1/15
These flashcards encapsulate key vocabulary and concepts related to the CompTIA SY0-701 Security+ certification, providing a focused study aid for the exam.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Security Controls
Measures put in place to prevent, detect, and respond to security risks.
CIA Triad
A model to guide policies for information security, consisting of Confidentiality, Integrity, and Availability.
Non-repudiation
A principle that ensures a party cannot deny the authenticity of their signature on a document or the sending of a message.
Authentication, Authorization, and Accounting (AAA)
A framework for controlling access to resources, consisting of user identification, validation of credentials, and tracking usage.
Zero Trust
A security model that requires strict identity verification for everyone trying to access resources in an organization, regardless of whether they are inside or outside the network.
Gap Analysis
A process for determining the difference between the current state and desired future state of an organization's security posture.
Public Key Infrastructure (PKI)
The framework for managing digital certificates and public-key encryption involving policies, procedures, hardware, software, and people.
Malware
Malicious software designed to harm, exploit, or otherwise compromise computer systems.
Phishing
A type of social engineering attack where attackers attempt to obtain sensitive information by masquerading as a trustworthy entity.
Encryption
The process of converting information into a code to prevent unauthorized access.
Vulnerability Scanning
An automated process for identifying security weaknesses in a system.
Incident Response
A structured approach to addressing and managing the aftermath of a security breach or cyberattack.
Business Continuity Plan (BCP)
A strategy that outlines how an organization will continue to function during and after a disaster.
Disaster Recovery Plan (DRP)
A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Access Control Lists (ACLs)
Rules that limit access to resources based on user identity, machine identity, or groups of users.