Security Plus SY0-701: Section 1

0.0(0)
studied byStudied by 5 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

Control Categories

Technical, Managerial, Operational, and Physical

2
New cards

Control type: Preventive

Control type that blocks access to resource like firewall rules or door locks

3
New cards

Control type: Deterrent

Control type that discourages an intrusion attempt, does not directly prevent access. i.e splash screens, demotions, reception desk, warning signs

4
New cards

Control type: Detective

A control type that identifies and logs an intrusion attempt, may not prevent access. i.e system logs, review login reports, property patrols, motion controls

5
New cards

Control Type: Corrective

Control type that applies a control after an event has been detected, reverses the impact of an event. i.e backup recovery, policies for reporting issues, contact authorities, fire extinguisher

6
New cards

Control Type: Compensating

Control type that gains control using other means when existing controls aren't sufficient. i.e firewall blocks specific application, implement separation of duties, require multiple security staff, power generator

7
New cards

Control Type: Directive

Control type that directs a subject towards security compliance, a relatively weak security control. i.e file storage policies, compliance policies, security policy training, sign that directs

8
New cards

CIA Triad

Confidentiality, availability, and integrity

9
New cards

Non-repudiation

Proof of integrity and proof of origin to verify the data comes from the right place and that the data does not change

10
New cards

Proof of Integrity

Verify data does not change

11
New cards

Proof of Origin

Prove the source of the message

12
New cards

AAA Framework

Authentication, Authorization, and Accounting

13
New cards

Authentication

Prove you are who you say you are

14
New cards

Authorization

Based on your identification and authentication, what access do you have?

15
New cards

Accounting

Logging anything: resources used, timestamps, data sent and received, logout time

16
New cards

Certificate Authority

issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model

17
New cards

Gap Analysis

a type of analysis that compares the differences between where we are and where we would like to be

18
New cards

Zero Trust

A security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network

19
New cards

Planes of Operation

Split the network into functional planes including end users, applications, and non-human entities.

20
New cards

Adaptive Identity

Relies on real-time validation that takes into account the

user's behavior, device, location to ensure identity of the user or resource. Can add or subtract from the trust given

21
New cards

Threat scope reduction

Decrease the number of possible entry points

22
New cards

Policy-driven access control

Entails developing, managing, and enforcing user access policies based on their roles and responsibilities

23
New cards

PEP

Policy enforcement point: Where the decision to grant or deny access within a system or network is actually executed

24
New cards

PDP

Policy Decision Point: Process for making an authentication decision

25
New cards

Policy Engine

Grants, Denies, or revokes each access decision based on policy and other information sources

26
New cards

Policy Administrator

Communicates with PEP, generates access tokens, tells the PEP to allow or disallow access

27
New cards

Zero Trust Across Planes

Subject -> system -> PEP -> Policy Administrator -> policy engine -> PEP

28
New cards

Barricade/bollards

Short vertical posts placed in front of entrances to prevent malicious actors from accessing the building

29
New cards

Access Control Vestibules

Double-door system electronically controlled to allow only one door open at a time

30
New cards

Honeypot

Vulnerable computer that is set up to entice an intruder to break into it and trap them in there

31
New cards

Honeynet

collection of honeypots connecting several honey pot systems on a subnet which can include servers, workstations, routers, switches, and firewalls

32
New cards

Honeyfile

Bait files intended for hackers to access. The files reside on a file server, and the server sends an alarm when accessed. Fake file that is baited to seem important

33
New cards

Honeytoken

Piece of data or a resource that has no legitimate value or use but is monitored for access or use so you know where it came from if its accessed. i.e API credentials, fake emails

34
New cards

Change Management

The process, tools, and techniques that help people implement changes to security and existing infrastructure along with anything else within an organization

35
New cards

Change approval process

formal process for managing change to avoid downtime, confusion and mistakes.

36
New cards

allow list

A security configuration where access is denied to any entity (software process, IP/domain, and so on) unless the entity appears on the allow list

37
New cards

deny list

Specific applications are blocked from execution

38
New cards

PKI

Public Key Infrastructure. Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. Certificates include public keys along with details on the owner of the certificate and on the CA that issued the certificate. Certificate owners share their public key by sharing a copy of their certificate.

