Security + Exam 701

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 272

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

273 Terms

1

Risk Management

The process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events.

New cards
2

Confidentiality

Refers to the protection of information from unauthorized access and disclosure

New cards
3

AAA

Stands for Authentication, Authorization, and Accounting, which are critical processes for ensuring secure access to resources.

New cards
4

CIANA

Confidentiality, Integrity, Availability, Non-repudiation, and Authentication, which are key principles in information security.

New cards
5

Encryption

is the process of converting information into a coded format to prevent unauthorized access, ensuring confidentiality and data protection.

New cards
6

Access Controls

Ensure only authorized personnel can access certain types of data

New cards
7

Data masking

is a data protection technique that obscures specific data within a database to protect sensitive information while retaining its usability for testing or analysis.

New cards
8

Physical security measures

are strategies and tools used to protect physical assets and facilities from unauthorized access, damage, or theft.

New cards
9

Hashing

Process of converting data into a fixed size value

New cards
10

Digital signature

Use encryption to ensure integrity and authenticity

New cards
11

Checksums

are values generated from data to verify its integrity by detecting errors or alterations.

New cards
12

Regular audits

are systematic evaluations of an organization's processes, controls, and compliance with regulations to ensure security and efficiency.

New cards
13

Availability

refers to the assurance that information and resources are accessible to authorized users when needed, ensuring continuous operation.

New cards
14

Redundancy

is the practice of duplicating critical components or functions of a system to increase reliability and availability in case of failure.

New cards
15

Server Redundancy

involves having multiple servers that can take over in case one fails, ensuring continuous service availability and minimizing downtime.

New cards
16

Data redundancy

is the practice of storing duplicate copies of data in multiple locations to prevent data loss and ensure availability in case of system failure.

New cards
17

Network redundancy

is the practice of having multiple network paths or devices to ensure connectivity and maintain service availability in case of a failure.

New cards
18

Power redundancy

is the practice of having multiple power sources or systems to ensure continuous power supply to critical systems and prevent downtime during power failures.

New cards
19

non-repudiation

is a security principle that ensures that a party in a transaction cannot deny the authenticity of their signature or the sending of a message, providing proof of the origin and integrity of the data.

New cards
20

Digital Signature (non-repudiation)

Created by first hashing a particular message or communication to be digital signed and encryption the hash digest with he user’s private key using asymmetric encryption

New cards
21

Authentication

Security measure that ensures individuals or entities are who they claim to be during a communication or transaction

New cards
22

5 common verification methods

Something you know

Something you have

Something you are

Something you do

Somewhere you are

New cards
23

Something you know

Relies on information that a user can recall

New cards
24

Something you have (possession factor)

Relies on the user presenting a physical item to authenticate themselves

New cards
25

Something you are (inherence factor)

Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be

New cards
26

Something you do (action factor)

Relied on the user conducting a unique action to prove who they are

New cards
27

Somewhere you are (location factor)

Relies on the user being in a certain geographical location before access is granted

New cards
28

Authorization

permissions and privileges granted to users or entities after they have been authenticated while also being a set of rules and policies that are used to dictate what actions users can perform once verified

New cards
29

Accounting

Security measure that ensures all user activities are properly tracked and recorded

New cards
30

Regulatory compliance

Maintains a comprehensive record of all the users activities

New cards
31

Forensic analysis

refers to a detailed investigation for detecting and documenting the course, reasons, culprits, and consequences of a security incident.

New cards
32

Syslog servers

a network device that collects, stores, and forwards log messages from other devices

New cards
33

network analyzer

the process of examining network traffic and related data to identify potential security threats and vulnerabilities by analyzing patterns and anomalies within the network activity

New cards
34

SIEM

Security information and event management

Provides real time analyses of security alerts generated by various hardware and software infrastructure in an organization

New cards
35

Technical control

Technologies, hardware , and software that are implemented to manager and reduce risks

EX. Firewalls, encryption processes, and IDSs

New cards
36

Managerial controls (administrative controls)

Involve the strategic planning and governance of security

EX.Risk assessment

New cards
37

Operational controls

the management of a business's day-to-day operations. It involves monitoring and adjusting processes, resources, and procedures to ensure that a business is efficient and effective and governed by internal processes and human actions.

EX. Password change every 90 days

New cards
38

Physical controls

tangible, real world measures taken to protect assets

EX. Security guards

New cards
39

Preventative controls

Proactive measures implemented to thwart potential security threats or breaches

Ex.Firewall

New cards
40

Detterent controls

Aim to discourage potential attackers by making the effort seem less appealing or more challenging

Ex. Sign OutFront that displays sign of home alarm system

New cards
41

Detective controls

Monitor and alert organizations to malicious activities as they occur or shortly thereafter

Ex. Security cameras

New cards
42

Corrective controls

Mitigate any potential damage and restore the systems to their normal state

New cards
43

Compensating controls

Alternative measures that are implemented when primary security controls are not feasible or effective

New cards
44

Directive controls

Often rooted in policy or documentation and set the standards for behavior within an organization

EX. AUP - acceptable use policy

New cards
45

Control plane

the central management system within a Zero Trust security architecture that governs access control, policy enforcement, and user/device verification

New cards
46

Adaptive identity

real time validation that takes into account the users behavior, device location, and more

New cards
47

Threat scope reduction

Limit the user’s access to only what they need for their work tasks because this drastically reduces the network potential attack surface

New cards
48

Policy driven access control

Entails developing, managing and enforcing user access policies based on their roles and responsibilities

New cards
49

Secured zones

Isolated environments within a network that are designed to house sensitive data

New cards
50

False Flag attack

Attack that is orchestrated in a way that it appears to originate from a different source or group

New cards
51

Threat vector

Pathway an attacker takes to gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action

New cards
52

Attack surface

Gathers all the various points where the unauthorized user can try to enter data to or extract data from an environment

New cards
53

Evil Twin

refers to a fraudulent Wi-Fi access point that appears legitimate but is set up by a hacker to intercept user data by tricking them into connecting to it instead of the real network

New cards
54

Bluesmack

Bluetooth attack that knock our some Bluetooth enabled devices and is a DOS type attack

New cards
55

TTP (Note port related)

Tactics, techniques, and procedures

New cards
56

Honeypot

Decoy system or network set up to attract potential hackers

New cards
57

Honeynet

A network of honeypots created in a more complex manner that is designed to mimic an entire network of systems, including servers, routers, and switches

New cards
58

Honeyfile

Decoy file placed within a systems to lure in potential hackers

New cards
59

Honeytoken

Piece of data or a resource that has no legitimate value or use but is monitored for access or use

Ex A fake password that seems real

New cards
60

Dynamic page generation

Used in websites to present ever changing content to web crawlers to confused and slow down threat actor

New cards
61

Port triggering

Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected

New cards
62

Fake Telemetry

System can respond to attackers network scan attempt by sending out fake telemetry or network data

New cards
63

4 Area of Surveillance

Video surveillance

Security Guards

Lighting

Sensors

New cards
64

Infrared Sensors

Detect changes in infrared radiation that is emitted by warm bodies

New cards
65

Pressure sensors

Detected when a specified amount of weight is detected on the platform

New cards
66

Microwave sensors

Detect movement in an area by emitting microwave pulses and measuring their reflection off moving objects

New cards
67

Ultrasonic sensors

Measure the reflection of ultrasonic sound waves off moving objects

New cards
68

EMI

Electromagnetic interference

Jamming the signals that surveillance systems rely on to monitor the environment

New cards
69

FAR

False acceptance rate

New cards
70

FRR

False rejection rate

New cards
71

EER

Equal error rate

commonly known as the CER Crossover error rate, which uses a measure of the effectiveness of a given biometric system to achieve a balance

New cards
72

RFID

Radio frequency identifcation

New cards
73

NFC

Near field communication

New cards
74

BEC

Business email compromise

New cards
75

Business email compromise

advanced attack that uses internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker

New cards
76

Identity fraud

Attacker takes the victims credit card number and makes changes

New cards
77

Identity theft

Attacker tries to fully assume the identity of their victim

New cards
78

Misinformation

Inaccurate information shared unintentionally

New cards
79

Disinformation

Intentional spread of false information to deceive or mislead

New cards
80

DNS Spoofing attack

an attack involving manipulating DNS records to redirect users toward a fraudulent, malicious website that may resemble the user's intended destination.

New cards
81

Malware

Software designed to infiltrate a computers systems and possibly damage without the users consent

New cards
82

Threat vector

How the attacker breaks into the system

New cards
83

Attack vector

How the attacker breaks in and infects the system

New cards
84

Virus

Malicious software that attaches to clean files and spread into a computer system

New cards
85

Macro Virus

Form of code embedded inside a document that when opened by the user the virus us then executed

New cards
86

Program Virus

Tries to find executables or applications files to infect with their malicious code

New cards
87

Multipartite Virus

A combination of boot sector virus and a program virus where it loads itself upon booting and then installs itself in a program and can be run every time the computer starts up

New cards
88

Encrypted Virus

Hides itself from being detected by encrypting it’s malicious code to avoid detection

New cards
89

Polymorphic Virus

Advanced version of encrypted because it changes the virus code each time it is executed by altering the decryption module to evade detection

New cards
90

Metamorphic Virus

Able to rewrite itself entirely to infect a given file

New cards
91

Worm

Malicious software, like a virus, but is able to replicate itself without user interaction

New cards
92

Botnet

A network of compromised computers being controlled by a masternode

New cards
93

Zombies

A compromised computer or device that is part of a botnet being controlled remotely to maliciously perform tasks

New cards
94

Rootkit

Software that is designed to gain administrative level control over a given computer system without being detected

New cards
95

Kernel mode (ring zero)

Allows a systems to control access to things like device drivers, sound card, and monitor

New cards
96

DLL

Dynamic link library

New cards
97

Dynamic link library

Technique used to run code within the address space of another process by forcing it to load a dynamic link library

New cards
98
New cards
99

What is a DLL or Dynamic link library?

a file that contains code and data that can be used by multiple programs

New cards
100

Shim

Software code that is placed between two components

New cards

Explore top notes

note Note
studied byStudied by 55 people
873 days ago
5.0(1)
note Note
studied byStudied by 8 people
898 days ago
5.0(1)
note Note
studied byStudied by 25 people
805 days ago
5.0(1)
note Note
studied byStudied by 7 people
952 days ago
5.0(1)
note Note
studied byStudied by 26 people
839 days ago
5.0(1)
note Note
studied byStudied by 20 people
705 days ago
5.0(1)
note Note
studied byStudied by 72 people
828 days ago
5.0(1)
note Note
studied byStudied by 259 people
971 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (41)
studied byStudied by 8 people
138 days ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 6 people
722 days ago
5.0(2)
flashcards Flashcard (60)
studied byStudied by 15 people
785 days ago
5.0(1)
flashcards Flashcard (148)
studied byStudied by 3 people
819 days ago
5.0(1)
flashcards Flashcard (53)
studied byStudied by 17 people
556 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 2 people
95 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 7 people
740 days ago
4.0(1)
flashcards Flashcard (67)
studied byStudied by 16 people
46 days ago
5.0(1)
robot