CompTIA Security+ Study Guide 601

0.0(0)
studied byStudied by 6 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/869

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:48 PM on 9/30/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

870 Terms

1
New cards

Confidentiality

The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.

2
New cards

integrity

The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications.

3
New cards

Availability

The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need.

4
New cards

Non-repudiation

The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.

5
New cards

National Institute of Standards and Technology (NIST)

Develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research.

6
New cards

security control

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.

7
New cards

Technical

A category of security control that is implemented as a system (hardware, software, or firmware). Technical controls may also be described as logical controls.

8
New cards

Operational

A category of security control that is implemented by people.

9
New cards

Managerial

A category of security control that gives oversight of the information system.

10
New cards

Access control lists (ACL)

A collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read only, read/write, and so on).

11
New cards

Detective Control

A type of security control that acts during an incident to identify or record that it is happening.

12
New cards

Corrective Control

A type of security control that acts after an incident to eliminate or minimize its impact.

13
New cards

Physical

A type of security control that acts against in-person intrusion attempts.

14
New cards

Deterrent

A type of security control that discourages intrusion attempts.

15
New cards

Compensating

A security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations.

16
New cards

ISO 27001

A comprehensive set of standards for information security, including best practices for security and risk management, compliance, and technical implementation.

17
New cards

Cloud Security Alliance (CSA)

Industry body providing security guidance to CSPs, including enterprise reference architecture and security controls matrix.

18
New cards

Statements on Standards for Attestation Engagements (SSAE)

Audit specifications designed to ensure that cloud/hosting providers meet professional standards. A SOC2 Type II report is created for a restricted audience, while SOC3 reports are provided for general consumption.

19
New cards

SOC2 Type I report

assesses the system design

20
New cards

SOC2 Type 2 report

assesses the ongoing effectiveness of the security architecture over a period of 6-12 months. _ reports are highly detailed and designed to be restricted. They should only be shared with the auditor and regulators and with important partners under non-disclosure agreement (NDA) terms

21
New cards

SOC2 Type 3 report

a less detailed report certifying compliance with SOC2. SOC3 reports can be freely distributed

22
New cards

Center for Internet Security

A not-for-profit organization (founded partly by SANS). It publishes the well-known "Top 20 Critical Security Controls" (or system design recommendations).

23
New cards

Payment Card Industry Data Security Standard (PCI DSS)

Information security standard for organizations that process credit or bank card payments.

24
New cards

Open Web Application Security Project (OWASP)

A charity and community publishing a number of secure application development resources.

25
New cards

Sarbanes-Oxley Act (SOX)

A law enacted in 2002 that dictates requirements for the storage and retention of documents relating to an organization's financial and business operations.

26
New cards

General Data Protection Regulation (GDPR)

Provisions and requirements protecting the personal data of European Union (EU) citizens. Transfers of personal data outside the EU Single Market are restricted unless protected by like-for-like regulations, such as the US's Privacy Shield requirements.

27
New cards

Gramm-Leach-Bliley Act (GLBA)

A law enacted in 1999 that deregulated banks, but also instituted requirements that help protect the privacy of an individual's financial information that is held by financial institutions.

28
New cards

Health Insurance Portability and Accountability Act

The Health Insurance Portability and Accountability Act of 1996 is a United States federal statute enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996.

29
New cards

California Consumer Privacy Act (CCPA)

A law that allows any California consumer to demand to see all the information a company has saved on them, as well as a full list of all the third parties that data is shared with.

30
New cards

Vulnerability

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

31
New cards

Threat

The potential for an entity to exercise a vulnerability (that is, to breach security).

32
New cards

Risk

the likelihood and impact (or consequence) of a threat actor exploiting a vulnerability.

33
New cards

black hat

An unauthorized hacker operating with malicious intent.

34
New cards

white hat

A hacker engaged in authorized penetration testing or other security consultancy.

35
New cards

gray hat hacker

A hacker who analyzes networks without seeking authorization, but without overtly malicious intent.

36
New cards

script kiddie

An inexperienced, unskilled attacker that typically uses tools or scripts created by others.

