1/21
A comprehensive set of flashcards summarizing key terms and concepts related to CompTIA Security+ (SY0-701) Domain 1.2, focusing on fundamental security concepts, including CIA triad, authentication methods, and security technologies.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Confidentiality
Ensures that only authorized users can access data.
Integrity
Protects data from unauthorized modification or corruption.
Availability
Ensures that data and services are accessible when needed.
Non-repudiation
Provides proof of the origin and integrity of data, ensuring that a sender cannot deny having sent the message.
Authentication
Verifies the identity of users or systems before granting access.
Authorization
Determines what actions or resources the user is allowed to access.
Accounting
Tracks user actions and access for auditing and monitoring.
Gap Analysis
Compares current security posture against desired or required standards to identify weaknesses or gaps.
Zero Trust
A security model that assumes no implicit trust, requiring verification for every user and device attempting to access resources.
Control Plane
Handles policy creation and decision-making for access control.
Policy Enforcement Point
The system component that grants or denies access based on the policy engine’s decision.
Honeypot
A decoy system designed to attract attackers and study their behavior.
Honeynet
A network of honeypots that simulate a real environment.
Honeyfile
A decoy document intended to identify unauthorized access when opened.
Honeytoken
A piece of fake data used to detect misuse or data breaches.
Authenticating People
Uses credentials like passwords, biometrics, or smart cards.
Authenticating Systems
Uses digital certificates or mutual authentication between devices.
Authorization Models
Common models include Role-Based Access Control (RBAC), Attribute-Based
Access Control (ABAC), and Mandatory Access Control (MAC).
Authenticating Example
Logging into a system
Authorization Example
user role permissions(What are they Authorized to do)
Accounting Example
tracking login times .