CompTIA Security+ 701 Study Guide Ch. 1 Notes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/62

flashcard set

Earn XP

Description and Tags

Security+ Ch1. Notes

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

63 Terms

1
New cards

What are the three key objectives of cybersecurity programs?

  • Confidentiality

  • Integrity

  • Availability

2
New cards

Confidentiality

Ensures that unauthorized individuals are not able to gain access to sensitive information.

3
New cards

Integrity

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally

4
New cards

Availability

Ensures that information and systems are ready to meet the need of legitimate users at the time those users request them

5
New cards

Nonrepudiation

Means that someone who performed some action, such as sending a message, cannot later deny having taken that action

6
New cards

Security Incidents

These occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.

7
New cards

The DAD Triad

Security model that explains the three key threats to cybersecurity efforts

8
New cards

What are the three components of the DAD Triad?

  • Disclosure

  • Alteration

  • Denial

9
New cards

Disclosure

This is the exposure of sensitive information to unauthorized individuals, otherwise known as data lose.

10
New cards

Alteration

This is the unauthorized modification of information and is a violation of the principle of integrity.

11
New cards

Denial

This is the disruption of an authorized user’s legitimate access to information.

12
New cards

Financial Risk

This is the risk of monetary damage to the organization as the result of a data breach.

13
New cards

Reputational Risk

This occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.

14
New cards

Strategic Risk

This is the risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.

15
New cards

Operational Risk

This is risk to the organization’s ability to carry out its day-to-day functions.

16
New cards

Compliance Risk

This occurs when a security breach causes an organization to run afoul of legal or regulatory requirements.

17
New cards

What are security controls in the confines of cybersecurity?

These are specific measures that fulfill the security objectives of an organization.

18
New cards

Gap Analysis

A process where cybersecurity professionals review the control objects for a particular organization, or service and then examines the controls designed to achieve those objectives.

19
New cards

What are the four different categories of security control?

  • Technical Controls

  • Operational Controls

  • Managerial Controls

  • Physical Controls

20
New cards

Technical Controls

These enforce confidentiality, integrity, and availability in the digital space.

21
New cards

What are some examples of technical controls?

  • Firewall Rules

  • Access Control Lists

  • Intrusion Prevention Systems

  • Encryption

22
New cards

Operational Controls

This is the process that we put in place to manage technology in a secure manner.

23
New cards

What are some examples of operational controls?

  • User Access Reviews

  • Log Monitoring

  • Vulnerability Management

24
New cards

Managerial Controls

These are procedural mechanisms that focus on the mechanics of the risk management process.

25
New cards

What are some examples of managerial controls?

  • Periodic Risk Assessments

  • Security Planning Exercises

  • Incorporation of security policies

26
New cards

Physical Controls

These are security controls that impact the physical world.

27
New cards

What are some examples of physical controls?

  • Fences

  • Perimeter Lighting

  • Locks

  • Fire Suppression Systems

  • Burglar Alarms

28
New cards

What are the different types of security control?

  • Preventive Controls

  • Deterrent Controls

  • Detective Controls

  • Corrective Controls

  • Compensating Controls

  • Directive Controls

29
New cards

Preventive Controls

These intend to stop a security issue before it occurs.

30
New cards

What are examples of preventive controls?

  • Firewalls

  • Encryption

31
New cards

Deterrent Controls

These seek to prevent an attacker from attempting to violate security policies.

32
New cards

What are some examples of deterrent controls?

  • Guard dogs

  • Barbed Wire Fences

33
New cards

Detective Controls

These identify security events that have already occurred.

34
New cards

What is an example of a detective control?

Intrusion Detection System

35
New cards

Corrective Controls

These remediate security issues that have already occurred.

36
New cards

What are some examples of corrective control?

Restoring Backups

37
New cards

Compensating Controls

These are controls designed to mitigate the risk associated with exceptions made to a security policy.

38
New cards

Directive Controls

These inform employees and others what they should do to achieve security objectives.

39
New cards

What are examples of directive controls?

  • Policies

  • Procedures

40
New cards

Data at Rest

  • This is stored data that resides on hard drives, tapes, in the cloud, or on other storage media.

  • This is prone to theft by attackers who gain access to systems and are able to browse through their contents.

41
New cards

Data in Transit

  • This is data that is in motion/transit over the network.

  • This type of data is open to eavesdropping attacks by anyone with access to those networks.

42
New cards

Data in Use

  • This is data that is actively in use by a computer system.

  • An attacker with control of the system may be able to read the contents of memory and steal sensitive information.

43
New cards

Encryption

This technology uses mathematical algorithms to protect information from prying eyes, both while in transit over a network and while it resides on systems.

44
New cards

What does DLP stand for?

Data Loss Prevention

45
New cards

Data Loss Prevention

These systems help organizations enforce information handling policies and procedures to prevent data loss and theft.

46
New cards

What two different environments does data loss prevention work in?

  • Agent-based DLP

  • Agentless (network-based) DLP

47
New cards

Agent-based DLP

This uses software agents installed on systems that search those systems for the presence of sensitive information.

48
New cards

Agentless (network-based) DLP

These systems are dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information.

49
New cards

What two mechanisms of action do data loss prevention systems have?

  • Pattern Matching

  • Watermarking

50
New cards

Pattern Matching

A technique used by DLP systems where they watch for the telltale signs of sensitive information.

51
New cards

Watermarking

A technique used by DLP systems where they apply electronic tags to sensitive documents and then the DLP system can monitor systems and networks for unencrypted content containing those tags.

52
New cards

Data Minimization

These are techniques that seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.

53
New cards

Deidentification Process

This removes the ability to link data back to an individual, reducing its sensitivity.

54
New cards

Data Obfuscation

A process when sensitive data is transformed into a format where the original information cannot be retrieved.

55
New cards

Hashing

This uses a hash function to transform a value in our dataset to a corresponding hash value.

56
New cards

Tokenization

This replaces sensitive values with a unique identifier using a lookup table.

57
New cards

Masking

This partially redacts sensitive information by replacing some or all sensitive fields with blank characters.

58
New cards

Access Restrictions

These are security measures that limit the ability of individuals or systems to access sensitive information or resources.

59
New cards

What are two common types of access restriction?

  • Geographic Restrictions

  • Permission Restrictions

60
New cards

Geographic Restriction

This limits access to resources based on the physical location of the user or system.

61
New cards

Permission Restriction

This limits access to resources based on the user’s role or level of authorization.

62
New cards

Segmentation

The process of placing sensitive systems on separate networks where they may communicate with each other but have strict restrictions on their ability o communicate with systems on other networks.

63
New cards

Isolation

This goes a step further than segmentation by completely cutting a system off from access to or from outside networks.