Comp TIA Security Plus 701 Flashcards
Nation States / APT
Definition: Highly skilled hackers targeting systems for espionage, data theft, or sabotage.
Example: Cyber espionage against a defense contractor.
Script Kiddies
Definition: Unskilled hackers using ready-made tools for unauthorized access.
Example: Running a downloaded tool to deface a website.
Hacktivists
Definition: Hackers driven by ideological motives, such as political protests.
Example: DDoS attacks on government sites during a political protest.
Organized Crime
Definition: Hackers seeking financial gain through deliberate, skilled actions.
Example: Stealing credit card data for resale on the dark web.
AAA (Authentication, Authorization, and Accounting)
Definition: Framework for controlling access and tracking user activities.
Example: Logging into a system with credentials and recording login events.
ACL (Access Control List)
Definition: A set of rules controlling access to network resources.
Example: Allowing only certain IP addresses to access a server.
AES (Advanced Encryption Standard)
Definition: A widely used encryption method for secure data.
Example: Encrypting sensitive corporate files using AES-256.
APT (Advanced Persistent Threat)
Definition: A prolonged attack where intruders remain undetected for extended periods.
Example: A cyber espionage group infiltrating a government agency.
IPSec (Internet Protocol Security)
Definition: A suite of protocols to secure IP communications via encryption and authentication.
Example: Encrypting a VPN connection using IPSec.
TLS (Transport Layer Security)
Definition: A protocol ensuring secure communication over a network.
Example: HTTPS websites using TLS to encrypt traffic.
SSH (Secure Shell)
Definition: A protocol for secure remote access to devices.
Example: Admins using SSH to configure servers.
DNS (Domain Name System)
Definition: A system that translates human-readable domain names into IP addresses.
Example: www.google.com resolving to an IP address.
Social Media Attacks
Definition: Exploiting social media for phishing or malicious activities.
Example: Fake posts with malicious links targeting users.
Email Attacks
Definition: Using malicious emails to distribute malware or steal credentials.
Example: Phishing emails impersonating a bank to gather account details.
Cloud Vulnerabilities
Definition: Exploiting weaknesses in shared cloud infrastructure.
Example: Breaching a multi-tenant cloud provider to access sensitive data.
MFA (Multi-factor Authentication)
Definition: Security requiring two or more authentication factors.
Example: Logging into a system with both a password and a texted code.
IDS (Intrusion Detection System)
Definition: A system monitoring network traffic for signs of malicious activity.
Example: Detecting and alerting on unusual login attempts.
SIEM (Security Information and Event Management)
Definition: A system analyzing security data from across a network to detect threats.
Example: Aggregating firewall logs for suspicious activity detection.
RAID (Redundant Array of Independent Disks)
Definition: A technology for data redundancy and improved performance.
Example: Using RAID-5 to ensure data remains accessible even if one drive fails.
RBAC (Role-Based Access Control)
Definition: Permissions are granted based on user roles within an organization.
Example: Giving a database administrator access to manage databases but not HR systems.
MAC (Mandatory Access Control)
Definition: Access is enforced by the operating system based on predefined rules.
Example: A classified system where only users with a top-secret clearance can view documents.
DAC (Discretionary Access Control)
Definition: Resource owners set access permissions.
Example: A user sharing a private folder with colleagues.
OAuth (Open Authorization)
Definition: A protocol for granting third-party access to resources without sharing credentials.
Example: Signing into a web service using your Google or Facebook account.
LDAP (Lightweight Directory Access Protocol)
Definition: Protocol for accessing and managing directory information over a network.
Example: Authenticating users in an Active Directory environment.
SAML (Security Assertion Markup Language)
Definition: A standard for exchanging authentication data between systems.
Example: Single sign-on (SSO) between a company’s intranet and a third-party app.
TACACS+ (Terminal Access Controller Access-Control System Plus)
Definition: Protocol for centralized authentication, authorization, and accounting.
Example: Managing user permissions for network routers.
RSA (Rivest-Shamir-Adleman)
Definition: A widely used public-key encryption algorithm.
Example: Securing email communications with RSA encryption.
ECC (Elliptic Curve Cryptography)
Definition: Encryption using elliptic curve math for enhanced security with smaller key sizes.
Example: Securing mobile apps with ECC-based encryption.
SHA (Secure Hash Algorithm)
Definition: Produces a unique hash value to ensure data integrity.
Example: Verifying downloaded software using a SHA-256 hash.
Diffie-Hellman
Definition: A key exchange algorithm enabling secure key sharing over public channels.
Example: Establishing an encrypted session between a web browser and server.
WAF (Web Application Firewall)
Definition: A firewall designed to protect web applications.
Example: Blocking SQL injection attacks on a website’s login page.
NGFW (Next-Generation Firewall)
Definition: Advanced firewalls with features like application awareness and intrusion prevention.
Example: Detecting malware based on network behavior.
VPN (Virtual Private Network)
Definition: Creates a secure, encrypted tunnel for internet communication.
Example: A remote employee using a VPN to access company servers securely.
Phishing
Definition: Fraudulent attempts to obtain sensitive data by impersonating trustworthy entities.
Example: Receiving a fake email from “your bank” asking for account credentials.
Spear Phishing
Definition: A targeted phishing attack aimed at specific individuals or organizations.
Example: A CEO receiving a fake invoice from what appears to be a trusted vendor.
Social Engineering
Definition: Manipulating people into divulging confidential information.
Example: Convincing an employee over the phone to reset a password.
FDE (Full Disk Encryption)
Definition: Encrypts all data on a disk to prevent unauthorized access.
Example: Encrypting a laptop’s hard drive using BitLocker.
DLP (Data Loss Prevention)
Definition: Tools designed to prevent unauthorized sharing or transmission of sensitive data.
Example: Blocking outgoing emails containing customer credit card numbers.
EFS (Encrypting File System)
Definition: A Windows feature for encrypting individual files or folders.
Example: Encrypting sensitive files stored on a shared network drive.