CompTIA A+ 902 Notes iCollege
CompTIA A+ 902 Notes iCollege
CompTIA A+ 902 Notes iCollege
Provide a number of functions while complex represent sw at the most basic level
OS Types
Graphical User Interface (GUI) – user interacts using a GUI with ability to point and click to send input to OS:
Windows or Mac OS. GUI contains CLI
Older OS’s:
DOS (Disk Operating System), Windows 3.x & Win for Workgroups
Win 9x/ME
Win NT Family – started 32 & 64 bit ver. Had server and client ver too
Win XP – Home & Pro
Win Server 2003 – Standard, Enterprise & Datacentre
Win Vista – Home Basic and Home Premium, Pro & Enterprise, Ultimate
Win Server 2008 – Std, Ent, Datacentre, Core versions
Current OS
Non-Windows OS
OS Functions
OS responsible for
Managing files and folders
Accessing and managing appls
Interacting with HW
Detecting user input and responding to it
OS allows users to permanently store data to secondary devices like CD, DVD, HDD, flash drives
A File system is required to store info on physical media and determines capabilities
FAT (File Allocation Table), FAT32, NTFS (NT File System), CDFS (Compact Disc FS), UDF (Universal Disk Format)
NTFS more efficient file system, uses Master File Tables. UDF used when Blu-ray access as a disk drive
HDD Terms
File System
Appl software used for a specific purpose must be compatible with the OS
Appls installed via media or downloaded files then launched by
o Desktop shortcut, Start Menu shortcut, Run command or Win Explorer
Multi-tasking – OS allows multiple appls to run simultaneously while keeping required resources separate
Virtual mem – used by the OS to support multiple appls that require mem. It is a file on HDD. Swapping/Paging – process
of moving appl data between RAM and Virtual mem
OS controls hardware on behalf of SW or users but does not directly interact with HW
Device Drivers – small programs stored on HDD that instruct OS on how to comm with specific HW
BIOS – used to comm with simple devices like floppy drives, mice, kb
Device Drivers
HW Management Utils
Win OS Versions
Win most used OS, each version builds on previous adding new features and support techs must understand
Vista
Released in 07. Completely redesigned Start Menu, Taskbar and Control Panel with new enhancements
Several versions – Home Basic & Premium, Biz and Enterprise, Ultimate
Win 7
Win 7 Home Premium – standard consumer edition with Aero but lacking biz related features
Win 7 Enterprise has advanced data protection and info access for highly managed environments
Features
Start screen
One Drive
Windows to Go
Windows Store
Charms
Client Hyper V
Multiple Monitor Taskbar
Live Sign in
Windows PowerShell
8.1, 8.1 Pro, Enterprise, RT (ARM processors) & all available in 32 & 64-bit
Benefits of 64-bit x64
o Improved performance
o Larger mem support
o Improved device support
o Support for client Hyper-V
GUI Nav - Primary nav components: Start Menu, Task Bar, Win Explorer or File Explorer
Start Menu
Win Vista intro’d Bread Crumb nav change – step back at any point, jump anywhere
Win 7 intro’d libraries which are virtual folders that can include multiple physical folders which are indexed
Vista & 7 include built-in indexing service and embedded Search box in both Start Menu and Win Explorer
CLI
File Naming Conventions: 8.3 similar to DOS, long file names supported in newer Oss
New files can be created by downloading or saving to disk or directly through Win Explorer or CLI
File Attributes – help assist with system activities and determine purpose
Some attributes can be set using properties of the file while some must be set using attrib CLI program
Control Panel
Group Policy
PowerShell
Computer Management
Regedit
Loads more
Type of installation
Version of Win
Verify system requirements
Verify Compatibility
Installation Type
Clean Install – installing an OS on a PC that has no OS or one not upgradeable to your choice of Win
Upgrade install – upgrading current system, data and programs to new version
Clean install will wipe previous installations of Windows and data migration must be performed beforehand
Additional types:
Vista: 800MHz CPU, 512 MB RAM, 15GB HDD, SVGA graphics, DVD
1GHz CPU, 1GB 32-bit or 2GB for 64-bit, 40GB GDD with 16GB free for x86 and 20GB free for x64, 128MB GPU
with DirectX9, DVD
Win 8: 1 GHz CPU with support for PAE and NX & SSE, 1GB RAM, 40GB HDD with 16GB and 20GB free, DVD, DirectX9
Verifying compatibility
Upgrade Advisor is supplied with all Win and runs automatically when upgrade install is chosen
Run UA separately for both clean and upgrade installations
If items are included in the list of incompatible programs, ensure manufacturer supported upgrades and device
drivers are available
Best Practices
Starting with Win 2000 installation media includes ability to create and delete partitions and format with FAT32 or NTFS
Multiple installation types for providing automated and manual methods of installation
Manual CD/DVD,
o Boot to the installation media, create partition, format with file system and complete install
o Clean installations require product key, regional options, etc.
