CompTIA Security+ 701 Flashcards
AAA (Authentication, Authorization, and Accounting)
a security framework that
ensures only authorized individuals are able to access resources
ABAC (Attribute Based Access Control)
evaluates attributes to determine the
access
ACL (Access Control List)
list of rules that specifies which users or systems are
granted or denied access to a particular object or system resource
AES (Advanced Encryption Standard)
a specification for the encryption of electronic
data established by the U.S National Institute of Standards and Technology (NIST) in
2001. AES is widely used today as it is a much stronger than DES and triple DES
despite being harder to implement
AIS (Automated Indicator Sharing)
service provided by CISA that enables real-time
exchange of machine-readable cyber threat indicators and defensive measures
between public and private sector organizations
APT (Advanced Persistent Threat)
a type of cyber attack in which an unauthorized
user gains access to a system or network and remains undetected for an extended
period of time
ARP (Address Resolution Protocol)
a protocol used to map an IP address to a
physical MAC address
ASLR (Address Space Layout Randomization)
a technique used to prevent
attackers from exploiting vulnerabilities in software by randomizing the location of key
data areas in memory
BCP (Business Continuity Planning)
detailed strategy and set of systems for
ensuring an organization’s ability to prevent or rapidly recover from a significant
disruption to its operations. The plan is essentially a playbook for how any type of
organization—such as a private-sector company, a government agency or a school will
continue its day-to-day business during a disaster scenario or otherwise abnormal
conditions
BDPU Guard (Bridge Protocol Data Units)
BDPU guard is a feature that defends the
layer 2 STP topology against BDPU-related threats
BIA (Business Impact Analysis)
the BIA should identify the operational and financial
impacts resulting from the disruption of business functions and processes
BIOS (Basic Input/Output System)
BIOS, or Basic Input/Output System, is software
stored on a small memory chip, also known as firmware. BIOS is found on the
motherboard. BIOS instructs the computer on how to perform basic functions like
booting and keyboard control; it is also used to identify and configure the hardware in a
computer such as the hard drive, CPU, memory, and related equipment. Finally, it
manages data flow between the computer’s operating system (OS) and attached
devices
BLOB (Binary Large Object Storage)
used by cloud providers as a database for
large amounts of text or binary data
BPA (Business Partnership Agreement)
agreement between 2 companies that are
doing business together in which it is confirmed how much each company should
contribute as well as their responsibility and how the profit will be split
BYOD (Bring Your Own Device)
a policy that allows employees to use their personal
devices, such as smartphones or laptops, to access company resources
CA (Certificate Authority)
trusted entity that issues digital certificates used to verify
the identities of individuals, organizations, websites or devices
CAC (Common Access Card)
smart card about the size of a credit card. It is the
standard identification for Active Duty United States Defense personnel
CASB (Cloud Access Security Broker)
software/hardware that sits between users
and their cloud service to enforce security policies
CAPTCHA (Completely Automated Public Turing test to tell Computers and
Humans Apart)
a challenge-response test used to distinguish between human and
automated users
CBC (Cipher Block Chaining)
a mode of operation for a block cipher – one in which
a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to
the entire block. Cipher block chaining uses what is known as an initialization vector (IV)
of a certain length. By using this along with a single encryption key, organizations and
individuals can safely encrypt and decrypt large amounts of plaintext
CER (Certificate)
security files provided and generated by an Certificate Authority.
