SecPlusP1 Flashcards
How many domains does the CompTIA Security+ (SY0-701) certification exam consist of?
Five
What should you be on the lookout for during the exam?
Distractors or red herrings
What is the approach to cybersecurity in the real world?
Situational
What is the definition of information security?
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
What is the definition of information systems security?
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
What are the three components of the CIA Triad?
Confidentiality, Integrity, Availability
What does confidentiality ensure?
Information is accessible only to authorized personnel (e.g., encryption)
What does integrity ensure?
Data remains accurate and unaltered (e.g., checksums)
What does availability ensure?
Information and resources are accessible when needed (e.g., redundancy measures)
What does non-repudiation guarantee?
An action or event cannot be denied by the involved parties (e.g., digital signatures)
What is an extension of the CIA triad with the addition of non-repudiation and authentication?
CIANA Pentagon
What are the Triple A’s of Security?
Authentication, Authorization, Accounting
What are the four categories of security controls?
Technical, Managerial, Operational, Physical
What are the different types of security controls? (DDDCCP)
Preventative, Deterrent, Detective, Corrective, Compensating, Directive
What principle does the Zero Trust Model operate on?
No one should be trusted by default
What are the two components of achieving zero trust?
Control Plane and Data Plane
What are the components of the Control Plane?
Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
What are the components of the Data Plane?
- Subject/system
- policy engine
- policy administrator
- establishing policy enforcement points (PEP)
What is a threat?
Anything that could cause harm, loss, damage, or compromise to our information technology systems
What are some sources of threats?
Natural disasters, cyber-attacks, data integrity breaches, disclosure of confidential information
What is a vulnerability?
Any weakness in the system design or implementation
What are some internal factors that can create vulnerabilities?
Software bugs, misconfigured software, improperly protected network devices, missing security patches, lack of physical security
Where does the risk to enterprise systems and networks lie?
Where threats and vulnerabilities intersect
What happens if there is a threat but no matching vulnerability?
There is no risk
What happens if there is a vulnerability but no threat against it?
There is no risk
What is the goal of risk management?
To minimize the likelihood of an outcome and achieve the desired outcome
What does confidentiality refer to?
Protection of information from unauthorized access and disclosure
Why is confidentiality important?
Protect personal privacy, maintain business advantage, achieve regulatory compliance
What is encryption?
Converting data into a code to prevent unauthorized access
What are access controls?
Setting up strong user permissions to restrict data access
What is data masking?
Obscuring specific data within a database
What is the purpose of physical security measures?
To ensure confidentiality for both physical and digital data
What is the importance of training and awareness in security?
To promote security awareness best practices among employees
What is the role of integrity in data security?
To ensure accuracy and trustworthiness of data
Why is integrity important?
Data accuracy, trust, system operability
What is hashing?
Converting data into a fixed-size value
How many reasons are there for the importance of integrity?
Three
What is the purpose of digital signatures?
Ensure both integrity and authenticity
What is the purpose of checksums?
Method to verify the integrity of data during transmission
What is the purpose of access controls?
Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations
What is the purpose of regular audits?
Review logs and operations to ensure authorized changes and address discrepancies
What is the purpose of availability in security?
Ensure information, systems, and resources are accessible and operational when needed by authorized users
What is the value of availability in cybersecurity?
Ensuring Business Continuity, Maintaining Customer Trust, Upholding an Organization’s Reputation
What is the best strategy to overcome challenges associated with maintaining availability?
Using redundancy in systems and network designs
What is server redundancy?
Using multiple servers in a load balanced or failover configuration.
What is data redundancy?
Storing data in multiple places.
What is network redundancy?
Ensuring data can travel through another route if one network path fails.
What is power redundancy?
Using backup power sources like generators and UPS systems.
What is non-repudiation?
Providing undeniable proof in digital transactions.
What is a digital signature?
Unique to each user operating within the digital domain
How is a digital signature created?
By hashing the message and encrypting the hash digest with the user’s private key
What are the three main reasons non-repudiation is important?
Confirm authenticity, ensure integrity, provide accountability
What is authentication?
Ensuring individuals are who they claim to be
What are the five commonly used authentication methods?
