Security+ SY0-701 - Chapter 1

0.0(0)
studied byStudied by 10 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

flashcard set

Earn XP

Description and Tags

CompTIA Security+ Study Guide Exam SY0-701

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Confidentiality, Integrity, and Availability

Key objectives of cybersecurity.

2
New cards

Confidentiality

Objective that ensures unauthorized individuals are not able to gain access to sensitive information.

3
New cards

Integrity

Objective that ensures there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

4
New cards

Availability

Objective that ensures information systems are ready to meet the needs of legitimate users at the time those users request them.

5
New cards

Nonrepudiation

Objective that ensures someone who performed an action cannot later deny having taken that action.

6
New cards

Security Incident

An occurrence characterized by the breach of an organization’s confidentiality, integrity, or availability of information or information systems.

7
New cards

Disclosure, Alteration, and Denial

Key threats to cybersecurity efforts.

8
New cards

Disclosure

Threat that causes exposure of sensitive information to unauthorized individuals, otherwise known as data loss.

9
New cards

Alteration

Threat that causes unauthorized modification of information and is a violation of the principle of integrity.

10
New cards

Denial

Threat that causes disruption of an authorized user’s legitimate access to information.

11
New cards

Financial, Reputational, Strategic, Operational, and Compliance

Types of breach impact risk.

12
New cards

Financial Risk

Risk of monetary damage to an organization as the result of a data breach.

13
New cards

Reputational Risk

Risk of negative publicity surrounding a security breach causing the loss of goodwill among customers, employees, suppliers, and other stakeholders.

14
New cards

Strategic Risk

Risk of an organization becoming less effective in meeting its major goals and objectives as a result of a breach.

15
New cards

Operational Risk

Risk of an organization’s inability to carry out its day-to-day functions.

16
New cards

Compliance Risk

Risk of a breach causing an organization to run afoul of legal or regulatory requirements.

17
New cards

Control Objective

Statement of a desired security state.

18
New cards

Security Control

A specific measure that fulfils the security objectives of an organization.

19
New cards

Gap Analysis

Review and examination of control objectives and the controls designed to achieve those objectives.

20
New cards

Gap

An occurrence of controls not meeting control objectives.

21
New cards

Technical, Operational, Managerial, and Physical

Categories of security controls.

22
New cards

Technical Control

Control that enforces confidentiality, integrity, and availability in the digital space.

23
New cards

Operational Control

Control that manages technology in a secure manner.

24
New cards

Managerial Control

Procedural mechanism that focuses on the mechanics of the risk management process.

25
New cards

Physical Control

Security control that impacts the physical world.

26
New cards

Preventative, Deterrent, Detective, Corrective, Compensating, and Directive

Types of security controls.

27
New cards

Preventative Control

Control intended to stop a security issue before it occurs.

28
New cards

Deterrent Control

Control intended to prevent an attacker from attempting to violate security policies.

29
New cards

Detective Control

Control intended to identify security events that have already occurred.

30
New cards

Corrective Control

Control intended to remediate security issues that have already occurred.

31
New cards

Compensating Control

Control intended to mitigate risk associated with exceptions made to a security policy.

32
New cards

Directive Control

Control intended to inform employees and others what they should do to achieve security objectives.

33
New cards

At-rest, In-transit, In-use

States of data, in regards to data protection.

34
New cards

At-rest Data

Stored data that resides on hard drives, tapes, in the cloud, or on other storage media.

35
New cards

In-transit Data

Data that is in motion/transit over a network.

36
New cards

In-use Data

Data that is actively being used by a computer system.

37
New cards

Acronym: DLP

Data Loss Prevention

38
New cards

DLP System

Control intended to help organizations enforce information handling policies and procedures to prevent data loss and theft.

39
New cards

Agent-based DLP

DLP System consisting of agents installed on systems that search those systems for the presence of sensitive information.

40
New cards

Agentless (network-based) DLP

DLP System consisting of dedicated devices that sit on the network and monitor outbound traffic, watching for any transmissions that contain unencrypted sensitive information.

41
New cards

Pattern Matching, and Watermarking

DLP mechanisms of action.

42
New cards

Pattern Matching

DLP mechanism that monitors for telltale signs of sensitive information.

43
New cards

Watermarking

DLP mechanism that monitors for unencrypted content containing electronic tags, applied by administrators to sensitive documents.

44
New cards

Acronym: DRM

Digital Rights Management

45
New cards

Data Minimization

Technique seeking to reduce risk by reducing the amount of sensitive information maintained on a regular basis.

46
New cards

Deidentification

Process that removes the ability to to link data back to an individual, reducing its sensitivity.

47
New cards

Data Obfuscation

Process that transforms data into a format where the original information can’t be retrieved.

48
New cards

Hashing, Tokenization, Masking

Data obfuscation tools.

49
New cards

Hashing

Data obfuscation tool that transforms a value in a dataset to a corresponding hash value.

50
New cards

Tokenization

Data obfuscation tool that replaces sensitive values with a unique identifier using a lookup table.

51
New cards

Masking

Data obfuscation tool that partially redacts sensitive information by replacing some or all sensitive fields with blank characters.

52
New cards

Access Restriction

Security measure that limits the ability of individuals or systems to access sensitive information or resources.

53
New cards

Geographic Restriction

Restriction that limits access to resources based on the physical location of the user or system.

54
New cards

Permission Restriction

Restriction that limits access to resources based on the user’s role or level of authorization.

55
New cards

Segmentation

Practice of placing sensitive systems on separate networks where they may communicate with each other, but have strict restrictions on their ability to communicate with systems on other networks.

56
New cards

Isolation

Practice of placing sensitive systems on separate networks completely cut off from access to or from outside networks.