what's new in comptia security+ - course technology computing conference

105
What's New In CompTIA Security+ Mark Ciampa

Upload: cengage-learning

Post on 15-May-2015

1.358 views

Category:

Education


4 download

DESCRIPTION

What's New In CompTIA Security+ - Course Technology Computing Conference Presenter: Mark Ciampa, Western Kentucky University The new CompTIA Security+ exam (SY0-401) is projected to be rolled out in the late spring of 2014. This exam will have several significant changes from the previous exam. These include an expanded emphasis on topics such as securing mobile devices, cloud computing, cryptography, and threats and vulnerabilities. In addition, CompTIA is continuing to use performance-based questions on Security+ exams, requiring test-takers to configure firewall access control lists, match ports with services, and analyze log files. What exactly will the new Security+ exam cover? How will the updated Cengage Security+ Guide to Network Security Fundamentals 5th Edition address these changes? And what are the best ways to help students be prepared for the new Security+ exam with its performance-based questions? This session will look at what's new in CompTIA Security+ and how we can teach security to our students.

TRANSCRIPT

Page 1: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+Mark Ciampa

Page 2: What's New In CompTIA Security+ - Course Technology Computing Conference

431 Million

• A – The current population of the U.S. • B – How many steps are needed to reach

your room here in the Opryland Hotel• C – The number of adults worldwide who

experienced cybercrime last year

2

Page 3: What's New In CompTIA Security+ - Course Technology Computing Conference

14 Each Second

• A – The number of infants born worldwide every day

• B – The number of emails you receive from your most needy student

• C – The frequency of a cybercrime incident worldwide

3

Page 4: What's New In CompTIA Security+ - Course Technology Computing Conference

79%

• A – Average pay raise of college presidents over the last 5 years

• B – The number of Cengage employees who use cengage as a password

• C – Percentage of Internet users spending 49+ hours per week online who are a victim of cybercrime

4

Page 5: What's New In CompTIA Security+ - Course Technology Computing Conference

Illicit Drugs

• A – The biggest threat on your campus

• B – What you will need after enduring this presentation

• C – The only activity that nets more revenue than cybercrime

5

Page 6: What's New In CompTIA Security+ - Course Technology Computing Conference

More Bad News• Web pages that infect by simply looking at them

(6,000 new infected pages daily, or 1 every 14 seconds)

• More attacks originate in U.S. than any other country (33%)

• Home users were the most highly targeted sector (93% all targeted attacks)

• An infected U.S. computer has an average of 8 instances of malware

• U.S. has highest number of infected computers

6

Page 7: What's New In CompTIA Security+ - Course Technology Computing Conference

Users Are Still Confused• Massive data breach from computers belonging to South

Carolina's Department of Revenue (DOR)• Exposed Social Security numbers of 3.8 million taxpayers

plus credit card & bank account data for total of 74.7 GB • Started with employee's computer infected with malware

after user opened phishing e-mail• Attacker captured the person's username and password• Installed tools that captured user account passwords on

6 servers• Eventually gained access to 36 other systems

7

Page 8: What's New In CompTIA Security+ - Course Technology Computing Conference

Users Are Still Confused• 2012 survey of American, British and German adult computer

users• 40% not always update software on computers when they

initially prompted• 25% said do not clearly understand what software updates do• 25% said do not understand the benefits of updating

regularly• 75% said saw update notifications but over half said needed

to see notification between 2-5 times before decided• 25% said do not know how to check if their software needs

updating

8

Page 9: What's New In CompTIA Security+ - Course Technology Computing Conference

Uses Are Still Confused

• 88% use their home computer for online banking, stock trading, reviewing personal medical information, and storing financial information, health records, and resumes

• 98% agree important to be able to know risk level of a web site before visiting it (But 64% admit don’t know how to)

• 92% think that their anti-virus software is up to date (But only 51% have current anti-virus software that been updated within last 7 days)

9

Page 10: What's New In CompTIA Security+ - Course Technology Computing Conference

