CompTIA Security+ SYO-701 Professor Messer Course Notes

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/136

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

137 Terms

1
New cards

Security Control Categories (List All 4)

Technical, Managerial/Administrative, Operational, Physical

2
New cards

Security Control Types (List All 6)

Preventive,

Deterrent,

Detective,

Corrective,

Compensating,

Directive

3
New cards

CIA Triad

Confidentiality, Integrity, Availability

4
New cards

AAA Framework

Authentication, Authorization,

Accounting

5
New cards

Gap Analysis

Analyzing the gap between the current security posture and the goal security posture of the organization

6
New cards

Zero Trust

A wholistic system that covers every device, process, and person, requiring verification for everything, nothing is inherently trusted

7
New cards

Planes of Operation (List Both)

Data Plane and Control Plane

8
New cards

Policy Decision Point (PDP)

Entity which receives untrusted requests, made up of a Policy Engine and Policy Administrator

9
New cards

Policy Engine

Evaluates access decision based on policy and other information, grants, denies, or revokes access

10
New cards

Policy Administrator

Generates Access Tokens or credentials, Communicates with the Policy Enforcement Point (PEP)

11
New cards

Policy Enforcement Point (PEP)

Endpoint which receives untrusted requests and sends them to the PDP

12
New cards

Access Control Vestibule

A room that controls the movement of people who go through it, usually at the entrance to a building

13
New cards

Honeypot, Honeynet, Honeyfile, Honeytoken

A Fake network, system, token, etc to attract and trap threat actors

14
New cards

Key Escrow

Someone else holds your private keys

15
New cards

Key Stretching

Make a weak key stronger by performing multiple processes with the same key, encrypting multiple times, hashing multiple times etc.

16
New cards

Out-Of-Band Key Exchange

Transfer an encryption key OFF of the internet, over the phone, in person, etc

17
New cards

In-Band Key Exchange

Exchanging encryption keys over the network, using encryption or something else

18
New cards

Trusted Platform Module (TPM)

Device that contains cryptographic hardware, includes key backup, cryptographic accelerators, etc/

19
New cards

Secret Enclave

Protected area for encryption secrets

20
New cards

Attributes of Threat Actors (List 4)

Internal/External,

Level of Sophistication/Capability,

Resources,

Motivation

21
New cards

Watering Hole Attack

Infect a 3rd party site, network, tool, etc with malware and wait for target to arrive

22
New cards

Memory Injection

Malware injects itself into the memory of an already running process

23
New cards

DLL Injection

Malware injects a path to a malicious DLL (Dynamic Link Library) Into existing windows process, one form of Memory Injection

24
New cards

Buffer Overflows

Overwriting a buffer of memory to change something in another separate memory area

25
New cards

XSS (Cross-Site Scripting) Attack

An attack where a threat actor injects code into a website to make a request to a third party using that user's authentication information

26
New cards

Directory Traversal

Allows applications to access data outside of their own folder using ../../..

27
New cards

Worm

Malware that self-replicates through the network, not requiring human interaction

28
New cards

Rootkit

Malware that modifies core system files, invisible to the operating system

29
New cards

Environmental Attack

Attack everything supporting the technology, the power, HVAC,

30
New cards

DNS Poisoning

Modify a DNS server to route a URL to a malicious IP address

31
New cards

Domain Hijacking

Get access to a domain registration, move traffic flow towards malicious sites

32
New cards

Birthday Attack

An attack that takes advantage of hash collision

33
New cards

Spraying Attack

Try 3 most common passwords on a ton of different accounts so you don't get locked out

34
New cards

Out-Of-Cycle Logging

Logs coming in at an unexpected time, an indicator of compromise

35
New cards

ACLs (Access Control Lists)

List to allow or disallow traffic, from source and destination IP, port number, time of day, application, etc

36
New cards

SSH Port

22 TCP

37
New cards

HTTPS Port

443 TCP

38
New cards

HTTP Port

80 TCP

39
New cards

EDR (Endpoint Detection and Response)

System that detects threats on endpoints throughout a network

40
New cards

SCADA / ICS

Supervisory Control and Data Acquisition System , a large scale, multi-site Industrial Control System, usually air-gapped and controls industrial equipment

41
New cards

RTOS (Real-Time Operating System)

An operating system with a deterministic processing schedule, meaning that each process is guaranteed to be executed in a specific amount of time, without waiting for other processes.

42
New cards

Availability Vs Redundancy

Available means constantly up, if something is redundant but not available it might require manually turning on the replacement infrastructure

43
New cards

Security Zones

Zone-based security technologies, labeling certain parts of the network as trusted, untrusted, screened, etc.

44
New cards

Fail Modes (List 2)

Fail-Open, meaning when the system fails, data continues to flow,

Fail-Closed,

when the system fails, data does not flow

45
New cards

IPS (Intrusion Prevention System)

System that watches network traffic looking for intrusions, both preventing and detecting

46
New cards

Forward Proxy

Protects the clients by controlling their access (internal proxy on client’s private network) to servers

47
New cards

Reverse Proxy

Direct inbound traffic from the internet to the proxy on your network

48
New cards

Open Proxy

External proxy that allows anyone to use it without restrictions (uncontrolled)

49
New cards

IEEE 802.1X

Port-based network access control, you don't get access to the network until you authenticate

50
New cards

EAP

Extensible Authentication Protocol, provides many different ways to authenticate, integrates with 802.1X

51
New cards

Traditional vs NGFW Firewall

Traditional firewall can't filter on application information, only port numbers, Next-Gen can also do content filtering, control website traffic by category, and serve as IPS systems

52
New cards

UTM (All-in-one Security Applicance)

