CompTIA Security+ (SY0-701)

0.0(0)
studied byStudied by 6 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/499

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

500 Terms

1
New cards

Control Categories & Control Types

2
New cards

Control Categories: Technical Control

Security Controls that are implemented using some type of technical system. (Firewalls, Antiviruses, System Logs, etc)

3
New cards

Control Categories: Managerial Controls

Overseeing a set of policies that explain the best way to manage their data, computer, and systems. If you are creating a series of security policies or a standard operating procedure, your managerial controls would fall under such series. Your are basically the manager of the security framework within an organization. (On/Offboarding policy, Compliance Policies, Separation Of Duties)

4
New cards

Control Categories: Operational Controls

These controls are implemented by individuals instead of systems. (Guard Shacks, Reception Desks, Property Patrols, Security Policy Training)

5
New cards

Control Category: Physical

A control category that limit a person’s physical access to a building, a room, or a device. (Door Locks, Fencing, Warning Signs)

6
New cards

Control Type: Preventive

A control type that limits someone's access to a certain resource. (Firewalls, On-Boarding Policy, Guard Shack, Door Lock)

7
New cards

Control Type: Deterrent

A control type that doesn’t prevent someone from accessing a resource, however it discourages a person from launching an attack. (Splash Screens, Demotions, Reception Desk, Warning Signs)

8
New cards

Control Type: Detective

A control type that can identify and log an intrusion attempt. (System Logs, Reviewing Log In Reports, Property Patrol, Motion Detectors)

9
New cards

Control Type: Corrective

A control type that is applied to after an event has been detected. Sometimes able to reverse the impact of an event, or be able to continue operating your business with minimum downtime. (Backup Recovery, Reporting Issues, Authority Contact, Fire Extinguisher)

10
New cards

Control Type: Compensating

A control type where if you don’t have the resources to reverse a security event which would allow you to have a different set of means to control the issue as a temporary solution. Only if your existing controls aren’t sufficient. (Firewalls/Blocked Access instead of a patch, Separation Of Duties, Multiple Security Staff required after an incident, Power Generator after an outage)

11
New cards

Control Type: Directive

A control type that is a relatively weak security control where you are directing someone to do something more secure than less secure. (file storage policies for encrypting valuable information, Compliance Policies, Security Policy Training, “Authorized Personnel Only” Sign)

12
New cards

CIA / AIC Triad

Confidentiality, Integrity, Availability

13
New cards

Confidentiality (CIA Triad)

Certain information should only be known to certain people, this prevents unauthorized information disclosure. Usually done through encryption, access controls, and 2FA.

14
New cards

Integrity (CIA Triad)

We want to ensure that the recipient is receiving exactly what was sent from the sender. Messages can’t be modified without detection. Typically done through hashing.

15
New cards

Availability (CIA Triad)

Systems and Networks must be up and running at all times even while we are implementing updates. Done through a multitude of ways (fault tolerance, high availability, load balancers, etc)

16
New cards

Non-Repudation

Ensures that a user cannot deny having performed a specific action—like sending data, logging in, or approving a transaction. Proof that data came from the stated sender and has not been changed (Proof of Origin/Identity through digital signatures).

17
New cards

Digital Signature

A cryptographic method used to verify the authenticity and integrity of a message, file, or digital document, proving the sender’s identity and preventing tampering.

18
New cards

AAA Framework

A security model that stands for Authentication, Authorization, and Accounting—used to control user access, verify identity, assign permissions, and track activity. Identification is usually apart of it, but technically not attached to the acronym.

19
New cards

Certificate Authority (CA)

An entity that issues and digitally signs public-key certificates for users or devices.

20
New cards

Certificate Revocation List (CRL)

A file containing a list of the revoked certificates. This list is maintained by the associated certificate authority

21
New cards

Certificate Signing Request (CSR)

Sent with the public key to the certificate authority in order to be signed. Once the certificate information has been verified, the CA will digitally sign the public key certificate.

22
New cards

OCSP (Online Certificate Status Protocol)

OCSP is a protocol used by the browser to check the revocation status of a certification.

