CompTIA Security+ SY0-601 Study Guide

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/907

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

908 Terms

1

Information Security

The act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction.

2

Information System Security

The act of protecting the systems that hold and process our critical data.

3

Confidentiality

Information has not been disclosed to unauthorized people.

Ex. Data Encryption, Digital Keys

4

Integrity

Information has not been modified or altered without proper authorization

Ex. Hashes

5

Availability

Information is able to be stored, accessed, or protected at all times.

6

Authentication

When a person's identity is established with proof confirmed by a system.

Examples:

- Something you know

- Something you are

- Something you have

- Something you do

- Somewhere you are

7

Authorization

Occurs when a user is given access to a certain piece of data or certain areas of a building.

8

Accounting

Tracking of data, computer usage, and network resources is maintained.

Ex. Log.txt Files

9

Malware

Short-Hand Term for Malicious Software

10

Unauthorized Access

Occurs when access to computer resources and data happens without the consent of the owner.

11

System Failure

Occurs when a computer crashes or an individual application fails.

12

Social Engineering

Act of manipulating a user into revealing confidential information or performing detrimental actions.

13

Physical Controls

Any security measures that are designed to deter or prevent unauthorized access to sensitive information or the systems that contain it.

Alarm systems, locks, surveillance cameras, identification cards, and security guards

14

Technical Controls

Safeguards and countermeasures used to avoid, detect, counteract, or minimize security risks to our systems and information.

Smart cards, encryption, access control lists (ACLs), intrusion detection systems, and network authentication.

15

Administrative Controls/Managerial Controls

Focused on changing the behavior of people instead of removing the actual risk involved.

Policies, procedures, security awareness training, contingency planning, and disaster recovery plans.

16

White Hat Hacker

Non-malicious hackers who attempt to break into a company's system at their requests. (Ethical Hacker, PenTester)

17

Black Hat Hacker

Malicious hackers who break into computer systems and networks without authorization or permission.

18

Gray Hat Hacker

Malicious hackers who break into computer systems and networks without authorization or permission.

19

Blue Hat Hacker

Hackers who attempt to hack into a network without permission of the company but are not employed by company.

20

Elite Hacker

Hackers who find and exploit vulnerability before anyone else does.

- 1 in 10,000 Hackers are this role

21

Script Kiddies

Hackers with little to no skill who only use tools and exploits written by others.

22

Hacktivists

Hackers who are driven by a cause like social change, political agendas, or terrorism.

23

Organized Crime

Hackers who are part of a crime group that is well-funded and highly sophisticated.

24

Advanced Persistent Threats (APTs)

Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal.

25

Timeliness

Property of an intelligence source that ensures it is up-to-date

26

Relevancy

Property of an intelligence source that ensures it matches the use case intended for it.

27

Accuracy

Property of an intelligence source that ensures it produces effective results.

28

Confidence Level

Property of an intelligence source that ensures it produces qualified statements about reliability.

29

Proprietary (Info Source)

Threat intelligence is very widely provided as a commercial service offering, where access to updates and research is subject to a subscription fee.

30

Closed-Source (Info Source)

Data that is derived from the provider's own research and analysis efforts, such as data from honeynets that they operate, plus information mined from its customers' systems, suitably anonymized.

31

Open-Source (Info Source)

Data that is available to use without subscription, which may include threat feeds similar to commercial providers, and may contain reputation lists and malware signature databases.

32

Open-Source Intelligence (OSINT)

Methods of obtaining information about a person or organization through public records, websites, and social media.

33

Threat Hunting

A cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring and is potentially less disruptive than penetration testing.

34

Security Information and Event Management (SIEM)

A combination of different data sources into one tool that provides real-time analysis of security alerts generated by applications and network hardware.

35

Lockheed Martin Kill Chain

A model developed by Lockheed Martin that describes the seven stages by which a threat actor progresses a network intrusion.

36

Reconnaissance

The attacker determines payload code that will enable access with exploit code that will use a vulnerability to execute on the target system(s).

37

Weaponization

The attacker couples payload code that will enable access with exploit code that will use a vulnerability to execute on the target system.

38

Delivery

The attacker identifies a vector by which to transmit weaponized code to the target environment.

39

Exploitation

The weaponized code is executed on the target system by this mechanism.

40

Installation

This mechanism enables the weaponized code to run a remote access tool and achieve persistence on the target system.

41

Command & Control (C2)

The weaponized code establishes an outbound channel to a remote server that can then be used to control the remote access tool and possibly download additional tools to progress the attack.

42

Actions and Objectives

The attacker typically uses the access he has achieved to covertly collect information from target systems and transfer it to a remote system (data exfiltration) or achieve other goals and motives.

43

MITRE ATT&CK Framework

A knowledge base maintained for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures.

44

Diamond Model of Intrusion Analysis

A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: Adversary, Capability, Infrastructure, and Victim.

Metafeatures include: Timestamps, Phases, Result, Direction, Methodology, Resources

<p>A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: Adversary, Capability, Infrastructure, and Victim.</p><p>Metafeatures include: Timestamps, Phases, Result, Direction, Methodology, Resources</p>
45

Virus

Malicious code that runs on a machine without the user's knowledge and infects the computer when executed. Requires user action in order to reproduce and spread.

46

Boot Sector (Virus)

Virus that is stored within the first sector of a hard drive and are loaded into memory upon boot.

47

Macro (Virus)

Virus embedded into a document and is executed when the document is opened by the user.

48

Program (Virus)

Virus that infects an executable or application.

49

Multipartite (Virus)

Virus that combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer.