Manual network
Automated CD/DVD
o Win System Image Manager to create answer file
o For CD installation the answer file unattended.xml and will be placed on a floppy disk/flash drive that’s
inserted during the installation process
o Only applies to clean install
o Usually for larger numbers of clients
Disk imaging
o Imaging is process of creating reference PC complete with OS, update, applications in order to clone
config and install on multiple network PCs
o Historically Ghost or Altiris could copy images from networks onto PCs
o Win Deployment Services is a new Win Server program that makes it possible to perform disk imaging
without 3rd party software
Disk Imaging Process
o Client is booted with a PXE boot (network card)
o Client connects to WDS server and downloads Win PE boot image
o Win PE is used to prepare the HDD for imaging
o Full custom image is downloaded
o System reboots and goes through final config which can also be automated with answer file
Best Practices
USB, CD-ROM, DVD, PXE, Solid State/Flash drives, External/hot swappable drives, Internal HDD (partition)
Upgrade Installation
Upgrade Paths
Ver considerations
Disable A/V
Disable 3rd party compression software
Uninstall unused applications
Delete temp files
Defrag HDD
Win XP had File and Settings Transfer Wizard to easily copy user profiles
Win Vista & 7 have Easy Transfer Wiz
Both programs are available on the installation media and designed for non-IT people
For network admins that need to migrate data for larger numbers there is User State Migration Tool
ScanState – scans users system using default settings or custom .xml files and copies user profile info to network
location
LoadState – accesses the net location and copies user profile info onto the fresh Win installation
OS Tools
Admin Tools
o Control panel
o PC Mgmt
o Lot others
Monitoring Tools
o Event Viewer
o Task Manager
CLI tools
Networking Tools
Control Panel – Primary admin utilities on Win OS’s. Most changes made here make registry changes!
Add/uninstall programs
Change display settings
Access admin tools
Access device manager
Modify settings for all HW devices
Adjust regional settings
Access security options
Vista & 7 added search facility and further redesign to category view
Control Panel – 7
Homegroup
Action center replaced Security centre
Remote appl and desktop connections
Network and sharing center
Troubleshooting
CP applet Scenario
Internet options Any changes to browser
display/display settings Bg, font, window colour
user accounts Change pw, add user, maintain users
folder options Hidden files and folders, single click, file extensions
system settings Rename pc, join domain, remote desktop settings
Troubleshooting
homegroup Local network
windows firewall Allow/disallow certain traffic
power options Hibernation options,
programs and features Mostly uninstall progs, repair, turn win features on or off, default programs
devices and printers Config peripherals
sound Adjust sound settings and playback or recording options, config mic
network and sharing Any network changes, making new connection, domain, network map, network
center location (home, work, public), network troubleshooting,
Clock lang and region Date, time, location, keyboard layouts
Action Center is mostly a display area with a few options to change like Turn on Problem Reporting
Win Firewall is on by default – primarily use it to allow comms to and from the PC
System applet used to change name, join to domain, config remote settings – remote desktop, shadow copy
Power options – more relevant for laptops/tablets or energy conscious on desktop, password on wake up, hdd behavior
after time, etc
Internet settings – cookies, history, privacy, cache, internet security settings, popup blocker, proxy settings
MS Management Console (MMC) introed in Win 2000 as a std framework for all admin tools to be built in
Default admin tools on Win OS like PC Mgmt, Services, Local Sec Policy, etc come with preconfig’d MMC consoles
Useful when admin tools on server OS added to client PC and can provide simple remote admin
Other Tools: Perf Montor, Mem diagnostics, Print Mgmt, Component Services, Data Sources, Task Manager
Event Viewer
Services
Disk types: Basic, Dynamic (Dynamic disk DB stored on HDD) and allows >4 partitions or volumes
Partition types: Primary, extended, logical drive, volumes (vols for dynamic disks only)
Partition styles: Master Boot Record (MBR), GUID Partition Table (GPT); gpt if part >2TB
Partition Mgmt: Extending, Shrinking, Multi-disk volumes
Config drives: Drive letters, Mount points (Drive paths), Importing foreign disks
Working with virtual HDDs
Storage Spaces are new feature in Win 8.1 & Server 2012 that give flexibility in disk mgmt that was only possible when
using SANS
Services.msc
MMC
MSTSC (Remote Desktop Connection - RDC)
Notepad
Explorer
MSInfo32
DXDiag
Defrag
System Restore
Win Update
The Registry is a hierarchical DB created during Win installation and holds all config options
CLI Tools
Some commands require you to start command prompt or PowerShell with admin rights
Tool Scenario
Taskkill Shut down process
Bootrec Boot recovery util, need to be booted into Win RE
/fixmbr – resolve mbr corruption
/fixboot – rewrites new boot sector if virus corruption
/scanOS – reports OS details
/rebuildBCD – reconfig Boot Configuration Store
Shutdown Shut down system
Tasklist List services
Md, rd, cd Directory nav
Del Delete file
Format Format a drive
Copy,xcopy,robocop Copy files
y
Diskpart Partition disks
Sfc System file checker – check integrity of drivers & signatures
Chkdsk Disk maintenance
Gpupdate Update group policy
Gpresult Show policies that apply as result of all policies
Dir List files and folders
Exit Exit CLI
Help More info on command
Expand Decompress a zip file
Config Network
Win systems will locate and install a device driver for connected NIC upon installation and install TCP/IP and Win
networking clients by default. Additional properties may need config
QoS – prioritize traffic of certain type
TCP/IP is primary protocol suite in use by internet and industry standard for all major OS’s
Win will obtain IP addy automatically by default which works in most cases
Home networks
Small biz networks
Large biz networks
Remote access connections
o VPN
o Remote desktop
o Remote assistance
HomeGroup
Win 7 and later provide this functionality and makes this type of networking much easier
HomeGroup is created on one system and others detect the HomeGroup
HomeGroup sharing options are config’d on each PC
User account security is handled automatically without need to duplicate accounts or share account passwords
Larger Biz networks will use client/server model also know as a domain
Domains use dedicated servers known as Domain Controllers which run Active Directory Domain Services on Win Server
2008/2012
Network and Sharing Center provides single location in Vista and 7 to config net connections and associated properties
Remote Desktop available on biz and ultimate versions of Vista and 7 and XP pro
Firewall rules can be config’d to allow/disallow both in/outbound traffic based on programs, port numbers or
preconfig’d rules
OS Security
Local accounts are stored in SAM DB on the PC and used to gain access to local PC resources
Domain user accounts stored in AD DB on Domain Controller and can be used to access resources on all domain
PCs
Process referred to as authentication which is validation of an individual attempting to use the system
Authentication Process
When user in workgroup attempts to gain access to another PC then NTLM (LAN Manager) protocol is used to
pass credentials
o If identical creds exist on SAM of destination PC and user is authorized then access is granted
o User will be prompted to authenticate when an account in the SAM of destination PC before
authorization is determined
o Authentication must precede authorization
In Domain
o User logs into domain and Kerberos authentication protocol is used
o Kerb authentication involves validation of the account against the domain DB stored on DC
o Access token generated in a domain scenario will allow for authorization against any resource in domain
o Authorization is determining what a user can do on the system or what resources can be accessed
o Authorization is determined by comparing access token to the Access Control List to determine if access
should be granted or denied
Local Groups
o Users – regular users cannot perform admin tasks
o Power users – upgraded group who can share folders, install printers perform some admin
o Admins – full control
o Guests – temp access to PC
Domain Groups – similar to above but whose admin rights and permissions extend across multiple systems
Credentials
Standard user creds stored as hash values in the domain and SAM DBs
User inputs creds which are encrypted and sent to DC
Encrypted creds compared with encrypted one stored in the domain DB
Alternatively digital certificates can be used to authenticate
Digital certificate is usually stored on a smart card or electronic chip embedded in a credit card type device
PCs are equipped with external smart card readers
Smart card readers can be part of kb or external device
Other authentication methods use biometrics and additional SW to validate user
o Fingerprint and retina scanners, facial recog SW
Client responsible for making shared resource is File and Print Sharing of MS Networks
Folders can be shared using Win Explorer or PC Mgmt
When sharing users must assign shared folder and NTFS permissions to control level of access given to remote
users
Permissions
Shared permissions – only applied when accessed over the network: Read, Change, Full Control
NTFS permissions apply locally and over the network and allow for more specific access to be granted
Every file and folder on an NTFS partition has am Access Control List (ACL) which defines who has access and the level of
that access
NTFS permissions
Read
Read and Execute
List Folder contents
Write
Modify
Full control
Shared folder permissions apply to resource accessed over the network and to the folders and all the files within
Combining NTFS and shared folder permissions results in the effective permissions for a file or folder
Encrypting File System (EFS) provides data confidentiality beyond typical access controls by using cryptographic methods
in both public and private key encryption
Technologies
Cryptography
Ciphers
Hashing algorithms
Public key encryption
Private key encryption (symmetric key)
EFS built in to the NTFS file system and Win OS
Encrypting Process
BitLocker To Go
Modes
TPM Mode
o Locks normal boot process
Optional startup PIN
Optional USB unlock
Non-TPM Mode
o Uses Group Policy
o Startup key stored on USB
User Account Control (UAC) is a feature that provides protection against unwanted SW
Preventative Maintenance
Fragmentation of HDD
Neglecting to install updates
Disorganization of file system
Malware infection
Mac OS called OS X since 2001 only on Mac HW, but Win can be installed as a virtual system on Mac HW
Linux kernel is freely available for download – open source and can be installed on any HW. Additional programs,
graphical interfaces, admin utils, etc. can be added. Individual distributions may require a purchase
Key Chain
Spot Light
iCloud
Gestures
Finder
Remote Disk
Dock
