CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Wednesday, January 28, 2026

A Comprehensive Guide to Simultaneous Authentication of Equals (SAE) in WPA3

 Simultaneous Authentication of Equals (SAE) 

SAE is a password‑authenticated key exchange (PAKE) protocol used in WPA3‑Personal Wi‑Fi networks.

It replaces the older PSK (Pre‑Shared Key) approach used in WPA2.

SAE is based on the Dragonfly key exchange protocol and provides a far more secure method for establishing encryption keys on wireless networks.

1. Why SAE Exists

Under WPA2-PSK, a weak password made the network vulnerable to:

  • Offline dictionary attacks
    • Attackers could capture the 4‑way handshake and brute‑force it offline without interacting with the network.
  • No forward secrecy
    • If the PSK was discovered later, past traffic could be decrypted.

SAE solves these problems.

2. What SAE Does

SAE provides:

  • Mutual authentication
    • Both the client and the access point demonstrate knowledge of the password without revealing it.
  • Forward Secrecy
    • The encryption keys change for each session.
    • If the password leaks later, old traffic cannot be decrypted.
  • Protection from Offline Cracking
    • An attacker cannot capture a handshake and brute‑force it later.
    • They must perform live, interactive attempts—slowing attacks drastically.
  • Resistance to Passive Attacks
    • Simply listening to the traffic gives no useful information about the password.

3. How SAE Works (Step-by-Step)

SAE is a two‑phase handshake:

Phase 1 – Commit Exchange

Both sides (client and AP):

1. Convert the shared Wi‑Fi password into a Password Element (PWE).

  • PWE is derived from the password and the two MAC addresses.
  • Ensures the handshake is unique for each client–AP pair.

2. Generate a random number (their private “secret”).

3. Compute:

  • A commit scalar
  • A commit element

4. Exchange these values openly over the air.

Important:

Even though the commit values are public, they cannot be used to derive the password.

Phase 2 – Confirm Exchange

Both sides:

1. Compute the shared secret key using:

  • Their own private random number
  • The other party’s commit element

2. Derive a session key (PMK).

3. Exchange confirm messages proving they derived the same key.

If confirm messages match → authentication succeeds.

4. Key Properties of SAE

  • Offline Attack Resistance
    • An attacker capturing SAE handshakes gets no password-derivable data.
  • Forward Secrecy
    • Keys change for every session.
  • Anti-Clogging
    • To prevent DoS attacks (spamming commit messages), the AP can require "anti-clogging tokens" before continuing.
  • Mutual Authentication
    • Both sides prove knowledge of the password.

5. How SAE Differs from WPA2‑PSK

6. Where SAE Is Used

SAE is the mandatory authentication method for:

  • WPA3-Personal
  • Wi-Fi Enhanced Open (for upgrade paths)
  • Enterprise environments that enable "Transition Mode"

7. Common Terms Related to SAE

  • Dragonfly Key Exchange — underlying cryptographic design.
  • Password Element (PWE) — ECC point representing the password.
  • Commit & Confirm messages — two-step handshake communication.
  • PMK (Pairwise Master Key) — key derived from SAE for the 4‑way handshake.

8. Why SAE Is Considered Secure

Because SAE:

  • Never transmits information usable to guess the password
  • Requires an attacker to interact for every guess
  • Uses elliptic-curve Diffie-Hellman
  • Uses strong hashing of the PWE
  • Provides fresh keys per session

This combination makes it substantially more secure than WPA2-PSK.

Summary

SAE (Simultaneous Authentication of Equals) is the WPA3 authentication method designed to prevent:

  • Offline dictionary attacks
  • Decryption of old traffic
  • Reuse of stale session keys
  • Weaknesses inherent to WPA2-PSK

It accomplishes this through a secure, mutual, password-authenticated key exchange that provides forward secrecy and robust resistance to brute-force attacks.

