SANS SEC 301 EXAM 2024/2025 WITH
100% ACCURATE SOLUTIONS
Everyone can do everything they need to do and nothing more. Bradley Manning - WikiLeaks Target -
HVAC hack - Precise Answer ✔✔Principle of Least Privilege
The cornerstone of all security: Everyting done in security addresses one or more of these three things
Confidentiality, Integrity, availability
Confidentiality - Only those who need to access something can; ties into principle of least privilege
Integrity - data is edited correctly and by the right people. Failure ex.: Delta $5 tickets round trip tickets
to anywhere Delta flies/attach on pricing database
Availability - If you cannot use it, why do you have it? - Precise Answer ✔✔CIA Triad
Pharmaceuticals and government, research - Precise Answer ✔✔Confidentiality
Financials maintained in part by confidentiality - Precise Answer ✔✔Integrity
eCommerce Ex. Amazon make $133,000/per minute thus denial of service is critical business impact;
power company need to keep lights on = availability issue - Precise Answer ✔✔Availability
-Has legal responsibility to protect the assets of the org:
That give him the ultimate responsibility for security
-Authority can be delegated - responsibility cannot be
Data owner - person or office with primary responsibility for data; owners determine classification,
protective measures and more
Data custodian - the person/group that implement the controls; make the decisions of the owner
happens
Users - use data; are also automatically data custodians - Precise Answer ✔✔Security Roles and
Responsiblities
safety of people - Precise Answer ✔✔Number 1 Goal of Security
years ago: teenagers
today: we face organized crime and nation states
-well funded
-highly motivated
,disgruntled insider: difficult to counter; tends to be subtle; often damaging or even devastating
Accidental insider: common; also tend to be subtle; in aggregate - even ore damaging
Outsider threat source - inside threat actor: a growing proble, the current most-common attack vector
2014 - 47% of U. S. adults had private data compromised in a breach (NBC News)
FBI can prove it was North Korea that attacked Sony - Precise Answer ✔✔Nature of the Threat
- Precise Answer ✔✔Security Policy
- Precise Answer ✔✔Separation of Duties
- Precise Answer ✔✔Acceptable Use Policy
verify identity; is Keith really Keith?
(1) Verifying the integrity of a transmitted message. See message integrity, e-mail authentication and
MAC.
(2) Verifying the identity of a user logging into a network. Passwords, digital certificates, smart cards and
biometrics can be used to prove the identity of the client to the network. Passwords and digital
certificates can also be used to identify the network to the client. The latter is important in wireless
networks to ensure that the desired network is being accessed. See identity management, identity
metasystem, OpenID, human authentication, challenge/response, two-factor authentication, password,
digital signature, IP spoofing, biometrics and CAPTCHA.
Four Levels of Proof
There are four levels of proof that people are indeed who they say they are. None of them are entirely
foolproof, but in order of least to most secure, they are:
, 1 - What You Know
Passwords are - Precise Answer ✔✔Authentication
- Precise Answer ✔✔Biometric
Control what they are allowed to do. Although we know Keith is Keith, what can Keith do? - Precise
Answer ✔✔Authorization
- Precise Answer ✔✔Accountability
Harden, patch & monitor - Precise Answer ✔✔HPM
Monitor what has been done. Although we know Keith is Keith, what did Keith do? - Precise Answer
✔✔Accountability
- Precise Answer ✔✔Awareness Training Programs
Prevent /defense as much as you can; detect for everything else; or if the preventive measures fail,
respond to what is detected
-Prevention is ideal
-detection is a must
-detection without response is useless - Precise Answer ✔✔Prevent/Detect/Respond (PRD)
The protection of data, networks and computing power. The protection of data (information security) is
the most important. The protection of networks is important to prevent loss of server resources as well
as to protect the network from being used for illegal purposes. The protection of computing power is
relevant only to expensive machines such as large supercomputers. - Precise Answer ✔✔computer
security
The protection of data against unauthorized access. Programs and data can be secured by issuing
passwords and digital certificates to authorized users. However, passwords only validate that a correct
number has been entered, not that it is the actual person. Digital certificates and biometric techniques
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller YANCHY. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.49. You're not tied to anything after your purchase.