CompTIA CySA+ CS0-003 Deck 4 Flashcards
Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.
Honeypots
A host, network, or file set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration.
High-Interaction Honeypots
A design to mimic real production systems, making it difficult for attackers to tell the difference between the honeypot and a real system. This aims to capture more detailed attack information than can be accomplished by using a low-interaction honeypot, allowing security teams to understand an attacker better.
Active Decoys
A system designed to distract potential attackers away from an organization’s critical systems and data. It creates a false environment that looks like a real system, complete with fake data, applications, and other elements. The decoy system is closely monitored to detect malicious activity and provide early warning and detailed insight into an attacker’s tactics and techniques.
Intrusion Detection Systems
A security appliance or software that analyzes data from a packet sniffer to identify traffic that violates policies or rules.
System Hardening
A process of making a host or app configuration secure by reducing its attack surface, through running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits.
Virtualization
A computing environment where multiple independent operating systems can be installed to a single hardware platform and run simultaneously.
Containers (VM)
An operating system virtualization deployment containing everything required to run a service, application, or microservice.
Microservices
A software architecture where components of the solution are conceived as highly decoupled services not dependent on a single platform type or technology.
Application Virtualization
A software delivery model where the code runs on a server and is streamed to a client.
Cloud Deployment
Classifying the ownership and management of a cloud as public, private, community, or hybrid.
Public cloud
Cloud that is deployed for shared use by multiple independent tenants.
Private Cloud
Cloud that is deployed for use by a single entity.
Hybrid Cloud
Cloud deployment that uses both private and public elements.
Serverless
A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances.
(VPC) Virtual Private Cloud
A private network segment made available to a single cloud consumer on a public cloud.