100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SANS SEC 301 EXAM 2024/2025 WITH 100% ACCURATE SOLUTIONS $17.49   Add to cart

Exam (elaborations)

SANS SEC 301 EXAM 2024/2025 WITH 100% ACCURATE SOLUTIONS

 1 view  0 purchase
  • Course
  • SANS 560
  • Institution
  • SANS 560

SANS SEC 301 EXAM 2024/2025 WITH 100% ACCURATE SOLUTIONS

Preview 4 out of 33  pages

  • September 3, 2024
  • 33
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • SANS 560
  • SANS 560
avatar-seller
YANCHY
SANS SEC 301 EXAM 2024/2025 WITH
100% ACCURATE SOLUTIONS

Everyone can do everything they need to do and nothing more. Bradley Manning - WikiLeaks Target -
HVAC hack - Precise Answer ✔✔Principle of Least Privilege



The cornerstone of all security: Everyting done in security addresses one or more of these three things

Confidentiality, Integrity, availability

Confidentiality - Only those who need to access something can; ties into principle of least privilege

Integrity - data is edited correctly and by the right people. Failure ex.: Delta $5 tickets round trip tickets
to anywhere Delta flies/attach on pricing database

Availability - If you cannot use it, why do you have it? - Precise Answer ✔✔CIA Triad



Pharmaceuticals and government, research - Precise Answer ✔✔Confidentiality



Financials maintained in part by confidentiality - Precise Answer ✔✔Integrity



eCommerce Ex. Amazon make $133,000/per minute thus denial of service is critical business impact;
power company need to keep lights on = availability issue - Precise Answer ✔✔Availability



Authentication, Authorization, Accountability - Precise Answer ✔✔AAA



Detailed steps to make policy happen - Precise Answer ✔✔Procedure



Policy, Procedure and Training - Precise Answer ✔✔PPT



Users must know what policies and procedures say to follow them. - Precise Answer ✔✔Training

,Broad general statement of management's intent to protect information - Precise Answer ✔✔Policy



A security professional needs to be:

1/3 technologist

1/3 manager

1/3 lawyer

-Tkhis is the perfect summation of the career field.

-Technology supports security efforts

-Management decisions (and budgets) drive security

-Legal issues mandate security requirements - Precise Answer ✔✔Security by Thirds



Senior Mgmt:

-Has legal responsibility to protect the assets of the org:

That give him the ultimate responsibility for security

-Authority can be delegated - responsibility cannot be

Data owner - person or office with primary responsibility for data; owners determine classification,
protective measures and more

Data custodian - the person/group that implement the controls; make the decisions of the owner
happens

Users - use data; are also automatically data custodians - Precise Answer ✔✔Security Roles and
Responsiblities



safety of people - Precise Answer ✔✔Number 1 Goal of Security



years ago: teenagers



today: we face organized crime and nation states

-well funded

-highly motivated

,disgruntled insider: difficult to counter; tends to be subtle; often damaging or even devastating



Accidental insider: common; also tend to be subtle; in aggregate - even ore damaging



Outsider threat source - inside threat actor: a growing proble, the current most-common attack vector



2014 - 47% of U. S. adults had private data compromised in a breach (NBC News)



FBI can prove it was North Korea that attacked Sony - Precise Answer ✔✔Nature of the Threat



- Precise Answer ✔✔Security Policy



- Precise Answer ✔✔Separation of Duties



- Precise Answer ✔✔Acceptable Use Policy



verify identity; is Keith really Keith?

(1) Verifying the integrity of a transmitted message. See message integrity, e-mail authentication and
MAC.



(2) Verifying the identity of a user logging into a network. Passwords, digital certificates, smart cards and
biometrics can be used to prove the identity of the client to the network. Passwords and digital
certificates can also be used to identify the network to the client. The latter is important in wireless
networks to ensure that the desired network is being accessed. See identity management, identity
metasystem, OpenID, human authentication, challenge/response, two-factor authentication, password,
digital signature, IP spoofing, biometrics and CAPTCHA.



Four Levels of Proof

There are four levels of proof that people are indeed who they say they are. None of them are entirely
foolproof, but in order of least to most secure, they are:

, 1 - What You Know

Passwords are - Precise Answer ✔✔Authentication



- Precise Answer ✔✔Biometric



Control what they are allowed to do. Although we know Keith is Keith, what can Keith do? - Precise
Answer ✔✔Authorization



- Precise Answer ✔✔Accountability



Harden, patch & monitor - Precise Answer ✔✔HPM



Monitor what has been done. Although we know Keith is Keith, what did Keith do? - Precise Answer
✔✔Accountability



- Precise Answer ✔✔Awareness Training Programs



Prevent /defense as much as you can; detect for everything else; or if the preventive measures fail,
respond to what is detected

-Prevention is ideal

-detection is a must

-detection without response is useless - Precise Answer ✔✔Prevent/Detect/Respond (PRD)



The protection of data, networks and computing power. The protection of data (information security) is
the most important. The protection of networks is important to prevent loss of server resources as well
as to protect the network from being used for illegal purposes. The protection of computing power is
relevant only to expensive machines such as large supercomputers. - Precise Answer ✔✔computer
security



The protection of data against unauthorized access. Programs and data can be secured by issuing
passwords and digital certificates to authorized users. However, passwords only validate that a correct
number has been entered, not that it is the actual person. Digital certificates and biometric techniques

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller YANCHY. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72841 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.49
  • (0)
  Add to cart