Boot Camp
TAR and CPIO commands can be used to construct full or partial backups
Each creates a large file that contains or archives other files
Linux has a snapshot feature providing ability to create a volume image of a device
Image Recovery
Disk Maintenance utils to maintain file integrity and as part of preventative maintenance
Screen Sharing
Press Alt+F2
Type gnome-terminal to open terminal session
Inside terminal type sudo xkill
Select applicable window to kill it
Best Practices
Scheduled backups, disk maintenance, system and app updates, driver and firmware update, AV and anti-malware
updates
Prevents unneeded copying when the destination file has not been changed
Operates both locally and remotely
Encrypts the transfer
In OS X you can use rsync from a terminal as well as the built-in GUI util called Time Machine
Linux does not require defrag cos of different file system handling
1 disk maintenance task is logical check of filesystem using fsch
OS X needs defrag sometimes
o Users created large number of multimedia files and the drive has been filling for some tine
System/App Updates
Driver/Firmware Updates
All major vendors produce products for OS X and major Linux distributions
Updates to these engines and definitions occur like in Win
Checks can be scheduled too
The ls command lists info about files in current directory like dir in Win
o Ls [option]… [file]…
-a –all
-author
d – list directories
--format
-G – do not group
grep command used to search for text in a file or a given file for lies containing a match to the given string or
words
o grep [options] pattern [file]
o There are options that govern the matching process and output
cd command is used to change directory
o syntax – cd [option] [directory]
o –L forces symbolic links to be followed
o –P uses physical directory structure ignoring symbolic links
diff - compares files
sort – sorts files
pwd – (print working directory)
gzip – create gzip compressed files
shutdown – shuts down system
service – runs scripts
ps – display process info
top – display processes with most cpu usage
kill - terminate process
cp – copy command
mv – rename files
cat – view multiple files at same time
chmod – change permissions
passwd – change password
md – make directory
ifconfig – view config ip addresses
Network OS’s
Server Roles – PCs running a server OS like Win 2012 that provide a type of shared service to clients over the network
Web servers, file servers, print servers, DHCP servers, DNS servers, Proxy servers, Mail servers, Authentication servers
Web servers
Provide access to info using HTTP
Browsers comm using HTTP with the web service running on the web server
Eg: IIS for Win and Apache for Linux
Servers available only internally are called intranet servers
Servers can securely transmit data with HTTPS which uses SSL in order to encrypt traffic
File server
Used to store files and make the m available to clients over the network
Ideally users store data on file server in order to centralize backup and take advantage of high speed access
Additional capabilities
o Security
o File classification
o File mgmt.
o Quotas
o File screens – prevent certain file types from being stored on server
Print server
DHCP server
DNS server
Used to resolve user friendly names for network devices to numeric IP addys
Clients forward queries to their preferred DNS server based on config
DNS serve are responsible for particular domain names and will query Internet name servers for names outside
of their control
Proxy server
Mail server
Run e-mail software and use SMTP in order to send and receive mail for users that have mailboxes on a server
Users connect mail clients directly to the server using various protocols
o HTTPS
o POP
o IMAP
Most popular mail server is MS Exchange
Beyond those server roles there are also network appliances that are dedicated to providing a particular set of
functionality
In many cases the can perform better than a server using SW roles
An approach to providing multiple security functions within the same device or appliance
Functions include
o Firewall
o Intrusion prevention
o Gateway antivirus and antispam
o VPN
o Content filtering
o Load balancing
o Data loss prevention
o On appliance reporting
Embedded
o PC system with a specific function within a larger computing system
o Present on many internet-connected devices such as VOIP phones and routers
o Increasingly found in devices such as home appliances and automobiles
Legacy systems are those that have essentially been handed down from one version of a system to another
without any major revisions
A set of techs that have numerous advantages in comparison to std server infrastructures
Benefits
Transparent to users
Machines can run different OS providing different roles
Efficient utilization of HW resources
Conservation of energy – less power consumption
Simplifies server deployment
Provides server consolidation not possible without virtualization
MS Hyper-V
VMWare ESX Server
Citrix XEN Server
Virtualization Components
Host system
Virtual machines
o SW – functions like regular PC or server
o HW – provides virtual equivalents to physical HW
CPU
Mem
NIC
HDD
VHD or VHDX or VMDK files (individual files on host)
Fixed – creation takes time
Dynamic – grows as storage does and is quick to setup
Pass though
VMs store entire config and data in group of virtual HDD contained in physical files. Provides additional capabilities
Mobility
Scalability
Backups using snapshots or checkpoints
Cloud Computing
Cloud model represents the ongoing evolution of the datacenter using virtualization techs and providing numerous
advantages over traditional server based models.