37
New cards

Advanced Persistent Threat (APT)

An attacker's ability to obtain, maintain, and diversify access to network systems using exploits and malware.

38
New cards

shadow IT

Computer hardware, software, or services used on a private network without authorization from the system owner.

39
New cards

attack surface

The points at which a network or application receives external connections or inputs/outputs that are potential vectors to be exploited by a threat actor.

40
New cards

attack vector

A specific path by which a threat actor gains unauthorized access to a system.

41
New cards

Supply chain

An attack that targets the end-to-end process of manufacturing, distributing, and handling goods and services.

42
New cards

criminal syndicate

A type of threat actor that uses hacking and computer fraud for commercial gain.

43
New cards

State actors

A type of threat actor that is supported by the resources of its host country's military and security services.

44
New cards

Hacktivists

An threat actor that is motivated by a social issue or political cause.

45
New cards

dark web

Resources on the Internet that are distributed between anonymized nodes and protected from general access by multiple layers of encryption and routing.

46
New cards

Behavioral threat research

narrative commentary describing examples of attacks and TTPs gathered through primary research sources.

47
New cards

TTPs

Threat research is a counterintelligence gathering effort in which security companies and researchers attempt to discover the tactics, techniques, and procedures

48
New cards

Reputational threat intelligence

Blacklists of known threat sources, such as malware signatures, IP address ranges, and DNS domains.

49
New cards

Threat data

computer data that can correlate events observed on a customer's own networks and logs with known TTP and threat actor indicators.

50
New cards

cyber threat intelligence (CTI)

The process of investigating, collecting, analyzing, and disseminating information about emerging threats and threat sources.

51
New cards

Closed/proprietary

Software code or security research that remains in the ownership of the developer and may only be used under permitted licence conditions.

52
New cards

Vendor websites

proprietary threat intelligence is not always provided at cost. All types of security, hardware, and software vendors make huge amounts of threat research available via their websites as a general benefit to their customers. One example is Microsoft's Security Intelligence blog

53
New cards

Information Sharing and Analysis Centers (ISACs)

Not-for-profit group set up to share sector-specific threat intelligence and security best practices amongst its members.

54
New cards

Open source intelligence (OSINT)

Publicly available information plus the tools used to aggregate and search it.

55
New cards

indicator of compromise (IoC)

A sign that an asset or network has been attacked or is currently under attack.

56
New cards

threat data feed

Signatures and pattern-matching rules supplied to analysis platforms as an automated feed.

57
New cards

Structured Threat Information eXpression (STIX)

A framework for analyzing cybersecurity incidents.

58
New cards

Automated Indicator Sharing (AIS)

Threat intelligence data feed operated by the DHS.

59
New cards

threat map

Animated map showing threat sources in near real-time.

60
New cards

Common Vulnerabilities and Exposures (CVE)

Scheme for identifying vulnerabilities developed by MITRE and adopted by NIST.

61
New cards

Trusted Automated eXchange of Indicator Information (TAXII)

A protocol for supplying codified information to automate incident detection and analysis.

62
New cards

footprinting

The phase in an attack or penetration test in which the attacker or tester gathers information about the target before attacking it.

63
New cards

pathping

Windows utility for measuring latency and packet loss along a route.

64
New cards

mtr

Utility combining the ping and traceroute commands.

65
New cards

Simple Network Management Protocol (SNMP)

Protocol for monitoring and managing network devices. _ works over UDP ports 161 and 162 by default.

66
New cards

Nmap Security Scanner

Versatile port scanner used for topology, host, service, and OS discovery and enumeration.

67
New cards

service discovery

The practice of using network scans to discover open TCP and UDP ports, plus information about the servers operating them.

68
New cards

TCP SYN (-sS)

this is a fast technique also referred to as half-open scanning, as the scanning host requests a connection without acknowledging it. The target's response to the scan's SYN packet identifies the port state.

69
New cards

UDP scans (-sU)

scan UDP ports. As these do not use ACKs, Nmap needs to wait for a response or timeout to determine the port state, so UDP scanning can take a long time. A UDP scan can be combined with a TCP scan.

