Dion Training CompTIA Security+ Introduction Flashcards
CompTIA Security+ (SY0-701) certification exam consists of five domains or areas of
knowledge
■ 12% of General Security Concepts
■ 22% of Threats, Vulnerabilities, and Mitigations
■ 18% of Security Architecture
■ 28% of Security Operations
■ 20% of Security Program Management and Oversight
What is Information Security
Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction
What is Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data
What is the CIA Triad
■ Confidentiality
● Ensures information is accessible only to authorized personnel (e.g.,
encryption)
■ Integrity
● Ensures data remains accurate and unaltered (e.g., checksums)
■ Availability
● Ensures information and resources are accessible when needed (e.g.,
redundancy measures)
What is Non-Repudiation
Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)
What is the CIANA Pentagon
An extension of the CIA triad with the addition of non-repudiation and
authentication
What is the Triple A’s of Security
■ Authentication
● Verifying the identity of a user or system (e.g., password checks)
■ Authorization
● Determining actions or resources an authenticated user can access (e.g.,
permissions)
■ Accounting
● Tracking user activities and resource usage for audit or billing purposes
What are the Security Control Categories
■ Technical
■ Managerial
■ Operational
■ Physical
What are the Security Control Types
■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive
What is the Zero Trust Model
■ Operates on the principle that no one should be trusted by default
■ To achieve zero trust, we use the control plane and the data plane
● Control Plane
○ Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones
● Data Plane
○ Subject/system, policy engine, policy administrator, and
establishing policy enforcement points
What is a Threat
■ Anything that could cause harm, loss, damage, or compromise to our information
technology systems
■ Can come from the following
● Natural disasters
● Cyber-attacks
● Data integrity breaches
● Disclosure of confidential information
What is a Vulnerability
■ Any weakness in the system design or implementation
■ Come from internal factors like the following
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security
Where threats and vulnerabilities intersect, that is where the risk to your enterprise
systems and networks lies
■ If you have a threat, but there is no matching vulnerability to it, then you have no
risk
■ The same holds true that if you have a vulnerability but there’s no threat against
it, there would be no risk
What is Risk Management
■ Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome
What is Confidentiality
■ Refers to the protection of information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes
Confidentiality is important for 3 main reasons
What are they
■ To protect personal privacy
■ To maintain a business advantage
■ To achieve regulatory compliance
To ensure confidentiality, we use five basic methods
What are they
■ Encryption
● Process of converting data into a code to prevent unauthorized access
■ Access Controls
● By setting up strong user permissions, you ensure that only authorized
personnel can access certain types data
■ Data Masking
● Method that involves obscuring specific data within a database to make it
inaccessible for unauthorized users while retaining the real data’s
authenticity and use for authorized users
■ Physical Security Measures
● Ensure confidentiality for both physical types of data, such as paper
records stored in a filing cabinet, and for digital information contained on
servers and workstations
■ Training and Awareness
● Conduct regular training on the security awareness best practices that
employees can use to protect their organization’s sensitive data
What is Integrity
■ Helps ensure that information and data remain accurate and unchanged from its
original state unless intentionally modified by an authorized individual
■ Verifies the accuracy and trustworthiness of data over the entire lifecycle
Integrity is important for three main reasons what are they
■ To ensure data accuracy
■ To maintain trust
■ To ensure system operability
To help us maintain the integrity of our data, systems, and networks, we usually utilize
five methods, what are they?
■ Hashing
● Process of converting data into a fixed-size value
■ Digital Signatures
● Ensure both integrity and authenticity
■ Checksums
● Method to verify the integrity of data during transmission
■ Access Controls
● Ensure that only authorized individuals can modify data and this reduces
the risk of unintentional or malicious alterations
■ Regular Audits
● Involve systematically reviewing logs and operations to ensure that only
authorized changes have been made, and any discrepancies are
immediately addressed
What is Availability
Ensure that information, systems, and resources are accessible and operational
when needed by authorized users
As cybersecurity professionals, we value availability since it can help us with what
■ Ensuring Business Continuity
■ Maintaining Customer Trust
■ Upholding an Organization’s Reputation
What is Redundancy
Duplication of critical components or functions of a system with the intention of enhancing its reliability
There are various types of redundancy you need to consider when designing your systems and networks what are they
■ Server Redundancy
● Involves using multiple servers in a load balanced or failover configuration
so that if one is overloaded or fails, the other servers can take over the
load to continue supporting your end users
■ Data Redundancy
● Involves storing data in multiple places
■ Network Redundancy
● Ensures that if one network path fails, the data can travel through
another route
■ Power Redundancy
● Involves using backup power sources, like generators and UPS systems
What is Non-repudiation
■ Focused on providing undeniable proof in the world of digital transactions
■ Security measure that ensures individuals or entities involved in a
communication or transaction cannot deny their participation or the authenticity
of their actions
What is a Digital Signatures
■ Considered to be unique to each user who is operating within the digital domain
■ Created by first hashing a particular message or communication that you want to
digitally sign, and then it encrypts that hash digest with the user’s private key
using asymmetric encryption
Non-repudiation is important for three main reasons what are they
■ To confirm the authenticity of digital transactions
■ To ensure the integrity of critical communications
■ To provide accountability in digital processes
What is Authentication
■ Security measure that ensures individuals or entities are who they claim to be
during a communication or transaction
5 commonly used authentication methods are what
■ Something you know (Knowledge Factor)
● Relies on information that a user can recall
■ Something you have (Possession Factor)
● Relies on the user presenting a physical item to authenticate themselves
■ Something you are (Inherence Factor)
● Relies on the user providing a unique physical or behavioral characteristic
of the person to validate that they are who they claim to be
■ Something you do (Action Factor)
● Relies on the user conducting a unique action to prove who they are
■ Somewhere you are (Location Factor)
● Relies on the user being in a certain geographic location before access is
granted
Multi-Factor Authentication System (MFA) is what
■ Security process that requires users to provide multiple methods of identification
to verify their identity
Authentication is critical to understand because of what
■ To prevent unauthorized access
■ To protect user data and privacy
■ To ensure that resources are accessed by valid users only
What is Authorization
■ Pertains to the permissions and privileges granted to users or entities after they
have been authenticated
Authorization mechanisms are important to help us with what
■ To protect sensitive data
■ To maintain the system integrity in our organizations
■ To create a more streamlined user experience
Accounting is what
■ Security measure that ensures all user activities during a communication or
transaction are properly tracked and recorded