Tuesday, January 27, 2026

SY0-701 Exam prep questions

 YOU DO NOT NEED TO USE YOUR EMAIL ADDRESS TO TAKE THIS QUIZ.

Understanding CYOD: The Enterprise Model That Blends Flexibility and Control

 CYOD (Choose Your Own Device)

What Is CYOD (Choose Your Own Device)?
CYOD (Choose Your Own Device) is an enterprise mobility strategy in which an organization offers employees a pre-approved list of devices (laptops, tablets, smartphones) and allows them to choose the model they prefer.

The key idea: employees get choice, but the company maintains control.

In a CYOD program:
  • The company buys or leases the devices, or in some cases subsidizes them.
  • The employee chooses from a controlled selection of hardware.
  • The IT department manages the devices for security, compliance, and support.
  • The devices are registered, secured, and maintained as corporate assets.

This creates a balance between employee freedom and organizational security.

Why CYOD Exists
With the rise of mobile work, companies needed a way to support:
  • Employee preference for modern devices
  • Corporate security requirements
  • Standardized IT support
  • Efficient lifecycle management
CYOD emerged as a middle ground between two extremes:

BYOD (bring any device you own)
COBO (corporate-owned, business-only, no choice)

How CYOD Works
1. IT Defines the Approved Device List
IT teams choose devices based on:
  • Security capabilities
  • Operating system versions
  • Enterprise feature support
  • Vendor relationships
  • Budget
\Example device lists:
  • Smartphones: iPhone 15, Samsung Galaxy S24, Google Pixel 9
  • Laptops: Dell Latitude, HP EliteBook, MacBook Air/Pro
  • Tablets: iPad, Surface Pro
2. Employees Select Their Preferred Device
Employees choose from the list based on:
  • Familiarity
  • Comfort
  • Performance needs
  • Accessibility requirements
3. Devices Are Configured and Secured
IT handles:
  • OS hardening
  • MDM enrollment (e.g., Intune, MobileIron, VMware Workspace ONE)
  • Encryption
  • Compliance settings
  • Company apps installation
4. Device Lifecycle Management
IT manages:
  • Warranty and repairs
  • Software updates
  • Security monitoring
  • Replacement cycles (typically 2–4 years)
Benefits of CYOD
1. Stronger Security and Compliance
Since devices are standardized and IT-approved:
  • Fewer vulnerabilities
  • Consistent patching
  • Controlled OS versions
  • Easier compliance with regulations (HIPAA, GDPR, PCI-DSS, etc.)
2. Better IT Support
With fewer device variations, support teams can:
  • Troubleshoot faster
  • Maintain shared device images
  • Use unified MDM policies
3. Higher Employee Satisfaction
Employees still get:
  • A device they like
  • Freedom to choose between brands/styles
  • Modern, high‑quality hardware
4. Cost Control
Organizations can negotiate bulk pricing, manage warranties, and plan refresh cycles efficiently.

Challenges of CYOD

1. Higher Cost Than BYOD
Because companies still purchase or subsidize the devices.
2. Limited Personalization
Employees must choose only from the approved list.
3. Device Management Overhead
IT still must:
  • Manage device inventory
  • Maintain MDM tools
  • Provide support
4. Balancing Choice With Standardization
Too many device options can overwhelm IT; too few options frustrate employees.

CYOD vs. BYOD vs. COPE vs. COBO


CYOD strikes a balance between user freedom and enterprise control.

When Companies Use CYOD

CYOD works especially well for:
  • Organizations with strict security needs but still want modern UX
  • Remote or hybrid workplaces
  • Companies with large mobile workforces
  • Businesses want consistent hardware standards
  • Companies adopting zero‑trust security models
Industries that commonly use CYOD:
  • Healthcare
  • Finance
  • Technology
  • Government
  • Education
  • Manufacturing
In Summary
CYOD gives employees choice while allowing organizations to maintain strict control over hardware, security, and support.