Users Are Still Confused

• 44% don’t understand firewalls• 25% have not even heard of the term “phishing”

and only 13% can accurately define it • 22% have anti-spyware software installed, an

enabled firewall, and anti-virus protection that has been updated within last 7 days

10

Page 11: What's New In CompTIA Security+ - Course Technology Computing Conference

Why Increase In Attacks• Speed of attacks• More sophisticated attacks• Simplicity of attack tools• Faster detection weaknesses• Delays in user patching• Distributed attacks• Exploit user ignorance & confusion

11

Page 12: What's New In CompTIA Security+ - Course Technology Computing Conference

User Confusion

• Confusion over different attacks: Worm or virus? Adware or spyware? Rootkit or Trojan?

• Confusion over different defenses: Antivirus? Firewall? Patches?

• Users asked to make security decisions and perform technical procedures

12

Page 13: What's New In CompTIA Security+ - Course Technology Computing Conference

Think Of a User• Will you grant permission to open this

port?• Is it safe to un-quarantine this

attachment?• May I install this add-in?

13

Page 14: What's New In CompTIA Security+ - Course Technology Computing Conference

User Misconceptions• I don’t have anything on my computer

they want• I have antivirus software so I’m protected• The IT Department takes care of security

here at school or work• My Apple computer is safe.

14

Page 15: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+• The new CompTIA Security+ exam (SY0-401) is projected to be rolled out in the late

spring of 2014. This exam will have several significant changes from the previous exam. These include an expanded emphasis on topics such as securing mobile devices, cloud computing, cryptography, and threats and vulnerabilities. In addition, CompTIA is continuing to use performance-based questions on Security+ exams, requiring test-takers to configure firewall access control lists, match ports with services, and analyze log files. What exactly will the new Security+ exam cover? How will the updated Cengage Security+ Guide to Network Security Fundamentals 5th Edition address these changes? And what are the best ways to help students be prepared for the new Security+ exam with its performance-based questions? This session will look what's new in CompTIA Security+ and how we can teach security to our students.

Page 16: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+

• Current state of security• New CompTIA Security+ exam (SY0-401) • Teaching Security+ • Security+ Guide to Network Security

Fundamentals 5th Edition

Page 17: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+Current State of Security

Page 18: What's New In CompTIA Security+ - Course Technology Computing Conference

18

Page 19: What's New In CompTIA Security+ - Course Technology Computing Conference

Number of Target Victims

• Current US Population• 110,000,000 – Target victims

19

Page 20: What's New In CompTIA Security+ - Course Technology Computing Conference

How It All Started

• Malwarebytes antivirus• Phishing email message

20

Page 21: What's New In CompTIA Security+ - Course Technology Computing Conference

Real-time Protection

21

Page 22: What's New In CompTIA Security+ - Course Technology Computing Conference

Phishing Email

22

Page 23: What's New In CompTIA Security+ - Course Technology Computing Conference

23

Page 24: What's New In CompTIA Security+ - Course Technology Computing Conference

Wireless Baby Monitor• Marc G. was his kitchen when started hear strange sounds coming from

the nursery of his two-year-old daughter Allyson• Marc and wife entered the nursery and heard a stranger's voice calling

out Allyson's name, cursing at her and calling her vile names• Voice was coming from the electronic baby monitor in Allyson's room

that contained a camera, microphone, and speaker connected to their home Wi-Fi network

• Because they did not have any security set on their wireless network, the attacker had been able to take control of the baby monitor from an unknown remote location

• Parents surmised that the attacker knew their daughter's name because he saw "Allyson" spelled out on the wall in her room

• Estimated that there are more than 100,000 wireless cameras that can be easily be exploited because they have virtually no security.