It is described by NIST as “a model for enabling ubiquitous, convenient and on-demand network access to a shared pool
of configurable computing resources like networks, servers, storage, application and service that you can rapidly
provision and release with minimal management effort or service provider interaction”
Physical HW required
Interoperability issues requiring individual applications or roles
Underused servers
Data stored locally
Virtualized datacenter
Reduction in operational costs
More energy conscious
Rapid elasticity
On demand
Resource pooling
Measured service
Cloud Models
Private
o Local fabric resources
o Increased customization
o Increased admin requirements
Public
o Provider hosts fabric
o Varying customization levels based on cloud services model
o Varying admin requirements based on cloud services model
Hybrid
SaaS – OSvC, dropbox, office 365. Everything from appl in cloud – everything managed by provider
PaaS – appl and data locally managed with all other things managed by provider
IaaS – appl to OS managed by user, and virtualization to networking managed by provider
Mobile devices: Pocket PC, smartphones, phablets, tablets, e-readers, ultra mobile internet devices
Personal Digital Assistant (PDA) – handheld organisers that contain address books, calculators and calendars
Smartphones and PocketPCs – have cellphone, internet browsing capabilities with ability to transcribe docs using a
mobile ver of MS Office
All devices have batteries used in notebook PC but smaller with ability to operate at long periods
Laptops
Convertibles
Laptops with screens that can flip to transform into a touchscreen writing surface
Netbooks
No touchscreen
No removable drives and a much smaller form factor
Tablet
7,8,10 “ screens
No physical kb
Usually use different OS than desk/laptops
Smartphones
4 – 5.5” screens
Sometimes feature retractable mini kb
Usually use different OS to desk/laptops
Mobile OS’s
Android is an OS from Google based on Linux kernel and written with core set of libraries that are written in Java
Being open source means all devs have access to the same framework APIs used by the core appls
Apple iOS is vendor specific system so devs must use SDK and register as developers
Whether desktop of mobile OS, it appears Win OS will always be closed course
Android apps primarily from Google Play Store but available from other sites
Apple apps ONLY available from App Store
Win apps available from MS Store only
Mobile devices contain accelerometer and or gyroscopes used to determine movement and tilt of device
These techs provide all mobile devices precision location tracking and directions making other navigational aids
almost obsolete
Some devices will use cell towers to get GPS info while others, like Android, connect directly to satellites
eliminating the towers
o GPS can cause battery drainage
o Location tracking can be turned off when not in use to conserve battery
Geotracking is a bit different and controversial as both iPhone and Android devices record the location of the
device and periodically send this info to a central location
wiFi calling
Virtual Assistants
Program built into mobile devices that assist user in looking up info on web, email, on device
iPhone VA called Siri
Android also provides voice recognition with voice actions
o Dictation of text and emails
o Play music or get directions
o Google Now acts as VA
o More VA’s available for download
SDK/APK
SW dev kit or appl dev kits are sets of utilities provided to 3rd party devs to help them develop appls
In vendors best interest to assist devs which has been 1 reason lack of success with Win products
Emergency Notifications
Features
Interface
Direct manipulation
Virtual kb
Haptic feedback
Homescreen made up of apps and widgets
Apps
Google play
Freeware or Shareware
Android devices
Settings app varies between devices but is primary location for all config
Connectivity
Screen orientation
GPS settings
Screen calibration
Etc.
Features
Interface
o Direct manipulation
o Multi-touch gestures
o Swipe, tap, pinch, reverse pinch
Included apps
o Mail
o Safari
o Music
o Videos
Apps available through App Store
Limits
Screen customization
Settings
Default appls
Wireless headsets
Kbs
Car stereo systems
Computers
Disabled by default
Requires pairing with a device
Requires PIN for pairing
Rejects unknown connections by default
Wireless to be enabled
o Called wifi in iOS
o Wireless on Android
SSID to be known
Click to connect and type password
Save wireless profiles to auto connect to hidden networks
Hotspots
Tethering
Exchange
Gmail
Other providers
o POP
o IMAP
o SSL and port settings
Server addy
o FQDN on incoming server which is POP3, IMAP4 or HTTP
o FQDN of outgoing server – SMTP
o Port numbers used for both
o Security required
Sync options
Product Release Info (PRI) is connection between mobile device and radio which may need updating from time to time
Baseband is the chip that controls all the GSM and 3G phone RF waves
Location of PRL update option will differ between devices but generally in settings
Baseband updates are radio firmware updates and require manual download, extract and update
Connections to corporate networks should occur using built in VPN capabilities in Android and iOS
Data to sync
Contacts
o Mail programs
Online
Outlook
o Social networks
Twitter
Facebook
Instagram
Programs
o App Store
o Google Play Store
o Windows Store
Email
o Config options
# days to download
How to handle deleted items
Email server and other config settings
Pictures
o Online services provide sync
o Auto uploads can be config’d when wifi connection present
Music and Video
o Sync’d with program
iTunes
Google Music
Win Media player
o Selectively store songs on mobile device
Calendar
o May require small appl such as using gmail on iPhone
Bookmarks
o Sites can be bookmarked and available across devices
o Can sync history too
Docs
o Sync’d using cloud providers so data is accessible on any device at any time
Location data
o Can config and allow apps to track location
o Helps tailor search to be location specific
Social media data
eBooks
mutual authentication is a process by which both sides of a connection are authenticated prior to data tf
Not only does server verify client creds but vice versa which adds security to the process