It offers:
  • Greater security than BYOD
  • More flexibility than COBO
  • Better user satisfaction than COPE
  • Predictable support and lifecycle costs

The Hidden Biases in AI: How Data Shapes Fairness and Accuracy

 Data Bias in Artificial Intelligence

Data bias in artificial intelligence (AI) refers to systematic errors or unfair patterns that arise when the data used to train an AI system is not fully representative, is skewed, or reflects existing societal inequalities. Because AI models learn patterns from the data they are given, any bias in that data can lead to biased outcomes.

Here’s a clear breakdown:

What Causes Data Bias?
1. Historical Bias
Even if data is collected perfectly, it can still reflect past inequalities or norms.
Example: Hiring data from a company that historically hired mostly men will cause an AI résumé screener to prefer male candidates.

2. Sampling Bias
The dataset doesn't represent the full population or scenario the AI will be used for.
Example: A facial recognition system trained mostly on lighter‑skinned faces performs poorly on darker‑skinned individuals.

3. Measurement Bias
Inaccurate or inconsistent data collection affects outcomes.
Example: Using self‑reported health metrics from one demographic but clinical measurements from another.

4. Label Bias
Human annotators bring their own assumptions into the labeling process.
Example: Annotators label certain dialects of speech as “aggressive” more often.

5. Algorithmic Amplification
Even small biases in data can be amplified by feedback loops.
Example: If a predictive policing tool directs more police to certain neighborhoods, more crimes will be recorded there, reinforcing the model’s belief that those areas need more policing.

Why Data Bias Matters

Fairness Issues
Biased AI systems can unfairly penalize or discriminate against groups of people based on race, gender, age, disability, or socioeconomic status.

Accuracy Problems
Bias reduces model performance by making predictions less generalizable.

Legal & Ethical Risks
Organizations can face regulatory penalties or reputational damage if their AI systems cause harm or discrimination.

Real-World Examples
  • Facial recognition models have shown higher error rates for women and people with darker skin tones.
  • Automated loan approval systems have been found to give worse terms to certain demographic groups.
  • Medical algorithms have sometimes underestimated risk for certain ethnic groups due to flawed data.
How to Reduce Data Bias

1. Improve Data Diversity
Ensure datasets include all relevant groups and scenarios.
2. Conduct Bias Audits
Regularly test data and models for performance disparities.
3. Use Fairness Techniques
Methods such as re-weighting, re-sampling, or algorithmic fairness constraints.
4. Increase Transparency
Document how data was collected, cleaned, and labeled (e.g., through model cards or data sheets).
5. Involve Diverse Teams
Different perspectives reduce the chance of blind spots.

In a Nutshell
Data bias in AI isn’t just a technical issue, it’s a human issue. AI mirrors the data it learns from, so creating fair and accurate systems requires attention to how data is collected, labeled, and applied.

Saturday, January 3, 2026

What Is Fast Identity Online (FIDO) and How Does It Work?

 FIDO (Fast Identity Online)

Fast Identity Online (FIDO) is an open standard for online authentication that replaces traditional password-based systems with stronger, more straightforward, and more secure methods. Here’s a detailed explanation:

1. What is FIDO?
  • FIDO stands for Fast Identity Online.
  • It is developed by the FIDO Alliance, a consortium of tech companies (including Google, Microsoft, PayPal, etc.) focused on creating authentication standards that reduce reliance on passwords.
  • The goal: secure, user-friendly, interoperable passwordless authentication across devices and platforms.
2. Why FIDO Exists
  • Passwords are vulnerable to phishing, credential stuffing, and data breaches.
  • FIDO addresses these issues by using public key cryptography and device-based authentication, making it resistant to common attacks.
3. How FIDO Works
  • Public Key Infrastructure (PKI):
    • When a user registers with a service, their device creates a key pair:
      • Private key: Stored securely on the user’s device.
      • Public key: Shared with the service.
  • Authentication:
    • The service sends a challenge.
    • The device signs the challenge with the private key.
    • The service verifies the signature using the public key.
  • No shared secrets (like passwords) are transmitted, reducing risk.
4. FIDO Protocols
  • FIDO UAF (Universal Authentication Framework):
    • Passwordless login using biometrics or PIN.
  • FIDO U2F (Universal 2nd Factor):
    • Adds a physical security key as a second factor.
  • FIDO2:
    • Combines WebAuthn (a W3C standard for browsers) and CTAP (Client to Authenticator Protocol).
    • Enables passwordless authentication across web and mobile.
5. Key Features
  • Strong Security: Based on asymmetric cryptography.
  • Privacy: No biometric data or private keys leave the device.
  • Interoperability: Works across platforms and browsers.
  • User Convenience: Supports biometrics, PINs, and hardware tokens.
6. Benefits
  • Eliminates password-related risks.
  • Reduces phishing and credential theft.
  • Improves user experience with faster, easier login.
7. Common Use Cases
  • Logging into websites without passwords.
  • Multi-factor authentication using security keys.
  • Enterprise authentication for employees.

Friday, January 2, 2026

What Is an Attestation of Compliance (AOC) and Why It Matters for PCI DSS

 Attestation of Compliance

The Attestation of Compliance (AOC) is a formal document used in the Payment Card Industry Data Security Standard (PCI DSS) compliance process. It serves as an organization's declaration that it has met PCI DSS requirements for securing cardholder data. Here’s a detailed breakdown:

1. Purpose of the AOC
  • The AOC is a confirmation statement that the organization has completed its PCI DSS assessment and is compliant.
  • It is submitted to acquiring banks, payment brands, or other stakeholders to demonstrate compliance.
2. Who Needs an AOC?
  • Merchants and Service Providers who handle cardholder data.
  • Required by organizations that process, store, or transmit payment card data.
3. When is it required?
  • After completing a Self-Assessment Questionnaire (SAQ) or a Report on Compliance (ROC).
  • Typically required annually or upon a significant environmental change.
4. Components of the AOC
The AOC includes:
  • Organization Information: Name, address, contact details.
  • Assessment Details:
    • Type of assessment (SAQ or ROC).
    • Date of assessment.
  • Scope of Compliance:
    • Systems, processes, and locations covered.
  • Validation Method:
    • Whether compliance was validated by a Qualified Security Assessor (QSA) or internally.
  • Attestation Statement:
    • Signed by an authorized officer confirming compliance.
5. Types of AOC
  • Merchant AOC: For businesses accepting card payments.
  • Service Provider AOC: For companies providing services that involve cardholder data.
6. Why is it Important?
  • Demonstrates due diligence in protecting cardholder data.
  • Helps avoid fines and penalties from payment brands.
  • Builds trust with partners and customers.
7. Common Mistakes
  • Incorrect scope definition.
  • Missing signatures or incomplete details.
  • Submitting outdated versions of the AOC template.

Thursday, January 1, 2026

Mastering Zero Standing Privileges: Principles, Benefits, and Implementation Strategies

 Zero Standing Privileges (ZSP)

Zero Standing Privileges (ZSP) is a privileged access management (PAM) strategy that removes all permanent or always‑on access rights from users and systems. Instead of having ongoing privileges, identities receive temporary, just‑in‑time (JIT) access only when needed, for only as long as necessary, and only after verification.

According to CyberArk, ZSP “advocates for the removal of all persistent privileges for users” and grants access only when temporary authorization is approved. Keeper Security similarly defines ZSP as removing all permanent access and requiring users to request temporary access for each task.

This approach is a natural evolution of Zero Trust and least privilege.

1. What Standing Privileges Are

Standing privileges are ongoing, always‑available access rights assigned to human or machine identities. These privileges exist even when the user is not actively performing administrative tasks.

