{"id":166,"date":"2019-01-15T08:00:15","date_gmt":"2019-01-15T14:00:15","guid":{"rendered":"https:\/\/storyconsulting.info\/?p=147"},"modified":"2019-01-09T20:26:19","modified_gmt":"2019-01-10T02:26:19","slug":"comptia-cysa-objective-2-3","status":"publish","type":"post","link":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/","title":{"rendered":"CompTIA CySA+ Objective 2.3"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Compare and contrast common vulnerabilities found in the following targets within an organization.<\/p><cite>CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0<br><\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Servers<\/h3>\n\n\n\n<p>There are many kinds of servers (server applications) in Enterprise networks.&nbsp; The most common vulnerabilities are for web servers and database servers.<\/p>\n\n\n\n<p>Web servers may have vulnerabilities in the actual service or the web application.&nbsp; Server software can include IIS, Apache, and NGIX among others.&nbsp; Each of these can include various modules that may also have vulnerabilities.&nbsp; It is important to keep web services patched and to only enable modules that are needed to lower the attack surface.<\/p>\n\n\n\n<p>The web applications themselves may also have vulnerabilities.&nbsp; These could be things like cross site scripting attacks or unvalidated input.&nbsp; They can also have vulnerabilities caused by backdoors and maintenance hooks put into the application by programmers for testing that were not removed in the production version.<\/p>\n\n\n\n<p>Database servers are also vulnerable both directly and through web applications that use them.&nbsp; One way that they can be exploited is through data sent to web applications without validation.&nbsp; If input is not validated, SQL commands can be sent to expose data that shouldn&#8217;t be accessible from the application.&nbsp; These are called SQL Injection attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Endpoints<\/h3>\n\n\n\n<p>Endpoints are one of the weakest targets within an organization.&nbsp; Often times they have many different software packages that all may have vulnerabilities.&nbsp; Endpoints also have the human factor.&nbsp; Attack vectors based on this can include various social engineering attacks or malware.&nbsp; Endpoints should have up to date antivirus and potentially host IPS and host firewalls.&nbsp; Updates to the software and operating system must also be regularly done.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network Infrastructure<\/h3>\n\n\n\n<p>Infrastructure devices like routers, switches and wireless controllers all need to be kept secure.&nbsp; An infrastructure device that is compromised could be used to further execute attacks against the enterprise by rerouting or altering traffic that passes through the device.&nbsp; Compromised devices may also be used as platforms to attack other devices.&nbsp;&nbsp;<\/p>\n\n\n\n<p>One potential sign of possible compromise is a network infrastructure device that reboots unexpectedly.&nbsp; When this happens, logs, crash files and the OS files themselves should be checked.&nbsp; Vendors usually provide hashes of the OS files to allow for verification.&nbsp; Some attacks can even alter the boot loader on the device to allow for a more persistent compromise.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Network infrastructure devices should be hardened using best practices such as those from NIST or DHS.&nbsp; Only services that are needed should be enabled.&nbsp; In addition all devices should have their logs sent to a central syslog or SIEM.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network Appliances<\/h3>\n\n\n\n<p>Network appliances, often those used for securing the network, can also have vulnerabilities. Some common ones to look for are listed below:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Management Interfaces with no brute force protection<\/li><li>Cross Site Scripting (XSS) flaws<\/li><li>Unauthenticated users can find model and version information.<\/li><li>Backdoors<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Virtual Infrastructure<\/h3>\n\n\n\n<p>VMWare, KVM, XenApp and other virtualization software has revolutionized IT over the last decade. As with physical infrastructure there are security issues associated with virtual infrastructure.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Virtual Hosts<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>VM escape:<\/strong> In this attack, the attacker is able to leave the isolation of the virtual machine and interact directly with the hypervisor. This can lead to other guests on the same host being accessed by the attacker.<\/li><li><strong>Data Remnants: <\/strong>Data can be left behind on a host when a guest is moved to another host, any such data must be protected.<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Virtual Networks<\/h4>\n\n\n\n<p>Virtual network switches can be vulnerable to the same attacks as physical infrastructure. The software that runs them also must be protected and kept updated to prevent against exploits.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Management<\/h4>\n\n\n\n<p>Virtual infrastructure must be managed and there are some attacks that can use that management interface as a vector.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Privilege Elevation:<\/strong> A privilege elevation on a hypervisor could compromise all of the guests on a host.<\/li><li><strong>Live VM Migration: <\/strong>During a vMotion, the data between hosts must be protected as not to reveal the contents of memory or the machine&#8217;s storage to an attacker.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Mobile Devices<\/h3>\n\n\n\n<p>Mobile devices have become ubiquitous in today&#8217;s world. Because these devices move between the corporate network and public networks, their security is extremely important. Some of the problems that must be addressed include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Insecure web surfing<\/li><li>Insecure wifi (coffee shops, etc)<\/li><li>Lost or stolen devices and the data that is on them<\/li><li>Trojan horse applications<\/li><li>Unpatched software.<\/li><li>Unknown devices (BYOD)<\/li><\/ul>\n\n\n\n<p>A mixture of policies and tools must be used to provide a secure environment while still allowing the flexibility that these devices provide.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Virtual Private Networks (VPNs)<\/h3>\n\n\n\n<p>Virtual Private Networks (VPNs) are used to assure the integrity and confidentiality of data being sent across non-secured media including the Internet. Primarily VPNs are either based on IPSec or TLS\/SSL technology<g class=\"gr_ gr_133 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation multiReplace\" id=\"133\" data-gr-id=\"133\">..<\/g><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">IPSec<\/h4>\n\n\n\n<p>IP Security (IPSec) was originally developed as part of the IPv6 protocol. It was brought to IPv4 as a VPN technology. A VPN connection using IPSec is composed of two phases. The first phase creates the keys used for the session. The Internet Key Exchange (IKE) protocol is used to securely exchange the keys over the Internet.