CompTIA Security+ Vocabulary List Flashcards
Active Directory
Directory service by Microsoft for Windows domain networks.
AES (Advanced Encryption Standard)
Symmetric encryption algorithm.
Application Layer
Layer 7 of the OSI model, providing network services to applications.
Anomaly Detection
Identifying unusual patterns that do not conform to expected behavior.
Attack Surface
Total points where an attacker can try to enter data into or extract data from an environment.
Audit Trail
Record of activities to ensure integrity and track changes.
Biometrics
Authentication using physical characteristics, like fingerprints or facial recognition.
Authentication Header (AH)
IPsec protocol providing connectionless integrity and data origin authentication.
Black Box Testing
Testing without knowledge of the internal workings of the application.
Blue Team
Group responsible for defending an organization from cyber attacks.
Bollard
Physical security device to prevent vehicle-based attacks.
CCTV (Closed-Circuit Television)
Video surveillance system.
Compensating Controls
Security controls that provide alternative measures.
Certificate Revocation List (CRL)
List of certificates that have been revoked by the Certificate Authority.
Chain of Custody
Documentation showing the seizure, custody, control, transfer, analysis, and disposition of evidence.
Ciphertext
Encrypted text transformed from plaintext.
Confidentiality
Ensuring that information is only accessible to those authorized to have access.
Control Diversity
Using different types of controls (administrative, technical, physical) to achieve security.
Data-at-Rest
Inactive data stored physically in any digital form.
Data-in-Transit
Data actively moving from one location to another.
Degaussing
Process of reducing or eliminating a magnetic field, often used to erase data from magnetic storage.
Digital Forensics
Process of uncovering and interpreting electronic data.
Elliptic Curve Cryptography (ECC)
Encryption algorithm based on elliptic curves over finite fields.
Demilitarized Zone (DMZ)
Physical or logical subnetwork that contains and exposes an organization’s external-facing services.
Dumpster Diving
Searching through waste to find confidential information.
EAP (Extensible Authentication Protocol)
Framework for transporting authentication protocols.
Evil Twin
Rogue wireless access point mimicking a legitimate one.
EMI (Electromagnetic Interference)
Disturbance affecting an electrical circuit due to electromagnetic radiation.
Escrowed Encryption
Encryption process where decryption keys are held in escrow.
File Integrity Monitoring
Process of validating the integrity of operating system and application software files.
Federated Identity Management
Linking a user’s electronic identity and attributes, stored across multiple distinct identity management systems.
Geofencing
Creating a virtual boundary for a geographic area.
Hashcat
Popular password cracking tool.
Identity Federation
Linking a single identity across multiple systems.
HIPS (Host-based Intrusion Prevention System)
System designed to protect a host from malicious attacks.
Hybrid Attack
Combining dictionary and brute-force attacks to crack passwords.
HIDS (Host-based Intrusion Detection System)
System that monitors and analyzes the internals of a computing system.
Incident Response Plan
Organized approach to addressing and managing the aftermath of a security breach or attack.
IDS (Intrusion Detection System)
System that monitors network or system activities for malicious activities.
IMAP (Internet Message Access Protocol)
Protocol used by email clients to retrieve messages from a mail server.