Comptia Security 701 Study

0.0(0)
studied byStudied by 8 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/499

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

500 Terms

1
New cards

What is the CIA Triad?

Three principles of security control and management: Confidentiality, Integrity, and Availability. Also known as the information security triad.

2
New cards

Confidentiality

The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.

3
New cards

Integrity

The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications.

4
New cards

Availability

The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need.

5
New cards

Non-repudiation

The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.

6
New cards

NIST(National Institute of Standards and Technology)

develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides.

7
New cards

Cybersecurity Frameworks (CSF)

Standards, best practices, and guidelines for effective security risk management.

8
New cards

Security Controls

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.

9
New cards

Gap Analysis

An analysis that measures the difference between the current and desired states in order to help assess the scope of work included in a project.

10
New cards

IAM(Identity and Access Management)

a security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities.

11
New cards

Authentication

A method of validating a particular entity's or individual's unique credentials.

12
New cards

Authorization

The process of determining what rights and privileges a particular entity has.

13
New cards

Accounting

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.

14
New cards

AAA(Authentication, Authorization, and Accounting)

a security concept where a centralized platform verifies subject identification, ensures relevant permissions, and logs actions.

15
New cards

Managerial Control

The control gives oversight of the information system. Examples include risk identification or tools for evaluating and selecting other security controls.

16
New cards

Operational Control

A category of security control that is implemented by people.

17
New cards

Technical Control

Control implemented as a system (hardware, software, or firmware). Examples: firewalls, antivirus software, and OS access control models.

18
New cards

Physical Control

Controls such as alarms, gateways, locks, lighting, security cameras, and guards that deter and detect access to premises and hardware.

19
New cards

Preventive Control

A type of security control that acts before an incident to eliminate or reduce the likelihood that an attack can succeed.

20
New cards

Detective Control

A type of security control that acts during an incident to identify or record that it is happening.

21
New cards

Corrective Control

A type of security control that acts after an incident to eliminate or minimize its impact.

22
New cards

Deterrent Control

A type of security control that discourages intrusion attempts.

23
New cards

Compensating Control

A security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations.

24
New cards

SOC(Security Operations Center)

the location where security professionals monitor and protect critical information assets in an organization.

25
New cards

DevOps(Development and Operations)

the practice of integrating software development with systems operations.

26
New cards

DevSecOps

A combination of software development, security operations, and systems operations, integrating each discipline with the others.

27
New cards

CIRT(Computer Incident Response Team )

team with responsibility for incident response across multiple business domains.

28
New cards

Vulnerability

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

29
New cards

Threat

A potential for an entity to exploit a vulnerability (that is, to breach security).

30
New cards

Risk

Likelihood and impact (or consequence) of a threat actor exercising a vulnerability.

31
New cards

Threat Actor

A person or entity responsible for an event that has been identified as a security incident or as a risk.

32
New cards

Nation-state Actors

A type of threat actor that is supported by the resources of its host country's military and security services.

33
New cards

Hacktivists

A threat actor that is motivated by a social issue or political cause.

34
New cards

Organized Crime

A type of threat actor that uses hacking and computer fraud for commercial gain.

35
New cards

Internal Threat

A type of threat actor who is assigned privileges on the system that cause an intentional or unintentional incident.

36
New cards

Shadow IT

Computer hardware, software, or services used on a private network without authorization from the system owner.

37
New cards

Threat Vector

The path that a threat actor uses to execute a data exfiltration, service disruption, or disinformation attack.

38
New cards

Social Engineering

Using persuasion, manipulation, or intimidation to make the victim violate a security policy.

39
New cards

Impersonation

Social engineering attack where an attacker pretends to be someone they are not.

40
New cards

Pretexting

Social engineering tactic where a team communicates a lie or half-truth to get someone to believe a falsehood.

41
New cards

Phishing

A type of email-based social engineering attack from a supposedly reputable source to try to elicit private information.

42
New cards

Vishing

A human-based attack where the attacker extracts information while speaking over the phone or leveraging VoIP.

43
New cards

Smishing

A form of phishing that uses SMS text messages to trick a victim into revealing information.

44
New cards

Pharming

An impersonation attack in which a request for a website is redirected to a similar-looking, but fake, website.

45
New cards

Typosquatting

An attack where an attacker registers a domain name with a common misspelling of an existing domain.

46
New cards

Business Email Compromise

An impersonation attack where the attacker gains control of an employee's account and uses it to convince other employees to perform fraudulent actions.

47
New cards

Watering Hole Attack

An attack where an attacker targets specific groups, discovers which websites they frequent, and injects malicious code into those sites.

48
New cards

Cryptography

The science and practice of altering data to make it unintelligible to unauthorized parties.

49
New cards

Plaintext

Unencrypted data that is meant to be encrypted before transmission, or the result of decryption.

50
New cards

Ciphertext

Data that has been enciphered and cannot be read without the cipher key.

51
New cards

Encryption

Scrambling characters in a message so it can be seen but not understood or modified unless deciphered.

52
New cards

Symmetric Encryption

Two-way encryption scheme where encryption and decryption are both performed by the same key.

53
New cards

Asymmetric Algorithm

Cipher that uses public and private keys that are mathematically linked, but the private key is not derivable from the public one.

54
New cards

Public Key

In asymmetric encryption, freely distributed key used to encrypt data, which can only be decrypted by the linked private key.

55
New cards

Private Key

In asymmetric encryption, key known only to the holder and linked to, but not derivable from, a public key.

56
New cards

Hashing

A function that converts an arbitrary-length string input to a fixed-length string output, reducing the chance of collisions.

57
New cards

SHA(Secure Hash Algorithm)

a cryptographic hashing algorithm created to address possible weaknesses in MD5. Current version is SHA-2.

58
New cards

MD5(Message Digest Algorithm #5)

a cryptographic hash function producing a 128-bit output.

59
New cards

Digital Signature

A message digest encrypted using the sender's private key that is appended to a message to authenticate the sender and prove integrity.

60
New cards

PKI(Public Key Infrastructure)

a framework of certificate authorities, digital certificates, software, and services deployed to validate subject identities.

61
New cards

Certificate Authority (CA)

A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.

62
New cards

Digital Certificate

Identification and authentication information presented in X.509 format and issued by a CA as a guarantee that a key pair is valid.

63
New cards

Root Certificate

In PKI, a CA that issues certificates to intermediate CAs in a hierarchical structure.

64
New cards

Certificate Chaining

A method of validating a certificate by tracing each CA that signs the certificate up through the hierarchy to the root CA.

65
New cards

Self-signed Certificate

A digital certificate that has been signed by the entity that issued it, rather than by a CA.

66
New cards

CSR(Certificate Signing Request)

a Base64 ASCII file that a subject sends to a CA to get a certificate.

67
New cards

SAN(Subject Alternative Name)

a field in a digital certificate allowing a host to be identified by multiple host names/subdomains.

68
New cards

Wildcard Domain

In PKI, a digital certificate that will match multiple subdomains of a parent domain.

69
New cards

CRL(Certificate Revocation List )

a list of certificates that were revoked before their expiration date.

70
New cards

OCSP(Online Certificate Status Protocol)

allows clients to request the status of a digital certificate to check whether it is revoked.

71
New cards

TPM(Trusted Platform Module)

specification for secure hardware-based storage of encryption keys, hashed passwords, and other identification information.

72
New cards

HSM(Hardware Security Module)

an appliance for generating and storing cryptographic keys, less susceptible to tampering than software-based storage.

73
New cards

Data at Rest

Information that is primarily stored on specific media, rather than moving from one medium to another.

74
New cards

Data in Transit

Information that is being transmitted between two hosts, such as over a private network or the Internet.

75
New cards

Data in Use

Information that is present in the volatile memory of a host, such as system memory or cache.

76
New cards

FDE(Full Disk Encryption)

encryption of all data on a disk including system files, temporary files, and the pagefile.

77
New cards

Perfect Forward Secrecy (PFS)

A characteristic ensuring that if a key is compromised, it will only affect a single session and not facilitate recovery of other sessions' plaintext.

78
New cards

Diffie-Hellman

A cryptographic technique that provides secure key exchange.

79
New cards

Salt

A security countermeasure that mitigates precomputed hash table attacks by adding a random value to each plaintext input.

80
New cards

Key Stretching

A technique that strengthens potentially weak input for cryptographic key generation against brute force attacks.

81
New cards

Blockchain

A concept where an expanding list of transactional records in a public ledger is secured using cryptography.

82
New cards

Obfuscation

A technique that "hides" or "camouflages" code or other information so it is harder to read by unauthorized users.

83
New cards

Steganography

A technique for obscuring the presence of a message, often by embedding information within a file or other entity.

84
New cards

Data Masking

A de-identification method where generic or placeholder labels are substituted for real data while preserving structure.

85
New cards

Tokenization

A de-identification method where a unique token is substituted for real data.

86
New cards

PIN(Personal Identification Number)

a number used with authentication devices such as smart cards, known only to the user.

87
New cards

Password Best Practices

Rules to govern secure selection and maintenance of knowledge factor authentication secrets, such as length, complexity, age, and reuse.

88
New cards

MFA(Multifactor Authentication)

an authentication scheme requiring the user to present at least two different factors as credentials.

89
New cards

Biometric Authentication

An authentication mechanism that allows a user to perform a biometric scan to operate an entry or access system.

90
New cards

FRR(False Rejection Rate)

a biometric metric measuring the number of valid subjects who are denied access.

91
New cards

FAR(False Acceptance Rate)

a biometric metric measuring the number of unauthorized users who are mistakenly allowed access.

92
New cards

CER(Crossover Error Rate)

a biometric evaluation factor expressing the point at which FAR and FRR meet, with low values indicating better performance.

93
New cards

Smart Cards

A security device similar to a credit card that can store authentication information on an embedded cryptoprocessor.

94
New cards

OTP(One-Time Password)

a password generated for use in one specific session and becomes invalid after the session ends.

95
New cards

Security Key

Portable HSM with a computer interface (USB or NFC) used for multifactor authentication.

96
New cards

Passwordless

Multifactor authentication scheme that uses ownership and biometric factors, but not knowledge factors.

97
New cards

DAC(Discretionary Access Control)

an access control model where each resource is protected by an ACL managed by the resource's owner.

98
New cards

MAC(Mandatory Access Control)

an access control model where resources are protected by inflexible, system-defined rules with clearance levels.

99
New cards

RBAC(Role-Based Access Control)

an access control model where resources are protected by ACLs managed by administrators based on job functions.

100
New cards

ABAC(Attribute-Based Access Control)

an access control technique that evaluates a set of attributes each subject possesses to determine access.