Security+ 701

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/196

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:34 AM on 3/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

197 Terms

1
New cards

Confidentiality

Ensures that unauthorized individuals are not able to gain access to sensitive information

2
New cards

Integrity

Ensures that there are no unauthorized modifications to info or systems

3
New cards

Availability

Ensures that info and systems are ready to meet the needs of legit users at the time those users request them

4
New cards

Non-repudiation

Someone who performed some action cannot later deny having taken that action

5
New cards

Security Incidents

Occur when an organization experiences a breach of the CIA triad

6
New cards

Disclosure

The exposure of sensitive info to unauthorized individuals otherwise known as data loss

7
New cards

Alteration

The unauthorized modification of info

8
New cards

Denial

Disruption of an authorized users legit access to info

9
New cards

Financial Risk

The rick of monetary damage to the organization as the result of a data breach

10
New cards

Reputational Risk

Occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, stakeholders, etc.

11
New cards

Strategic Risk

The risk that an organization will become less effective in meeting its major goals and objectives

12
New cards

Operational Risk

The risk an organization’s ability to carry out its day to day

13
New cards

Compliance Risk

Occurs when a security breach causes an organization to run afoul of legal and regulatory requirements

14
New cards

Control Objectives

Requirements to maintain CIA

15
New cards

Security Controls

Specific measures taken to fulfill the control objectives

16
New cards

Gap Analysis

Review the control objectives for a particular org, system, or service and then examine the controls designed to achieve these objectives

17
New cards

Technical Controls

Enforce CIA in the digital space eg. firewall

18
New cards

Operation Controls

The processes that we put in place to manage tech in a secure manner, eg. log monitoring, user access reviews

19
New cards

Managerial Controls

Procedural mechanism that focus on the mechanics of the risk management process, eg. risk assessments

20
New cards

Physical controls

Security controls that impact the physical world, eg. fences

21
New cards

Preventive Controls

Intend to stop a security issue before it occurs

22
New cards

Deterrent Controls

Seek to prevent an attacker from attempting to violate security policies

23
New cards

Detective Controls

Identify security events that have already occurred

24
New cards

Corrective Controls

Remediate security issues that have already occurred

25
New cards

Compensating Controls

Controls designed to mitigate the risk associated with exceptions made to a security policy

26
New cards

Directive Controls

Inform employees and others what they should do to achieve security objectives

27
New cards

Data at Rest

Stored data that resides on hard drives, in the cloud, etc. This data is prone to theft by insiders or external attackers who gain access to systems and are able to browse their contents

28
New cards

Data in Transit

Data that is in motion over a network. When data travels on an untrusted network, it is open to anyone with access to those networks

29
New cards

DLP Systems

Helps organization enforce info handling policies and procedures to prevent data loss and theft. They search systems for stores of sensitive info that is unsecured

30
New cards

Agent Based DLP

Uses software agents installed on systems that search those systems for the presense of sensitive infoA

31
New cards

Agent-less DLP

Dedicated Devices that sit on the network and monitor outbound network traffic, watching for any transmission that contains unencrypted sensitive info

32
New cards

Pattern Matching

DLP Systems watch for signs of sensitive info following a certain pattern, Eg. SSN

33
New cards

Data Minimization

Seeks to reduce risk by reducing the amount of sensitive info

34
New cards

Hashing

Uses a has function to transform a value in our dataset to a corresponding hash value

35
New cards

Tokenization

Replaces sensitive values with an unique id using a lookup table

36
New cards

Data Masking

Partially redacts sensitive info by replacing some or all fields. Ex. SSN xxx-xx-1234

37
New cards

Geo Restrictions

Limit access to resources based on the physical location of the user or system

38
New cards

Permission Restrictions

Limit access to resources based on the users role or level of authorization

39
New cards

Segmentation

Places sensitive systems on separate networks where they can communicate but have restrictions

40
New cards

White hat hacker

Those who act with authorization and seek to exploit security vulnerabilities with the intent of correcting them

41
New cards

Black hat hacker

Those with malicious intent, they seek to defeat security controls and compromise CIA

42
New cards

Gray hat hacker

They act without proper authorization but they do so with the intent of informing their targets of any security vulnerabilities

43
New cards

Attack Surfaces

A system, app, or service that contains a vulnerability a threat actor might exploit

44
New cards

Threat Vector

The means that a threat actor use to obtain access

45
New cards

Indicators of Compromise (IOC)

Telltale signs that an attack has taken place and may include file signatures, log patterns, and other evidence left behind by attackers

46
New cards

OSINT

Open source intelligence you can publicly gather from available sources

47
New cards

Malware

Describes a wide range of software that is intentionally designed to cause harm to a system, devices, networks, or users

48
New cards

Ransomware

Malware that takes over a computer and then demands a ransom.

