security + flashcard deck

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/564

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

565 Terms

1
New cards

Technical controls

Controls implemented using technology, such as firewalls, encryption, and antivirus software.

2
New cards

Managerial controls

Controls related to management oversight, policies, and procedures for security.

3
New cards

Operational controls

Controls implemented through day-to-day operations, such as backups and incident response.

4
New cards

Physical controls

Controls that physically protect assets, such as locks, fences, and security guards.

5
New cards

Preventive control

A control designed to prevent a security incident from occurring.

6
New cards

Deterrent control

A control intended to discourage security violations before they happen.

7
New cards

Detective control

A control that identifies and detects security incidents after they occur.

8
New cards

Corrective control

A control that mitigates or fixes the impact of a security incident.

9
New cards

Compensating control

A control that substitutes or reduces risk when primary controls cannot be used.

10
New cards

Directive control

A control that provides guidance or instructions for proper behavior or operations.

11
New cards

Confidentiality

Ensuring information is only accessible to authorized individuals.

12
New cards

Integrity

Ensuring information is accurate and unaltered.

13
New cards

Availability

Ensuring information and systems are accessible when needed.

14
New cards

Non-repudiation

Ensuring a sender cannot deny sending a message or performing an action.

15
New cards

Authentication

Verifying the identity of a user or system.

16
New cards

Authorization

Determining what an authenticated user or system is allowed to do.

17
New cards

Accounting (AAA)

Tracking user actions and system activity for auditing and compliance.

18
New cards

Authenticating people

Verifying human users’ identities through passwords, biometrics, or tokens.

19
New cards

Authenticating systems

Verifying devices or systems before granting access.

20
New cards

Authorization models

Frameworks for defining access rights, such as RBAC or DAC.

21
New cards

Gap analysis

Identifying differences between current security posture and desired state.

22
New cards

Zero Trust

Access control model that assumes no implicit trust; verification required for all.

23
New cards

Control Plane

Zero Trust layer that manages access policies and decisions.

24
New cards

Adaptive identity

Adjusting authentication based on user behavior and context.

25
New cards

Threat scope reduction

Minimizing potential attack surfaces and exposure.

26
New cards

Policy-driven access control

Access determined strictly by defined policies.

27
New cards

Policy Administrator

Component enforcing policy decisions in Zero Trust.

28
New cards

Policy Engine

Component evaluating access requests and making decisions.

29
New cards

Data Plane

Zero Trust layer that enforces access and handles actual data flow.

30
New cards

Implicit trust zones

Areas where access is granted only after verification; no assumed trust.

31
New cards

Subject/System

Entities requesting access to resources in a Zero Trust model.

32
New cards

Policy Enforcement Point

Mechanism enforcing security policies at the point of access.

33
New cards

Access control vestibule

Controlled entryway requiring authentication to proceed.

34
New cards

Fencing

Physical barrier to restrict access to secure areas.

35
New cards

Video surveillance

Cameras monitoring and recording activity for security.

36
New cards

Security guard

Personnel providing physical security and monitoring.

37
New cards

Access badge

ID card granting authorized access to facilities or areas.

38
New cards

Sensors

Devices detecting movement, pressure, or environmental changes.

39
New cards

Infrared sensor

Sensor detecting heat or body movement via infrared light.

40
New cards

Pressure sensor

Sensor detecting weight or force applied to surfaces.

41
New cards

Microwave sensor

Sensor detecting motion using microwave signals.

42
New cards

Ultrasonic sensor

Sensor detecting movement using ultrasonic waves.

43
New cards

Honeypot

Decoy system designed to lure attackers and monitor activity.

44
New cards

Honeynet

Network of honeypots used to study attacker behavior.

45
New cards

Honeyfile

Decoy file meant to attract attackers or detect unauthorized access.

46
New cards

Honeytoken

Decoy data or credentials used to detect misuse or intrusion.

47
New cards

Public key infrastructure (PKI)

System managing public/private key pairs and certificates.

48
New cards

Public key

Key used for encryption or verifying digital signatures in asymmetric cryptography.

49
New cards

Private key

Key kept secret for decrypting data or creating digital signatures.

