Security Concept Fundamentals

Welcome to the Security Concept Fundamentals practice lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Security fundamentals begin with confidentiality, integrity, and availability (CIA). These concepts are the pillars and promise of cyber security. CIA is often implemented through authentication, authorization, and accounting. All these processes require tools and configurations to ensure they provide the expected level of security.

Availability is enabled by redundant and resilient systems. One such system is the redundant array of independent disks (RAID). Certain RAID configurations, like RAID 1 and RAID 10, duplicate data across multiple disks, providing redundancy, meaning that if a disk fails, the system can continue to operate without data loss. This enables data availability even in the face of component and system failures.

File Integrity Monitoring (FIM) is a security practice that involves regularly checking and validating the integrity of files and system configurations. It’s designed to detect unauthorized changes to critical and designated files, configurations, and directories. FIM enables early detection of breaches, regulatory compliance, and incident response.

In this module, you will enhance availability with a RAID configuration. You will then test FIM on a designated file system to ensure the integrity of the files being monitored.

Overview

Learning Outcomes:

In this module, you will complete the following exercises:

  • Exercise 1 - Configure RAID 1
  • Exercise 2 - Configure and Test File Integrity Monitoring

After completing this module, you should be able to:

  • Create two unformatted VHDs.
  • Configure RAID 1 across the unallocated disks.
  • Prepare the SIEM manager.
  • Install an agent on ACIWIN11 and configure FIM.
  • Test FIM.

Exam Objectives:

The following exam objectives are covered in this module:

1.2 Summarize fundamental security concepts

  • Confidentiality, integrity, and availability (CIA)
  • Authentication, authorization, and accounting (AAA)
  • Zero trust

3.1 Compare and contrast security implications of different architecture models

  • Considerations

3.4 Explain the importance of resilience and recovery in security architecture

  • High availability

4.5 Given a scenario, modify enterprise capabilities to enhance security

  • File Integrity Monitoring