CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
Physical Security

Physical Security

Key Concepts

1. Access Control

Access control involves managing who has physical access to an organization's assets. This includes implementing measures such as locks, keycards, biometric systems, and security personnel to ensure that only authorized individuals can enter restricted areas.

Example: A data center might use a combination of keycard access and biometric scanners to control entry to the server rooms, ensuring that only authorized technicians can access the sensitive equipment.

2. Surveillance

Surveillance refers to the use of cameras and monitoring systems to observe and record activities within and around an organization's premises. This helps in deterring unauthorized access and providing evidence in case of security incidents.

Example: A retail store might install surveillance cameras at all entry points and throughout the store to monitor customer behavior and prevent theft.

3. Environmental Controls

Environmental controls are measures taken to protect physical assets from environmental hazards such as fire, water, and extreme temperatures. This includes fire suppression systems, HVAC systems, and waterproofing.

Example: A server room might have a fire suppression system that uses inert gases to extinguish fires without damaging electronic equipment, along with a robust HVAC system to maintain optimal temperature and humidity levels.

4. Physical Barriers

Physical barriers are structures designed to prevent unauthorized access and protect assets. This includes fences, walls, gates, and bollards.

Example: A government building might have a perimeter fence with security gates and bollards to prevent vehicle access, ensuring that only authorized personnel can enter the premises.

5. Security Personnel

Security personnel are individuals responsible for maintaining physical security within an organization. They patrol the premises, monitor surveillance systems, and respond to security incidents.

Example: A bank might employ security guards to patrol the premises, monitor surveillance cameras, and check the identification of individuals entering the building.

Examples and Analogies

Consider a fortress as an analogy for physical security. Access control is like the drawbridge and portcullis that only allow authorized knights to enter. Surveillance is like the watchtowers and guards who monitor the surroundings for any threats. Environmental controls are like the moat and fireproof materials that protect the fortress from external hazards. Physical barriers are the walls and gates that prevent unauthorized access. Security personnel are the knights who patrol the fortress and respond to any breaches.

By understanding and implementing these key concepts, organizations can significantly enhance their physical security, protecting their assets from both external and internal threats.