CompTIA A+ 1201 - 2.0 Security Flashcards
Shadow IT
Shadow IT is any software, hardware or IT resource used on an enterprise network without the IT department’s approval and often without IT’s knowledge or oversight.
Share Permissions
Full Control - Change permissions and all else.
Change - Change but not permissions.
Read - Read only.
Folder Permissions - Read
View files and subfolders including their attributes, permissions and ownership.
Folder Permissions - Write
Create new folders and files, change attributes, view permissions and ownership.
Folder Permissions - List
View the names of files and subfolders
Folder Permissions - Read & Execute
Pass-through folders for which no permissions are assigned, plus read and list permissions.
Folder Permissions - Modify
Includes read/execute and write permissions, as well as the ability to rename and delete the folder.
Folder Permissions - Full Control
All previous permissions, plus changing permissions, taking ownership and deleteing files/subfolders.
File Permissions - Read
Read the contents of the file and view attributes, ownership and permissions.
File Permissions - Write
Overwrite the file and view attributes, ownership and permissions.
File Permissions - Read & Execute
Read permissions, plus the ability to run applications.
File Permissions - Modify
Includes Read/Execute and Write permissions, as well as the ability to rename and delete the file.
File Permissions - Full Control
All previous permissions, plus changing permissions and taking ownership.
Windows Server Domain Controller
Any Windows based server that provides domain authentication services (logon services) is reffered to as a Domain Controller.
Active Directory Domain Services (ADDS)
The database that contains the users, groups, and computer accounts in a Windows Server Domain.
Member Servers
Any server based system that has been configured into the domain, but do not maintain a copy of Active Diretory (Exchange, SQL, Web etc)
Organisation Units (OU’s)
In WIndows Active Directory, a way of dividing up the domain into different administrative realms.
Logon Script
A file containing commands that run each time a user logs onto a computer to set up the user environment.
CIA Triad
Confidentiality - Keeping information and communications private and protected from unauthorized access.
Integrity - Ensuring that data is not altered or tampered with.
Availability - Ensuring that systems operate continuously and that authorized individuals can access what they need.
Execution Control (Hardening)
A security technique in which the default configuration of a system is altered to protect the system against attacks.
Logical Security
Controls implemented within software to create an access control system. (Firewall etc)
Triple A
Authentication - A means to prove identity to computer systems.
Authorization - The process of determining what rights and priveliges a particular entity has.
Accounting - The process of tracking and recording system activities and resource access. (Auditing)
Implicit Deny
Unless something has explicitly been granted access, it should be denied access. (You’re not on the list pal)
Least Privelige
Something should be allocated the minimum necessary rights, priveliges or information to perform its role.
Symmetric Encryption
A fast, light and less intensive form of encryption that uses a single secret key for encryption/decryption.
You need to securely distribute and store the key.
Asymmetric Encryption
A slower, more intensive form of encryption that uses 2 keys (public & private) to encrypt/decrypt data.
The public key encrypts the data, and the private key decrypts. Both are mathematically related.
RSA Cipher
The first successful algorithm designed for public key encryption, named after its designers - Rivest, Shamir and Adelman.
Key Exchange
Two hosts need to know the same symmetric encryption key without any other host finding out what it is.
Cryptographic Encryption
A one-way encryption process, from which it is impossible to recover the original data.
Eg; Active Directory stores a hashed copy of your password, which it will match when you input it during logon. Means that your actual password isn’t stored somewhere.
SHA-1 & SHA-2
Secure Hashing Algorithm. Utilized during cryptographic encryption to hash data.
Addresses possible weaknesses in the MD5 / MDA
MD5 / MDA
Message Digest Algorithm
Used to hash data during cryptographic encryption.
Inferior to SHA-1 & SHA-2
Cryptominers
An individual or a group of people that use computers or specialized hardware to participate in blockchain processing to compete for rewards paid in Cryptocurrency.
PKI
Public Key Infrastructure
A combination of policies, procedures and technology needed to manage digital certificates in a public key cryptography scheme.
CA Server
Certificate of Authority Server.
A server that can issue digital certificates and the associated public/private key pairs.
(Ie; HR gets all the private and public keys associated with their users & machines, so they can communicate securely)
Digital Certificate
The X.509 certificate is issued and signed by a CA Server, as a guarantee that the key belongs to the organization that issued it.
Contains a public key that is presented by the logical entity attempting to access system resources and validated by the CA.
(Papers Please)
Heuristic Identification
A monitoring technique that allows dynamic pattern matching based on past experience rather than relying on pre-loaded signatures.
An Artificial Intelligence approach to Anti-virus / Anti-malware monitoring that utilizes machine learning to better identify malicious code.
NAC
Network Access Control
An umbrella term that relates to the means with which we ensure endpoint security.
Eg; Firewalls, MAC Filtering etc
Endpoint
An Endpoint is a remote computing device that communicates back and forth with a network to which it is connected.
Eg; Desktops, Laptops.
Health Policy
Policies or profiles describing a minimum security configuration that devices must meet to be granted network access.
Checks for:
- Malware
- Patch Levels
- Personal Firewall Status
- Virus Definitions
(Gonna need to check you before you get in lad)