Security+

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

RPO (Recovery point objective)

defines the maximum acceptable amount of data loss measured in time, determining how old backup data can be to resume normal operations after a failure.

2
New cards

RTO (Recovery time objective)

indicates the target amount of time to restore IT and business activities post-disaster, focusing on downtime rather than data loss.

3
New cards

SOW

A statement of work specifies the detailed scope of work, tasks, deliverables, timelines, and costs for a specific project or engagement with the vendor.

4
New cards

Data Custodian

responsible for ensuring the secure transmission of data and maintaining data integrity by monitoring for inconsistencies or potential issues

5
New cards

Extensible Authentication Protocol (EAP)

network access authentication protocol that can handle multiple authentication methods

6
New cards

Committees

specialized groups that include subject matter experts who support the governance board with expert analysis and recommendations. 

7
New cards

DKIM (DomainKeys Identified Mail)

allows senders to associate a domain name with an email, thus vouching for its authenticity using a cryptographic signature.

8
New cards

UTM (unified threat management)

consolidates various security functionalities into a single appliance. It provides comprehensive protection by merging multiple security features, including intrusion detection/prevention, firewall capabilities, content filtering, and anti-malware tools, into one solution.

9
New cards

Sanitization

crucial process that ensures any data present on an asset, whether it's hardware or storage media, is thoroughly removed or modified to the point of being irrecoverable. This process is essential when repurposing, transferring, or disposing of assets to prevent unauthorized individuals from accessing or retrieving sensitive information.

10
New cards

Stream ciphers

encrypt plaintext data one byte or bit at a time, making them suitable for scenarios where the total message length is unknown. They combine the plaintext with a separate randomly generated message derived from the key and an initialization vector (IV).

11
New cards

Netflow

network monitoring and analysis tool that provides visibility into network traffic, allowing administrators to understand and analyze the flow of data across the network. This helps identify potential security threats and abnormal behawior.

12
New cards

AUP (Acceptable Use Policy)

defines the rules and guidelines for the appropriate and acceptable use of an organization's IT resources. It outlines the dos and don'ts for employees regarding the use of company devices, networks, software, and data. 

13
New cards

SPF (Sender Policy Framework)

helps prevent email spoofing by enabling domain owners to define which servers can send emails on their behalf.

14
New cards

Adaptive identity

allows for more flexible and dynamic access control by using contextual data to make dynamic access control decisions. For example, the system might grant access to a sensitive resource based on the user’s location or the time of day. 

15
New cards

Structured Query Language injection

a web-based attack that involves inserting malicious SQL statements into user input fields or URLs that are executed by the database server. It can allow an attacker to read, modify, delete, or execute commands on the database.

16
New cards

Cross-site scripting (XSS)

web-based attack that involves inserting malicious scripts into web pages that are executed by the browser of unsuspecting users. It can allow an attacker to steal cookies, session tokens, credentials, or perform other actions on behalf of the user.

17
New cards

Cross-site request forgery (CSRF)

web-based attack that involves tricking a user into performing an unwanted action on a website where they are already authenticated. It can allow an attacker to transfer funds, change passwords, or perform other actions without the user’s consent.

18
New cards

Directory traversal

web-based attack that involves exploiting a vulnerability in a web server or application to access files or directories that are outside the intended scope. It can allow an attacker to read, modify, delete, or execute files or directories on the server

19
New cards

A firmware vulnerability

issue that involves the ability to modify or replace the software that controls the functionality of a hardware device. It can allow an attacker to alter the behavior, performance, or security of the device, or install malware, backdoors, or spyware on it.

20
New cards

The exposure factor (EF)

the fraction of the asset value that is at risk in the event of a security incident. 

21
New cards

Session Initiation Protocol (SIP), port 5060

used for signaling in Voice over IP (VoIP) services. Unauthorized access to this port can result in toll fraud or unauthorized call control.

22
New cards

Wiretapping

in the context of a wired network, refers to the act of connecting directly to the network's physical infrastructure (cables) to monitor and capture data traffic. It is a direct method to eavesdrop on communications. 

23
New cards

Rescanning

involves running the vulnerability scan again after remediation efforts to confirm that identified vulnerabilities have been addressed properly and no longer pose a threat.

24
New cards

ARO (Annualized rate of occurrence)

quantifies the expected frequency of a risk occurring within a one-year time frame.

25
New cards

An image backup

duplicates an OS installation, either from a physical hard disk or a VM's virtual hard disk. It offers a quick means to redeploy the system without reinstalling software and settings.

26
New cards

Regulated data

implies that it's a category of data that adheres to specific compliance standards due to its sensitive nature.