Examples include:

  • Domain admin accounts
  • Cloud IAM roles with broad permissions
  • Service accounts with persistent access
  • SaaS admin roles

CyberArk notes that standing privileges exist across hybrid and multi‑cloud environments and pose a significant risk if compromised.

2. Why Standing Privileges Are Dangerous

Standing privileges dramatically increase the attack surface. If an attacker compromises an account with standing privileges, they can:

  • Steal credentials
  • Move laterally
  • Escalate privileges
  • Access sensitive systems
  • Exfiltrate data

Keeper Security highlights risks such as privilege creep, where users accumulate more access than necessary over time, and privilege escalation, where attackers exploit compromised accounts to gain additional access.

This aligns with the Zero Trust “assume breach” mindset.

3. What Zero Standing Privileges Actually Do

ZSP eliminates all permanent entitlements. No user or system has built‑in access to anything, not even basic admin functions.

Instead, ZSP enforces:

Just‑In‑Time (JIT) Access

Temporary access is granted only when needed and automatically removed afterward. StrongDM explains that JIT generates new credentials for each request and destroys them once the task completes.

Continuous Identity Verification

Users must authenticate and justify access every time.

Ephemeral Privileges

Access rights are valid only for minutes or hours, not for days or months.

Auditability

Every access request is logged, reviewed, and traceable.

4. How ZSP Works (Step-by-Step)

A. User Requests Access

They specify:

  • What system do they need
  • Why do they need it
  • For how long

B. Identity Verification

  • Multi-factor authentication (MFA), device posture checks, or risk scoring.

C. Just‑In‑Time Provisioning

  • A temporary role, token, or credential is created.

D. Time‑Bound Access

  • Users perform the task within a limited window.

E. Automatic Revocation

  • Credentials expire or are destroyed.

F. Full Audit Trail

  • Every action is logged for compliance and forensics.

5. ZSP vs. Least Privilege

Strong DM explains the difference clearly:

  • Least Privilege: Users have only the minimal standing access needed for daily tasks.
  • Zero Standing Privilege: Users have no standing access; all requests are JIT.

ZSP is stricter and more secure.

6. Benefits of Zero Standing Privileges

A. Massive Reduction in Attack Surface

  • No standing privileges = nothing for attackers to steal.

B. Stops Lateral Movement

  • Attackers can’t pivot without persistent privileges.

C. Eliminates Privilege Creep

  • Access is temporary and purpose‑bound.

D. Strong Alignment with Zero Trust

  • “Never trust, always verify” becomes operationalized.

E. Better Compliance

Auditable, time‑bound access supports:

  • SOX
  • HIPAA
  • PCI DSS
  • FedRAMP
  • ISO 27001

F. Cloud Security

  • Dynamic cloud environments benefit from ephemeral access rather than static IAM roles.

7. How Organizations Implement ZSP

A. Privileged Access Management (PAM) Tools

Modern PAM platforms automate:

  • JIT access
  • Credential rotation
  • Session recording
  • Approval workflows

B. Identity Governance

  • Define who can request what and under what conditions.

C. Automation

  • Access is granted and revoked automatically.

D. Policy Enforcement

Rules define:

  • Access duration
  • Required approvals
  • Allowed systems

E. Continuous Monitoring

  • Detect anomalies and revoke access instantly.

8. Challenges and Considerations

A. Cultural Resistance

  • Admins are used to persistent access.

B. Workflow Changes

  • Teams must adapt to requesting access.

C. Tooling Requirements

  • It requires PAM, IAM, and automation integration.

D. Legacy Systems

  • Older systems may not support ephemeral access.

Final Thoughts

Zero Standing Privileges is one of the most potent modern security strategies. It eliminates the risks associated with always‑on access, enforces Zero Trust principles, and dramatically reduces the blast radius of credential theft.

It’s not just a best practice; it’s becoming a necessity in cloud‑first, identity‑centric environments.