24

Page 25: What's New In CompTIA Security+ - Course Technology Computing Conference

25

Page 26: What's New In CompTIA Security+ - Course Technology Computing Conference

Twitter• Twitter account of Associated Press (AP) was broken into and a

fictitious tweet was posted claiming there were "two explosions in the White House and [the U.S. President] is injured“

• Even though the tweet was only visible for a matter of minutes before it was removed, because of this fictitious tweet the Dow Jones industrial average dropped immediately (it recovered later in the day)

• CBS television websites 60 Minutes and 48 Hours, the New York Times, the Wall Street Journal, the Washington Post, Burger King, and Jeep have been victims of recent Twitter break-ins

• U.S. Securities and Exchange Commission (SEC) recently said that it would allow public companies to disclose corporate information on social media sites like Twitter

26

Page 27: What's New In CompTIA Security+ - Course Technology Computing Conference

27

Page 28: What's New In CompTIA Security+ - Course Technology Computing Conference

Prepaid Debit Cards• Attackers penetrated the network of a credit card processing company that

handles prepaid debit cards• Manipulated the balances and limits on just 5 prepaid cards then used

withdraw cash from ATMs• One month almost $5 million was fraudulently withdrawn from ATM machines

around the world in 5700 transactions• Cell in New York City withdrew $400,000 in 750 fraudulent transactions at 140

ATM locations in the city in only 2.5 hours• A similar attack manipulated balances and withdrawal limits on 12 more cards

to withdraw an additional $40 million from ATM machines around the world• New York City cell withdrew $2.4 million in 3000 ATM transactions in just 10

hours.28

Page 29: What's New In CompTIA Security+ - Course Technology Computing Conference

29

Page 30: What's New In CompTIA Security+ - Course Technology Computing Conference

Economic Development Administration• Recently Department of Homeland Security (DHS)

warned Commerce Department that a "potential" malware infection could be occurring within its networks

• Security administrators at the Commerce Department identified potentially infected computers as belonging to Economic Development Administration (EDA)

• Email sent by Commerce Department security administrators to the EDA said that they found 146 EDA systems that could potentially be infected

• In reality, only 2 actually were infected30

Page 31: What's New In CompTIA Security+ - Course Technology Computing Conference

Economic Development Administration• Next day Commerce Department sent a follow-up email correcting the

numbers but second email was vague and did not point out the first email was inaccurate

• EDA interpreted the second email as a confirmation of the first warning• Confirmed when EDA performed a forensic analysis on 2 computers listed in

the second email and found evidence of an infection• Commerce Department told the EDA to reimage the computers (meaning 2

computers) to clean them of malware• But the EDA interpreted it as an instruction to clean at least 146 systems• When EDA said that there were too many computers to reimage (across a

network 50 computers can easily be re-imaged in one day) the Commerce Department incorrectly assumed that the EDA had found more computers that were infected

• Chief Information Officer (CIO) of EDA instructed that their computers should be isolated from the network

31

Page 32: What's New In CompTIA Security+ - Course Technology Computing Conference

Economic Development Administration• Later CIO decided that these computers should be physically

destroyed: not just the hard drives cleaned or replaced, but the entire systems--along with mice and keyboards--should be crushed

• In 8 months EDA had spent all of the money allocated for this destruction--$170,000--and had to stop

• Had their sights set on destroying over $3 million worth of computer systems

• The next month the EDA requested from the Commerce Department's IT Review Board over $26 million over the next three years to fund its recovery efforts (request was denied)

• EDA spent 50% of its entire IT budget ($2.7 million) in personnel and related costs to address a total of 2 infected computers

32

Page 33: What's New In CompTIA Security+ - Course Technology Computing Conference

Economic Development Administration• Department of Commerce launched a "comprehensive

incident response improvement project“• Project has already used a third party to review its

incident response capabilities, hired three experienced incident handlers, and put a new security incident tracking system in place

• It is unknown how much this new project will finally cost.