39
New cards

Symmetric Encryption

the same key is used to encode and decode

40
New cards

Asymmetric Encryption

two keys are used that are mathematically related; one key encodes the message, and the other key decodes the message. Private key and public key

41
New cards

Key Escrow

a control procedure whereby a trusted party is given a copy of a public or private key used to encrypt data

42
New cards

Transparent Encryption

Encrypt all database information with a symmetric key

43
New cards

Record Level Encryption

Encryption that is performed at the record level. Choices can be made about which records to encrypt, which has a significant positive effect on both performance and security

44
New cards

Transport Encryption

Way to protect data traversing the network

45
New cards

VPN

Virtual Private Network; encrypts all data transmitted over the network, regardless of the application

Client-based VPN: using SSL/TLS

Site-to-Site: Using IPsec

46
New cards

Key Stretching

A technique that enhances the security of a key, typically a password, by repeatedly hashing the key using a secure algorithm making it more resilient to brute force attacks

47
New cards

Key Exchange

The process of sending and receiving secure cryptographic keys

48
New cards

Out-of-band key exchange

Sending an encryption key to someone through telephone, courier, in person. Not over the web

49
New cards

TPM

Trusted Platform Module. This is a hardware chip on the motherboard included on many newer laptops. A TPM includes a unique RSA asymmetric key, and it can generate and store other keys used for encryption, decryption, and authentication. TPM provides full disk encryption.

50
New cards

HSM

Hardware security module, high end cryptographic function, key backup for servers. Securely store thousands of cryptographic keys. Can securely store keys and has cryptographic accelerators

51
New cards

Key Management System

Integrated approach for generating, distributing and managing, cryptographic keys for devices and applications

52
New cards

security enclave

A protected area for our secrets. Often implemented as a hardware processor, isolated from main processor, provides extensive security features

53
New cards

Obfuscation

the action of making something obscure, unclear, or unintelligible. Hiding something in plain sight

54
New cards

Steganography

the art and science of hiding information by embedding messages within other, seemingly harmless messages, typically through images

55
New cards

Common steganography techniques

• Network based

• Embed messages in TCP packets

• Use an image

• Embed the message in the image itself

• Invisible watermarks

• Yellow dots on printers

• Serial number and timestamp

56
New cards

Tokenization

The process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.

57
New cards

Data Masking

Hiding some of the original data. i.e. hiding credit card number on receipt

58
New cards

PII

Personally Identifiable Information

59
New cards

Hashes

Represent data as a short string of text (a message digest)

• Impossible to recover the original message from the digest

• Used to store passwords and provide confidentiality

• Can be a digital signature for authentication,

non-repudiation, and integrity

• A well designed hash will not collide

• Different messages will not have the same hash

60
New cards

Collision

when different inputs create the same hash

61
New cards

salting

Adding random data into a one-way cryptographic hash to help protect against password cracking techniques

62
New cards

Rainbow Table

A file of pre-generated hash values and their associated plaintext

63
New cards

Digital Signature

Prove the message was not changed, proves the source of the message, makes sure the signature isn't fake and uses hash to create it

64
New cards

Blockchain

a distributed ledger that keeps track of transactions

Everyone on the blockchain networks keeps track of transactions

records and replicates to anyone and everyone

Applications: payments, digital identification, supply chain monitoring, digital voting

65
New cards

Digital Certificate

a data file that identifies individuals or organizations online and is used to establish trust with the CA that has a lot more information than just a hash

66
New cards

Web of Trust

A decentralized model used for sharing certificates without the need for a centralized CA by having other trusted sources sign a certificate

67
New cards

X.509

The standard format for digital certificates.

68
New cards

Root of trust

Roots of trust are basically hardware or software components that are inherently trusted

69
New cards

CA

Certificate Authority. An organization that manages, issues, and signs certificates and is part of a PKI. Browser trusts CA and therefore establishes trust with any website with digital certificate of a website that is signed by CA. Establishes root of trust

70
New cards

CSR

Certificate signing request. A method of requesting a certificate from a CA. It starts by using the applicants public key along with any identifying information to create the CSR. The CA validates the identity of the CSR and uses its private key to sign thus creating the digital certificate

71
New cards

Self-signed Certificates

Internal certificates don't need to be signed by

a public CA

- Your company is the only one going to use it

- No need to purchase trust for devices that already

trust you

• Build your own CA

- Issue your own certificates signed by your own CA

• Install the CA certificate/trusted chain on all devices

- They'll now trust any certificates signed by

your internal CA

- Works exactly like a certificate you purchased

72
New cards

Wild Card Certificate

Allows multiple sub domains to use the same certificate

73
New cards

SAN

Subject alternative name, Field in a digital certificate allowing a host to be identified by multiple host names/subdomains (Used in wild card certificates)

74
New cards

CRL

Certificate revocation list. A list of certificates that a CA has revoked. Certificates are commonly revoked if they are compromised, or issued to an employee who has left the organization. Maintained by CA

75
New cards

OCSP

Online Certificate Status Protocol. An alternative to using a CRL. It allows entities to query a CA with the serial number of a certificate. The CA answers with good, revoked, or unknown.