23
New cards

Digital Certificate

An electronic document issued by a Certificate Authority (CA) that verifies the identity of an entity and contains its public key, enabling secure encrypted communication.

24
New cards

Certificate-Based Authentication

A method that uses digital certificates to verify a user’s or device’s identity, enabling secure access without relying on passwords.

25
New cards

Authorization Model

A framework or method that defines how permissions and access rights are assigned and enforced for users and resources in a system.

26
New cards

Gap Analysis

A process that compares current security controls or performance against desired standards or requirements to identify missing elements or weaknesses.

27
New cards

Zero Trust

A security model that assumes no user or device—inside or outside the network—is trusted by default; every access request must be verified continuously before granting permission.

28
New cards

Zero Trust: Control Plane

The overseer who manages all of the actions that are occurring in the data plane. This may be configuring rules or policies, or possibly setting up a forward policy. Anytime you're looking at a firewall rule, routing table, or understanding network address should be handled, you're configuring on the control plane.

29
New cards

Zero Trust: Data Plane

The data plane is the part of the device that is actually performing the security process; this could be a firewall, switch, or router that is processing frames, packets, and network data. 

30
New cards

Adaptive Identity

We are examining the identity of an individual, and then applying security controls of what the user tells us along with the other resources. 

31
New cards

Attack Surface

All the points in a system or network where an attacker can try to enter or extract data.

32
New cards

Threat Scope Reduction

Decreasing the number of possible entry points to the network

33
New cards

Policy Driven Access Control

An access control method where permissions are granted based on predefined policies that evaluate user attributes, context, and rules.

34
New cards

Policy Enforcement Point (PEP):

The component that enforces access control decisions by allowing or denying user requests based on security policies.

35
New cards

Policy Decision Point (PDP)

The system component that evaluates access requests against policies and makes the authorization decision. Instructs the PEP to allow/disallow traffic.

36
New cards

Policy Administrator (PA):

The entity or system responsible for creating, managing, and updating security policies used for access control decisions.

37
New cards

Honeypots

Decoy systems or resources set up to attract attackers, detect intrusions, and gather information about attack methods.

38
New cards

Honeynets

Networks of interconnected honeypots designed to trap and analyze attackers on a larger scale

39
New cards

Honeyfiles

Fake files planted to lure attackers and detect unauthorized access.

40
New cards

Honeytokens

Decoy data or credentials that alert defenders when accessed or used by attackers.

41
New cards

Change Management

A structured approach to planning, implementing, and monitoring changes in an organization’s systems or processes to minimize risks and ensure smooth transitions.

42
New cards

Change Management: Formal Process

A defined sequence of steps—including request, approval, planning, implementation, and review—to control and document changes in IT systems or business processes. Documenting scope, time, purpose, risk, gathering approval, etc.

43
New cards

Change Management: Owner & Stakeholders

individual or group responsible for overseeing and managing the change process, ensuring the change meets their requirements, coordinating testing, and representing stakeholders impacted by the change.

44
New cards

Change Management: Backups/Version Control

Key components of change management that ensure failed changes can be safely reversed (backout plan) and previous system states or code versions can be restored accurately (version control).

45
New cards

Impact Analysis

The process of identifying and evaluating the potential effects and consequences a proposed change may have on systems, processes, and stakeholders

46
New cards

Sandbox Testing Environment

A isolated, controlled setting where software or changes can be safely tested without affecting the live production system. Can also be an area where malware or a vulnerability is isolated in order to be analyzed, tested, and erradicated.

47
New cards

Allow List

A security mechanism that permits access only to pre-approved, trusted entities—such as IP addresses, applications, or users—while blocking everything else by default.

48
New cards

Deny List

A security mechanism that blocks specific, known untrusted entities—such as IP addresses, applications, or users—while allowing all others by default.

49
New cards

Public Key Infrastructure (PKI)

The policies/procedures whether it be hardware/software that is responsible for creating, distributing, managing, storing, and revoking processes associated with digital certificates. Also refers to the binding of public keys to people or devices, usually in accordance with a certificate authority. Based on how much you can trust a specific user is truly who they claim to be.

