CompTIA Security+

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Confidentiality

ensure that unauthorized individuals are not able to gain access to sensitive information

2
New cards

Integrity

ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally

3
New cards

Availability

ensures that information and systems are ready to mee the needs of legitimate users at the time those users request them

4
New cards

Nonrepudiation

Someone who performed some action, cannot later deny having taken that action. Digital signatures are an example

5
New cards

Security Incidents

A breach of the confidentiality, integrity or availability of information or systems

6
New cards

Disclosure

The exposure of sensitive information to unauthorized individuals, data loss. When attackers purposefully remove it, they are performing data exfiltration

7
New cards

Alteration

Unauthorized modification of information, intentionally or unintentionally (power surge)

8
New cards

Denial

Disruption of an authorized user’s legitimate access to information.

9
New cards

Financial Risk

Risk of monetary damage to the organization as result of data breach

10
New cards

Reputational Risk

Negative publicity surrounding a security breach causes loss of goodwill among customers

11
New cards

Strategic Risk

Risk the organization will become less effective in meeting its major goals and objectives as a result of the breach

12
New cards

Operational Risk

Risk to the organization’s ability to carry out its day-to-day functions

13
New cards

Compliance Risk

Occurs when a security breach causes an organization to run afoul of legal or regulatory requirements

14
New cards

Gap Analysis

Cybersecurity professionals review control objectives for a particular oganization, system or service and examines controls designed to achieve those objectives.Controls that do no meet the control objectives are denoted gaps

15
New cards

Technical Controls

Enforce confidentiality, integrity, and availability in the digital space

16
New cards

Operational Controls

Processes put in place to manage technology in a secure manner

17
New cards

Managerial Controls

Procedural mechanisms that focus on the mechanics of risk management process

18
New cards

Physical Controls

Security controls that impact the physical world.

19
New cards

Preventive Controls

intend to stop a security issue before it occurs

20
New cards

Deterrent Controls

seek to prevent an attacker from attempting to violate security policies

21
New cards

Detective Controls

identify security events that have already occurred

22
New cards

Corrective Controls

remediate security issues that have already occurred

23
New cards

Compensating Controls

Mitigate the risk associated with exceptions made to a security policy

24
New cards

Directive Controls

Inform employees and other what they should do to achieve security objectives

25
New cards

Data Protection Stages

Data at rest, data in transit, data in use

26
New cards

Data Loss Prevention

Data loss prevention (DLP) systems help organizations enforce information handling policies and procedures to prevent data loss and theft.

27
New cards

Agent-Based DLP

Software agents installed on a system that search those systems for the presence of sensitive information

28
New cards

Agnetless DLP

Dedicated devices that sit on the network and monitor outbound network traffic, watching for transmissions that contain unencrypted information. May block traffic in violation

29
New cards

DLP Pattern Matching

Telltale signs of sensitive information

30
New cards

DLP Watermarking

Administrators apply electronic tags to sensitive documents. DLP can monitor for unencrypted content containing those tags

31
New cards

Data Minimization

technique reducing risk by reducing the amount of sensitive information maintained on a regular basis

32
New cards

Deidentification

Removes the ability to link data back to an individual

33
New cards

Data Obfuscation

Transforming into a format where original information can’t be retrieved

34
New cards

Hashing

A hash function to transform values in a dataset to a corresponding hash value

35
New cards

Tokenization

Replaces sensitive values with a unique identifier using a lookup table

36
New cards

Masking

Partially redacts sensitive information by replacing some or all sensitive fields with blank characters

37
New cards

Rainbow Table Attack

The attacker computes all possible candidate values and matches them

38
New cards

Geographic Restrictions

Limit access to resources based on the physical location of the user or system

39
New cards

Permission Restrictions

Limit access to resources based on the user’s role or level of authorization

40
New cards

Segmentation

places sensitive systems on separate networks where they may communicate with each other but have strict restrictions.

41
New cards

Isolation

completely cuts a system from access to or from outside networks

42
New cards

Data Exfiltration

When attackers purposefully remove it, they are performing data exfiltration

43
New cards
44
New cards