CompTIA Security+ Study Guide Chapter 1: Todays Security Professional

studied byStudied by 2 people
0.0(0)
Get a hint
Hint

Confidentiality

1 / 33

flashcard set

Earn XP

Description and Tags

34 Terms

1

Confidentiality

Ensures that unauthorized individuals are not able to gain access to sensitive information.

New cards
2

Integrity

Ensures that there are not unauthorized modifications to information or systems, either intentionally or unintentionally.

New cards
3

Availability

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

New cards
4

Security Incidents

Occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information of information systems.

New cards
5

Disclosure

The exposure of sensitive information to unauthorized individuals, otherwise known as data loss.

New cards
6

Alteration

The unauthorized modification of information and is a violation of the principle of integrity.

New cards
7

Denial

The unintended disruption of an authorized user's legitimate access to information.

New cards
8

Financial Risk

The risk of monetary damage to the organization as the result of a data breach.

New cards
9

Reputational Risk

Occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.

New cards
10

Strategic Risk

The risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.

New cards
11

Operational Risk

Risk to the organizations ability to carry out its day-to-day functions.

New cards
12

Compliance Risk

Occurs when a security breach causes an organization to run afoul of legal or regulatory requirements.

New cards
13

Technical Controls

Enforce confidentiality, integrity, and availability in the digital space.

New cards
14

Operational Controls

The process that we put in place to manage technology in a secure manner.

New cards
15

Managerial Controls

Procedural mechanisms that focus on the mechanics of the risk management process.

New cards
16

Preventative Controls

Intended to stop a security issue before it occurs. ex. Firewall, Encryption

New cards
17

Detective Controls

Identifies security events that have already occurred. ex. Intrusion detection systems

New cards
18

Corrective Controls

Remediate security issues that have already occurred. ex. Restoring backups

New cards
19

Deterrent Controls

Seeks to prevent an attacker from attempting to violate security policies. ex. Barbed wire

New cards
20

Physical Controls

Security controls that impact the physical world. ex. Fire Suppression Systems, burglar alarms

New cards
21

Compensating Controls

Controls designed to mitigate the risk associated with exceptions made to a security policy. (see page 9 for more info)

New cards
22

Data at rest

Stored data that resides on hard drives, tapes, in the cloud, or on other storage media. This data is prone to pilfering by insiders or external attackers who gain access to systems and are able to browse through their contents.

New cards
23

Data in motion

Data that is in transit over a network. When data travels on an untrusted network, it is open to eavesdropping attacks by anyone with access to those networks.

New cards
24

Data in processing

Data that is actively in use by a computer system. This includes the data stored in memory while processing takes place. An attacker with control of the system may be able to read the contents of memory and steal sensitive information.

New cards
25

Encryption

Technology that uses mathematical algorithms to protect information from prying eyes, both while it is in transit over a network and while it resides on systems.

New cards
26

Data Loss Prevention (DLP)

A system that helps organizations enforce information handling policies and procedures to prevent data loss and theft.

New cards
27

Host-Based DLP

Uses software agents installed on systems that search those systems for the presence of sensitive information. Can also monitor system configuration and user actions, blocking undesirable actions. ex. block users from accessing USB-based devices.

New cards
28

Network DLP

Dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information.

New cards
29

Pattern Matching

Where they watch for the telltale signs of sensitive information. ex. Numbers formatted like credit cards or ssn

New cards
30

Watermarking

Where systems or administrators apply electronic tags to sensitive documents and then the DLP system can monitor systems and networks for unencrypted content containing those tags.

New cards
31

Data Minimization

Techniques seeking to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis. ex. Destroying data when it is no longer needed

New cards
32

Hashing

Uses a hash function to transform a value in our dataset to a corresponding hash value.

New cards
33

Tokenization

Replaces sensitive values with a unique identifier using a lookup table. ex. replacing a student ID with a randomly generated 10-digit number. Then maintaining a lookup table that allows us to convert those back to student IDs

New cards
34

Masking

Partially redacts sensitive information by replacing some or all sensitive fields with blank characters. ex. Replacing last four digits of credit card with xxxx

New cards

Explore top notes

note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
4.0(1)
note Note
studied byStudied by 5 people
... ago
4.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
4.0(1)
note Note
studied byStudied by 23 people
... ago
5.0(1)
note Note
studied byStudied by 40070 people
... ago
4.8(312)

Explore top flashcards

flashcards Flashcard (201)
studied byStudied by 32 people
... ago
5.0(1)
flashcards Flashcard (64)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 6 people
... ago
4.0(2)
flashcards Flashcard (42)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (91)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 19 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 18 people
... ago
4.0(1)
flashcards Flashcard (45)
studied byStudied by 4 people
... ago
5.0(1)
robot