50
New cards

Symmetric Encryption

An encryption method where the same key is used to both encrypt and decrypt data, requiring secure key sharing between parties.

51
New cards

Asymmetric Encryption

An encryption method that uses a pair of keys—one public and one private—where data encrypted with one can only be decrypted with the other, enabling secure key exchange and digital signatures.

<p>An encryption method that uses a pair of keys—one public and one private—where data encrypted with one can only be decrypted with the other, enabling secure key exchange and digital signatures. </p>
52
New cards

Key Escrow

A security arrangement where encryption keys are held by a trusted third party, allowing access to encrypted data if needed for recovery or legal reasons.

53
New cards

Record-Level Encryption

Encrypting individual records within a database, allowing fine-grained security and selective access to specific data entries.

54
New cards

Transparent Encryption

Encryption that occurs automatically at the system or database level without requiring user intervention, securing data at rest seamlessly.

55
New cards

Transport Encryption

Protecting data as it moves across networks using protocols like TLS/SSL to prevent interception or tampering during transmission.

56
New cards

Key Stretching

A technique that strengthens weak or short cryptographic keys (like passwords) by applying repeated hashing to make brute-force attacks more difficult.

57
New cards

Out-of-Band Key Exchange

The process of sharing cryptographic keys through a separate, secure channel outside the main communication path (e.g., sending a key by phone while using email).

58
New cards

In-Band Key Exchange

The process of exchanging cryptographic keys within the same communication channel used for data transfer, often protected by encryption protocols like TLS.

59
New cards

Session Key

A temporary encryption key used for a single communication session to securely encrypt and decrypt data, then discarded after the session ends.

60
New cards

Key Exchange Algorithm

An cryptographic method used to securely share encryption keys between parties over an insecure channel, enabling encrypted communication (e.g., Diffie-Hellman).

61
New cards

Trusted Platform Module (TPM)

Platform security, ensuring the integrity of the device's hardware and software, enabling secure boot processes, and protecting cryptographic keys used for local data encryption. Burned in during manufacturing, has both persistant and versatile memory. Password protected from brute force attacks.

62
New cards

Hardware Security Module (HSM)

A specialized, highly secure hardware device used in large environments to store and manage cryptographic keys, provide fast cryptographic processing with dedicated hardware (like plug-in cards), and ensure high availability through clustering and redundancies. Meant for high performance, scalability, and key management.

63
New cards

Obfuscation

The process of deliberately making code or data difficult to understand or interpret to protect it from unauthorized access or reverse engineering.

64
New cards

Tokenization

A type of obfuscation that replaces sensitive data with non-sensitive placeholders (tokens) that have no meaningful value outside the system.

65
New cards

Steganography

A type of obfuscation that conceals data within other harmless-looking files (like images or audio) to hide its existence.

66
New cards

Data Masking

A type of obfuscation that hides or alters data (e.g., showing only last 4 digits of a credit card) to protect sensitive information while maintaining usability.

67
New cards

Hash

A fixed-size output generated by a hash function from input data, used to verify data integrity. Usually used to store passwords in databases.

68
New cards

Collision

When two different inputs produce the same hash output, potentially compromising hash reliability. (MD5)

69
New cards

Salt Hash

A hash combined with a random value (salt) added to the input to prevent attackers from using precomputed hash tables.

70
New cards

Rainbow Tables

Precomputed tables of hashed values used by attackers to reverse common hashes and crack passwords faster,

71
New cards

Blockchain Technology

A decentralized, distributed ledger system that securely records transactions in linked blocks, ensuring transparency, immutability, and resistance to tampering.

<p>A decentralized, distributed ledger system that securely records transactions in linked blocks, ensuring transparency, immutability, and resistance to tampering. </p>
72
New cards

Web of Trust

A decentralized trust model where individuals validate each other’s identities through mutual endorsements, commonly used in PGP encryption.

73
New cards

Root of Trust

A trusted, foundational component (hardware or software) that anchors security in a system, serving as the base for all trust decisions and cryptographic operations.

