4.0 CompTIA Security+ (SY0-701) Security Operations

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 205

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

206 Terms

1

Secure baselines

Establishing, deploying, and maintaining hardened targets to ensure a secure starting point for systems

New cards
2

Hardening targets

Securing various types of devices, including mobile devices, workstations, switches, routers, cloud infrastructure, servers, ICS/SCADA, embedded systems, real-time operating systems (RTOS), and Internet of Things (IoT) devices

New cards
3

Wireless devices

Devices that connect wirelessly, such as mobile devices, laptops, and IoT devices

New cards
4

Installation considerations

Factors to consider when installing wireless devices, including performing site surveys and creating heat maps to optimize coverage and minimize interference

New cards
5

Mobile device management (MDM)

A system used to manage and secure mobile devices within an organization, including device provisioning, configuration, and monitoring

New cards
6

Deployment models

Different models for deploying mobile devices, including bring your own device (BYOD), corporate-owned personally enabled (COPE), and choose your own device (CYOD)

New cards
7

Connection methods

Different methods for connecting wireless devices, including cellular networks, Wi-Fi, and Bluetooth

New cards
8

Wireless security settings

Settings and protocols used to secure wireless networks, such as Wi-Fi Protected Access 3 (WPA3), Remote Authentication Dial-In User Service (RADIUS), cryptographic protocols, and authentication protocols

New cards
9

Application security

Protecting applications from vulnerabilities, including input validation, secure cookies, static code analysis, and code signing

New cards
10

Sandboxing

Isolating applications to prevent them from accessing sensitive resources or compromising the system

New cards
11

Monitoring

Continuous monitoring of systems and networks for security threats and anomalies

New cards
12

Acquisition Process

The process of obtaining assets for an organization.

New cards
13

Assignment Process

The process of assigning ownership and classifying assets.

New cards
14

Monitoring Process

The process of tracking and managing inventory of assets.

New cards
15

Inventory

A detailed list of all assets owned by an organization.

New cards
16

Enumeration Process

The process of counting and recording the number of assets.

New cards
17

Disposal Process

The process of getting rid of assets that are no longer needed.

New cards
18

Sanitization Process

The process of removing sensitive data from assets before disposal.

New cards
19

Destruction Process

The process of physically destroying assets to prevent recovery of data.

New cards
20

Certification Process

The process of verifying that assets have been properly disposed of.

New cards
21

Data Retention

The process of storing and managing data for a specified period of time.

New cards
22

Identification methods

Techniques used to identify vulnerabilities in a system

New cards
23

Vulnerability scan

Process of scanning a system to identify potential vulnerabilities

New cards
24

Application security

Measures taken to secure applications from vulnerabilities

New cards
25

Static analysis

Analyzing an application's source code without executing it to identify vulnerabilities

New cards
26

Dynamic analysis

Analyzing an application's behavior during runtime to identify vulnerabilities

New cards
27

Package monitoring

Monitoring software packages for vulnerabilities

New cards
28

Threat feed

Source of information about current threats and vulnerabilities

New cards
29

Open-source intelligence (OSINT)

Gathering information from publicly available sources to identify vulnerabilities

New cards
30

Proprietary/third-party

Information obtained from private or external sources to identify vulnerabilities

New cards
31

Information-sharing organization

Group that facilitates the sharing of cybersecurity information

New cards
32

Dark web

Part of the internet not indexed by search engines, often used for illegal activities

New cards
33

Penetration testing

Simulated attack on a system to identify vulnerabilities

New cards
34

Responsible disclosure program

Program that encourages reporting of vulnerabilities to the system owner

New cards
35

Bug bounty program

Program that rewards individuals for finding and reporting vulnerabilities

New cards
36

System/process audit

Examination of a system/process to assess compliance and effectiveness

New cards
37

Analysis

Process of examining vulnerabilities and assessing their impact

New cards
38

Confirmation

Validating whether a vulnerability is real or not

New cards
39

False positive

Incorrectly identifying a non-existent vulnerability

New cards
40

False negative

Failing to identify an actual vulnerability

New cards
41

Prioritize

Ranking vulnerabilities based on their severity and potential impact

New cards
42

Common Vulnerability Scoring System (CVSS)

Standardized system for assessing the severity of vulnerabilities

New cards
43

Common Vulnerability Enumeration (CVE)

Standardized naming scheme for vulnerabilities

New cards
44

Vulnerability classification

Categorizing vulnerabilities based on their characteristics

New cards
45

Exposure factor

Measure of the potential impact of a vulnerability

New cards
46

Environmental variables

Factors that influence the impact of a vulnerability in a specific environment

New cards
47

Industry/organizational impact

Assessing the impact of vulnerabilities on specific industries or organizations

New cards
48

Risk tolerance

An organization's willingness to accept or mitigate risks

New cards
49

Vulnerability response and remediation

Actions taken to address and fix vulnerabilities

New cards
50

Patching

Applying updates or fixes to software to address vulnerabilities

New cards
51

Insurance

Coverage to mitigate financial losses due to cybersecurity incidents

New cards
52

Segmentation

Dividing a network into smaller segments to contain potential attacks

New cards
53

Compensating controls

Alternate security measures implemented to mitigate vulnerabilities

New cards
54

Exceptions and exemptions

Allowances made for specific cases where vulnerabilities cannot be immediately addressed

New cards
55

Validation of remediation

Process of verifying that vulnerabilities have been successfully addressed

New cards
56

Rescanning

Performing another vulnerability scan after remediation

New cards
57

Audit

Examination of systems/processes to ensure compliance and effectiveness

New cards
58

Verification

Confirming that vulnerabilities have been fixed and are no longer present

New cards
59

Reporting

Documenting and communicating the findings and actions taken

New cards
60

Monitoring computing resources

The process of tracking and observing computer systems, applications, and infrastructure to ensure their optimal performance, security, and availability.

