CompTIA Security+ SY0-701 Flashcards - Created By Jeff Chaplin

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 245

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

246 Terms

1

Preventive Controls

Objective: Prevent security incidents from occurring. Examples: Firewalls, Access control mechanisms (e.g., passwords, biometrics) Intrusion prevention systems (IPS), Security policies and procedures

New cards
2

Deterrent Controls

Objective: Discourage potential attackers from attempting to compromise a system. Examples: Warning signs, Security awareness training, Visible security measures (e.g., security guards, CCTV)

New cards
3

Detective Controls

Objective: Detect and alert on security incidents as they occur. Examples: Intrusion detection systems (IDS), Security information and event management (SIEM) systems, Audit logs and monitoring, Surveillance cameras

New cards
4

Corrective Controls

Objective: Correct and mitigate the impact of security incidents. Examples: Antivirus and anti-malware software, Backup and recovery procedures, Patch management systems, Incident response plans

New cards
5

Compensating Controls

Compensating controls are security measures implemented to provide an alternative method of protecting assets when standard controls are not feasible. Examples: Temporary access restrictions, Alternative authentication mechanisms, Additional monitoring when primary controls are down

New cards
6

Directive Controls

Objective: Specify acceptable practices and expected behavior. Examples: Security policies and guidelines, Employee handbooks, Standard operating procedures (SOPs), Codes of conduct

New cards
7

Define the Five Core principles of Information Security (CIANA)

Confidentiality, Integrity, Availability, Non-Repudiation, Authentication

New cards
8

Gap Analysis Steps

Define the scope, Gather data about the current infrastructure, Analyze the data and identify the gaps, Develop a plan to bridge the gap

New cards
9

Honeypot

A honeypot is a decoy system or resource designed to attract and deceive attackers. It appears to be a legitimate part of the network but is isolated and monitored to gather information about attackers' tactics, techniques, and motives.

New cards
10

Honeynet

A honeynet is a network of honeypots that are interconnected to simulate a larger and more realistic environment for attracting and monitoring attackers. It allows organizations to capture and analyze broader attack patterns and behaviors.

New cards
11

Honeyfile

A honeyfile is a file or document that is intentionally created and placed in a network to act as bait for attackers. It contains seemingly valuable information that, if accessed or modified, triggers alerts and provides insights into unauthorized access attempts.

New cards
12

Honeytoken

A honeytoken is a piece of data or credential that is intentionally placed within an information system to serve as a decoy or indicator of unauthorized access. If a honeytoken is accessed or used, it alerts security teams to potential security breaches.

New cards
13

Non-Repudiation

A security principle ensuring that a party in a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. This is typically achieved through the use of cryptographic methods, such as digital signatures and public key infrastructure (PKI).

New cards
14

What are the five factors of Authentication

Knowledge Factor: Something You Know, Possession Factor: Something You Have, Inherence Factor: Something You Are, Behavioral Biometrics: Something You Do, Location Factor: Somewhere You Are

New cards
15

PTZ

Pan-Tilt-Zoom

New cards
16

FRR

False Rejection Rate - How often a biometric system fails to allow a user access who should have had access

New cards
17

Chiper Lock

A Mechanical locking mechanism that uses a mechanical keypad for entry

New cards
18

Infrared Sensor

IR sensors can be either active or passive. Active IR sensors emit infrared light and measure the reflection, while passive IR sensors detect the infrared light naturally emitted by objects. Used in: Motion Detection, Remote Controls, Thermal Cameras, Temperature sensors

New cards
19

Microwave Sensor

A microwave sensor uses microwave radar to detect objects and motion. These sensors emit microwaves and measure the time it takes for the waves to be reflected back after hitting an object. Used in: Automatic Doors, Speed Radars, Occupancy Sensing, Motion sensors

New cards
20

Ultrasonic Sensor

An ultrasonic sensor uses ultrasonic sound waves to detect objects and measure distances. The sensor emits sound waves at a high frequency and measures the time it takes for the echo to return after hitting an object. Used in: Parking Assistance, Robotics, Industrial Automation

New cards
21

Shadow IT

A type of threat actor that creates internal threats involving the use of systems, devices, software, applications, and services that are used within an organization without explicit approval or knowledge of the organization's IT department.