Firewall that can also do a ton of other stuff, filter spam, inspect for malware, serve as a router, a switch, and an IPS/IDS system

53
New cards

WAF (Web Application Firewall)

A firewall that runs in the browser

54
New cards

SD-WAN

Software Defined Networking in a Wide Area Network

a WAN built for cloud services so cloud applications can communicate directly without hopping through a central point

55
New cards

Data Sovereignty

Data that resides in a certain country is subject to the laws of that country

56
New cards

Data Masking

Hide some of the original data, like ******123 with credit card numbers

57
New cards

COOP (Continuity of Operations Planning)

A plan for continuing the organizations operations if all the technology is disabled

58
New cards

Fail Over

Plan for the worst case scenario to keep running with alternate infrastructure to "fail over" to

59
New cards

Recovery Testing

Simulating a situation where data is lost and we restore to a backup

60
New cards

Replication

An ongoing real-time backup, keep data synchronized in multiple locations

61
New cards

Journaling

Writing data to storage in chunks, make a journal entry when start writing, close it when done, so that if the system goes down while writing you can distinguish corrupted data

62
New cards

UPS (List 3 Types)

Uninterruptible power supply.

Offline/Standby,

Line-Interactive,

On-Line/Double Conversion

63
New cards

Site Surveys

Sample existing wireless landscape in a location

64
New cards

MDM

Mobile Device Management, centralized management of mobile devices

65
New cards

BYOD

Bring Your Own Device, technology or devices that employees bring in, need to meet the company's requirements

66
New cards

COPE

Company Owned, Personally Enabled, a device that the company buys, but can also be used as a personal device

67
New cards

CYOD

Choose your own Device, similar to COPE, but the user gets to choose the device

68
New cards

WPA2 vs WPA3

WPA2 has a vulnerability that allows the PSK to be brute forced or captured over the network, WPA3 solves this problem

69
New cards

SAE

Simultaneous Authentication of Equals (Dragonfly handshake)

  • Authentication method for WPA3

  • resistant to offline dictionary attacks

  • forward secrecy

  • use of ECC

70
New cards

RADIUS

Remote Authentication Dial-In User Service

One of the more common AAA protocols, centralize authentication for users

71
New cards

Static Code Analyzer (SAST)

Static Application Security Testing analyzes code to help identify security flaws, has false positives

72
New cards

Fuzzing (Dynamic Analysis)

Input randomized input to applications to find vulnerabilities

73
New cards

CTA

Cyber Threat Alliance, an alliance of organizations which share information about cybersecurity threats

74
New cards

OSINT

Open Source Intelligence, contains a collection of known threats

75
New cards

Responsible Disclosure Program

controlled release of information about vulnerabilities, bug bounties

76
New cards

CVSS

Common vulnerability Scoring system, quantitative scoring of a vulnerability used in the National Vulnerability Database

77
New cards

SIEM

Security information and event Manager, an application that colocates security logs from across the network into one place

78
New cards

DLP

Data Loss Prevention

79
New cards

SNMP

Simple Network Management Protocol, polls devices for statistics at fixed intervals, can be set up for alerts called SNMP traps

80
New cards

Active Directory

a database of everything on the network, primarily windows based

81
New cards

FTP Port

20, TCP

82
New cards

Telnet Port

23

83
New cards

IMAP Port

143 TCP

84
New cards

SPF

Sender Policy Framework, sender configures a list of all servers authorized to send emails for a domain

85
New cards

DKIM (Domain Keys Identified Mail)

A Mail server digitally signs all outgoing mail, the signature is validated by the receiving mail servers

86
New cards

DMARC

Domain-Based Message Authentication, Reporting and Conformance

an extension of SPF and DKIM, the domain owner decides what receiving email sdervers should do with emails not validating using SPF and DKIM, accept all, send to spam, or reject, creates compliance reports sent to email administrator

87
New cards

FIM (File Integrity Monitoring)

monitor important files that should never change with hashes, in windows its SFC in linux its tripwire

88
New cards

Extended Detection and Response (XDR)

An evolution of EDR improves missed detections, false positives, etc. Adds network-based detection

89
New cards

IAM

Identity and Access Management, manages identities and authorization for different resources

90
New cards

LDAP (Lightweight Directory Access Protocol)

Protocol for reading and writing directories over an IP network

91
New cards

Security Assertion Markup Language (SAML)

Open standard for authentication and authorization

92
New cards

Access Control Types (List 5)

Mandatory (Based on levels of security clearance, confidential, secret, top secret, etc)

Discretionary (Based on data ownership, the creator of data decides who has access to it)

Role-Based access Control (Different roles in the org have different levels of access)

Rule-Based Access control (generic system enforced rules for access)

Attribute-Based (Complex relationships between users and data, may be based on many different criteria)

93
New cards

MFA types (List 4)

Something you know

Something you have

Something you are

Somewhere you are

94
New cards

NIST SP800-61

National Institute of Standards and Technology, computer security incident handling guide

95
New cards

Incident Response Lifecycle

Preparation

Detection & Analysis

Containment, Eradication, & Recovery

Post-Incident Activity

96
New cards

Acceptable Use Policies (AUP)

Detailed documentation on the acceptable use of company assets, internet, telephone, etc.

97
New cards

ARO (Annualized Rate of Occurence)

how likely is it that a certain disaster will happen over the course of a year

98
New cards

Exposure Factor (EF)

Percentage of an asset’s value that will be lost if an incident / threat materializes

99
New cards

SLE (Single Loss Expectancy)

What is the monetary loss if a single event occurs?

Exposure Factor x Asset Value

100
New cards

ALE (Annualized Loss Expectancy)

Annualized Rate of Occurence * Single Loss Expectancy