General Security Concepts
12% of ExamSecurity controls, CIA triad, cryptography, PKI, authentication, and zero trust.
Exam Objectives
- 1.1Compare and contrast various types of security controls
- 1.2Summarize fundamental security concepts
- 1.3Explain the importance of change management processes and the impact to security
- 1.4Explain the importance of using appropriate cryptographic solutions
1.1Security Controls
Categories
- Technical — Firewalls, encryption, access controls
- Managerial — Policies, procedures, risk management
- Operational — Day-to-day security audits, monitoring
- Physical — Locks, biometrics, surveillance cameras
Types
- Preventive — Stop incidents (firewalls, auth)
- Deterrent — Discourage attackers (signs, cameras)
- Detective — Identify incidents (IDS, audits)
- Corrective — Restore after incident (IR plans, backups)
- Compensating — Alternative when primary fails
- Directive — Guidance on compliance (policies, training)
1.2Fundamental Security Concepts
The CIA Triad — Core Security Principles
AAA Framework
- Authentication — Verify identity (who you are)
- Authorization — Grant access (what you can do)
- Accounting — Track actions for audit
Zero Trust Architecture
"Never trust, always verify" — No implicit trust regardless of location.
- Control Plane: Policy Engine, Administrator, Enforcement Point
- Data Plane: Implicit trust zones, subject/system access
- Adaptive Identity: Context-based dynamic authentication
Physical Security
Deception Technologies
1.3Change Management & Security
Change Management Process
- 1. Approval Process — Review and authorize changes
- 2. Ownership — Assign responsibility
- 3. Stakeholders — Identify affected parties
- 4. Impact Analysis — Assess security implications
- 5. Test Results — Validate before deployment
- 6. Backout Plan — Rollback if change fails
- 7. Maintenance Window — Scheduled time for changes
Technical Change Management
- Allow/Deny Lists — Control application execution
- Restricted Activities — Limit high-risk operations
- Downtime — Planned outages for maintenance
- Legacy Applications — Handle outdated systems
- Dependencies — Track system interdependencies
- Version Control — Track and manage changes
1.4Cryptographic Solutions
Encryption Types
- Symmetric — Same key for encrypt/decrypt. Fast. Examples: AES, DES, 3DES
- Asymmetric — Public/private key pair. Slower. Examples: RSA, ECC, Diffie-Hellman
- Hashing — One-way transformation. Examples: SHA-256, MD5, bcrypt
PKI & Certificates
- CA — Certificate Authority; issues/manages digital certificates
- CRL — Certificate Revocation List of invalid certs
- OCSP — Online Certificate Status Protocol (real-time)
- CSR — Certificate Signing Request to a CA
- Wildcard — Secures all subdomains of a domain
- Root of Trust — Trusted anchor for all crypto operations
Hashing & Obfuscation
- Hashing — Fixed-size output; non-reversible
- Salting — Random data before hashing; prevents rainbow tables
- Digital Signatures — Verify authenticity and integrity
- Key Stretching — Increases effort to crack passwords (bcrypt, PBKDF2)
- Steganography — Hiding data within other data
- Tokenization — Replace sensitive data with tokens
Crypto Hardware & Blockchain
- TPM — Trusted Platform Module; hardware key storage
- HSM — Hardware Security Module; dedicated crypto hardware
- Key Escrow — Keys stored by trusted third party
- Secure Enclave — Isolated hardware for sensitive processing
- Blockchain — Distributed decentralized ledger; transparent and immutable
- Non-repudiation — Sender cannot deny sending (digital signatures)