These files help a browser to verify if a website is secure and save to enter, verifying its
authenticity. These CER security certificates are usually installed on a web server
CER (Crossover Error Rate)
point where FAR and FRR are equal
CHAP (Challenge Handshake Authentication Protocol)
challenge-response
identity authentication protocol. It depends on a combination of CHAP security
credentials and a “shared secret” between the requestor (client) and the authenticator
(server), and it does not expose a password
CIA (Confidentiality, Integrity, and Availability)
the three core principles of
information security
CIRT (Computer Incident Response Team)
a team responsible for responding to
and mitigating cyber security incidents
COPE (Corporate-Owned, Personally-Enabled)
a policy that allows employees to
use company-owned devices for personal use
CRC (Cyclic Redundancy Check)
a mathematical algorithm used to detect errors in
data transmission
CRL (Certificate Revocation List)
first phase of checking if certificate is valid
CSA (Cloud Security Alliance)
non-profit organization that provides different
resources to help Cloud Security Providers (CSPs)
CSRF (Cross-Site Request Forgery)
is a web security vulnerability that allows an
attacker to induce users to perform actions that they do not intend to perform
CSO (Chief Security Officer)
a senior-level executive responsible for overseeing an
organization’s security program
CSP (cloud service provider)
is a third-party company that provides scalable
computing resources that businesses can access on demand over a network, including cloud-based compute, storage, platform, and application services
CSR (Certificate Signing Request)
a request made by a user or device to a
certificate authority for a digital certificate
CSRF (Cross Site Request Forgery)
attack that forces an end user to execute
unwanted actions on a web application in which they are currently authenticated
CSV (Comma Separated Values)
a file format used to store data in a table-like
format, with each row separated by a comma
CVE (Common Vulnerabilities and Exposure)
list of vulnerabilities created by
MITRE
CVSS (Common Vulnerabilities Scoring System)
ranking of vulnerabilities and their
severity
CYOD (Choose Your Own Device)
company has set of devices that employees can
choose to use for work
DAC (Discretionary Access Control)
restricting access to objects based on the
identity of subject
DDoS (Distributed Denial of Service)
a type of cyber attack in which multiple
systems are used to flood a target server or network with traffic, causing it to become
unavailable
DES (Data Encryption Standard)
is a symmetric-key block cipher published by the
National Institute of Standards and Technology (NIST) that was widely used in the past
but is now considered insecure
DHCP (Dynamic Host Configuration Protocol)
a protocol used to automatically
assign IP addresses and other network settings to devices on a network
DMZ (Demilitarized Zone)
a network segment that is isolated from the internal
network and is used to provide public-facing services, such as web servers or email
servers
DNS (Domain Name System)
a system that translates domain names into IP
addresses
DoS (Denial of Service)
a type of cyber attack in which a server or network is
overwhelmed with traffic, causing it to become unavailable
DPO (Data Protection Officer)
DPO makes sure that the organization is correctly
protecting individuals personal data according to current legislation
DRP (Disaster Recovery Plan)
preparing for any type of disaster that could occur
EAP (Extensible Authentication Protocol)
architectural framework that provides
extensibility for authentication methods for commonly used protected network access
technologies such as IEEE 802.1X-based wireless access, IEEE 802.1X-based wired
access and Point-to-Point Protocol (PPP)
EFS (Encrypting File System)
a feature in Windows that allows files and folders to be
encrypted using a user’s public key. Windows’ EFS feature allows you to easily encrypt
and decrypt files on your Windows NTFS drives. Once you’ve encrypted files with this
tool, other people won’t be able to access them unless they have your password
EMI (Electromagnetic Interference)
interference caused by electromagnetic waves,
which can disrupt the functioning of electronic devices
EMP (Electromagnetic Pulse)
a burst of electromagnetic radiation that can cause
damage to electronic devices
ESP (Encapsulating Security Payload)
is security payload is an individual protocol in
IPSec. ESP is responsible for the CIA triad of security (Confidentiality, Integrity,
Availability), which is considered significant only when encryption is carried along with
them. Securing all payload/ packets/ content in IPv4 and IPv6 is the responsibility of
ESP
FAR (False Acceptance Rate)
metric used to measure the likelihood of granting
access to an unauthorized user
FDE (Full Disk Encryption)
security technique that encrypts all data stored on a disk
or storage device, including the operating system, applications, and user data
FISMA (Federal Information Security Management Act)
FISMA requires federal
agencies to develop, document, and implement an agency-wide program to provide
information security for the information and systems that support the operations and
assets of the agency, including those provided or managed by another agency,
contractor, or other source
FRR (False Rejection Rate)
metric used to measure the likelihood of denying access
to an authorized user
FTP (File Transfer Protocol)
a protocol used to transfer files between computers over
a network. Port 21
GDPR (General Data Protection Regulation)
regulation in European Union (EU) law
on data protection and privacy for individuals within the EU and the European Economic
Area (EEA). It came into effect on May 25, 2018 and is enforced by the EU Data
Protection Authorities
GPS (Global Positioning System)
a system of satellites used to determine the
location of a device
GRE (Generic Routing Encapsulation)
a protocol used to encapsulate one type of
packet within another
GBAC (Group Based Access Control)
gives access to a group of individuals to the
resources that they need
HMAC (Hash-based Message Authentication Code)
is a cryptographic
authentication technique that uses a hash function and a secret key. With HMAC, you
can achieve authentication and verify that data is correct and authentic with shared
secrets, as opposed to approaches that use signatures and asymmetric cryptography
HIDS (Host Intrusion Detection System)
HIDS stands for host-based intrusion
detection system and represents an application that is monitoring a computer or
network for suspicious activities
HIPAA (Health Insurance Portability And Accountability Act)
federal law that was
enacted in 1996 to protect the privacy and security of patients’ personal health
information (PHI)
HOTP (HMAC-based One-Time Password)
algorithm used to generate one-time
passwords that are used for authentication purposes
HSM (Hardware Security Module)
type of specialized hardware device designed to
securely store and manage digital keys and perform cryptographic operations. It can be
used to store encryption keys, digital certificates, and other sensitive data