Comptia Section 1

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/155

flashcard set

Earn XP

Description and Tags

General security concepts

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

156 Terms

1
New cards

Technical Controls

controls that are implemented using a technical system

2
New cards

Technical Control Examples

operation system controls, firewalls, antivirus

3
New cards

Managerial Controls

administrative control associated with security design

4
New cards

operational controls

Controls implemented by people instead of systems

5
New cards

Operational control examples

security guards, awareness programs

6
New cards

Physical controls

controls that restrict unauthorized individuals from gaining access to a company's computer facilities

7
New cards

physical control examples

guard shack, fences, locks, badge readers

8
New cards

Control Types

Preventive, Deterrent, Detective, Corrective, Compensating, Directive

9
New cards

Preventive control type

block access to a resource

10
New cards

Preventive control type examples

Firewalls, security guards, door locks

11
New cards

Corrective Controls

Controls that identify and correct problems.

12
New cards

What do corrective controls help recover from?

The resulting errors from identified problems.

13
New cards

Deterrent control

A type of security control that discourages intrusion attempts.

14
New cards

Detective control

Identify and log an intrusion attempt

15
New cards

Compensating Controls

control using other means, prevent exploitation of a weakness

16
New cards

Direct Control

Direct a subject towards security compliance "do this please"

17
New cards

Confidentiality

prevent disclosure of information to unauthorized individuals or systems

18
New cards

The CIA Triad

Fundamental principles: Confidentiality, Integrity, Availability.

19
New cards

integrity

cant be modified without detection, Data is stored and transferred as intended

20
New cards

Availability

systems and networks must be running, always at your fingertips

21
New cards

Confidentiality examples

encryption, Access control, two-factor authentication

22
New cards

Integrity examples

hashing, digital signatures, certificates, and non-repudiation

23
New cards

Hashing

transforming plaintext of any length into a short code called a hash, If data changes then hash also changes, One way trip

24
New cards

Digital signatures

Mathematical scheme to verify the integrity of data, prove that the data was not changed

25
New cards

Non-repudiation

provide proof of integrity can be asserted to be genuine ( digital signatures

26
New cards

Fault Tolerance

The ability of a system to continue operation even if a component fails.

27
New cards

redundancy

build service that will always be available

28
New cards

what does non- repudiation add

Proof of integrity and proof of origin

29
New cards

Proof of integrity

Verify data does not change, The data remains accurate and consistent

30
New cards

Proof of origin

Prove the message was not changed, prove the source of the message

31
New cards

AAA Framework

Authentication, Authorization, and Accounting

32
New cards

Authentication

prove who you say you are

33
New cards

Authorization

Based on your identification and authentication, what access do you have?

34
New cards

Acounting

resources used ( login time, data sent and received, logout time)

35
New cards

How can you truly authenticate a device?

Put a digitally signed certificate on the device

36
New cards

Authorization models

adds an abstraction, reduces complexity and creates a clear relationship between the user and the resource.

37
New cards

Gap Analysis

Where you are compared with where you want to be.

38
New cards

gap analysis report

Formal document outlining current state and recommendations.

39
New cards

Zero Trust

A holistic approach to network security that covers every device every person and every process

40
New cards

Planes of operation

-Split the network into functional planes

41
New cards

-Applies to physical, virtual, and cloud components

42
New cards

Data planes

processes the frames, packets and network data

43
New cards

Control planes

manages the actions of the data plane, defines policies and rules, determines how packets should be forwarded

44
New cards

Adaptive Identity

use adaptive identities that rely on real time validation that takes into account the users behavior, device, location, and more

45
New cards

Threat Scope Reduction

Decrease the number of possible entry points

46
New cards

Policy enforcement point (PEP)

the gatekeeper, allow monitor and terminate connections

47
New cards

Policy Decision Point (PDP)

Process for making an authentication decision.

48
New cards

policy engine

evaluates each access decision based on policy and info sources

49
New cards
  • grant, deny, revoke
50
New cards

Policy Administrator

  • Communicates with the Policy Enforcement Point
51
New cards
  • Generates access tokens or credentials
52
New cards
  • Tells the PEP to allow or disallow access address, etc.
53
New cards

Make the authentication stronger, if needed

54
New cards

Implicit trust zones (Data Plane)

These are areas within the network that have a predefined level of trust.

55
New cards

Physical Security

tangible protection

56
New cards

Bollards

Short vertical posts that act as a barricade. Bollards block vehicles but not people.

57
New cards

access control vestibule

A secure entry system with two gateways, only one of which is open at any one time.

58
New cards

fencing

Build a perimeter

59
New cards
  • Usually very obvious
60
New cards
  • May not be what you're looking for
61
New cards

Transparent or opaque

62
New cards
  • See through the fence (or not)
63
New cards

• Robust

64
New cards
  • Difficult to cut the fence
65
New cards

Prevent climbing

66
New cards
  • Razor wire
67
New cards
  • Build it high
68
New cards

Video surveillance

Physical security control that uses cameras and recording devices to visually monitor the activity in a certain area.

69
New cards

security guard

Physical protection

70
New cards
71
New cards

Validates identification of existing employees

72
New cards
73
New cards

Provides guest access

74
New cards

Sensors

infrared, pressure, microwaves, ultrasonic

75
New cards

Honeypot

Attract attackers and trap them there, they make virtual world

76
New cards

Honeynet

An entire dummy network used to lure attackers. made up of multiple honeypots

77
New cards

Honeyfiles

A file pretending to be legitimate, in order to detect malicious activity. bait for the honeynet

78
New cards

Honeytoken

Piece of data or a resource that has no legitimate value or use but is monitored for access or use,

79
New cards

Change Management

Process of making sure changes are made smoothly and efficiently and do not negatively affect systems reliability, security, confidentiality, integrity, and availability.

80
New cards

Change approval process

formal process for managing change to avoid downtime, confusion and mistakes.

81
New cards

ownership

owning the process, and manages the process

82
New cards

Stakeholder

people impacted by a change

83
New cards

Impact analysis

Determine a risk value. risks can be minor or far reaching

84
New cards

risks of not making a change

security vulnerability

85
New cards

application unavailability

86
New cards

unexpected downtime to other services

87
New cards

sandbox

A testing environment that isolates untested code changes and outright experimentation from the production environment or repository, in the context of software development including Web development and revision control

88
New cards

backup plan

scheme ready to be used in place of or to help another

89
New cards

Maintenance window

The time period in which a change is expected to be implemented.

90
New cards

Standard Operating Procedures (SOPs)

specific sets of written instructions about how to perform a certain aspect of a task

91
New cards

Technical Change Management

Put the change management process into action.

92
New cards
  • Execute the plan
93
New cards

• There's no such thing as a simple upgrade

94
New cards
  • Can have many moving parts
95
New cards
  • Separate events may be required
96
New cards

• Change management is often concerned with "what"

97
New cards

needs to change

98
New cards
  • The technical team is concerned with "how" to change it
99
New cards

Allow list

nothing runs unless allowed, very restrictive

100
New cards

Deny List

• Nothing on the "bad list" can be executed