50
New cards

Key escrow

Third-party storage of cryptographic keys for recovery purposes.

51
New cards

Full-disk encryption

Encrypting an entire storage device to protect data at rest.

52
New cards

Partition encryption

Encrypting a specific partition on a storage device.

53
New cards

File encryption

Encrypting individual files to protect their contents.

54
New cards

Volume encryption

Encrypting a storage volume, which may include multiple partitions.

55
New cards

Database encryption

Encrypting database contents to secure sensitive information.

56
New cards

Record encryption

Encrypting individual records within a database.

57
New cards

Transport encryption

Encrypting data in transit between systems or networks.

58
New cards

Asymmetric encryption

Encryption using a public/private key pair.

59
New cards

Symmetric encryption

Encryption using a single shared key for both encryption and decryption.

60
New cards

Key exchange

Method for securely exchanging cryptographic keys between parties.

61
New cards

Encryption algorithms

Mathematical methods used for encrypting and decrypting data.

62
New cards

Key length

The size of cryptographic keys, affecting security strength.

63
New cards

Trusted Platform Module (TPM)

Hardware module for secure key storage and cryptographic operations.

64
New cards

Hardware security module (HSM)

Dedicated device managing cryptographic keys securely.

65
New cards

Key management system

System for generating, storing, distributing, and revoking keys.

66
New cards

Secure enclave

Hardware-based isolated environment for secure processing and storage.

67
New cards

Steganography

Hiding data within other files or media to obscure its presence.

68
New cards

Tokenization

Replacing sensitive data with non-sensitive tokens for security.

69
New cards

Data masking

Obscuring specific data within datasets to protect information.

70
New cards

Hashing

Transforming data into a fixed-size string that represents the original content.

71
New cards

Salting

Adding random data to inputs before hashing to prevent attacks.

72
New cards

Digital signatures

Electronic signatures ensuring authenticity and integrity of data.

73
New cards

Key stretching

Technique to make weak keys more secure against brute-force attacks.

74
New cards

Blockchain

Distributed ledger storing data securely and transparently.

75
New cards

Open public ledger

Publicly accessible record of transactions or data entries.

76
New cards

Certificate authorities (CA)

Trusted entities issuing and managing digital certificates.

77
New cards

Certificate revocation lists (CRL)

Lists of certificates that have been revoked before expiration.

78
New cards

Online Certificate Status Protocol (OCSP)

Protocol to check the revocation status of a certificate in real time.

79
New cards

Self-signed certificate

Certificate signed by the entity that created it, not a CA.

80
New cards

Third-party certificate

Certificate issued by a trusted external certificate authority.

81
New cards

Root of trust

Trusted starting point for validating a chain of certificates.

82
New cards

Certificate signing request (CSR)

Request sent to a CA to obtain a digital certificate.

83
New cards

Wildcard certificate

Certificate valid for multiple subdomains of a domain.

84
New cards

Change management

Processes to control changes to systems and their impact on security.

85
New cards

Approval process

Formal authorization step for implementing changes.

86
New cards

Ownership

Identifying responsible parties for changes.

87
New cards

Stakeholders

Individuals or groups affected by changes.

88
New cards

Impact analysis

Evaluating potential effects of a change.

89
New cards

Test results

Results validating a change does not introduce issues.

90
New cards

Backout plan

Plan to revert changes if problems occur.

91
New cards

Maintenance window

Scheduled period for performing changes.

92
New cards

Standard operating procedure (SOP)

Documented procedures for consistent change execution.

93
New cards

Allow lists/deny lists

Permissions that restrict or permit specific activities.

94
New cards

Restricted activities

Tasks limited to prevent risk.

95
New cards

Downtime

Time systems are unavailable due to maintenance or issues.

96
New cards

Service restart

Restarting applications or services as part of change.

97
New cards

Application restart

Restarting software to apply updates or configuration.

98
New cards

Legacy applications

Older software with potential compatibility or security risks.

99
New cards

Dependencies

Systems or services that rely on each other.

100
New cards

Updating diagrams

Modifying system/network diagrams to reflect changes.