IT support specialists must understand and implement a range of security strategies to keep their organization's devices, information, software, and network safe. Security refers to making sure only the people (or systems) that should have access to something do have access. IT specialists will use a combination of physical, procedural (operational), and logical controls to keep their resources secure. They must also follow legal and regulatory guidance, especially when it comes to using licensed resources, such as software.
IT staff use some technologies, like encryption, firewalls, and anti-virus software to keep network resources secure, but technology alone will not keep resources secure. People who use the network resources have to understand the ways people may try to obtain access to private or secure information, what is often referred to as social engineering. They then need to act in approved ways so these attacks against individuals or devices comprising the network can be avoided.
We all own things we want to keep secure. They can include things like a bicycle or a car, your phone or a laptop, and many other things that are either important to you or that cost you or someone in your family money, time, or effort to obtain. Some of these things might be replaceable; although, it would take more time and effort and would probably come at additional cost. There are things you own that you want to keep secure but might not be replaceable, at least not easily. These can include things you've created. Maybe you draw or write and don't want to share your creations with the world, yet. Or maybe you create digital objects, like digital art or even VR worlds in a program like Minecraft. You should be able to determine who has access to them.
We want to be in charge of who has access to the things we own and the things we create. We want to determine who can see them or use them, if we even want to allow that. The same is true when we use an IT infrastructure, including the devices, software, network, and especially the information it contains. IT support specialists take steps to ensure that all aspects of the infrastructure are available only to those people who should have access to them. Keeping the IT infrastructure secure may involve a variety of strategies, including using special software, enacting policies for the way people should behave, as well as physical strategies as simple as locks on devices. Taking steps to secure an IT network means that information and resources are not used without permission by anyone who should not have access to them.
How can I create a secure IT environment? What role does technology play? What do people need to know and be able to do?
Students create documentation that describe common logical and physical security concepts and how they are used. They also generate documentation that can be shared internally with the Help Desk or beyond to other students, faculty, and staff about social engineering threats and how to prevent them.
Logical Security Concepts
Security
Hardening
Security controls
Logical security
Public Key Infrastructure (PKI)
Execution control
autorun.inf file and AutoPlay dialog box
Anti-malware software
Firewall
Defense in depth or endpoint security
Network Access Control (NAC)
Health policy
MAC filtering
Whitelisting and Blacklisting MAC addresses
Port-based Network Access Control (PNAC)
Mobile Device Management (MDM)
Bring Your Own Device (BYOD)
Virtual Private Network (VPN)
Internet Protocol Security (IPSec)
Threats and Vulnerabilities
Vulnerability
Threat
Risk
Social Engineering Threats
Network Footprinting Threats
Eavesdropping or sniffing
Spoofing (or impersonation or masquerade)
MITM (Man in the Middle) attack
Dictionary password attack
Brute force password attack
Rainbow tables
Denial of Service (DoS)
Cyber warfare
Hacker collectives
Software exploitation
Zero-day exploit
Legacy system
Physical Security
Tailgating
Mantrap
Radio Frequence ID (RFID) badge
Entry control roster
Privacy screen
Remnant removal
Monday
Introduction to problem: Keeping IT infrastructure Secure
Online Pre-assessment (available for student practice, as well)
Review content resources with whole group: 12A: Logical Security Concepts
Activity 12-1: Discussing Logical Security Concepts
Team meetings to develop project plan and goals
Tuesday
Review content resources with whole group: 12B: Threats and Vulnerabilities
Activity 12-2: Discussing Threats and Vulnerabilities
Small group and independent exploration of resources
Contribute to team project
Wednesday
Hands-on exploration with IT professionals: Logical Security Concepts
Review content resources with whole group: 12C: Physical Security Measures
Activity 12-3: Discussing Physical Security Measures
Team progress check with supervisor (using project plan)
Thursday
Hands-on exploration with IT professionals: Demonstrate/explore Wireshark, if possible
Small group and independent exploration of resources
Contribute to team project
Friday
Team progress check with supervisor or sharing of progress with whole group
Online post-assessment
These topics contain a lot of concepts and terminology students must become familiar with but may not introduce many skills students need to practice. Whenever there is the opportunity to explore the concepts through hands-on application, consider doing so, either through discussions with IT professionals or even creating stations that allow students to simulate some of the concepts, especially encryption and the use of hashes. If possible, consider reviewing some of the tutorials available from Wireshark either as a group or in pairs or individually.
Part of the Help Desk's charge is to help others use devices safely and keep information, devices, and people secure. As students explore the threats and vulnerabilities to different parts of the infrastructure, consider whether they can create documentation that goes beyond the Help Desk team and helps other students, faculty, and staff better adhere to suggested security guidelines. These could be in the form of posters (digital or print), videos, social media campaigns, or public service announcements broadcast on campus or through a local-access television channel. Student teams could tackle different threats and create media with tools they feel comfortable with.
The Official CompTIA A+ Core 1 & Core 2 Instructor Guide for Exams 220-1001 and 220-1002
Professor Messer at ProfessorMesser.com and YouTube offers numerous free videos of various lengths for many of the topics for the CompTIA 220-1001 A+ Exam. They are easy to understand, narrated videos with visuals. If you are teaching a CompTIA course, the site notes "You're welcome to use them as much as you'd like, provided you embed the videos with the associated YouTube link or link directly to my site. Please click the "Contact Us" link at the top of our web page and let me know how you're using them."
Entry Level I.T. Training from Technology Gee
Microsoft Support
Wireshark tutorials: https://www.wireshark.org/#learnWS
Other Articles and Resources:
Avoiding Social Engineering and Phishing Attacks from the Cybersecurity & Infrastructure Security Agency, a division of Homeland Security
How to Enable, Disable, and Customize AutoPlay in Windows 10 by Rahul Saigal for How-to Geek
Symmetric vs. Asymmetric Encryption: What's the Difference? A thorough example with graphics by Brett Daniel for Trenton Systems (contains advertisements and popups)
What is Social Engineering? Examples & Prevention Tips from Webroot, which is a digital security company (minimal Webroot advertisements)
What is VPN? How it Works, Types of VPN for kaspersky. Thorough article with some advertisements for kaspersky products.