<\/p>\n\n\n\n<p>The second phase creates the actual tunnels for the data. Internet Security Association and Key Management Protocol (ISAKMP) is used to create the security association based on the keys exchanged by phase one using IKE.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">TLS\/SSL<\/h4>\n\n\n\n<p>Using the same technology as secure websites (HTTPS), a VPN can be created. This type of VPN has the advantage that HTTPS is a standard protocol that is almost always allowed through firewalls.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Industrial Control Systems\/SCADA Systems<\/h3>\n\n\n\n<p>Industrial Control Systems are used to control processes such as assembly lines and power plants. These systems are often running software that if compromised could cause serious physical damage. Due to their specialization, they are often not designed with security in mind or the ability to be patched. Because of these limitations, both physical and network segmentation is a must to secure ICS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compare and contrast common vulnerabilities found in the following targets within an organization. CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Servers There are many kinds of servers (server applications) in Enterprise networks.&nbsp; The most common vulnerabilities are for web servers and database servers. Web servers may have vulnerabilities in the actual service or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":353,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"CompTIA CySA+ Objective 2.3 Study Notes #comptia #cysa+ #ciscochampion","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[88,31,95],"tags":[89,90,91],"class_list":["post-166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-certification","category-cysa","tag-blog","tag-certification","tag-cysa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CompTIA CySA+ Objective 2.3 -<\/title>\n<meta name=\"description\" content=\"There are multiple aspects of enterprise networks. Each aspect has unique security challenges that security analysts must face.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CompTIA CySA+ Objective 2.3 -\" \/>\n<meta property=\"og:description\" content=\"There are multiple aspects of enterprise networks. Each aspect has unique security challenges that security analysts must face.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-15T14:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Story\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/ntwrk80\" \/>\n<meta name=\"twitter:site\" content=\"@ntwrk80\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Story\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/\"},\"author\":{\"name\":\"Ben Story\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"headline\":\"CompTIA CySA+ Objective 2.3\",\"datePublished\":\"2019-01-15T14:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/\"},\"wordCount\":1002,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1\",\"keywords\":[\"blog\",\"certification\",\"cysa+\"],\"articleSection\":[\"Blog\",\"Certification\",\"CySA+\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/\",\"name\":\"CompTIA CySA+ Objective 2.3 -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1\",\"datePublished\":\"2019-01-15T14:00:15+00:00\",\"description\":\"There are multiple aspects of enterprise networks. Each aspect has unique security challenges that security analysts must face.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1\",\"width\":640,\"height\":426,\"caption\":\"Photo by Philipp Birmes from Pexels\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/15\\\/comptia-cysa-objective-2-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/packitforwarding.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CompTIA CySA+ Objective 2.3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/\",\"name\":\"\",\"description\":\"Paying it forward to the next generation of IT.\",\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/packitforwarding.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\",\"name\":\"Ben Story\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"width\":489,\"height\":250,\"caption\":\"Ben Story\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\"},\"description\":\"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/packitforwarding\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/benstory\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/ntwrk80\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CompTIA CySA+ Objective 2.3 -","description":"There are multiple aspects of enterprise networks. Each aspect has unique security challenges that security analysts must face.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/","og_locale":"en_US","og_type":"article","og_title":"CompTIA CySA+ Objective 2.3 -","og_description":"There are multiple aspects of enterprise networks. Each aspect has unique security challenges that security analysts must face.","og_url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/","article_publisher":"https:\/\/www.facebook.com\/packitforwarding","article_author":"https:\/\/www.facebook.com\/packitforwarding","article_published_time":"2019-01-15T14:00:15+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1","type":"image\/jpeg"}],"author":"Ben Story","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/ntwrk80","twitter_site":"@ntwrk80","twitter_misc":{"Written by":"Ben Story","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/#article","isPartOf":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/"},"author":{"name":"Ben Story","@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"headline":"CompTIA CySA+ Objective 2.3","datePublished":"2019-01-15T14:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/"},"wordCount":1002,"commentCount":1,"publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1","keywords":["blog","certification","cysa+"],"articleSection":["Blog","Certification","CySA+"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/","url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/","name":"CompTIA CySA+ Objective 2.3 -","isPartOf":{"@id":"https:\/\/packitforwarding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/#primaryimage"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1","datePublished":"2019-01-15T14:00:15+00:00","description":"There are multiple aspects of enterprise networks. Each aspect has unique security challenges that security analysts must face.","breadcrumb":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/#primaryimage","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1","width":640,"height":426,"caption":"Photo by Philipp Birmes from Pexels"},{"@type":"BreadcrumbList","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/packitforwarding.com\/"},{"@type":"ListItem","position":2,"name":"CompTIA CySA+ Objective 