33

Page 34: What's New In CompTIA Security+ - Course Technology Computing Conference

Emily Williams• U.S. federal government agency that specialized in "offensive cybersecurity"

had been resistant to technology-based penetration testing in the past• Pen testers turned to social engineering• Created a fake online profile of "Emily Williams," an attractive 28-year-old

who graduated from MIT and had several years of security experience• Profiles of Emily were posted Facebook and LinkedIn, along with a photo

(that of a server from a local restaurant that many of the employees of this same government agency frequented)

• Testers also posted on several of MIT's university forums using the name Emily Williams

• After only 15 hours Emily had 60 Facebook and 55 LinkedIn connections with employees from the targeted government agency and its contractors

• After 24 hours she already had 3 job offers from other companies

34

Page 35: What's New In CompTIA Security+ - Course Technology Computing Conference

Emily Williams• Emily then started receiving LinkedIn endorsements

for her skills, and males who worked at the government agency offered to help her get a jump-start on a new job within the agency

• These males said they would help her by-pass normal procedures for receiving a laptop computer and network access, giving her higher levels of access than a new hire would normally have

• During Christmas holiday testers created web site with a Christmas card and posted a link to it on Emily's social media profiles

35

Page 36: What's New In CompTIA Security+ - Course Technology Computing Conference

Emily Williams• Anyone who visited the site was prompted to execute a

Java applet, which was actually a Trojan that exploited a vulnerability

• Pen testers were able to gain administrative rights over these agency computers and capture user passwords, install applications, and steal sensitive documents, which, in more irony, contained information about state-sponsored attacks on foreign governments

• One of the contractors for this agency who fell for this ploy actually worked as a developer for an antivirus vendor and had access to the antivirus source code, which the testers were able to see

36

Page 37: What's New In CompTIA Security+ - Course Technology Computing Conference

Emily Williams• Pen team saw that two of the agency's employees had

exchanged information on Facebook about the upcoming birthday of the agency's head of information security

• Head did not have a Facebook or LinkedIn account (perhaps for security reasons), so testers directly sent to him an email with a birthday card that pretended to come from one of these agency's employees

• The head of security fell victim by opening the card and infecting his computer, thus exposing the crown jewels of the entire system

37

Page 38: What's New In CompTIA Security+ - Course Technology Computing Conference

Emily Williams• Pen testers accomplished all of their goals using Emily

Williams in 7 days• Test validated what is widely known: because

attractive females often receive special treatment in the male-dominated IT industry, social engineering attacks frequently take advantage of this

• Pen team also tried a similar test by planting a fake male social media profile to see if any of the females at the agency would fall for it

• They did not.

38

Page 39: What's New In CompTIA Security+ - Course Technology Computing Conference

39

Page 40: What's New In CompTIA Security+ - Course Technology Computing Conference

Craigslist & EBay• Federal Bureau of Investigation (FBI) is warning buyers to

beware• Attackers masquerading as legitimate sellers frequently

advertise items at "too-good-to-be-true" prices to entice a large number of victims

• Attackers do not post photos of the item for sale but instead offer to send a photo as an email attachment or as a link upon request

• Photo attachments contain malware: when the recipients open the attachment their computers become infected

• Potential buyers are encouraged request original posting be modified so that it includes a photo

40

Page 41: What's New In CompTIA Security+ - Course Technology Computing Conference

41

Page 42: What's New In CompTIA Security+ - Course Technology Computing Conference

Apple• Apple's Secure Transport library found in all versions of its

operating systems since iOS 6 and OS X 10.9• Handles establishing encrypted connection for Apple

applications (Apple Mail, iBooks, FaceTime, Calendar, Keynote, Safari browser, and Software Update applications)

• Library is used for the most common cryptographic transport algorithms of Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

• A coding error in the Apple library is responsible for a security vulnerability

42

Page 43: What's New In CompTIA Security+ - Course Technology Computing Conference

Appleif ((err = SSLHashSHA1.update(&hashCtx, &signedParams)) != 0) goto fail; goto fail;if ((err = SSLHashSHA1.final . . .

43

Page 44: What's New In CompTIA Security+ - Course Technology Computing Conference

Apple• 2 "goto fail" lines in a row• First line would be executed if there is an error

triggered by the "if ((err = SSLHashSHA1.update" line• Second line is not based on a condition (even though it

is indented) and "goto fail" will always be executed, even if there was not an error

• Code leaps over another call and result is that a verification will always succeed and never fail

• Attackers could perform man-in-the-middle attack and return false data that appears that it came from a valid web server and has been cryptographically verified

44

Page 45: What's New In CompTIA Security+ - Course Technology Computing Conference

45

Page 46: What's New In CompTIA Security+ - Course Technology Computing Conference

Deadliest Attack• Insulin pump worn by diabetics that administers insulin as

an alternative to multiple daily injections• Diabetic security researcher demonstrated wireless attack

on an insulin pump that could secretly change the delivery dosage of insulin to the patient up to 300 feet away

• Another security researcher broke into defibrillator used to stabilize heartbeats and reprogrammed it, then disabled power-save mode so the battery ran down in hours instead of years

• Threat was so real that a former vice president of the U.S. had his defibrillator removed and replaced with one that lacked capabilities that an attacker might exploit

46

Page 47: What's New In CompTIA Security+ - Course Technology Computing Conference

Deadliest Attack• Department of Homeland Security (DHS) report entitled

"Attack Surface: Healthcare and Public Health Sector" says “now becoming a major concern. . . . pose a significant threat to the public and private sector"

• Food and Drug Administration (FDA), which regulates the design and manufacture of medical devices issued an "FDA Safety Communication" document recommending that medical device manufacturers and health care facilities should "take steps to assure that appropriate safeguards are in place to reduce the risk of failure due to cyberattack”

• FDA has stated that for any medical devices that do not "appropriately address" security risks "might consider" withholding its approval of the device

47

Page 48: What's New In CompTIA Security+ - Course Technology Computing Conference

Director of National Intelligence• What is our greatest global threat?• A – Terrorism• B – Weapons of mass destruction• C – Cybersecurity

48

Page 49: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+

• Current state of security• New CompTIA Security+ exam (SY0-401) • Teaching Security+• Security+ Guide to Network Security

Fundamentals 5th Edition

Page 50: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+New CompTIA exam (SY0-401)

Page 51: What's New In CompTIA Security+ - Course Technology Computing Conference

SY0-201 (2008-2011)

51

Page 52: What's New In CompTIA Security+ - Course Technology Computing Conference

SY0-301 (2011-2014)

52

Page 53: What's New In CompTIA Security+ - Course Technology Computing Conference

SY0-401 (2014-2017)

53

Page 54: What's New In CompTIA Security+ - Course Technology Computing Conference

54

Security+ SY0-401 contains primarily updates and expansion of existing SY0-301 objectives to include current technologies and security concerns. There are more scenario based objectives, which are often used for performance based

questions in CompTIA exams.

Notable updates

Expansion of common protocols and services More content devoted to risk, including risks due to systems integration with third

parties and how to plan for them New emphasis on mobile security and BYOD Risk mitigation in static environments including SCADA and Android/iOS. Expanded and elevated (scenario based) authentication, authorization and access

control, including federation.

Changes in SY0-401 (Spring 2014)

Page 55: What's New In CompTIA Security+ - Course Technology Computing Conference

.

July2013

August2013

September2013

October2013

November2013

December2013

January2014

February 2014

March2014

Remaining2014

2013-2014TranslationSchedule

Exam Retirements

CompTIA 2013 Product Calendar Effective October 1, 2013dates subject to change

A+ (701/702)8/31/13-English 12/31/13-

All Languages

Green ITIT for Sales

12/31/13PDI+

1/31/2014CDIA+ (225-030)

3/31/14-All Languages

Healthcare IT (HIT-001)