New cards
22

Name all four Security Controls

Detective, Compensating, Directive, Corrective

New cards
23

Social Proof

A psychological and social phenomenon where individuals copy the actions of others in an attempt to reflect correct behavior for a given situation. This concept is often exploited in social engineering attacks

New cards
24

Typosquatting

"Typosquatting" is a form of cyber-attack where malicious actors register domain names that are similar to legitimate websites, often differing by a small typo or misspelling. Example: Real: Facebook.com | Fake: Facebo0k.com

New cards
25

Watering Hole Attack

A "watering hole attack" is a type of cyber-attack in which attackers compromise a specific website or set of websites that are frequently visited by a particular group, organization, or industry. The goal is to infect the visitors of these sites with malware.

New cards
26

Phishing

Phishing is a cyber-attack where attackers send fraudulent emails or messages pretending to be from reputable sources to trick individuals into revealing sensitive information, such as usernames, passwords, and credit card details.

New cards
27

Spear Phishing

Spear phishing is a targeted phishing attack aimed at a specific individual or organization. Attackers gather personal information about their target to craft a highly personalized and convincing email or message to deceive them into revealing sensitive information.

New cards
28

Whaling

Whaling is a type of phishing attack that targets high-profile individuals, such as executives or senior management, within an organization. The attacker impersonates a trusted entity to deceive the target into divulging sensitive information or authorizing significant financial transactions.

New cards
29

Vishing

Vishing, or voice phishing, involves attackers using phone calls to impersonate legitimate organizations or individuals to trick victims into providing personal information, such as credit card numbers or social security numbers.

New cards
30

Smishing

Smishing, or SMS phishing, involves attackers sending fraudulent text messages that appear to come from reputable sources. These messages often contain links or phone numbers that lead to phishing websites or prompt the victim to provide personal information.

New cards
31

Business Email Compromise (BEC)

Business Email Compromise (BEC) is a sophisticated phishing attack where attackers spoof or compromise a legitimate business email account to deceive employees, partners, or customers into transferring money or sensitive information. BEC often targets employees with access to company finances or valuable data.

New cards
32

Invoice Scam

A type of social engineering attack where cybercriminals send fraudulent invoices to a business or individual, hoping to trick the recipient into making a payment to the attacker's account.

New cards
33

Baiting

"Baiting" is a type of social engineering attack where an attacker entices a victim with a lure, such as a seemingly harmless or appealing object, to trick them into compromising their security.

New cards
34

Piggybacking

Piggybacking occurs when an unauthorized person convinces an authorized person to allow them access into the facility.

New cards
35

Diversion Theft

Diversion Theft is a tactic used by criminals to distract or divert attention away from a target in order to carry out a theft or other criminal activity.

New cards
36

Threat Vector

A threat vector is the method or avenue by which a threat actor gains access to a target system or network in order to execute an attack.

New cards
37

Attack Vector

An attack vector is the specific technical method or process used by a threat actor to exploit a vulnerability or execute an attack once they have gained access via a threat vector.

New cards
38

Boot Sector Virus

A type of virus that infects the master boot record (MBR) of a hard drive, loaded into memory upon booting to take control of the computer before the operating system is loaded.

New cards
39

Macro Virus

A virus written in the same macro language used for software applications, typically embedded in documents and executed when the document is opened.

New cards
40

Program Virus

A virus that infects executable programs or applications, executing virus code when infected programs run.

New cards
41

Multipartite Virus

A sophisticated virus that can infect multiple parts of a system, making it challenging to remove.

New cards
42

Encrypted Virus

A virus that uses encryption to hide its code from antivirus software, decrypting itself when executed to perform malicious activities.

New cards
43

Polymorphic Virus

Complex file infectors that can create modified versions of itself to avoid detection yet retain the same basic routines after every infection.

New cards
44

Metamorphic Virus

A highly sophisticated virus that can change its own code by translating, editing, and rewriting it.

New cards
45

Armored Protection

Techniques used by malware to shield itself from detection and analysis by security researchers and antivirus software.

New cards
46

Malware

Any software intentionally designed to cause damage, disrupt operations, steal data, or harm the functionality, security, or privacy of computer systems, networks, or devices.

New cards
47

Worm

A type of standalone malware that replicates itself to spread to other computers without needing to attach to an existing program or file.

New cards
48

Trojan

A type of malware that disguises itself as legitimate software to deceive users into installing it for executing malicious activities.

New cards
49

RAT

A Remote Access Trojan that allows an attacker to gain unauthorized remote access and control over a compromised computer.

New cards
50

Botnet

A network of compromised computers controlled by an attacker to carry out malicious activities.

New cards
51

Command and Control (C&C or C2) node

A server or infrastructure used by attackers to maintain communication and control over compromised systems within a botnet.

New cards
52

Rootkit

A program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.

New cards
53

DLL

Dynamic Link Library is a file in Microsoft Windows containing code and data for use by multiple programs simultaneously to promote code reuse and modularization.

New cards
54

DLL Injection

A technique used to insert a malicious Dynamic Link Library (DLL) into the address space of another process to execute arbitrary code within the context of a legitimate application.

New cards
55

Kernel Mode

Also known as Supervisor Mode or Ring 0, refers to a privileged mode of execution where the operating system's kernel has unrestricted access to the hardware and system resources.

New cards
56

Logic Bomb

A type of malicious code or software program intentionally inserted into a system to execute a harmful action when certain conditions are met.

New cards
57

Keylogger

A type of malicious software or hardware device designed to record and monitor every keystroke made by a user on a computer or mobile device.

New cards
58

Impossible Travel

An activity where a user's account shows login attempts from geographically impossible locations within a short period of time.

New cards
59

Fileless Malware

A type of malicious code that operates in a computer's memory, usually in RAM, instead of on the hard drive and utilities such as PowerShell, Windows Management Instrumentation (WMI).

New cards
60

All the classification levels from highest to lowest for the government

1. Top Secret

2. Secret

3. Confidential

4. Sensitive but Unclassified

5. Unclassified

New cards
61

What technologies would you use to secure data in transit?

IPsec

SSL

TLS

New cards
62

PII

Personally Identifiable Information, a type of regulated data.

New cards
63

PHI

Protected Health Information, a type of regulated data.

New cards
64

PCI

Payment Card Information, a type of regulated data.

New cards
65

IP

Intellectual Property, a type of regulated data.

New cards
66

Financial Data

A type of regulated data.

New cards
67

HIPPA

Regulation protecting PHI - Protected Health Information.

New cards
68

GDPR

General Data Protection Regulation, a comprehensive data protection law enacted by the European Union (EU).

New cards
69

DLP

Data Loss Prevention, a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

New cards
70

PCI DSS

Payment Card Industry Data Security Standard, a security standard created by the Payment Card Industry Security Standards Council (PCI SSC)

New cards
71

Network DLP

Software or hardware that's placed at the perimeter of a network to detect data in transit and alert the network admin based on conditions set

New cards
72

Cloud Based DLP System

Secures data stored in and transmitted through cloud services

New cards
73

Storage DLP

Installed on servers and storage systems, such as file servers, databases, and network-attached storage (NAS) devices. To protect data at rest

New cards
74

Data Owner

Data owners are responsible for the classification, protection, use, and quality of one or more data sets.

New cards
75

Data Controller

Manages the purpose and means by which data is processed

New cards
76

Data Processor

Works under the data controller to assist in tasks like collecting, storing, or analyzing data. Processes the data on behalf of the data controller

New cards
77

Data Custodian

Responsible for data accuracy, privacy, security, and compliance. (System admin)

New cards
78

Symmetric Encryption

Uses a single key for both encryption and decryption of data. The same key must be securely shared and kept secret between the communicating parties. This method is efficient and faster than asymmetric encryption

New cards
79

Asymmetric Encryption

Uses a pair of keys: a public key and a private key. The public key is used to encrypt the data, while the private key is used to decrypt it. The public key can be shared openly, but the private key must be kept secure.