Both Android and iOS devices will support mutual authentication commonly done in conjunction with SSL to
keep creds secure
Software and specific connectivity types might be required on the PC for sync
User
Network
Malicious
Physical
User Threats – weakest point of any security system and there are a few ways to alleviate risk
Social Engineering – a very common way to gain access to the network by preying on employees human nature and
attempting to trick them into divulging seemingly harmless info
Dumpster diving
Shoulder surfing
Creating friendship or inspiring pity
Trojan horse attachments
Posing as an employee
Phishing
Spear Phishing
Uses different kinds of msgs to further the idea that it’s a legit msg
Instead of requests from banks or cc companies they appear to come from family or friends prompting the user
to click a link to watch a video
Term comes from the request cutting through defenses like a spear and has a higher likelihood of being clicked
Vishing – Phishing that uses the phone systems and takes advantage of the lack of call tracing when using VoIP
Network Threats – attacks that would target network technologies, protocols or devices
Denial of Service (DoS) – Web server hammered with too many requests, of malformed packet headers to cause
buffer overrun
Distributed Denial of Server (DDoS) – using multiple PCs to attack a web server using a Trojan horse for eg
Man-in-the-middle attack – attacker places themselves in the middle of comms, TCP hijacking
IP Spoofing – Plays with source IP addresses in packet headers
DNS cache poisoning – Changing the local DNS IP addresses to redirect users to bad sites
Zero-Day Attacks
Occurs when a security vulnerability in an application is discovered on the same day the application is released
Very difficult to defend against as patches are not yet released
Zombie / Botnet – A PC infected with malware that takes part in a DDoS attack
Password Attacks
Noncompliant Systems
Systems that do not have the appropriate antimalware updates and OS patches installed
Enterprise networks use software to prevent noncompliant systems from connecting and to ensure that systems
remain in compliance
Malicious Code Attacks – a specific type of software attack that uses programming code with malicious intent often
referred to as malware
The general purpose is to disrupt systems by deleting or corrupting data or taking control of the system through
malicious code
Malicious code attacks can go undetected for long periods of time and be used later for DDoS attacks or to
remotely access the system or for the purpose of identity theft
Types of Viruses
Physical Threats
Theft
Physical damage
Loss of systems and access
Unauthorized network access
Tailgating – people getting access to areas by following someone else after their clearance allowed them in
Physical Access Restrictions - though the access may not be malicious in nature direct access to server hardware is never
a good idea
In order to protect corporate networks and their systems most biz employ a layered approach or “Defense in Depth”
model that employs security tactics at various levels
CompTIA specifies both physical and digital prevention methods on the exam
Depending on the type of attack various types of SW and user education will be needed in order to prevent them from
happening
Antivirus and antimalware – used to prevent, detect and remove malicious SW from PC systems
Anti-spyware SW – can be separate SW dedicated to detecting and removing spyware and adware products similar to
antivirus software or bundled together with it
Looks for files stored in key locations based on file names and signature files
Needs to be kept up to date in order to continue protection
Most major AV vendors bundle antispyware with products
Look out for bogus antispyware products that ae themselves spyware
Schedule scans
Auto update
Quarantine or delete infected files
Firewalls – SW or HW used to control info that is sent or received which resides typically on the network’s gateway or its
connection point to the public network
HW Firewall – physical devices that protect the network and also functions as a router
SOHO routers can function as a variety of devices in one and include many capabilities including firewall and
proxy functions
Corporate firewalls
o Cisco PIX and ASA
o Sonicwall
o Barricuda
Typically implemented at perimeter of network
Packet filter
o Passing or blocking packets based on source and destination ip or ports
o Does not analyze data in the packet
o Rules define allow or disallow traffic
o Rules form what is sometimes called an ACL (Access Control List)
o ACL contains an implicit deny statement
Proxy firewall
o Considered an intermediary between 2 networks
o Uses dual NICs to be connected to both outside networks and intranet
o Examines all incoming data and makes rule based decisions as to whether request should be allowed or
refused
o All packets are reprocessed for use internally and sent to internal systems using the firewalls intranet ip
address thus masking the network from the internet
o Provides higher security
o Appl-level proxy vs circuit level proxy
Stateful packet inspection – aka stateful packet filtering
o Tracks comms channel or where the packet is going
o Occurs at all levels of the network to provide additional security for connectionless protocols like UDP
and ICMP
o Adds complexity to the process and can make the device susceptible to DoS attacks
SW Firewall (host based) – installed on the PC itself protecting it from network threats
o 3rd party firewalls
ZoneAlarm
Symantec Security Center
BlackTie
o Win Vista and later provide Windows Firewall
Basic config possible in Control Panel
Host based that is on by default
Can block incoming and outgoing traffic
Win Firewall with Advanced Security for advanced config
Win Firewall
o Incoming and outgoing rules
Programs
Ports
Preconfig’d rules
o Network location aware using profiles
o IPSec integration
o Group Policy config in domain environments
Securing Workstations
Users are the weakest link and this is why education and policies that are enforced are the key to network security
Security checklist for workstations – CompTIA’s 5 best practices
Passwords
Account management
Disable autorun
Data encryption
Patch/update mgmt.
