Prof Messer CompTIA SY0-701 Security+ 1.1 & 1.2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:48 PM on 5/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

56 Terms

1
New cards

control categories

technical controls

managerial controls

operational controls

physical controls

2
New cards

technical controls

controls implemented using systems/tech

OS controls

firewalls, antivirus, etc

3
New cards

managerial controls

administrative controls associated with security design and implementation

security policies, standard operating procedures, etc

4
New cards

operational controls

controls implemented by people

security guards, etc

5
New cards

physical controls

limit physical access

fences, locks, badge readers, etc

6
New cards

control types

preventive

deterrent

detective

corrective

compensating

directive

7
New cards

preventive control types

block access to a resource

ex: firewall rules, door locks, guards checking ID, etc

8
New cards

deterrent control types

discourage intrusion

threat of demotion, posted warning signs, application splash screens, etc

9
New cards

detective control types

identify and log an intrusion attempt

find issue

- collect and review system logs

- review login reports

- regularly patrol property

- motion detectors

10
New cards

corrective control types

apply a control after event has been detected

reverse impact of event

continue operating with minimal downtime

ex: restoring from backups to mitigate an infection, create policies for reporting security issues, use fire extinguisher

11
New cards

compensating control types

control using other means; current controls arent enough

prevent the exploitation of a weakness

ex:

firewalls block an application while devs work on a patch, generator used after power outage

12
New cards

directive control types

direct a subject towards a security compliance

relatively weak security control

"do this please"

ex: store all sensitive files in a protected folder, post a sign saying "authorized personnel only" etc

13
New cards

control categories and types

knowt flashcard image
14
New cards

The CIA Triad

Confidentiality, Integrity, Availability

15
New cards

Confidentiality

prevent disclosure of info to unauthorized people/systems

some ways to provide it:

encryption

access controls

2 factor auth

16
New cards

Integrity

messages cant be modified without detection

some ways to provide it:

hashing

digital signatures

certificates

non-repudiation

17
New cards

certificates

combined with dig sigs to verify an individual

18
New cards

Availability

systems and networks must be up and running

some ways to provide it:

redundancy

fault tolerance

patching

19
New cards

fault tolerance

the ability for a system to keep running even when a failure occurs

20
New cards

non-repudiation

provides proof of integrity, can be asserted to be genuine

you cant deny what you said - no take backs

21
New cards

proof of integrity

verify data doesnt change - remains accurate and consistent

in cryptography - hash is used

- only tells if data was changed, not linked to an individual

22
New cards

proof of origin

prove source of the message

make sure signature is not fake

sign with the private key

- message doesnt need to be encrypted

- nobody else has the private key (only person sending the data)

verify with the public key associated with the private key

- any change to the message will invalidate the signature

23
New cards

creating a digital signature

knowt flashcard image
24
New cards

verifying a digital signature

knowt flashcard image
25
New cards

AAA Framework

Identification

Authentication

Authorization

Accounting

26
New cards

Identification

this is who you claim to be

(think username)

27
New cards

Authentication

prove who you say you are

(password, etc)

28
New cards

Authorization

based on your identification and authentication

29
New cards

Accounting

login time, data sent and received, logout time, etc

30
New cards

authenticating systems

put a digitally signed certificate on the device

- other business processes rely on the certificate (VPN access, etc)

31
New cards

certificate authentication

Certificate Authority needed

organization creates a cert for the device

- signs it with their CA

cert now able to be added as an authentication factor

- CA's digital signature is used to validate the cert

32
New cards

Certificate Authority (CA)

device/software responsible for managing all the certs in the environment

CA has its own cert signed by root CA

33
New cards

no authorization model

simple relationship

user -> data

does not scale

- manually setting up permissions for lots of people would take forever

34
New cards

authorization models

used to give diff people different access based on role, organization, etc

allows authorization to be much more scalable and easier

reduce complexity

administration is streamlined

35
New cards

gap analysis

where you are vs where you wanna be

may require extensive research

- can take weeks, months, years

36
New cards

choosing framework (gap analysis)

work towards a known baseline

- may be an internal set of goals

- some orgs should use formal standards

determine end goal

37
New cards

evaluate people and processes (gap analysis)

get a baseline of employees

- formal experience

- current training

- their knowledge

examine current processes

38
New cards

compare and contrast (gap analysis)

identify weaknesses

- along with most effective processes

a detailed analysis

- examine broad security categories

- break those into smaller segments

39
New cards

the analysis and report (gap analysis)

final comparison

- clear view of current state

- detailed baseline objectives

need a path to get from current security to goal

40
New cards

zero trust

authenticate every time you want access to a resource

everything must be verified

41
New cards

planes of operation

splitting network into functional planes

data plane

control plane

42
New cards

data plane (planes of operation)

- process the frames, packet and network data

- anything that helps data move from one part of the network to another

part of device that performs the actual security process

43
New cards

control plane (planes of operation)

manages actions of data plane

- defines policies and rules

- determines how packets should be forwarded

etc

44
New cards

adaptive identity

consider the source and requested resources

multiple risk indicators (location, type of connection, etc)

make authentication stronger if needed

threat scope reduction

-decrease number of entry points

45
New cards

policy driven access control

combine adaptive identity with a redefined set of rules

looks at everything, and decides what type of authentication process is best

46
New cards

security zones

looks at where you are trying to connect from and where you are trying to connect to

- trusted, untrusted network

- internal/external network

define what zones have access to other zones

47
New cards

policy enforcement point (PEP)

any subjects and systems that are communicating through this will be evaluated by the PEP

a "gatekeeper"

can be multiple devices

doesnt make the decision, just allows/disallows

48
New cards

Policy Decision Point (PDP)

info from PEP is given to PDP to make an authentication decision

made up of:

policy engine

policy administrator

49
New cards

policy engine

evaluates each access decision based on policy and info sources

- grant, deny, revoke

50
New cards

policy administrator

takes decision from policy engine and gives it to PEP

- generates access tokens or credentials

51
New cards

physical security

barricades/bollards

access control vestibules

fencing

video surveillance (CCTV)

guards and access badges

lighting

sensors

52
New cards

honeypots

attract bad guys and trap them there

create a virtual world for them to explore, fake systems for them to attack

53
New cards

honeynets

combine honeypots into honeynets

- a larger deception network

fake networks to trap attackers

54
New cards

honeyfiles

fake files to attract attackers

bait for honeypots

55
New cards

honeytokens

traceable data that you put in honeynets

- if its stolen you know where it came from

can be any type of data

56
New cards

Still learning (1)

You've started learning these terms. Keep it up!