50

Encrypted (Virus)

Virus that Cyphers itself in order to avoid detection by any antivirus software.

51

Polymorphic (Virus)

Advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption model to avoid detection.

52

Metamorphic (Virus)

Virus that is able to rewrite itself entirely before it attempts to infect a file.

53

Stealth (Virus)

Virus category that uses various techniques to avoid detection by antivirus software.

54

Armored

Viruses with a layer of protection to confuse a program or person analyzing it.

55

Hoax

An attempt to deceive a user into believing that something is legitimate (or vice versa).

56

Worm

Malicious software, like a virus, but is able to replicate itself without user interaction. This virus has the ability to disrupt normal network traffic and computing activites.

57

Trojan Horse

Malicious software that is disguised as a piece of harmless or desirable software. May perform desired function on top of malicious function. (Ex. McAfee Antivirus)

58

Ransomware

Malware that restricts access to a victim's computer system until a ransom is received. Uses a vulnerability in pre-existing software to gain access and then encrypts files.

59

Spyware

Malware that secretly gathers information about the user without their consent.

60

Keylogger

Type of spyware that gathers a users keystrokes and takes screenshots that get sent to the attacker.

61

Adware

Spyware that detects user behaviors and interests in order to display related advertisements.

62

Grayware / Jokeware

Software that isn't benign nor malicious and tends to behave improperly without serious consequences.

63

Rootkit

Software designed to gain administrative level control over a system without detection.

64

DLL Injection

Malicious code inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime.

65

Driver Manipulation

An attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level.

66

Spam

Activity that abuses electronic messaging systems, most commonly through email. Used often to exploit a company's open mail relays to send their messages.

67

Watering Hole

Occurs when malware is placed on a website that the attacker knows his potential victims will access.

68

Botnet

A collection of compromised computers under the control of a master node.

69

Zombie

A computer that has been taken over by a botnet.

70

Distributed Denial of Service (DDoS)

A group of compromised systems attack a single target simultaneously to create a Denial of Service (DoS).

71

Active Interception

When a computer is placed between the sender and receiver and is able to capture or modify the traffic between them.

72

Privilege Escalation

When an attacker exploits a design flaw or bug in a system to gain access to resources that a normal user isn't able to access.

73

Backdoor

A security and authentication bypass usually used for maintenance purposes. Can also be used for malicious purposes.

74

Easter Egg

Non-malicious code that when invoked, displays an insider joke, hidden message, or secret feature.

75

Logic Bomb

Malicious code that has been inserted inside a program and will execute only when certain conditions have been met.

76

Symptoms of Infection

Performance Degradation, BSOD, Inaccessible Files, Strange Noise, Error Messages, Icons Appearing and Disappearing, Double File Extensions, or Antivirus Software is refusing to run.

77

Malware Removal Steps

1. Identify Symptoms of Infection

2. Quarantine

3. Disable System Restore

4. Remediate the System

5. Schedule Auto-Update and Scans

6. Enable System Restore

7. Provide end user security awareness training

78

Virus Prevention

Use of Antivirus Software, Service Packs, and Updates

79

Worm, Trojan, and Ransomware Prevention

Antimalware Solutions

80

Spyware Prevention

Antispyware Solutions, Windows Defender, and Browser Configuration

81

Rootkit Prevention

Scanners are able to detect a file containing a this once its installed, but it is difficult to remove once installed and is best to reimage the machine.

82

Spam Prevention

Verify your email server configuration doesn't allow open relays, Remove email addresses from websites, use whitelists and blacklists, and train and educate end users.

83

Malware Prevention

1. Update your antimalware and scan

2. Update and patch your OS and apps

3. Educate and train end users over safe searching practices

84

Dropper

Malware designed to install or run other types of malware embedded in a payload on an infected host.

85

Downloader

A piece of code that connects to the internet to retrieve additional tools after the initial infection by a dropper.

86

Shellcode

Any lightweight code designed to run an exploit on the target, which may include any type of code format from scripting languages to binary.

87

Code Injection

An exploit technique that runs malicious code with the identification number of a legitimate process.

88

Masquerading

Replacement of a genuine executable with a malicious one.

89

DLL Sideloading

Dropper exposes vulnerability in a legitimate program's manifest to load a malicious DLL runtime.

90

Process Hollowing

Dropper starts a process in a suspended state and requires the memory locations containing the process code with the malware code.

91

Living Off the Land

Exploit techniques that use standard system tools and packages to perform intrusions.

92

Personal Firewalls

Software applications that protects a single computer from unwanted internet traffic.

93

Windows Firewall with Advanced Security

Firewall that comes with every version of Windows, meant mainly for business usage and those who want in-depth firewall configuration.

94

Packet Filter

Firewall that comes with every MacOS X version after 10.10, allows for firewall configuration within MacOS.

95

iptables

Linux tool that configures Firewalls through the command line using Accept and Reject tools.

96

Intrusion Detection System (IDS)

Device or software application that monitors a system or network and analyzes the data passing through it in order to identify an incident or attack.

97

Host-Based Intrusion Detection System (HIDS)

Software based IDS installed on a Computer or server that logs anything that seems suspicious.

98

Network-Based Intrusion Detection System (NIDS)

Piece of Hardware connected to a network switch that logs anything that seems suspicious.

99

Signature-Based IDS Methodology

IDS Methodology that detects a specific string of bytes and triggers an alert if it is a known bad string.

100

Policy-Based IDS Methodology

IDS Methodology that relies on specific declaration of the security policy in order for an alarm to go off.

Ex. "No Telnet Authorized"