COMPTIA SEC+ !!

studied byStudied by 7 people
0.0(0)
Get a hint
Hint

Confidentiality

1 / 97

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

98 Terms

1

Confidentiality

Ensures data is not disclosed to unintended people

New cards
2

Integrity

Ensures data is not tampered with

New cards
3

Availability

Uptime of system to make data accessible

New cards
4

Non-repudiation

Validation of a message’s origin

New cards
5

Security

Protection against danger, damage, loss, and criminal activity

New cards
6

Asset

Value to an individual/organization

New cards
7

Threat

Potential to cause the loss of an asset

New cards
8

Threat Agent

Person/entity attempting to carry out a threat

New cards
9

Vulnerability

Weakness in a system

New cards
10

Exploit

Act/procedure/software taking advantage of a vulnerability

New cards
11

Malware

Software to take over/damage a computer without consent

New cards
12

Virus

Program damaging computer systems and replicating

New cards
13

Worm

Self-replicating malware

New cards
14

Trojan horse

Malicious program disguised as legitimate software

New cards
15

Zombie

Infected computer controlled by a central command center

New cards
16

Botnet

Group of zombie computers controlled centrally

New cards
17

Rootkit

Programs allowing hidden admin access

New cards
18

Logic Bomb

Malware executing under predefined conditions

New cards
19

Spyware

Software intercepting or controlling a user’s computer

New cards
20

Adware

Monitors user preferences and sends matching ads

New cards
21

Ransomware

Denies access until a ransom is paid

New cards
22

Scareware

Deceptive emails to trick users

New cards
23

Crimeware

Malware for identity theft

New cards
24

Social engineering

Attack involving human interaction for access

New cards
25

Footprinting

Gathering info about an organization

New cards
26

Pretexting

Persuading someone with a fake scenario

New cards
27

Elicitation

Extracting info without arousing suspicion

New cards
28

Pharming

Redirecting URL traffic to attacker’s site

New cards
29

Typosquatting

Leading users to URLs due to mistakes

New cards
30

Whaling

Targeting senior executives and high-profile victims

New cards
31

Vishing

Using VoIP for phishing

New cards
32

Spear phishing

Sending personalized emails to victims

New cards
33

Air gap

Physically isolating a network portion

New cards
34

Faraday cage

Blocks electromagnetic emissions

New cards
35

Hardening

Securing devices by reducing security exposure

New cards
36

Hotfix

Quick fix for a specific software problem

New cards
37

Patch

Thoroughly tested fix for wider deployment

New cards
38

Service pack

Collection of patches and enhancements for deployment.

New cards
39

Trusted Operating System/TOS

Operating system hardened and validated to a specific security level, supporting multilevel security where users can't access data at different classification levels.

New cards
40

Security baseline

Part of a configuration baseline ensuring workstations and servers comply with security goals of the organization.

New cards
41

Standard Operating Environment/SOE

Implemented as a standard disk image for deploying new computers, based on TOS and fully patched.

New cards
42

Manage software

Ensuring up-to-date licenses, installing security software, needed software only, avoiding untrusted software, and reducing attack surface by limiting applications and services.

New cards
43

Security zone

Network/system portion with specific security concerns.

New cards
44

Wireless network

Network without physical connections.

New cards
45

Guest network

Provides internet access to guest users with firewall regulation.

New cards
46

Honeynet

Special network to trap potential attackers.

New cards
47

Ad hoc

Decentralized network allowing direct connections between devices.

New cards
48

Intranet zone

Private network using internet services internally.

New cards
49

Internet

Public network with publicly available servers.

New cards
50

Extranet

Privately controlled network between the internet and a private LAN.

New cards
51

Demilitarized zone

Network with publicly accessible resources between private network and untrusted network.

New cards
52

Proxy server

Firewall intermediary between clients and servers.

New cards
53

Internet content filter

Software to monitor and restrict web content.

New cards
54

Network access control

Software controlling network access based on security requirements.

New cards
55

All-in-one security appliance

Device combining multiple security functions.

New cards
56

Application-aware device

Device managing network traffic based on application-layer protocol.

New cards
57

Intelligence Fusion

Sharing information between multiple government agencies and private security firms.

New cards
58

Vulnerability Scan

Process of capturing and analyzing packets to identify security weaknesses in a network, computer system, local applications, or web applications.

New cards
59

Common Vulnerability Scoring System (CVSS)

System that ranks vulnerabilities based on severity.

