CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Sunday, October 27, 2024

Understanding GRE: How It Works, Benefits, Limitations, and Use Cases

 GRE (Generic Routing Encapsulation)

Generic Routing Encapsulation (GRE) is a protocol that allows data packets to be transported over a network by wrapping one packet inside another:

How it works

GRE encapsulates a payload packet inside a GRE packet, which is then encapsulated in a transport protocol like IP. The packet is then redirected to an intermediary host, where it is de-encapsulated and routed to its final destination.

Benefits

GRE can simplify connections between separate networks and enable the use of protocols that are not normally supported by a network.

Limitations

GRE tunnels are stateless, meaning the tunnel's endpoint has no information about the far end. GRE also adds two headers to the packet, which could violate maximum transmission unit (MTU) rules.

Use cases

GRE tunnels are ideal for forwarding internet-bound traffic from a corporate network to a service.

GRE is similar to a VPN, but without encryption. It can be used to bypass open filtering systems, which hackers can use to set up distributed denial of service (DDoS) attacks.

Saturday, October 26, 2024

Smishing 101: How to Stay Safe from Text Message Phishing

 Smishing (SMS / Text Message)

A smishing attack is a cyber attack that uses text messages to trick people into taking actions that are harmful to them, such as sharing personal information or downloading malware. The term "smishing" is a combination of the words "SMS" (short message service) and "phishing".

Here are some examples of smishing attacks:

Fraud alerts

A text message that appears to be from a bank or other financial institution asking for personal information or to verify a transaction

Package delivery

A text message that claims a package was missed or delivered incorrectly, and includes a link to a fake survey

Prize or lottery

A text message that claims the victim has won a prize, and asks them to provide personal information or click a link to claim it

Tech support

A text message that warns the victim of a problem with their device or account, and asks them to contact a tech support number

Smishing attacks can be difficult to detect because text messages often contain less information and fewer clues than emails. To protect yourself from smishing attacks, you can: Avoid clicking links in text messages, Don't provide personal data, Install apps from reputable app stores, and Never share MFA codes.

You can report potential smishing scams to the FCC and FTC.

Understanding Vishing: The Voice Phishing Threat

 Vishing

"Vishing" is a term used for "voice phishing," a type of cybercrime in which attackers use phone calls to trick victims into revealing sensitive personal information, like credit card numbers or login details, by pretending to be a legitimate company or authority figure over the phone; essentially, it's phishing conducted through voice calls instead of email.

Method:

Attackers often use caller ID spoofing to make it appear that they are calling from a trusted source, such as a bank or credit card company.

Goal:

To obtain sensitive information from the victim by using deceptive tactics and social engineering.

Example scenario:

A scammer might call, claiming to be from a bank's fraud department, and ask the victim for credit card details to "verify" a suspicious activity.

ifconfig Basics: Viewing and Modifying Network Settings on Linux/macOS

 Ifconfig (Linux)

ifconfig (short for interface configuration) is a command-line utility used in Unix-like operating systems, including Linux, macOS, and BSD, to configure, control, and query network interface parameters. Here are some key points about ifconfig:

Functionality: It allows users to set IP addresses, subnet masks, and enable or disable network interfaces. It can also be used to view the current configuration of network interfaces.

Usage: Common commands include ifconfig to display all active interfaces, ifconfig [interface] up to enable an interface, and ifconfig [interface] down to disable an interface.

Deprecation: In many modern Linux distributions, ifconfig has been deprecated in favor of the ip command from the iproute2 package, which offers more features and better support for modern networking needs.

Incremental vs. Differential Backups: A Breakdown of Key Differences

 Incremental vs. Differential Backups

The main difference between incremental and differential backups lies in what data they back up and how they handle changes:

Incremental Backup

What it Backs Up: only the data that has changed since the last backup (whether full or incremental).

Backup Speed: Generally faster because it only backs up the most recent changes.

Storage Space: Requires less storage space since each backup contains only the changes made since the last backup.

The restore process is slower and more complex. It requires the last full backup and all subsequent incremental backups to restore the data.

Differential Backup

What it Backs Up: All the data has changed since the last full backup.

Backup Speed: Slower than incremental backups because it backs up more data each time.

Storage Space: Requires more storage space over time as each differential backup grows larger until the next full backup.

Restore Process: This process is faster and simpler, as it only requires the last full backup and the most recent differential backup to restore the data.

Summary

Incremental backups are more efficient regarding backup time and storage space but can be slower to restore.

Differential backups take more time and space for backups but offer quicker and simpler restoration.

Ensuring Data Safety with Regionally Diverse Backups

 Regionally Diverse Backups

Regionally diverse backups, also known as geo-redundant backups, are used to protect data and ensure business continuity in the event of a disaster:

Disaster recovery

By storing data in multiple regions, backups can be used to recover from a disaster and reduce downtime.

Compliance

Backups can be stored in different geographical locations to meet compliance requirements.

Data migration

Regionally diverse backups can migrate data from one region to another.

Resiliency

Backups in multiple regions can help ensure that workloads can continue to run even if one region experiences an outage.

Some examples of regionally diverse backups include:

AWS Backup: Allows customers to copy backups across multiple services to different regions.


Understanding NFC: The Power of Near Field Communication

 NFC (Near Field Communication)

NFC stands for Near Field Communication, a short-range wireless technology that allows devices to exchange information when they are a few centimeters apart. NFC is used in a variety of ways, including:

Contactless payments: NFC-enabled credit cards or mobile wallets can wirelessly communicate with a payment terminal to send encrypted payment information.

Data exchange: NFC can be used to share small amounts of data, such as photos, music, or videos, between two devices.

Connecting to devices: NFC can be used to connect to wireless devices, such as connecting a toy to a video game.

Tracking inventory: NFC can be used to track inventory by scanning products.

Accessing coupons: NFC can be used to access coupons by scanning in-store signs.

NFC is more power-efficient than Bluetooth and is best suited for applications where devices need to be in close proximity.

To check if your device has NFC capabilities, you can look at the backplate of your device.