Disable Autorun
Some malware can infect files on removable media and be placed in the autorun.inf file on that media
1st rule is never insert media to install software from an unknown source
2nd rule is to ensure autorun remains disabled
Data Encryption
Many address vulnerabilities and are nearly as important as AV and antimalware updates
Automated systems on network to ensure compliance
o Win Server Update Services - WSUS
o System Center Config Manager
Win Auto Update client for workstations
Highly portable and susceptible to loss and theft and could contain corporate info
Securing options
Screen locks
o Basic mechanism – easy to setup
o Several types
Fingerprint lock
Users fingerprint to authenticate and unlock
Relies on biometrics so more secure
Face lock
Facial scan of user to authenticate
Secure cos of biometrics
Swipe lock
Single gesture or series of gestures
Sometimes movement of an icon in a certain pattern
Passcode lock
Remote wipes
o iOS5 and later provide remote wipe capabilities through iCloud
o LostAndroid app is not installed by default but freely available
o Many email appls and MDM programs will support the ability to remotely wipe a device
Locator and remote backup appls
o FindMe programs use GPS to locate lost or stolen devices
o Must be turned on prior to losing
o Backing can be performed by appls online
o Dropbox, google drive, box.net, icloud,
Failed login attempts restrictions
o Similar to account lockout restrictions
o Available on mobile
Lock the device for a period of time
Perform remote wipe after a certain number of failed attempts
o iOS has Erase Data function which can be set after a number of failed attempts
o Android has appls that can do similar function
Antimalware / Antivirus
o Mobiles can be infected too
o Major vendors provide products for mobile devices
o Same rules and best practices apply
Patching / OS updates
o Auto updates available for both OS’s
o Manually download OS updates when they notified by device
Biometric authentication
o Most mobile devices offer this option
Fingerprint or facial recognition
o Multifactor authentication is available
Full device encryption
o 3rd party apps and Mobile Device Management SW like InTune
Authenticator Apps
Make it possible for mobile devices to use a time-based OTP algorithm with a site that requires it
Shared secret key is provided to user over a secure channel and stored in the authenticator app
Key is used for all future logins to site
User will provide username and password and an OTP
Firewalls
Firewall apps
In addition IPS or IDS can be placed on mobiles
Realize these apps always run and can impact severely on battery life
Invest in MDM
Enforce passcodes and lockout screens
Use complex PINs and passwords
Encourage biometrics where possible
Always leave Bluetooth disabled and only enable visibility to know devices
Config passwords for purchases
Use device encryption when available
Due to all sensitive materials stored on HDDs its important for Orgs to have in place an appropriate plan
Formatting
o Prepares the drive to hold data
o Can overwrite data that is already there
Sanitation
o Thoroughly wiping data off drive – not through OS
Destruction
o Renders drive no longer usable
Physical destruction
Recycling/Repurposing
Usually little security but still have private data that should be secured
Security requires some planning and implementation
Determine type of network
Wireless
Most common
Wireless comms use RF which opens additional network threats
WAPs come with multiple security controls that need to be understood and implemented
Change default data: SSID name, admin username and password, default device password
Disable SSID broadcast
For higher security
o Use guest access feature
o Enable MAC filtering
o Assign static IPs and change default address scheme
Radio power levels and antenna placement can restrict coverage areas
Avoid the use of WiFi Protected Setup (WPS)
All devices both wired and wireless should have this enabled by default
Device and personal firewalls are important
Content Filtering
Update firmware
Physical security
Effective Tshooting
Choose a model
Methodical approach to problem solving
Learn as much as possible about systems and tech
Keep calm
Be professional
Models
CompTIA A+
CompTIA N+
Novell
ASID
CompTIA A+ Model
Professional Comms
Be on time
Don’t minimize the problem
Avoid distractions
Don’t eat or drink in their spec
Don’t’ use office devices unless for tshooting
Try to avoid adjusting monitor, chair, keyboard
Respect customers privacy
Never interrupt customer or argue with them
Never discuss or dispute info heard at a customers location
Be culturally sensitive
Ensure comms channel is the one the customer is most comfortable with
Avoid
o Arguing
o Getting defensive
o Dismissing their problem
o Being judgmental
Always clarify statements with open ended questions to narrow the scope, restate the issue or question to verify
understanding
Don’t use social media to disclose experiences
Speak clearly
Avoid jargon
Keep msgs concise and specific
Ensure msg understood
Listen actively
Paraphrase to ensure understanding
When charged objects are brought near each other current can flow to balance the charges
Current flow is characterized by high voltage but low current
Static discharge isn’t dangerous to humans but is to PC components
Increase humidity
Anti-static bags
Wear cotton clothing
Remove carpeting
Personal safety
Disposal guidelines
Batteries
Toner
CRTs
Compliance with regulations
Toxic materials
Other considerations
Power issues
Power surge – sudden spike in power that can damage electrical equipment if not connected to surge protector
Brownout – decrease in power but not complete outage which could still cause reboot
Blackout – complete and prolonged power loss
Battery backup
o UPS
Surge protectors
OS Tshooting
Common symptoms
o BSOD – read error msgs and research from there. Usually HW issue MB, RAM or device driver, check
event logs. Try reboot and if fails, use safe mode. In Mac mostly unresponsive app, try use Force Quit util
o Failure to boot
Missing file: NTLDR
