CompTIA Domain 1.2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards summarizing key terms and concepts related to CompTIA Security+ (SY0-701) Domain 1.2, focusing on fundamental security concepts, including CIA triad, authentication methods, and security technologies.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Confidentiality

Ensures that only authorized users can access data.

2
New cards

Integrity

Protects data from unauthorized modification or corruption.

3
New cards

Availability

Ensures that data and services are accessible when needed.

4
New cards

Non-repudiation

Provides proof of the origin and integrity of data, ensuring that a sender cannot deny having sent the message.

5
New cards

Authentication

Verifies the identity of users or systems before granting access.

6
New cards

Authorization

Determines what actions or resources the user is allowed to access.

7
New cards

Accounting

Tracks user actions and access for auditing and monitoring.

8
New cards

Gap Analysis

Compares current security posture against desired or required standards to identify weaknesses or gaps.

9
New cards

Zero Trust

A security model that assumes no implicit trust, requiring verification for every user and device attempting to access resources.

10
New cards

Control Plane

Handles policy creation and decision-making for access control.

11
New cards

Policy Enforcement Point

The system component that grants or denies access based on the policy engine’s decision.

12
New cards

Honeypot

A decoy system designed to attract attackers and study their behavior.

13
New cards

Honeynet

A network of honeypots that simulate a real environment.

14
New cards

Honeyfile

A decoy document intended to identify unauthorized access when opened.

15
New cards

Honeytoken

A piece of fake data used to detect misuse or data breaches.

16
New cards

Authenticating People

Uses credentials like passwords, biometrics, or smart cards.

17
New cards

Authenticating Systems

Uses digital certificates or mutual authentication between devices.

18
New cards

Authorization Models

Common models include Role-Based Access Control (RBAC), Attribute-Based

Access Control (ABAC), and Mandatory Access Control (MAC).

19
New cards

Authenticating Example

Logging into a system

20
New cards

Authorization Example

user role permissions(What are they Authorized to do)

21
New cards

Accounting Example

tracking login times .

22
New cards