New cards
80

Block Cipher

An encryption algorithm that divides plaintext into fixed-size blocks, typically 64 or 128 bits, and then encrypts each block individually. The same key is used to encrypt and decrypt each block

New cards
81

Stream Cipher

An encryption algorithm that encrypts plaintext one bit or byte at a time using a keystream. Unlike block ciphers, which process fixed-size blocks of data, stream ciphers encrypt data continuously, which can provide faster encryption for real-time communications.

New cards
82

Digital Signature

A cryptographic mechanism used to verify the authenticity and integrity of digital messages or documents. It provides assurance that the message or document was created by a known sender (authentication) and has not been altered since it was signed (integrity).

New cards
83

DH (Diffie-Hellman)

Diffie Hellman - Asymmetric algorithm commonly used for key exchange inside of VPN tunnels

New cards
84

Hashing Algorithms

MD5 (Message Digest Algorithm 5),

SHA-1 (Secure Hash Algorithm 1),

SHA-256 (Secure Hash Algorithm 256),

SHA-3 (Secure Hash Algorithm 3),

RIPEMD (RACE Integrity Primitives Evaluation Message Digest)

New cards
85

PtH

Pass the hash (PtH) is a hacking technique used to authenticate to a remote server or service by using the hashed credentials (password hash) instead of the plaintext password. This method bypasses the need to crack or obtain the actual password and can be used to gain unauthorized access to systems.

New cards
86

Birthday Attack

A type of cryptographic attack that exploits the mathematical probability of collisions in hash functions. It is named after the 'birthday paradox.'

New cards
87

Key Stretching

A technique used in cryptography to enhance the security of passwords or cryptographic keys by increasing the time and computational effort required to derive the original plaintext from its hashed form. This process makes brute-force attacks and other password cracking techniques more difficult and time-consuming.

New cards
88

Salting

A technique used in cryptography to strengthen the security of hashed passwords or other data by adding a random value (known as a salt) to the input before hashing. This random value ensures that even if two users have the same password, their hashed values will differ

New cards
89

Nonce

Number used once is a cryptographic term referring to a random or semi-random number that is generated for a specific purpose, typically to ensure the freshness and uniqueness of data in cryptographic communications or protocols. Nonces are used to prevent replay attacks and to add randomness to cryptographic operations.

New cards
90

Methods to Prevent Hash Related Attacks

Key Stretching, Salting, Nonce

New cards
91

Hash Attack Methods

Pass the Hash attack, Birthday Attack

New cards
92

Digital Signature Algorithms

DSS (Digital Signature Standard),

RSA (Rivest-Shamir-Adleman),

DSA (Digital Signature Algorithm)

New cards
93

Public Key Infrastructure (PKI)

A framework of policies, procedures, and technologies used to manage digital certificates and public-key encryption. It provides a secure and reliable way to verify the authenticity of digital entities (such as users, devices, or servers) on a network.

New cards
94

Certificate Authority (CA)

A trusted entity responsible for issuing digital certificates that authenticate the identity of individuals, organizations, servers, or devices in a public key infrastructure (PKI).

New cards
95

Wildcard Certificates

Secure a domain and all its subdomains using a single certificate. Example, a wildcard certificate issued for *.example.com would secure www.example.com, mail.example.com, etc.

New cards
96

SAN Certificates

Multi-domain certificates secure multiple domain names within a single certificate. They are convenient for organizations managing multiple domains or subdomains.

New cards
97

Registration Authority (RA)

Acts as an intermediary between users (or entities) and a Certificate Authority (CA) in a PKI environment.

New cards
98

CRL

Certificate Revocation List - a list of digital certificates that have been revoked before their scheduled expiration dates.

New cards
99

OCSP

Online Certificate Status Protocol (OCSP) is an Internet protocol used to obtain the current status of a digital certificate in real-time.

New cards
100

PKP

Public Key Pinning (PKP) is a security feature that helps prevent attackers from impersonating a server using fraudulent certificates issued by compromised or rogue certificate authorities. It works by associating a specific cryptographic public key with a particular web server

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot