comptia glossary

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

802.1X

The IEEE standard that defines port-based security for network access control.

2
New cards

Acceptable Use Policy (AUP)

A document that provides network and system users with clear direction on permissible uses of information resources.

3
New cards

Access Control List (ACL)

Rule that either permits or denies actions.

4
New cards

Active Reconnaissance

A technique that directly engages the target in intelligence gathering.

5
New cards

Adaptive Identity

Also called adaptive authentication, it considers multiple data points like user location and device.

6
New cards

Advanced Persistent Threats (APTs)

Cybersecurity adversaries characterized by a sophisticated series of related attacks taking place over an extended period.

7
New cards

Application Programming Interfaces (APIs)

APIs allow application developers to interact directly with a web service through function calls.

8
New cards

Asymmetric Key Algorithms

Cryptographic algorithms that use two different keys: one for encryption and another for decryption.

9
New cards

Backdoors

An opening left in a program application that allows additional access to data.

10
New cards

Behavior-based Detection

An intrusion discovery mechanism that finds abnormal and possible malicious activities by watching system behavior.

11
New cards

Brute-Force Attacks

A type of attack that systematically tries all possibilities for a password until successful.

12
New cards

Business Continuity and Disaster Recovery (BC-DR)

Outline the procedures and strategies to ensure essential business functions continue during and after a disaster.

13
New cards

Cloud Access Security Broker (CASB)

A security policy enforcement solution that enforces security policies across cloud providers.

14
New cards

Cryptanalysis

The study of methods to defeat codes and ciphers.

15
New cards

Data Exfiltration Attack

An attack where access to sensitive information is gained and then removed from an organization.

16
New cards

Denial-of-Service Attacks

Attacks that seek to disrupt services making them unavailable to legitimate users.

17
New cards

Encryption

The process of converting plain text into ciphertext to prevent unauthorized access.

18
New cards

Identity Theft

The unauthorized use of someone else's identity.

19
New cards

Intrusion Detection System (IDS)

A product that automates the inspection of audit logs and system events to detect intrusion attempts.

20
New cards

Vulnerability Management

A program used to detect weaknesses within an organization through scans and assessments.

21
New cards

Web Application Firewall (WAF)

A firewall specifically designed to protect web applications.

22
New cards

Zero Trust

A security model that presumes no trust boundary and requires continuous validation of all actions.

23
New cards
24
New cards

Phishing

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

25
New cards

Malware

Malicious software designed to harm, exploit, or otherwise operate unauthorized or unwanted actions on computer systems.

26
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

27
New cards

Social Engineering

Manipulative tactics used to trick individuals into revealing confidential or personal information.

28
New cards

Multi-Factor Authentication (MFA)

A security mechanism that requires more than one form of verification to access an account or system.

29
New cards

Tokenization

The process of replacing sensitive data with unique identification symbols that retain essential information about the data without compromising its security.

30
New cards

Patch Management

The process of managing updates for software applications and technologies to mitigate vulnerabilities.

31
New cards

Biometric Authentication

A security process that relies on the unique biological characteristics of individuals, such as fingerprints or facial recognition.

32
New cards

Security Information and Event Management (SIEM)

A software solution that aggregates and analyzes security data from across an organization to provide real-time insights.

33
New cards

Ransomware

A type of malware that encrypts a victim's files and demands payment for the decryption key.

34
New cards

Network Segmentation

The practice of dividing a computer network into smaller parts for improved security and performance.

35
New cards

Incident Response Plan

A set of instructions for responding to and managing cybersecurity incidents.

36
New cards

Security Awareness Training

Training provided to employees to help them recognize and respond to security threats.

37
New cards

Threat Intelligence

Information obtained from various sources to understand potential threats and vulnerabilities to an organization.

38
New cards

Data Loss Prevention (DLP)

A strategy for ensuring that sensitive data is not lost, misused, or accessed by unauthorized users.

39
New cards

Endpoint Security

The practice of securing endpoints or entry points of end-user devices, such as desktops and laptops.

40
New cards

Two-Factor Authentication (2FA)

A security process in which the user provides two different authentication factors to verify their identity.

41
New cards

Continuous Monitoring

The ongoing observation and analysis of systems and networks to detect anomalies and threats.

42
New cards

Cybersecurity Framework

A set of standards, guidelines, and best practices designed to manage cybersecurity-related risk.

43
New cards

Network Intrusion Prevention System (NIPS)

A network security technology that inspects network traffic for malicious activity and can take action.

44
New cards

Patch Management System

A system used to deploy updates and patches for software applications to mitigate security vulnerabilities.

45
New cards

Risk Assessment

The process of identifying, evaluating, and prioritizing risks to organizational assets.

46
New cards

Data Breach

An incident where unauthorized access to confidential data occurs.

47
New cards

Virtual Private Network (VPN)

A technology that creates a secure connection over the internet to protect data privacy.

48
New cards

Digital Forensics

The process of recovering, preserving, and analyzing data from digital devices in response to a cybersecurity incident.

49
New cards

Service-Level Agreement (SLA)

A contract that defines the level of service expected from a service provider.

50
New cards

Cyber Threat Hunting

Proactive searching for cyber threats that may have infiltrated a network.

51
New cards

Social Media Fraud

Fraudulent activities conducted through social media platforms to deceive individuals.

52
New cards

Incident Detection

The process of identifying cybersecurity incidents or breaches as they occur.

53
New cards

Digital Risk Protection

The practice of monitoring online threats and protecting an organization’s digital assets.

54
New cards

Secure Coding Practices

Methodologies used by developers to write code that is secure against vulnerabilities.

55
New cards

Data Encryption at Rest

Encryption of data that is stored on disk to prevent unauthorized access.

56
New cards

User Behavior Analytics (UBA)

The monitoring and analysis of user behaviors to detect potential insider threats.

57
New cards

SSL/TLS (Secure Sockets Layer/Transport Layer Security)

Protocols used to establish a secure connection between a client and a server.

58
New cards

Forensics Analysis

The examination of digital devices to uncover and analyze cyber incidents.

59
New cards

Supply Chain Security

The practice of ensuring the integrity and security of the supply chain process.

60
New cards

Security Policy

Formalized rules and guidelines that dictate how an organization's data and resources are protected.