74
New cards

Private Certificate Authority

An internal CA operated by an organization to issue and manage digital certificates for secure communication within its own network or systems, not publicly trusted outside that environment.

75
New cards

Wildcard Certificate

A digital certificate that secures a domain and all its subdomains using a single certificate (e.g., *.example.com).

76
New cards

Subject Alternative Name (SAN)

An extension in a digital certificate that allows multiple domain names or IP addresses to be secured by one certificate.

77
New cards

Threat Actor

An individual, group, or entity that conducts malicious activities to compromise or damage information systems or data.

78
New cards

Attributes of Threat Actor

Internal/External, Resources/Funds, Sophistication, etc

79
New cards

Nation-State Actor

A government-sponsored threat actor engaged in cyber operations to advance national interests, often possessing significant resources and capabilities.

80
New cards

Advanced Persistent Threat (APT)

A prolonged and targeted cyberattack by a skilled threat actor aiming to gain and maintain unauthorized access to a network for espionage or sabotage.

81
New cards

Unskilled Attackers

Individuals who carry out cyberattacks without advanced technical knowledge, often relying on readily available tools or methods.

82
New cards

Hacktivisit

Individuals who are hackers with purposes such as political, philosophical, or revenge reasons.

83
New cards

Insider Threats

These individuals tend to be motivated by revenge or financial gain from the organization. Because they are an insider threat they have the organization’s resource at their hands to use to attack.

84
New cards

Organized Crime

Organizations of criminals who are motivated by solely financial gain. These individuals are almost always an external entity, these organizations may have a corporate structure: one doing the hacking, one managing the exploits, another selling the data, and an individual handling customer support especially with one fighting an organization with ransomware. These individuals are very sophisticated and usually have large amounts of capital to fund hacking efforts.

85
New cards

Shadow IT

Use of information technology systems, devices, software, or applications within an organization without explicit approval from the IT department.

86
New cards

Threat Vector (Attack Vector)

A method or pathway used by an attacker to gain access to or infect a targeted system.

87
New cards

Message-Based Vector

A threat vector involving malicious content delivered through messages such as email, SMS, or direct messages, often including phishing or malware.

88
New cards

Phishing Attack

A cyberattack where attackers send deceptive messages with malicious links or attachments to steal sensitive information or deliver malware.

89
New cards

Social Engineering Scam

A manipulation technique where attackers use fake voicemails, messages, or scams like cryptocurrency fraud to trick victims into revealing information or performing actions.

90
New cards

Image-Based Vector

A threat vector using images, such as SVG files containing executable code like HTML or JavaScript, to deliver malicious payloads.

91
New cards

File-Based Vector

Malicious software embedded in files such as PDFs, compressed archives (ZIP/RAR), or Microsoft Office documents with macros to infect systems.

92
New cards

Voice Call Vector

Threats delivered via phone calls, including vishing (voice phishing), spam over IP calls, war dialing, or call tampering.

93
New cards

Removable Device Vector

Threats introduced through USB drives or other removable media that can bypass network security, potentially infecting air-gapped systems.

94
New cards

Vulnerable Device Vector

Exploitation of known or unknown software vulnerabilities in devices or applications that require patching or updating.

95
New cards

Unsupported System Vector

Security risks from outdated systems or software that no longer receive security patches or updates.

96
New cards

Unsecure Network Vector

Security weaknesses within an organization's own network, such as outdated Wi-Fi protocols, rogue access points, or unsecured Bluetooth connections.

97
New cards

Open Service Ports Vector

Risks posed by open TCP or UDP ports on network services that attackers can exploit to gain unauthorized access.

98
New cards

Default Credential Vector

Security vulnerabilities caused by using default usernames and passwords (e.g., “admin”), allowing attackers easy access.

99
New cards

Supply Chain Vector

Threats introduced through third-party vendors or service providers who have access to an organization's infrastructure.

100
New cards

Typosquatting

A type of URL hijacking where attackers register misspelled domain names to impersonate legitimate sites or email addresses, often used in social engineering attacks like pretexting to steal personal information.