27
New cards

A UPS (Uninterruptible Power Supply)

provides immediate power protection from input power interruptions by supplying short-term battery power. This ensures that devices can either be properly shut down or switched to an alternative power source like a generator.

28
New cards

MTBF (Mean time between failures)

predicts the average time intervals between system failures, indicating the reliability of a system or component.

29
New cards

A Memorandum of understanding (MOU)

formal agreement between two or more parties that outlines their mutual understanding and intentions to collaborate. It serves as a precursor to a legally binding contract and establishes a framework for future negotiations

30
New cards

Discretionary Access Control (DAC)

an authorization model where the owner of the resource decides who is allowed to access it.

31
New cards

End-of-life vulnerability

can allow a hardware attack that involves exploiting vulnerabilities in devices that are no longer supported or updated by the manufacturer. It can allow an attacker to compromise the security or functionality of the device, or use it as a gateway to access other systems or networks.

32
New cards

Risk identification

the first step in the risk management process. It involves identifying potential threats and vulnerabilities that could pose a risk to an organization's assets or operations.

33
New cards

Confidential data

information that is restricted and should be kept secret; hence, its access is limited to specific people or systems. Data under non-disclosure agreements (NDAs) typically falls under this classification.

34
New cards

SNMP

ensures secure communication among software applications and allows security analysts to monitor these communications

35
New cards

S/MIME (Secure Multipart Internet Message Extensions)

leverages email certificates to both sign and encrypt email content, ensuring both authenticity and confidentiality.

36
New cards

Journaling

keeps track of all transactions and changes that occur within a system. In the event of a crash or failure, this record allows for precise recovery to the moment before the disruption.

37
New cards

E-discovery

essential component of incident response and primarily relates to the collection and handling of electronic data. It is designed to be used as evidence in legal cases and includes in its scope anything that is stored electronically - emails, documents, databases, presentation files, voicemails, video/audio files, social media posts, and more.

38
New cards

A risk threshold

the limit of acceptable risk that an organization establishes, which once exceeded, triggers a response to reduce the risk to an acceptable level.

39
New cards

Concurrent session usage

an indicator of malicious activity that shows that an attacker or malware has compromised an account and is using it simultaneously with the legitimate user, creating multiple sessions from different locations or devices. 

40
New cards

Due diligence/care

refers to the diligent and proactive efforts made by an organization to meet and maintain compliance requirements. This includes implementing necessary policies, procedures, and controls to align with regulatory mandates.

41
New cards

Software Defined Networking (SDN)

separates network control from the physical infrastructure, centralizing management and offering flexibility.

42
New cards

PKI (Public Key Infrastructure)

set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

43
New cards

The CCPA (California Consumer Privacy Act)

a state legislation that provides comprehensive data protection rights to consumers, much like the GDPR. It's considered "horizontal" as it applies across sectors.

44
New cards

Embedded systems

computer systems that are integrated into larger devices or machines, such as cars, medical devices, or cameras.

45
New cards

RTO (Recovery time objective)

sets the goal for the time taken to recover business operations after an outage, essential for continuity planning.

46
New cards

MTTR (Mean time to repair)

average repair time for a failed system or component, not the timeframe for full business recovery.

47
New cards

BCP (Business continuity planning)

overarching process that includes recovery time objectives, but it is not a time-specific recovery target.

48
New cards

RPO (Recovery point objective)

assesses the maximum tolerable data age for recovery purposes, unrelated to the duration for restoring operations.

49
New cards

Secure web gateways (SWGs)

tailored to handle user traffic and can filter URLs based on content blacklists. They also provide threat analysis and integrate features like DLP and CASB to guard against various unauthorized egress threats.

50
New cards

Hybrid warfare

a strategy where state actors use a mix of espionage, disinformation, hacking, and soft power to achieve their objectives, offering a multifaceted approach to conflict.

51
New cards

National legal implications

laws and regulations set at the country level that outline the requirements and boundaries for data protection and privacy.

52
New cards

Ad hoc assessments

performed as necessary, often triggered by specific events or detected threats, providing flexibility in the risk management process. 

53
New cards

SNMP

a network monitoring and management protocol that enables devices to send and receive alerts and data about their performance and status. It allows network administrators to monitor network devices, identify potential issues, and proactively address them.

54
New cards

A WAF

designed to filter, monitor, and block HTTP traffic to and from a web application, making it the most appropriate choice for temporary mitigation against a known vulnerability. 

55
New cards

An exposure factor

measures the proportion of an asset’s value that would be lost if a vulnerability is exploited. It is essential for organizations to assess the potential impact of specific vulnerabilities and prioritize remediation efforts accordingly.