#CompTIA Security+ 501 exam Chapter11 Managing Business Continuity
Posted by Superadmin on November 17 2018 01:30:47

Managing Business Continuity

 

In this chapter, we will be looking at our business environment to provide systems availability, selecting the most appropriate method for disaster recovery following a disaster. This will be broken down into four distinct sections, and you must understand each of them:

We will cover the following topics in this chapter: 

 

 

mplementing secure systems design

 

IT systems range from desktops and servers used internally to mobile devices, such as laptops that can also be used externally in unsecured environments, such as hotels and airports. We therefore need to harden the systems and operating systems so that they are as secure as we can possibly make them. There are various aspects that we need to look at, depending on the functionality of the device and where they are used. Let's look at all of the aspects that we need to take into consideration, and we will start with a system booting up:

Example: Your company is a multinational company that requires an operating system that can be used by both desktops and laptops that can provide both secure boot and attestation. Which operating system and feature will you choose and why? At the moment, we are using a BIOS to boot up from.

The first thing that we would do is upgrade the BIOS to UEFI so that it can provide a secure boot. The operating system selected would be Windows 10 as it provides a secure boot where the drivers need to be signed to allow boot up. We would then enable Device Guard, which logs the setting of the operating system and checks the integrity of the software and hardware, otherwise the boot sequence fails.

 

 

Hardware/firmware security

 

We need to protect our computer systems against someone stealing the data by stealing the device, re-installing the operating system, and stealing the data. We need to be able to secure the operating systems and hardware by encrypting them by using products such as Microsoft's Bitlocker. Let's look at some encryption methods:

Exam tip:FDE needs either a TPM chip on the motherboard or a HSM.

 

 

Operating systems

 

There are various operating systems, such as Linux, that are used by the cloud and many network appliances, and Microsoft has Windows 10 for desktops and laptops, and Server 29016 for servers. There is also Android for many phones, as well as Apples iOS for iPhones and iPads. Let's look at different uses of these:

 

 

Securing IT systems

 

It is important that we secure all of our IT systems against attacks. Let's now look at hardening the operating system to reduce the surface attack. Let's look at each of these in turn:

Exam tip:When receiving a new IT System or IoT device, you need to change the default administrator account and password.

Exam tip:When receiving a new IT system or IoT device, you need to change the default administrator account and password.

 

 

Peripherals

 

Once we have looked at the security of the IT systems, we need to look at the vulnerabilities of the peripherals to see where they are vulnerable:

 

 

Importance of secure staging deployment concepts

 

Before applications can be used in a production environment, we must ensure that they are as secure as possible to mitigate the risk of being attacked by an outside agency. We are going to look at three different aspects: sandboxing, environment, and secure baseline. Let's look at these in turn:

Figure 1: Environment

 

 

Troubleshooting common security issues

 

On a day-to-day basis, the security team will come across some of the following issues, and we will look at how they can mitigate the risk caused by each of them:

Figure 2: Trusted Root Certification Authorities

Exam tip:If a certificate does not work, ensure it is valid and add it to the Trusted Root Certification Authorities.

 

 

Misconfigured devices

 

It is vital that all network appliances are properly configured or the company could be vulnerable to attack. Let's look at some of the appliances for this:

 

 

Personnel issues

 

Most cybercrime is successful due to the actions of people that work for the company, and therefore we need to set up policies to mitigate against any attack. Let's look at some of the personnel security issues facing the security team:

Exam tip: Accessing the company network externally with a secure connection or VPN is policy violation.

 

 

Software issues

 

Software is no longer run locally, as some of it is now run or downloaded from the internet. Therefore, the security team needs to be aware of unauthorized software being installed on their IT systems. Let's look as some of the problems that are posed:

Exam tip:Someone downloading unauthorized software will increase the bandwidth and reduce the disk space.

 

 

Disaster recovery and continuity of operations concepts

 

It is important that if a company suffers from a disaster that they can be up and running as soon as possible. Disasters range from natural disasters such as hurricanes or floods, hardware failure, malicious insider attack, or accidental deletion of data. The main aim of a disaster recovery plan is to get the company back up and running so that it can generate income. Let's look at the different aspects of disaster recovery:

Exam tip:Cloud providers and multinational companies can only store data within the region that it was created in.

Exam tip:If we don't hold a post-incident meeting, then we will not prevent the incident from re-occurring. This is known as lessons learned.

 

 

Review questions

 

  1. What type of BIOS needs to be implemented if we want an operating system to be able to secure boot?

  2. When a Windows 10 operating systems secure boots, what checks does it carry out relating to drivers?

  3. What type of trust model is being used if we use Full Disk Encryption?

  4. If my laptop is going to use Full Disk Encryption, what type of chip do I need to have installed on the motherboard?

  5. Why would you need to vet your supply chain?

  6. Where does EMI come from and how can it affect your computer systems?

  7. What is the difference between EMI and EMP?

  8. What can a company install to reduce the threat of EMP?

  9. What is the purpose of a Kiosk?

  10. Describe a trusted operating system.

  1. Name two mobile operating systems and where they are used.

  2. When we receive a new IT system or IoT device, what is the first step we need to carry out?

  3. Why would you disable unnecessary ports and services?

  4. What is the purpose of using STIG?

  5. How can I protect an external storage device against data theft?

  6. What should I do to reduce the attack surface on a digital camera?

  7. What is the best way to test a bespoke application before moving it into production?

  8. What are the four stages when designing a new application?

  9. What is an example of access violation?

  10. If I purchase a new X509 certificate and it does not work, what two actions should I carry out?

  11. How can I tell if someone is stealing data using steganography?

  12. What can we do to prevent someone stealing PII or sensitive data?

  13. What is the most common authentication method that can be incorrectly configured?

  14. How can we prevent someone from stealing a laptop and a tablet?

  15. If a remote user is accessing the company's network externally and decides not to use a VPN, what is he guilty of?

  16. What information should I not post on social media, such as Twitter or Facebook?

  17. What are two symptoms that someone is downloading unauthorized software?

  18. Give an example of license compliance violation.

  19. What is the fastest site to implement during disaster recovery?

  20. If my company is a multinational corporation, can I store New York data in London, in case the New York site falls over?

  21. If my hot site is over 200 miles away, what should I consider to make recovery much faster?

  22. What is a theory-based or paper-based disaster recovery exercise?

  23. What is the purpose of an after-action report?

  24. What is the cheapest disaster recovery site but the slowest to get back up and running?

  25. What is the difference between geotracking and geotagging?

 

 

 

Answers and explanations

 

  1. You would implement the Unified Extensible Firmware Interface (UEFI) as it is more secure and has the ability to secure boot an operating system.

  2. When a Windows 10 operating system secure boots, it checks that all of the drivers are digitally signed.

  3. A hardware root of trust is used by FDE.

  4. Full Disk Encryption needs a TPM chip on the motherboard or a portable HSM.

  5. You need to vet people working for companies in your supply chain and also ensure that they are large enough to supply goods and services.

  6. Electromagnetic Interference (EMI) coming from motors, fluorescent lights, and radio frequencies interference affects a systems performance and could cause jamming to prevent IT system's working.

  7. EMI interferes with IT systems, but EMP destroys them.

  8. A company installs a UPS or a surge protector to reduce the threat of EMP.

  9. A Kiosk is a computer in a reception area or foyer that needs to be tied down so that only the displayed information about the building is available.

  10. A trusted operating system is a secure system normally used by the military where it has multiple layers of security as it is used to access classified data. It is tied down tightly and changes to the operating system are controlled.

  11. Apple iOS is an operating system for mobile devices such as the iPhone and the iPad, and Android is used by all other mobile telephones, such as Samsung.

  12. The first stage when we receive a new IT system or IoT device is to change the default administrator account and password.

  13. You disable unnecessary ports and services to harden the operating system and reduce the attack surface.

  14. A Security Technical Implementation Guides (STIG) is used by the military to ensure that operating systems are tied down tightly.

  15. You should use FDE to protect an external storage device against data theft.

  16. You should remove the memory card to reduce the attack surface on a digital camera.

  17. You should use sandboxing to test a bespoke application before moving it into production.

  1. The four stages when designing a new application are developing, testing, staging, and then production.

  2. Access violation is where a user is accessing data that they should not be able to see.

  3. You would first of all check that the certificate is valid and then check if it has been added to the Trusted Root Certification Authorities.

  4. A file would be larger and an image would be lighter in color.

  5. We can use DLP to prevent someone stealing PII or sensitive data.

  6. The most common authentication method that can be incorrectly configured is a username and password.

  7. We can use cable locks to prevent someone from stealing a laptop and a tablet.

  8. They are guilty of policy violation.

  9. Company information should never be posted on social media, such as Twitter or Facebook.

  10. Your internet bandwidth has increased and your local disk space has been reduced.

  11. License compliance violation is where you steal the license to an application and then install it on your desktop without consent.

  12. The fastest disaster recovery site is the hot site.

  13. No data can only be stored regionally; you would need a backup site in the USA.

  14. You should consider moving your hot site to the cloud.

  15. A tabletop exercise is a theory-based or paper-based disaster recovery exercise.

  16. An after-action report looks at how an incident happened and put measures in place to prevent re-occurrence, sometimes called lessons learned.

  17. The cheapest disaster recovery site is the cold site; it is the slowest to get back up and running as it has power and water and nothing else.

  18. Geotracking can tell you the location of a mobile device and geotagging puts the location on a picture and when it was taken.