49
New cards

Trojans

Type of malware that is typically disguised as legit software

50
New cards

Worms

Malware that spreads itself, often associated with spreading via attacks on vulnerable services

51
New cards

Spyware

Malware that is designed to obtain info about an individual, organization, or system

52
New cards

Bloatware

All encompassing term used to describe unwanted apps installed on systems by manufacturers

53
New cards

Viruses

Malware that self copy and self replicate, they typically have a trigger which determines when the malware will execute and a payload which is what the malware does/delivers/or the action performed

54
New cards

Keyloggers

Programs that capture keystrokes from a keyboard, can also capture mouse movement, touch screen inputs, credit card swipes

55
New cards

Logic Bombs

Functions or code placed inside other programs that will activate when set conditions are met

56
New cards

Rootkits

Malware designed to allow attackers to access a system through a backdoor

57
New cards

Social Engineering

The practice of manipulating people through a variety of strategies to accomplish desired actions

58
New cards

Phishing

Broad term used to describe the fraudulent acquisition of info

59
New cards

Vishing

Phishing accomplished via voice or voicemail

60
New cards

Smishing

Relies on text messages as part of the phishing scam

61
New cards

Business Email Compromises

Relies on using apparently legit email addresses to conduct scams and other attacks

62
New cards

Watering Hole Attacks

Uses websites that targets frequent often

63
New cards

TypoSquatting

Use Misspelled and slightly off but similar to the legit site URLS

64
New cards

Brute Force Password Attack

Iterate through passwords until they find one that works

65
New cards

Password Spraying

Attempts to use a single password or small set of passwords against many accounts

66
New cards

Vulnerability Management

Plays a crucial role in identifying, prioritizing, and remediating vulnerabilities in our environment

67
New cards

Vulnerability scanning

Use to detect new vulnerabilities as they arise and then implement a remediation workflow that addresses the highest priority vulnerabilities

68
New cards

Risk Appetite

Willingness to tolerate risk within the environment

69
New cards

Regulatory Requirements

May dictate a minimum frequency for scans

70
New cards

Technical Constraints

Scanning Systems may only be capable of performing x amount of scans per day

71
New cards

Static Testing

Analyzes code without executing it

72
New cards

Dynamic Testing

executes codes as part of the test

73
New cards

Interactive Testing

Combines static and dynamic code testing

74
New cards

CVSS

industry standard for assessing the severity of security vulnerabilities

75
New cards

Attack Vector Metric (AV)

Describes how an attack would exploit a vulnerability

76
New cards

Attack complexity metric (AC)

Describes the difficulty of exploiting a vulnerability

77
New cards

Privileges Required Metric (PR)

The type of account access needed to exploit a vulnerability

78
New cards

User Interaction Metric

Whether the attacker need to involve another human to exploit a vulnerability

79
New cards

Confidentiality Metric

The type of info disclosure that might occur if an attacker successfully exploits a vulnerability

80
New cards

Integrity Metric

Type of info alteration that might occur if an attacker successfully exploits a vulnerability

81
New cards

Availability Metric

Type of disruption that might occur if an attacker successfully exploits a vulnerability

82
New cards

Scope Metric

Whether the vulnerability can affect system components beyond the scope of the vulnerability

83
New cards

None Severity Scale

0.0 CVSS Score

84
New cards

Low Severity Scale

0.1 - 3.9 CVSS Score

85
New cards

Medium Severity Scale

4.0-6.9 CVSS Score

86
New cards

High Severity Scale

7.0 - 8.9 CVSS Score

87
New cards

Critical Severity Scale

9.0 - 10.0 CVSS Score

88
New cards

Penetration Testing

Seeks to bridge the gap between the use of tech tools to test and organizations security and the power of those tool when placed in the hands of an attacker

89
New cards

Threat Hunting

Seek to adopt the attackers mindset and imagine how hackers might seek to defeat an organization

90
New cards

Physical Penetration Test

Focuses on identifying and exploiting vulnerabilities in an organizations physical security controls

91
New cards

Offensive Penetration Test

Proactive approach where security professionals act as attackers to identify and exploit vulnerabilities

92
New cards

Defensive Penetration

Focuses on evaluating an organizations ability to defend against cyberattacks. Involves assessing the effectiveness of policies, procedures, and tech in detecting and mitigating threats

93
New cards

Integrated Penetration Test

Combines aspects of both offensive and defensive pen tests

94
New cards

Known Environments

Pen tests performed with full knowledge of the underlying tech, configurations, and settings that make up the target

95
New cards

Unknown Environments

Pen Tests intended to replicate what an attackers would encounter. Testers not provided access of info

96
New cards

Rules of Engagement

Formal, written guidelines that define how a pen test or operation is conducted

97
New cards

Passive Pen Test Recon

Seeks to gather info without directly engaging with the pen test target

98
New cards

Active Pen Test Recon

Directly engaging with the target in intelligence gathering for pen test

99
New cards

Privilege Escalation

Uses hacking techniques to shift from initial access to more advanced privileges

100
New cards

Pivoting/Lateral Movement

Attacker uses the initial system compromise to gain access to other systems on the target network

Explore top flashcards

flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)
flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)