70
New cards

Port range (-p)

by default, Nmap scans 1000 commonly used ports, as listed in its configuration file. Use the -p argument to specify a port range.

71
New cards

fingerprinting

Identifying the type and version of an operating system (or server application) by analyzing its responses to network scans.

72
New cards

netstat

Utility to show network information on a machine running TCP/IP, notably active connections and the routing table.

73
New cards

nslookup/dig

Software tool for querying DNS server records.

74
New cards

theHarvester

Utility for gathering results from open source intelligence queries. It works by scanning multiple public data sources to gather emails, names, subdomains, IPs, URLs and other relevant data.

75
New cards

dnsenum

packages a number of tests into a single query, as well as hosting information and name records, _ can try to work out the IP address ranges that are in use.

76
New cards

curl

is a command line client for performing data transfers over many types of protocol. This tool can be used to submit HTTP GET, POST, and PUT requests as part of web application vulnerability testing. curl supports many other data transfer protocols, including FTP, IMAP, LDAP, POP3, SMB, and SMTP.

77
New cards

Nessus

The list of services and version information that a host is running can be cross-checked against lists of known software vulnerabilities.

78
New cards

Packet analysis

The act of examining protocol headers and payloads within individual network packets or frames.

79
New cards

Protocol analysis

The act of examining protocol usage statistics over a network link.

80
New cards

tcpdump

a command line packet capture utility for Linux, The utility will then display captured packets until halted manually

81
New cards

Well-known tools used for packet injection

Dsniff, Ettercap, Scapy, and hping

82
New cards

hping

an open-source spoofing tool that provides a penetration tester with the ability to craft network packets to exploit vulnerable firewalls and IDSs.

83
New cards

tcpreplay

A command-line utility that replays packets saved to a file back through a network adapter.

84
New cards

remote access trojan (RAT)

Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

85
New cards

exploitation framework

Suite of tools designed to automate delivery of exploits against common software and firmware vulnerabilities.

86
New cards

Metasploit

A platform for launching modularized attacks against known software vulnerabilities.

87
New cards

Sn1per

Software utility designed for penetration testing reporting and evidence gathering that can also run automated test suites.

88
New cards

Netcat

Utility for reading and writing raw data over a network connection.

89
New cards

data breach event

where confidential data is read or transferred without authorization. A privacy _ is where personal data is not collected, stored, or processed in full compliance with the laws or regulations governing personal information. A _ can also be described as a data leak. A data breach can be intentional/malicious or unintentional/accidental.

90
New cards

Data exfiltration

the methods and tools by which an attacker transfers data without authorization from the victim's systems to an external network or media.

91
New cards

Vendor management

Policies and procedures to identify vulnerabilities and ensure security of the supply chain.

92
New cards

Security Content Automation Protocol (SCAP)

A NIST framework that outlines various accepted practices for automating vulnerability scanning.

93
New cards

Common Vulnerability Scoring System (CVSS)

A risk management approach to quantifying vulnerability data and then taking into account the degree of risk to different types of systems or information.

94
New cards

Non-intrusive (or passive) scanning

An enumeration or vulnerability scan that analyzes only intercepted network traffic rather than sending probes to a target. More generally, passive reconnaissance techniques are those that do not require direct interaction with the target.

95
New cards

Active scanning

probing the device's configuration using some sort of network connection with the target. Active scanning consumes more network bandwidth and runs the risk of crashing the target of the scan or causing some other sort of outage. Agent-based scanning is also an active technique.

96
New cards

Open Vulnerability and Assessment Language (OVAL)

an XML schema for describing system security state and querying vulnerability reports and information.

97
New cards

Extensible Configuration Checklist Description Format (XCCDF)

an XML schema for developing and auditing best-practice configuration checklists and rules. Previously, best-practice guides might have been written in prose for system administrators to apply manually. XCCDF provides a machine-readable format that can be applied and validated using compatible software.

98
New cards

Rules of engagement

Agreeing scope, operational parameters, and reporting requirements for a penetration test.

99
New cards

Black box

An assessment methodology where the assessor is given no privileged information about the configuration of the target of assessment.

100
New cards

White box

An assessment methodology that simulates an inside attacker that knows everything about the target.