12/31/14

A+ (800 Series) Japanese-June 2013

German- September 2013

LAM Spanish- Q4 2013

Thai- Q4 2013

Arabic- Q1 2014

French- Q4 2013

Chinese- Q4 2013

Portuguese: Q1 2014

CDIA+ Japanese-July 2013

Security+ (SYO-004)Item Writing

September 16-20,2013

Mobility+ (MBO-001) Cut Score Workshop

Aug 19-23

Network+ (N10-005) Item Refresh

Aug 26-30CASP Refresh JTA

Oct 7-11, 2013

October 1, 2013Launch

CVO-001

iOS: IOS-001Android : ADR-001

October 15, 2013Launch

Security+ (SY0-401)May 2014

CASP (CAS-002)August 2014

Network+ (NI0-006)Q4 2014

Strata IT Fundamentals (FC0-U51)Q4 2014

Security+ (SY0-004)JTA

July 8-12, 2013

Security+ (SY0-401) Objectives Release

Security+ Refresh Cut ScoreNov 11-15, 2013

MB0-001

November 1, 2013Launch

Page 56: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+• SY0-401 exam objectives released to general

public December 2013• SY0-401 exam goes live May 2014• SY0-301 exam objectives 11 pages• SY0-401 exam objectives 15 pages

Page 57: What's New In CompTIA Security+ - Course Technology Computing Conference

1.0 Network Security• +Layered defenses• +Common protocols• +Common services• +Unified Threat Managers

Page 58: What's New In CompTIA Security+ - Course Technology Computing Conference

2.0 Compliance & Operational Security• +Information security terminology• -Physical defenses• +Data Loss Prevention

Page 59: What's New In CompTIA Security+ - Course Technology Computing Conference

3.0 Threats & Vulnerabilities• -Worms, keyloggers• +Social engineering• +Arbitrary/Remote code execution• ?WEP/IV Attacks• ?Rainbow tables

Page 60: What's New In CompTIA Security+ - Course Technology Computing Conference

4.0 Application, Data, Host Security• +Securing static environments• +Big Data• +Storage Area Networks• +Virtualization & Cloud computing• ++Mobile devices• ??Mainframe

Page 61: What's New In CompTIA Security+ - Course Technology Computing Conference

5.0 Access Control & ID Mngt• +Authentication credentials• +Account management

Page 62: What's New In CompTIA Security+ - Course Technology Computing Conference

6.0 Cryptography• +Comparative strengths & performance of

algorithms• +Key stretching• +Certificate authorities• +Perfect forward secrecy

Page 63: What's New In CompTIA Security+ - Course Technology Computing Conference

Personal Observations• Somewhat deceptive about how much new

material has been added• New material is more an expansion of

existing topics than entirely new topics (going deeper instead of wider)

• Watch for Given a scenario as trigger for performance-based questions

Page 64: What's New In CompTIA Security+ - Course Technology Computing Conference

Personal Observations• Ignore Suggested Classroom Equipment list• Ignore Security+ Acronym list

Page 65: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+

• Current state of security• New CompTIA Security+ exam (SY0-401) • Teaching Security+ • Security+ Guide to Network Security

Fundamentals 5th Edition

Page 66: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+Teaching Security+

Page 67: What's New In CompTIA Security+ - Course Technology Computing Conference

Practical Principles

• Tradeoff• We can’t win• The Chain• What it takes

67

Page 68: What's New In CompTIA Security+ - Course Technology Computing Conference

Tradeoff

68

Page 69: What's New In CompTIA Security+ - Course Technology Computing Conference

We Can’t Win

• Information security should not be viewed as a war to be won or lost

• Just as crime like burglary can never be completely eradicated neither can attacks against technology

• The goal is not a complete victory but instead maintaining equilibrium

69

Page 70: What's New In CompTIA Security+ - Course Technology Computing Conference

We Can’t Win

• As attackers take advantage of a weakness in a defense, defenders must respond with an improved defense

• Information security is an endless cycle between attacker and defender

70

Page 71: What's New In CompTIA Security+ - Course Technology Computing Conference

The Chain

71

Page 72: What's New In CompTIA Security+ - Course Technology Computing Conference

What It Takes

72

Page 73: What's New In CompTIA Security+ - Course Technology Computing Conference

Practical Principles

• Tradeoff• We can’t win• The Chain• What it takes

73

Page 74: What's New In CompTIA Security+ - Course Technology Computing Conference

Which Is Better?• thisisaverylongpassword• Xp4!e%• Length always trumps complexity

Page 75: What's New In CompTIA Security+ - Course Technology Computing Conference

Length Over Complexity

• Keyboard had only 3 keys: A, B, and C• Had to create a 2-character password• How many different passwords could we

create?• What’s the relationship between those

numbers?

Page 76: What's New In CompTIA Security+ - Course Technology Computing Conference

Length Over ComplexityNumber-of-Keyboard-Keys ^ Password-Length = Total-Number-of-

Possible-PasswordsKeyboard Keys Password

LengthPossible Passwords

95 2 9,02595 3 857,37595 4 81,450,62595 6 735,091,890,62

5

189 6 4.5579633e+13

Page 77: What's New In CompTIA Security+ - Course Technology Computing Conference

77

Test Passwords

• How Secure Is My Password

Page 78: What's New In CompTIA Security+ - Course Technology Computing Conference

Tennessee Password Policy• Have 3 of the following 4 characteristics:• Upper case characters (A-Z)• Lower case characters (a-z)• Digits (0-9)• Non alphanumeric characters (~ ! # % * _ -)• Is not a word in any language, slang, dialect, or jargon, etc.• Is not based on personal information.• Minimum of eight (8) characters

Page 79: What's New In CompTIA Security+ - Course Technology Computing Conference

Password Paradox

• Password paradox – For password to remain secure it should never be written down but must be committed to memory.

• Password should also be of a sufficient length and complexity that an attacker cannot easily determine

• Paradox: although lengthy and complex passwords should be used and never written down, it is very difficult to memorize these types of passwords.

• Users have multiple accounts for computers at work, school, and home, e-mail accounts, banks, online Internet stores, and each account has its own password

Page 80: What's New In CompTIA Security+ - Course Technology Computing Conference

Weak Passwords

• Common word (Eagles) • Short passwords (ABCDEF)• Personal information (name of a child or pet)• Write password down• Predictable use of characters• Not change password• Reuse same password

Page 81: What's New In CompTIA Security+ - Course Technology Computing Conference

Top 10 Passwords

Page 82: What's New In CompTIA Security+ - Course Technology Computing Conference

Password Principles

1. Any password that can be memorized is a weak password

2. Any password that is repeated on multiple accounts is a weak password

Page 83: What's New In CompTIA Security+ - Course Technology Computing Conference

Password Management Application

• Use technology instead of our memory for password management• Password management application – Allow user to store username

and password, along with other account details• Application is itself protected by a single strong password, and can

even require the presence of a file on a USB flash drive before the program will open

• Allows user to retrieve usernames and passwords without the need to remember or even type them

• Allows for very strong passwords:

Page 84: What's New In CompTIA Security+ - Course Technology Computing Conference

My Password

ÞtqâGøÑÆ»¬ñB±.Û©¸ùÏ\"$@mgÉ\� � �

84

Page 85: What's New In CompTIA Security+ - Course Technology Computing Conference

Password Management Application• In-memory protection - Passwords are encrypted while the application is running

to conceal passwords• Key files - In order to open the password database key file must also be present• Lock to user account - The database can be locked so that it can only be opened by

the same person who created it• Password groupings - User passwords can be arranged as a tree, so that a group

can have subgroups• Random password generator - A built-in random password generator can create

strong random passwords based on different settings

Page 86: What's New In CompTIA Security+ - Course Technology Computing Conference

KeePass

86

Page 87: What's New In CompTIA Security+ - Course Technology Computing Conference

If You Rely On Memory Only• Length is more important than complexity• Do not use passwords that consist of dictionary words or phonetic words• Do not use birthdays, family member names, pet names, addresses, or any

personal information• Do not repeat characters (xxx) or use sequences (abc, 123, qwerty)• Minimum of 12 characters in length or for accounts that require higher security a

minimum of 18 characters is recommended• Consider using a longer passphrase but not in normal English sequence: not

theraininspainfallsmainlyontheplain but instead use in sequence mainlyinonthethespainrainfalls

• Use nonkeyboard characters

Page 88: What's New In CompTIA Security+ - Course Technology Computing Conference

88

Use Nonkeyboard Characters

• Make passwords stronger with special characters not on keyboard• Created by holding down ALT key while simultaneously typing a

number on numeric keypad (but not the numbers across the top of the keyboard); ALT + 0163 produces £.