2.3"}]},{"@type":"WebSite","@id":"https:\/\/packitforwarding.com\/#website","url":"https:\/\/packitforwarding.com\/","name":"","description":"Paying it forward to the next generation of IT.","publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/packitforwarding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8","name":"Ben Story","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","width":489,"height":250,"caption":"Ben Story"},"logo":{"@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1"},"description":"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.","sameAs":["https:\/\/www.facebook.com\/packitforwarding","https:\/\/www.linkedin.com\/in\/benstory","https:\/\/x.com\/https:\/\/www.twitter.com\/ntwrk80"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pay9MD-2G","jetpack-related-posts":[{"id":174,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-security-content-automation-protocol-scap\/","url_meta":{"origin":166,"position":0},"title":"CompTIA CySA+ &#8211; Security Content Automation Protocol (SCAP)","author":"Ben Story","date":"January 10, 2019","format":false,"excerpt":"The Security Content Automation Protocol (SCAP) is a standard that defines how software flaws and configuration errors are classified. Four components make up SCAP. Common Configuration Enumeration (CCE) The Common Configuration Enumeration (CCE) is a list of best practices maintained by the National Institute of Standards and Technology (NIST). They\u2026","rel":"","context":"In &quot;Certification&quot;","block_context":{"text":"Certification","link":"https:\/\/packitforwarding.com\/index.php\/category\/certification\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/12\/pexels-photo-1173735.jpeg?fit=640%2C640&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/12\/pexels-photo-1173735.jpeg?fit=640%2C640&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/12\/pexels-photo-1173735.jpeg?fit=640%2C640&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":165,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/14\/comptia-cysa-objective-2-2\/","url_meta":{"origin":166,"position":1},"title":"CompTIA CySA+ Objective 2.2","author":"Ben Story","date":"January 14, 2019","format":false,"excerpt":"Given a scenario, analyze the output resulting from a vulnerability scan.CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Analyze Reports from a Vulnerability Scan The data from a vulnerability scan must be interpreted and analyzed to turn it into usable and actionable information.\u00a0 One of the first parts of\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Microscope","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-256262.jpeg?fit=640%2C424&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-256262.jpeg?fit=640%2C424&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-256262.jpeg?fit=640%2C424&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":164,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/12\/comptia-cysa-objective-2-1\/","url_meta":{"origin":166,"position":2},"title":"CompTIA CySA+ Objective 2.1","author":"Ben Story","date":"January 12, 2019","format":false,"excerpt":"Given a scenario, implement an information security vulnerability management process.CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Identification of Requirements One of the key parts of managing vulnerabilities is knowing what the enterprise is trying to achieve.\u00a0 The first set of requirements often come from regulatory bodies.\u00a0 Some of\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Lex Photography from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-1109541.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-1109541.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-1109541.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":455,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/25\/comptia-cysa-objective-4-4\/","url_meta":{"origin":166,"position":3},"title":"CompTIA CySA+ Objective 4.4","author":"Ben Story","date":"February 25, 2019","format":false,"excerpt":"Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC). CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Best Practices During Software Development The software development life cycle is the framework for how software should be created and upgraded. Plan\/initiate projectGather requirementsDesignDevelopTest\/validateRelease\/maintainCertify\/accreditPerform\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Startup Stock Photos from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/startup-photos.jpg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/startup-photos.jpg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/startup-photos.jpg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":337,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/11\/comptia-cysa-objective-1-4\/","url_meta":{"origin":166,"position":4},"title":"CompTIA CySA+ Objective 1.4","author":"Ben Story","date":"January 11, 2019","format":false,"excerpt":"Explain the purpose of practices used to secure a corporate environment. CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Penetration Testing Penetration testing is performed by security analysts to test a network to see where security improvements can be made. The testing could be external or internal and may\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by rawpixel.com from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1498958.jpeg?fit=640%2C557&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1498958.jpeg?fit=640%2C557&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1498958.jpeg?fit=640%2C557&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":163,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/09\/comptia-cysa-objective-1-3\/","url_meta":{"origin":166,"position":5},"title":"CompTIA CySA+ Objective 1.3","author":"Ben Story","date":"January 9, 2019","format":false,"excerpt":"Given a network-based threat, implement or recommend the appropriate response and countermeasure.CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 For this objective we will explore some potential countermeasures and controls to help secure a network and what kinds of attacks they may thwart. Network Segmentation One of the most\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Jan Prokes from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/11\/pexels-photo-709730.jpeg?fit=640%2C352&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/11\/pexels-photo-709730.jpeg?fit=640%2C352&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/11\/pexels-photo-709730.jpeg?fit=640%2C352&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/comments?post=166"}],"version-history":[{"count":0,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/166\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media\/353"}],"wp:attachment":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media?parent=166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/categories?post=166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/tags?post=166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}