New cards
61

Log aggregation

The practice of collecting and consolidating log data from various sources, such as servers, applications, and network devices, to gain a comprehensive view of system activities and troubleshoot issues.

New cards
62

Alerting

The act of notifying users or administrators about potential issues or threats detected by monitoring systems, enabling timely response and mitigation.

New cards
63

Scanning

The process of examining computer systems or networks to identify vulnerabilities, security weaknesses, or potential risks that may compromise their integrity or confidentiality.

New cards
64

Reporting

The generation and presentation of information about the status or performance of computing resources, providing insights for decision-making, troubleshooting, and compliance purposes.

New cards
65

Archiving

The practice of storing data for long-term retention and future reference, ensuring its availability and integrity for compliance, analysis, or historical purposes.

New cards
66

Alert response and remediation/validation

The process of taking immediate action to address and resolve identified alerts, followed by validation to ensure the effectiveness of the response and mitigate potential risks.

New cards
67

Quarantine

The act of isolating potentially compromised systems or resources to prevent further harm, containing the impact of security incidents and facilitating investigation and remediation.

New cards
68

Alert tuning

The adjustment of alert settings to reduce false positives or improve detection accuracy, optimizing the monitoring system's ability to identify genuine threats and minimize unnecessary notifications.

New cards
69

Security Content Automation Protocol (SCAP)

A set of standards and specifications for automating security-related tasks, including vulnerability management, configuration assessment, and compliance checking.

New cards
70

Benchmarks

Reference points or standards used to evaluate and measure system performance or security, providing a basis for comparison, optimization, and adherence to industry best practices.

New cards
71

Agents/agentless

Software agents or methods that collect and transmit data for monitoring purposes, or monitoring without the need for dedicated agents, respectively.

New cards
72

Security information and event management (SIEM)

A system that collects and analyzes security event data from various sources, enabling real-time threat detection, incident response, and compliance monitoring.

New cards
73

Antivirus

Software designed to detect, prevent, and remove malicious software, protecting computer systems and data from viruses, worms, trojans, and other types of malware.

New cards
74

Data loss prevention (DLP)

Technologies and strategies aimed at preventing unauthorized access or leakage of sensitive data, ensuring its confidentiality, integrity, and availability.

New cards
75

Simple Network Management Protocol (SNMP) traps

Notifications sent by network devices to a central management system for monitoring and troubleshooting, providing information about network events, performance, and errors.

New cards
76

NetFlow

A network protocol used for monitoring and collecting IP traffic information, enabling network administrators to analyze and optimize network performance, detect anomalies, and troubleshoot issues.

New cards
77

Vulnerability scanners

Tools that identify and assess vulnerabilities in computer systems or networks, helping organizations proactively address security risks and strengthen their overall security posture.

New cards
78

Firewall

A security device that monitors and controls network traffic based on predetermined rules.

New cards
79

Access lists

Lists of rules that determine network traffic permissions.

New cards
80

Ports/protocols

Specific communication endpoints and rules for transmitting data between devices.

New cards
81

Screened subnets

A network architecture that separates and protects internal networks from external networks using firewalls.

New cards
82

IDS/IPS

Intrusion Detection System/Intrusion Prevention System - Security systems that monitor network traffic for suspicious activity and prevent attacks.

New cards
83

Trends

Patterns in network security threats and attacks.

New cards
84

Signatures

Patterns of known malicious activity used by IDS/IPS systems to identify and block threats.

New cards
85

Web filter

A security tool that blocks or filters web content based on predefined rules or categories.

New cards
86

Agent-based

A type of web filter that requires software installation on devices to enforce web filtering policies.

New cards
87

Centralized proxy

A server that acts as an intermediary between client devices and the internet, providing web filtering and caching.

New cards
88

URL scanning

The process of analyzing URLs to determine if they are safe or malicious.

New cards
89

Content categorization

The classification of web content into categories based on its nature or purpose.

New cards
90

Block rules

Rules that prevent access to specific websites or web content.

New cards
91

Reputation

A measure of the trustworthiness or reliability of a website or IP address based on historical data.

New cards
92

Operating system security

Measures and practices to protect the operating system of a computer or device from unauthorized access or attacks.

New cards
93

Group Policy

A feature in Windows operating systems that allows administrators to manage and enforce security settings across a network.

New cards
94

SELinux

Security-Enhanced Linux - A security framework for Linux that provides access control and mandatory access control policies.

New cards
95

Secure protocols

Configuring and using communication protocols to protect data during transmission.

New cards
96

Protocol selection

Choosing the appropriate network protocol based on security requirements and compatibility.

New cards
97

Port selection

Choosing specific network ports for communication based on security and functionality needs.

New cards
98

Transport method

The method used to transmit data between devices, such as wired or wireless communication.

New cards
99

DNS filtering

Blocking or allowing access to websites or domains based on DNS queries.

New cards
100

Email security

Measures and protocols to protect email communication from unauthorized access or malicious content.

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot