Comp TIA Security Plus 701 Flashcards
Nation States / APT
Definition: Highly skilled hackers targeting systems for espionage, data theft, or sabotage.
Example: Cyber espionage against a defense contractor.
Script Kiddies
Definition: Unskilled hackers using ready-made tools for unauthorized access.
Example: Running a downloaded tool to deface a website.
Hacktivists
Definition: Hackers driven by ideological motives, such as political protests.
Example: DDoS attacks on government sites during a political protest.
Organized Crime
Definition: Hackers seeking financial gain through deliberate, skilled actions.
Example: Stealing credit card data for resale on the dark web.
AAA (Authentication, Authorization, and Accounting)
Definition: Framework for controlling access and tracking user activities.
Example: Logging into a system with credentials and recording login events.
ACL (Access Control List)
Definition: A set of rules controlling access to network resources.
Example: Allowing only certain IP addresses to access a server.
AES (Advanced Encryption Standard)
Definition: A widely used encryption method for secure data.
Example: Encrypting sensitive corporate files using AES-256.
APT (Advanced Persistent Threat)
Definition: A prolonged attack where intruders remain undetected for extended periods.
Example: A cyber espionage group infiltrating a government agency.
IPSec (Internet Protocol Security)
Definition: A suite of protocols to secure IP communications via encryption and authentication.
Example: Encrypting a VPN connection using IPSec.
TLS (Transport Layer Security)
Definition: A protocol ensuring secure communication over a network.
Example: HTTPS websites using TLS to encrypt traffic.
SSH (Secure Shell)
Definition: A protocol for secure remote access to devices.
Example: Admins using SSH to configure servers.
DNS (Domain Name System)
Definition: A system that translates human-readable domain names into IP addresses.
Example: www.google.com resolving to an IP address.
Social Media Attacks
Definition: Exploiting social media for phishing or malicious activities.
Example: Fake posts with malicious links targeting users.
Email Attacks
Definition: Using malicious emails to distribute malware or steal credentials.
Example: Phishing emails impersonating a bank to gather account details.
Cloud Vulnerabilities
Definition: Exploiting weaknesses in shared cloud infrastructure.
Example: Breaching a multi-tenant cloud provider to access sensitive data.