IT Security/Threats/Threat Mitigation

< IT Security < Threats

This lesson covers threat mitigation.

Objectives and Skills

Objectives and skills for the threat mitigation portion of Security+ certification include:[1]

Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
  • Monitoring system logs
    • Event logs
    • Audit logs
    • Security logs
    • Access logs
  • Hardening
    • Disabling unnecessary services
    • Protecting management interfaces and applications
    • Password protection
    • Disabling unnecessary accounts
  • Network security
    • MAC limiting and filtering
    • 802.1x
    • Disabling unused interfaces and unused application service ports
    • Rogue machine detection
  • Security posture
    • Initial baseline configuration
    • Continuous security monitoring
    • Remediation
  • Reporting
    • Alarms
    • Alerts
    • Trends
  • Detection controls vs. prevention controls
    • IDS vs. IPS
    • Camera vs. guard

Multimedia

  1. Watch YouTube: Monitoring System Logs - CompTIA Security+ SY0-401: 3.6.
  2. Watch YouTube: Operating System Hardening - CompTIA Security+ SY0-401: 3.6.
  3. Watch YouTube: Physical Port Security - CompTIA Security+ SY0-401: 3.6.
  4. Watch YouTube: Security Posture - CompTIA Security+ SY0-401: 3.6.
  5. Watch YouTube: Reporting - CompTIA Security+ SY0-401: 3.6.
  6. Watch YouTube: Detection vs. Prevention - CompTIA Security+ SY0-401: 3.6.

References

This article is issued from Wikiversity - version of the Sunday, December 13, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.