4.1 - CompTIA Security+

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Mobile device hardening

Implementing security measures on mobile devices, including configuring strong passwords, enabling encryption, ensuring regular software updates, and installing MDM software.

2
New cards

Workstation hardening

Implementing security measures on workstations, such as configuring firewalls, using antivirus software, managing user access controls, and applying security patches regularly.

3
New cards

Switch/router/server hardening

Implementing security measures on network switches, including changing default credentials and ensuring regular firmware updates.

4
New cards

Cloud infrastructure hardening

Ensuring security in cloud environments by utilizing strong access controls, encrypting sensitive data, logging user activity, and regularly auditing configurations and compliance with security standards.

5
New cards

ICS/SCADA hardening

Isolating control systems from the rest of the network, and the internet (air-gapped systems).

6
New cards

RTOS hardening

Implementing secure coding practices, minimizing the attack surface by disabling unused features, and applying timely updates and patches to mitigate vulnerabilities.

7
New cards

IoT Devices hardening

Ensuring strong authentication protocols, encrypting data in transit and at rest, regularly updating firmware, and employing network segmentation to limit exposure to threats.

8
New cards

Mobile device manager (MDM)

Software used for managing devices owned by a company or that contain corporate data.

9
New cards

Bring your own device (BYOD)

A policy that allows employees to use their personal devices for work purposes, enabling greater flexibility and potentially increasing employee satisfaction.

10
New cards

Corporate-owned, personally enabled (COPE)

A model where the organization provides devices to employees, but allows them to personalize and customize those devices.

11
New cards

Choose your own device (CYOD)

A model that allows employees to select a device from a predefined organization list where the device is corporate-owned.

12
New cards

Wi-Fi security

Ensure all network connections are encrypted and utilize strong passwords to prevent unauthorized access.

13
New cards

Bluetooth security

Ensure all devices use a formal pairing process to establish secure connections and avoid pairing to unverified devices.

14
New cards

Wi-Fi Protected Access 3 (WPA3)

Wi-Fi standard/protocol designed to enhance security compared to WPA2, including improved encryption methods and protections against brute-force attacks.

15
New cards

AAA/RADIUS

A networking protocol that enables centralized authentication, authorization, and accounting for users who connect to a network.

16
New cards

Cryptographic protocols

Protocols that provide secure communication through encryption, ensuring data integrity and confidentiality during transmission.

17
New cards

Authentication protocols

Protocols that verify the identity of users or systems before granting access or privileges.

18
New cards

Input validation

Analysis of user input to ensure it matches expected criteria, preventing injection vulnerabilities.

19
New cards

Secure cookies

Utilizing HTTPOnly and Secure attributes to protect cookies from being accessed by client-side scripts.

20
New cards

Static code analysis

A method to examine source code for security vulnerabilities and coding errors without executing the program.

21
New cards

Code signing

A developer digitally signs software with a cryptographic key to verify the authenticity and integrity of the code.

22
New cards

Sandboxing

A security mechanism to run untested or untrusted code in a restricted environment.

23
New cards

Monitoring

Building surveillance systems to track unauthorized activity in applications, networks, and user behavior.