comptia glossary

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

802.1X

1 / 59

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

60 Terms

1

802.1X

The IEEE standard that defines port-based security for network access control.

New cards
2

Acceptable Use Policy (AUP)

A document that provides network and system users with clear direction on permissible uses of information resources.

New cards
3

Access Control List (ACL)

Rule that either permits or denies actions.

New cards
4

Active Reconnaissance

A technique that directly engages the target in intelligence gathering.

New cards
5

Adaptive Identity

Also called adaptive authentication, it considers multiple data points like user location and device.

New cards
6

Advanced Persistent Threats (APTs)

Cybersecurity adversaries characterized by a sophisticated series of related attacks taking place over an extended period.

New cards
7

Application Programming Interfaces (APIs)

APIs allow application developers to interact directly with a web service through function calls.

New cards
8

Asymmetric Key Algorithms

Cryptographic algorithms that use two different keys: one for encryption and another for decryption.

New cards
9

Backdoors

An opening left in a program application that allows additional access to data.

New cards
10

Behavior-based Detection

An intrusion discovery mechanism that finds abnormal and possible malicious activities by watching system behavior.

New cards
11

Brute-Force Attacks

A type of attack that systematically tries all possibilities for a password until successful.

New cards
12

Business Continuity and Disaster Recovery (BC-DR)

Outline the procedures and strategies to ensure essential business functions continue during and after a disaster.

New cards
13

Cloud Access Security Broker (CASB)

A security policy enforcement solution that enforces security policies across cloud providers.

New cards
14

Cryptanalysis

The study of methods to defeat codes and ciphers.

New cards
15

Data Exfiltration Attack

An attack where access to sensitive information is gained and then removed from an organization.

New cards
16

Denial-of-Service Attacks

Attacks that seek to disrupt services making them unavailable to legitimate users.

New cards
17

Encryption

The process of converting plain text into ciphertext to prevent unauthorized access.

New cards
18

Identity Theft

The unauthorized use of someone else's identity.

New cards
19

Intrusion Detection System (IDS)

A product that automates the inspection of audit logs and system events to detect intrusion attempts.

New cards
20

Vulnerability Management

A program used to detect weaknesses within an organization through scans and assessments.

New cards
21

Web Application Firewall (WAF)

A firewall specifically designed to protect web applications.

New cards
22

Zero Trust

A security model that presumes no trust boundary and requires continuous validation of all actions.

New cards
23
New cards
24

Phishing

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

New cards
25

Malware

Malicious software designed to harm, exploit, or otherwise operate unauthorized or unwanted actions on computer systems.

New cards
26

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New cards
27

Social Engineering

Manipulative tactics used to trick individuals into revealing confidential or personal information.

New cards
28

Multi-Factor Authentication (MFA)

A security mechanism that requires more than one form of verification to access an account or system.

New cards
29

Tokenization

The process of replacing sensitive data with unique identification symbols that retain essential information about the data without compromising its security.

New cards
30

Patch Management

The process of managing updates for software applications and technologies to mitigate vulnerabilities.

New cards
31

Biometric Authentication

A security process that relies on the unique biological characteristics of individuals, such as fingerprints or facial recognition.

New cards
32

Security Information and Event Management (SIEM)

A software solution that aggregates and analyzes security data from across an organization to provide real-time insights.

New cards
33

Ransomware

A type of malware that encrypts a victim's files and demands payment for the decryption key.

New cards
34

Network Segmentation

The practice of dividing a computer network into smaller parts for improved security and performance.

New cards
35

Incident Response Plan

A set of instructions for responding to and managing cybersecurity incidents.

New cards
36

Security Awareness Training

Training provided to employees to help them recognize and respond to security threats.

New cards
37

Threat Intelligence

Information obtained from various sources to understand potential threats and vulnerabilities to an organization.

New cards
38

Data Loss Prevention (DLP)

A strategy for ensuring that sensitive data is not lost, misused, or accessed by unauthorized users.

New cards
39

Endpoint Security

The practice of securing endpoints or entry points of end-user devices, such as desktops and laptops.

New cards
40

Two-Factor Authentication (2FA)

A security process in which the user provides two different authentication factors to verify their identity.

New cards
41

Continuous Monitoring

The ongoing observation and analysis of systems and networks to detect anomalies and threats.

New cards
42

Cybersecurity Framework

A set of standards, guidelines, and best practices designed to manage cybersecurity-related risk.

New cards
43

Network Intrusion Prevention System (NIPS)

A network security technology that inspects network traffic for malicious activity and can take action.

New cards
44

Patch Management System

A system used to deploy updates and patches for software applications to mitigate security vulnerabilities.

New cards
45

Risk Assessment

The process of identifying, evaluating, and prioritizing risks to organizational assets.

New cards
46

Data Breach

An incident where unauthorized access to confidential data occurs.

New cards
47

Virtual Private Network (VPN)

A technology that creates a secure connection over the internet to protect data privacy.

New cards
48

Digital Forensics

The process of recovering, preserving, and analyzing data from digital devices in response to a cybersecurity incident.

New cards
49

Service-Level Agreement (SLA)

A contract that defines the level of service expected from a service provider.

New cards
50

Cyber Threat Hunting

Proactive searching for cyber threats that may have infiltrated a network.

New cards
51

Social Media Fraud

Fraudulent activities conducted through social media platforms to deceive individuals.

New cards
52

Incident Detection

The process of identifying cybersecurity incidents or breaches as they occur.

New cards
53

Digital Risk Protection

The practice of monitoring online threats and protecting an organizationā€™s digital assets.

New cards
54

Secure Coding Practices

Methodologies used by developers to write code that is secure against vulnerabilities.

New cards
55

Data Encryption at Rest

Encryption of data that is stored on disk to prevent unauthorized access.

New cards
56

User Behavior Analytics (UBA)

The monitoring and analysis of user behaviors to detect potential insider threats.

New cards
57

SSL/TLS (Secure Sockets Layer/Transport Layer Security)

Protocols used to establish a secure connection between a client and a server.

New cards
58

Forensics Analysis

The examination of digital devices to uncover and analyze cyber incidents.

New cards
59

Supply Chain Security

The practice of ensuring the integrity and security of the supply chain process.

New cards
60

Security Policy

Formalized rules and guidelines that dictate how an organization's data and resources are protected.

New cards

Explore top notes

note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 11 people
... ago
4.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 551 people
... ago
5.0(1)
note Note
studied byStudied by 17 people
... ago
5.0(1)
note Note
studied byStudied by 62 people
... ago
5.0(1)
note Note
studied byStudied by 52 people
... ago
5.0(2)
note Note
studied byStudied by 118 people
... ago
5.0(3)

Explore top flashcards

flashcards Flashcard (588)
studied byStudied by 42 people
... ago
5.0(1)
flashcards Flashcard (83)
studied byStudied by 46 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 194 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 24 people
... ago
5.0(1)
flashcards Flashcard (63)
studied byStudied by 14 people
... ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 1 person
... ago
4.0(1)
flashcards Flashcard (317)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (60)
studied byStudied by 111 people
... ago
5.0(5)
robot