New cards
60

Security Information and Event Management (SIEM)

Tool that gathers network information and centralizes it for analysis to detect threats.

New cards
61

Security Orchestration, Automation, and Response (SOAR)

Solution stack of compatible software programs that collect and respond to security threats automatically.

New cards
62

Man-In-The-Middle (MITM) Attack

Hacker intercepts communication between two devices.

New cards
63

ARP Poisoning

Attack targeting the ARP protocol where the attacker changes the ARP cache by spoofing the IP address of a target.

New cards
64

MAC Spoofing

Hacker spoofs the MAC address of the gateway to overwrite the gateway’s MAC address in the switch’s CAM table.

New cards
65

MAC Flooding

Attack where the attacker overwhelms a network switch by sending a large number of Ethernet frames with various MAC addresses.

New cards
66

DNS Attack

Attack that targets the Domain Name System service.

New cards
67

Distributed Denial of Service (DDoS)

Attack designed to overwhelm a target with more data than it can handle, causing a shutdown.

New cards
68

Macros

Code used to perform a series of steps or functions within an application.

New cards
69

Brute Force Attack

Password attack where a cracking tool submits every possible combination of letters, numbers, and symbols in a short amount of time.

New cards
70

Password Spraying

Brute force attack that uses the same password across multiple user accounts.

New cards
71

Dictionary Attack

Brute force attack where a hacker uses a list of words or phrases to guess the password.

New cards
72

Rainbow Attack

Attack using special tables with common passwords and generated hashes of each password.

New cards
73

Dumpster Diving

Social engineering attack where an attacker searches through trash to find important documents or information.

New cards
74

Packet Capture

Process of collecting Layer 3 (Network) information over the wire, like IP addresses.

New cards
75

TCPDUMP

Linux tool for collecting packet data for later analysis.

New cards
76

Wireshark

Network protocol analyzer tool.

New cards
77

Secure Shell (SSH)

Remote admin protocol for secure connections to remote systems.

New cards
78

PuTTY

Open-source software supporting various protocols like SSH and Telnet.

New cards
79

Secure Sockets Layer (SSL)

Encryption protocol for secure connections to remote systems.

New cards
80

Public Key Infrastructure (PKI)

System for secure data transmission using key pairs and certificates for verification.

New cards
81

Fault Tolerance

Ability to respond to unexpected hardware/software failures without data loss.

New cards
82

Redundancy

Method for providing fault tolerance by using duplicate or multiple components performing the same function.

New cards
83

Geo Dispersion

Storing data in multiple locations to mitigate downtime due to loss of availability at one location.

New cards
84

Multipath

Fault-tolerance technique providing multiple physical paths between a CPU and a mass-storage device.

New cards
85

Load Balancers

Process distributing processing among multiple nodes.

New cards
86

Uninterrupted Power Supply (UPS)

Stand-alone power supply allowing servers to be gracefully shut down during a power outage.

New cards
87

Active/Active

Two load balancers working together to distribute network traffic.

New cards
88

Active/Passive

Two load balancers with one active and the other in standby mode to take over if the active one fails.

New cards
89

Virtual IP

IP address usable by multiple endpoints, commonly used in failover systems and for load balancing.

New cards
90

Storage Area Network (SAN)

High-speed network of storage devices, typically used for file shares.

New cards
91

Full Backup

Captures all data on a machine, usually the first backup to be run.

New cards
92

Incremental Backup

Contains all changes since the last incremental backup.

New cards
93

Differential Backup

Contains all changes since the last full backup.

New cards
94

Snapshot

Instant copy of an individual computer, often used on virtual machines for reverting changes.

New cards
95

Network Storage Appliance (NAS)

Device used to store backups or other files.

New cards
96

Scalability

Ability to increase or decrease data storage space.

New cards
97

Restoration Order

Pre-planned sequence for restoring servers following a disastrous event based on their importance.

New cards
98

3-2-1 Rule

Backup strategy requiring three copies of each complete backup, two kept on-site on different appliances, and one kept off-site.

New cards

Explore top notes

note Note
studied byStudied by 34 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 170 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 29 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 10752 people
Updated ... ago
4.8 Stars(24)

Explore top flashcards

flashcards Flashcard206 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard25 terms
studied byStudied by 25 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard109 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard60 terms
studied byStudied by 55 people
Updated ... ago
4.0 Stars(2)
flashcards Flashcard96 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard148 terms
studied byStudied by 226 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard84 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard35 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(2)