.
  • Identifies threats: A WAF searches for malicious requests, suspicious patterns, and known threats.
  • Blocks requests: When a threat is detected, a WAF blocks the request and alerts security teams.

WAFs can protect against a variety of threats, including:

  • Malware
  • Malicious bots
  • Zero-day exploits
  • Cross-site scripting (XSS)
  • SQL injection
  • Cross-site request forgery
  • Distributed denial of service (DDoS) attacks
  • Buffer Overflow

WAFs can be deployed in various ways, including network-based, host-based, or cloud-based. They are usually part of a suite of tools that work together to create a comprehensive defense against various attack vectors.