Missing boot.ini – corrupted files, potentially malware. Boot up to OS recovery media
Missing OS
Invalid boot disk
GUI fails to load – try safe mode with CLI
Missing GRUB / LILO – maybe malware
o Kernel panic - Linux recovery media
o Improper shutdown
o Spontaneous shutdown/restart – check HW first, otherwise malware maybe
o Device fails to start or detected – check drivers
o Missing DLL msg – potential driver issue, appl corruption
o Services failed to start – check services console and dependencies, try change auto restart behavior
o Compatibility error – app for old ver of Win stalled on newer version, rightclick and check compatibility
tab
o Slow system performance – check running apps and maybe performance monitor, maybe malware
o Boots to safe mode –
o File fails to open – maybe corruption, maybe malware, maybe incorrect file assoc
o Multiple Monitor misalignment / orientation – identify monitor, switch connection
Extent of harm caused depends on speed and quality of the initial response of event
1st Response – clearly defines activities related to initial point when incident is realized
o ID problem
What policy or law prohibits action
Categories
Exploiting people
Containing adult content
Violating privacy rights
Impersonation
Pyramid schemes
Etc
o Report though proper channels
Violation of company policy – HR
Violations of law – law enforcement
o Preserve data
Content must be preserved until it can be turned over to authority
Commandeering drives, devices or equipment
Data must be preserved in the state it was discovered
Follow procedures outlined in incident response plan
Documentation / Change of Doc
o During process identify, detect, report problem
o Info may be NB if incident escalates to judicial system
Chain of Custody
o NB
o When you begin to collect evidence, keep track of it all times
Who has it
Who has seen it
Where has it been
o Occasionally chain of custody forms are required
Licensing / DRM / EULA
o Use of items without purchase is illegal
o Digital media is protected by DRM
o Not all SW requires a license
Open Source vs Commercial Licensing
o FOSS
o Commercial SW require purchase
Personal License cannot be shared single use, Enterprise licenses allow multiple installations
Personally Identifiable Information (PII)
o Any info about user that could uniquely identify them
o Always danger of companies leaking PII
Follow corporate policies and security best practice policies
OS Troubleshooting Tools
Tools
Common Symptoms
No display – is it powered on or charged? Perhaps “bricked” through power failure during update
Dim display – check display settings
Flickering display – could be calibration, faulty screen, malware
Sticking keys – probable spill on laptop kb
Intermittent wireless – distance from WAP, connected to correct network? Wifi analyzer as tool
Battery not charging – perhaps near end of life
Ghost cursor - calibration
Unable to decrypt email – is appropriate certificate installed? Can device support DRM?
Extremely short battery life – end of life?
Overheating – apps using radios constantly in background
System lockout – incorrect passcodes
No power – dead battery or faulty charger
Num lock indicator lights on laptop – enable/disable Fn Numlock
No wireless connectivity – in range? Required config info?
No Bluetooth connectivity – same as above are devices paired
Cannot broadcast to external monitor – maybe faulty app, needs activation, setup on tv or monitor
Touchscreen unresponsive – calibration issue,
Apps not loading – could be low on mem, app may have to be forcefully stopped and restarted, clear all cached
data
Slow performance – malware, too many apps running, some apps a memory hungry
Frozen system – reboot or soft reset device using button combos
No sound from speakers – are speakers plugged in or powered, Bluetooth settings correct, volume up?
Tshooting Tools
Mobile OS’s
Common symptoms
o Signal drop / weak signal – coverage of SP bad?
o Power drain – greedy apps or malware
o Slow data speeds – coverage
o Unintended wifi connection – device remembering connection
o Unintended Bluetooth pairing – could be attack, disconnect asap
o Leaked personal files /data – security issue more than troubleshooting
o Data transmission overlimit – sending/receiving large files
o Unauthorized account access – set pin
o Unauthorized root access –
o Unauthorized location tracking – could be malware or setting turned on
o Unauthorized camera / mic – malware
Tools
o Anti-malware
o App scanner
o Factory reset / clean install
o App reinstallation
o Wifi analyzer
o Force stop
o Cell tower analyzer
o Backup / restore
o iTunes / iCloud / Apple Config
o Google Sync
o OneDrive
NB to understand and occasionally issues are related to a security problem or misconfig’d security settings
Common Symptoms
o Popups – spyware/adware – browser addons, reboot to AV recovery disc
o Browser redirection – malware or installed SW that came with unseen options
o Security alerts – certificates – installed, expired?
o Slow performance – malware?
o Internet connectivity issues – lots of questions – could be lots of things
o App crashes – malware? Scan, remove, repair app, uninstall reinstall app
o OS Update failures
o Spam – avenue for malware/phishing
o Renamed system files – malware –scan and address
o Security alerts – malware?
o PC lock ups – check antivirus
o Rogue antivirus - bogus AV software
o Files disappearing – malware/virus
o File permissions change – someone has control of pc and is messing with system. Check audit logs
o Hijacked email
o Access denied – could be config, permissions
Tools
o AV SW
o Antimalware
o Anti-spyware
o Recovery console
o System restore / snapshot
o Windows PE
o AV boot disks
o Event Viewer
o Refresh / restore
o MSconfig / safe boot
Best Practices for Malware Removal
o Clearly ID when symptoms indicate malware
o Quarantine infected system
o Disable system restore
o 3rd party boot disks and Win PE are invaluable to scan and remove viruses
o Remediate infected systems
Update AV
Schedule scans and updates
Educate user
Create new restore point with cleaned system