Dion Training CompTIA Security+ Introduction Flashcards
CompTIA Security+ (SY0-701) certification exam consists of five domains or areas of
knowledge
■ 12% of General Security Concepts
■ 22% of Threats, Vulnerabilities, and Mitigations
■ 18% of Security Architecture
■ 28% of Security Operations
■ 20% of Security Program Management and Oversight
What is Information Security
Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction
What is Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data
What is the CIA Triad
■ Confidentiality
● Ensures information is accessible only to authorized personnel (e.g.,
encryption)
■ Integrity
● Ensures data remains accurate and unaltered (e.g., checksums)
■ Availability
● Ensures information and resources are accessible when needed (e.g.,
redundancy measures)
What is Non-Repudiation
Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)
What is the CIANA Pentagon
An extension of the CIA triad with the addition of non-repudiation and
authentication
What is the Triple A’s of Security
■ Authentication
● Verifying the identity of a user or system (e.g., password checks)
■ Authorization
● Determining actions or resources an authenticated user can access (e.g.,
permissions)
■ Accounting
● Tracking user activities and resource usage for audit or billing purposes
What are the Security Control Categories
■ Technical
■ Managerial
■ Operational
■ Physical
What are the Security Control Types
■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive
What is the Zero Trust Model
■ Operates on the principle that no one should be trusted by default
■ To achieve zero trust, we use the control plane and the data plane
● Control Plane
○ Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones
● Data Plane
○ Subject/system, policy engine, policy administrator, and
establishing policy enforcement points
What is a Threat
■ Anything that could cause harm, loss, damage, or compromise to our information
technology systems
■ Can come from the following
● Natural disasters
● Cyber-attacks
● Data integrity breaches
● Disclosure of confidential information
What is a Vulnerability
■ Any weakness in the system design or implementation
■ Come from internal factors like the following
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security
Where threats and vulnerabilities intersect, that is where the risk to your enterprise
systems and networks lies
■ If you have a threat, but there is no matching vulnerability to it, then you have no
risk
■ The same holds true that if you have a vulnerability but there’s no threat against
it, there would be no risk
What is Risk Management
■ Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome
What is Confidentiality
■ Refers to the protection of information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes