Security+ Exam Cram: General Security Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/94

flashcard set

Earn XP

Description and Tags

Flashcards based on the provided lecture notes for Security+ exam preparation, focusing on key vocabulary and concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

95 Terms

1
New cards

Physical Security Controls

Security mechanisms focused on protecting facilities and real-world objects.

2
New cards

Technical Security Controls

Hardware or software mechanisms used to manage access to resources and systems, providing protection.

3
New cards

Managerial Security Controls

Policies, procedures, and administrative controls defined by an organization's security policy for planning and risk management.

4
New cards

Operational Security Controls

Measures ensuring that daily operations comply with overall security, primarily implemented by people.

5
New cards

Security Controls

Security measures to counter and minimize loss or unavailability of services due to vulnerabilities.

6
New cards

Safeguards

Proactive security measures that reduce the likelihood of an event occurring.

7
New cards

Countermeasures

Reactive security measures that reduce the impact of an event after it has occurred.

8
New cards

Deterrent Controls

Controls deployed to discourage violation of security policies.

9
New cards

Preventive Controls

Controls deployed to thwart or stop unwanted or unauthorized activity from occurring.

10
New cards

Detective Controls

Controls deployed to discover or detect unwanted or unauthorized activity.

11
New cards

Compensating Controls

Controls that provide options to other existing controls to aid in enforcement of security policies.

12
New cards

Corrective Controls

Controls that modify the environment to return systems to normal after an unwanted activity.

13
New cards

Directive Controls

Controls that direct, confine, or control actions to force compliance with security policies.

14
New cards

Integrity

Ensuring that data or system configurations are not modified without authorization.

15
New cards

Availability

Authorized requests for objects must be granted to subjects within a reasonable time frame.

16
New cards

Non-Repudiation

Methods to provide irrefutable evidence of a transaction, preventing denial.

17
New cards

Digital Signatures

Digital signatures, based on asymmetric cryptography, that prove a document was not modified since it was signed.

18
New cards

Authentication

User or service proves identity with credentials like username and password.

19
New cards

Authorization

Authenticated users are granted access to resources based on roles and permissions.

20
New cards

Accounting

Methods that track user activity and record it in logs as part of the audit trail.

21
New cards

Discretionary Access Control (DAC)

Every object has an owner, and the owner can grant or deny access to any other subject.

22
New cards

Role Based Access Control (RBAC)

Uses roles or groups, assigning privileges to roles instead of directly to users.

23
New cards

Rule-based Access Control

Applies global rules that apply to all subjects, often referred to as restrictions or filters.

24
New cards

Non-discretionary Access Control

Enforcement of system-wide restrictions that override object-specific access control.

25
New cards

Mandatory Access Control (MAC)

Every object and subject has one or more labels, with the system determining access based on assigned labels.

26
New cards

Attribute-Based Access Control

Access restricted based on attributes on the account, such as department or location.

27
New cards

Subjects

A user, group, or service accessing resources.

28
New cards

Objects

Resources such as files, folders, shares, and printers, accessed by subjects.

29
New cards

Control Gap

Discrepancy between the security measures an organization should have in place versus those actually in place.

30
New cards

Zero Trust

An approach to security architecture in which no entity is trusted by default.

31
New cards

Policy Enforcement Point (PEP)

Responsible for enabling, monitoring, and terminating connections based on access control policies.

32
New cards

Policy Decision Point (PDP)

Where access decisions are made based on factors such as user identity, device health, and risk assessment.

33
New cards

Adaptive Identity

Changes the way a system asks a user to authenticate based on the request's context.

34
New cards

Threat Scope Reduction

An end goal of Zero Trust Network Architecture (ZTNA), which is to decrease risks to the organization.

35
New cards

Policy-Driven Access Control

Controls based upon a user’s identity rather than simply their system’s location.

36
New cards

Policy Administrator (PA)

Responsible for communicating the decisions made by the policy engine.

37
New cards

Policy Engine (PE)

Decides whether to grant access to a resource for a given subject.

38
New cards

Implicit Trust Zones

Part of traditional security where systems belonging to the organization were placed inside a defined boundary.

39
New cards

Bollard

A short, sturdy vertical post used as a physical barrier to prevent vehicle-based attacks.

40
New cards

Access Control Vestibule

A physical security system comprising a small space with two interlocking doors to control access to secure areas.

41
New cards

Perimeter Intrusion Detection and Assessment System (PIDAS)

System that will detect someone attempting to climb a fence.

42
New cards

Change Management

The policy outlining the procedures for processing changes helps reduce risk associated with changes.

43
New cards

Configuration Management

Ensures that systems are configured similarly, configurations are known and documented.

44
New cards

Change Control

Process of evaluating a change request to decide if it should be implemented.

45
New cards

Approval Process

Ensures that every proposed change is properly reviewed and cleared by management.

46
New cards

Ownership (Change Management)

Clearly defines who is responsible for each change by designating a primary owner.

47
New cards

Stakeholder Analysis

Identifies all individuals and groups affected by the change, both inside and outside the organization.

48
New cards

Impact Analysis

A review of the potential impacts of a change, including side effects.

49
New cards

Backout Plan

Detailed step-by-step sequence to roll back if a change goes wrong.

50
New cards

Maintenance Window

Standard window of time during which changes can be implemented with minimal business impact.

51
New cards

Key Management

Managing cryptographic keys, including generation, exchange, storage, destruction, and replacement.

52
New cards

Certificate Authority (CA)

Create digital certificates and own the policies in a Public Key Infrastructure (PKI).

53
New cards

Certificate Revocation List (CRL)

Contains information about any certificates that have been revoked due to compromises.

54
New cards

Online Certificate Status Protocol (OCSP)

Offers a faster way to check a certificate’s status compared to downloading a CRL.

55
New cards

Certificate Signing Request (CSR)

Records identifying information for a person or device that owns a private key, sent to a CA to get a certificate.

56
New cards

Root CA

Usually maintained offline and issues certs to new subordinate CAs.

57
New cards

Subordinate CA

May be referred to as a Policy CA. Issues certs to new issuing CAs. Also referred to as Intermediate CA.

58
New cards

Key Escrow

Addresses the possibility that a cryptographic key may be lost, enabling its recovery.

59
New cards

User Certificate

Used to represent a user's digital identity, often mapped back to a user account.

60
New cards

Root Certificate

A trust anchor from which the whole chain of trust is derived.

61
New cards

Domain Validation (DV) Certificate

A certificate that proves the ownership of a domain name.

62
New cards

Extended Validation (EV) Certificates

Provide a higher level of trust in identifying the entity using the certificate.

63
New cards

Wildcard Certificates

Can be used for a domain and a subdomain, saving costs.

64
New cards

Code Signing Certificate

Used to digitally sign code, ensuring users trust the code's origin and integrity.

65
New cards

Self-Signed Certificate

Issued by the same entity that is using it but is not trusted and lacks a CRL validation.

66
New cards

Machine/Computer Certificate

Used to identify a computer within a domain.

67
New cards

Email Certificate

Allow users to digitally sign and encrypt emails.

68
New cards

Third-Party Certificate

Issued by a widely trusted external provider, preferred for TLS on public-facing services.

69
New cards

Subject Alternative Name (SAN) Certificate

An extension allowing users to specify additional host names for a single SSL certificate.

70
New cards

File Encryption

Used to protect specific files with unique encryption keys.

71
New cards

Volume Encryption

Encryption that targets a specific partition or volume within the physical drive.

72
New cards

Disk Encryption

Automatically encrypts data when written to or read from the entire disk.

73
New cards

Self-Encrypting Drive

Encryption built into the hardware of the drive itself.

74
New cards

Transparent Data Encryption (TDE)

SQL Databases and data warehouses feature encrypting/decrypting database, backups, and transaction logs at rest.

75
New cards

Transport Encryption

Data in transit is most often encrypted using TLS or HTTPS.

76
New cards

Asymmetric Key

Public keys are shared among communicating parties, while private keys are kept secret.

77
New cards

Symmetric Key

Relies on the use of a shared secret key.

78
New cards

Advanced Encryption Standard (AES)

The current industry gold standard, offering flexibility in security levels.

79
New cards

Rivest–Shamir–Adleman (RSA)

Used for key exchange and digital signatures, relying on the difficulty of factoring large prime numbers.

80
New cards

Stream Cipher

A symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).Considered to be less secure than block ciphers.

81
New cards

Block Cipher

A method of encrypting text in which a cryptographic key and algorithm are applied to a block of data at once. Considered to be more secure than stream ciphers

82
New cards

Substitution Cipher

A cipher that uses the encryption algorithm to replace each character or bit of the plaintext message with a different character.

83
New cards

Transposition Cipher

A cipher that rearranges order of plaintext letters according to a specific rule. the message itself is left unchanged, just the order is scrambled.

84
New cards

Salt

Random data used as an additional input to a one-way function that hashes data, reducing the effectiveness of rainbow table attacks.

85
New cards

Trusted Platform Module (TPM)

A chip on the motherboard used for storage and management of keys for full disk encryption (FDE) solutions.

86
New cards

Hardware Security Module (HSM)

A physical computing device that safeguards and manages digital keys, performing encryption and decryption functions.

87
New cards

Key Management System (KMS)

A cloud service for centralized secure storage and access for application secrets.

88
New cards

Secure Enclave

A secure and isolated area within a system for processing sensitive data.

89
New cards

Steganography

A file, message, image, or video is concealed within another file, message, image, or video.

90
New cards

Tokenization

A de-identification procedure where Personally Identifiable Information (PII) fields are replaced with artificial identifiers or pseudonyms.

91
New cards

Anonymization

A process of removing all relevant data so that it is impossible to identify the original subject or person.

92
New cards

Data Masking

Implemented so that only a partial data is left in the data field.

93
New cards

Hashing

A one-way function that scrambles plain text to produce a unique message digest.

94
New cards

Key Stretching

Processes used to take a key that may be weak and make it stronger, by making it longer and more random

95
New cards

Blockchain

A distributed, public ledger used to store transactions without intermediaries.