• To see a list of all the available non-keyboard characters click Start and Run and enter charmap.exe; click on character and the code ALT + 0xxx will appear in lower-right corner if can be reproduced in Windows

Page 89: What's New In CompTIA Security+ - Course Technology Computing Conference

89

Use Nonkeyboard Characters

Page 91: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+

• Current state of security• New CompTIA Security+ exam (SY0-401) • Teaching Security+• Security+ Guide to Network Security

Fundamentals 5th Edition

Page 92: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+Security+ Textbook 5th Edition

Page 93: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5e• Security+ Guide to Network Security Fundaments, 5e

(9781305093911)• Available August 1, 2014• Maps completely to new SY0-401 exam objectives• Retains popular format• Increased from 14 to 15 chapters (new chapter on

Mobile Device Security)• Increased chapter length by 2-3 pages

Page 94: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5e• Cryptography moved up to Chapters 5-6• New “Today’s Attacks & Defenses” openers• New sectional units• New and updated Review Questions, Hands-On Projects,

Case Projects• New lecture videos• New material on companion web site to be updated

regularly

Page 95: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5e• Chapter 1: Introduction to Security

– Challenges of Securing Information– What Is Information Security?– Who Are the Attackers?– Attacks and Defenses

Page 96: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5eTHREATS • Chapter 2: Malware and Social Engineering Attacks

– Attacks Using Malware – Social Engineering Attacks

• Chapter 3: Application and Networking-Based Attacks– Application Attacks – Networking-Based Attacks

Page 97: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5eBASIC SECURITY • Host, Application, and Data Security

– Securing the Host – Securing static environments– Application Security – Securing Data

Page 98: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5eCRYPTOGRAPHY • Chapter 5: Basic Cryptography

– Defining Cryptography – Cryptographic Algorithms – Using Cryptography

• Chapter 6: Advanced Cryptography– Digital Certificates – Public Key Infrastructure (PKI) – Key Management – Transport Encryption Algorithms

Page 99: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5eNETWORK SECURITY • Chapter 7: Network Security

– Security through network devices – Security through network technologies – Security through network design elements

• Chapter 8: Administering a Secure Network – Common Network Protocols – Network Administration Principles – Securing Network Applications

Page 100: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5eMOBILE SECURITY• Chapter 9: Wireless Network Security

– Wireless Attacks – Vulnerabilities of IEEE 802.11 Security – Wireless Security Solutions

• Chapter 10: Mobile Device Security – Types Mobile Devices– Mobile Device Risks– Securing Mobile Devices

Page 101: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5eACCESS CONTROL AND IDENTITY MANAGEMENT • Chapter 11: Access Control Fundamentals

– What is access control? – Implementing access control – Authentication Services

• Chapter 12: Authentication and Account Management– Authentication Credentials– Single sign-on – Account Management

Page 102: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5eCOMPLIANCE & OPERATIONAL SECURITY • Chapter 13: Business Continuity

– What is business continuity? – Disaster recovery– Environmental Controls – Incident Response Procedures – Forensics

• Chapter 14: Risk Mitigation – Controlling Risk – Reducing Risk through Policies – Awareness and Training

Page 103: What's New In CompTIA Security+ - Course Technology Computing Conference

Security+ 5eCOMPLIANCE & OPERATIONAL SECURITY • Chapter 15: Vulnerability Assessment and

Third Party Integration–Vulnerability Assessment –Vulnerability Scanning vs. Penetration Testing –Third Party Integration –Summary

Page 104: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA Security+

• Current state of security• New CompTIA Security+ exam (SY0-401) • Teaching Security+• Security+ Guide to Network Security

Fundamentals 5th Edition

Page 105: What's New In CompTIA Security+ - Course Technology Computing Conference

What's New In CompTIA [email protected]