Knowledge, possession, inherence, action, location
What is multi-factor authentication (MFA)?
Security process that requires multiple methods of identification
What is the importance of authentication?
- To prevent unauthorized access
- To protect user data and privacy
- To ensure that resources are accessed by valid users only
What is the purpose of authorization?
Pertains to the permissions and privileges granted to users or entities after they have been authenticated
Why are authorization mechanisms important?
- To protect sensitive data
- To maintain system integrity
- To create a more streamlined user experience
What is the purpose of accounting?
Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded
Why should your organization use a robust accounting system?
To create an audit trail and maintain regulatory compliance
What is the purpose of conducting forensic analysis?
Understand what happened, how it happened, and how to prevent similar incidents
How can organizations optimize system performance and minimize costs?
Track resource utilization and allocation decisions
Why is user accountability important?
Deter potential misuse and promote adherence to policies
What are some technologies used for accounting?
Syslog Servers, Network Analysis Tools, Security Information and Event Management (SIEM) Systems
What are the 4 broad categories of security controls?
Technical Controls, Managerial Controls, Operational Controls, Physical Controls
What are technical controls?
Technologies, hardware, and software mechanisms to manage and reduce risks
What are managerial controls?
Strategic planning and governance side of security
What are operational controls?
Procedures and measures to protect data on a day-to-day basis
What are physical controls?
Tangible, real-world measures to protect assets
What are the 6 basic types of security controls?
Preventive, Deterrent, Detective
What are preventive controls?
Proactive measures to thwart threats
What are deterrent controls?
Measures to discourage attackers
What are detective controls?
Monitoring and alerting to malicious activities
What are corrective controls?
Mitigate potential damage and restore systems
What are compensating controls?
Alternative measures when primary controls are not feasible or effective
What are directive controls?
Guide, inform or mandate actions
What is gap analysis?
Evaluating differences between current and desired performance
What is a gap analysis?
Tool for organizations to improve operations
What are the steps involved in conducting a gap analysis?
Define scope, Gather data, Analyze data, Develop a plan
What is the purpose of gathering data in a gap analysis?
To understand the current state of the organization
Why is analyzing data important in a gap analysis?
To identify areas of improvement
What is the final step in conducting a gap analysis?
Developing a plan to bridge the gap
What are the 2 basic types of gap analysis?
Technical and Business
What is technical gap analysis?
Evaluation of current technical infrastructure
What is business gap analysis?
Evaluation of current business processes
What does a Plan of Action and Milestones (POA&M) outline?
Specific measures to address vulnerabilities and timelines for remediation tasks
What is Zero Trust?
Demanding verification for every device, user, and transaction within the network
What is the control plane?
The framework and components responsible for defining, managing, and enforcing access policies
What is adaptive identity?
Real-time validation considering user’s behavior, device, location, etc.
What is threat scope reduction?
Limits users’ access
What is policy-driven access control?
Enforcing user access policies
What are secured zones?
Isolated environments for sensitive data
What is the data plane?
Ensures proper execution of policies
The data plane forwards network traffic, applying security measures like firewalls and encryption.
Who/what is a subject/system?
Individual/entity attempting access
What is the role of the Policy Engine?
Cross-references the access request with its predefined policies
What is the role of the Policy Administrator?
Establish and manage the access policies
What happens at the Policy Enforcement Point?
Execution of the decision to grant or deny access
What are the common motivations for threat actors?
Data exfiltration, blackmail, espionage, service disruption, financial gain
What are the differences between internal and external threat actors?
Resources, funding, level of sophistication
What are the types of threat actors?
Unskilled attackers
What are hacktivists driven by?
political, social, or environmental ideologies
What is the motivation behind organized crime cyberattacks?
financial gain
Who sponsors highly skilled attackers for cyber espionage or warfare?
governments
What are insider threats?
security threats originating from within the organization
What is shadow IT?
IT systems, devices, software, or services managed without explicit organizational approval
What are some threat vectors and attack surfaces?
message-based, image-based, file-based, voice calls, removable devices, unsecured networks
What are honeypots?
decoy systems to attract and deceive attackers
What are honeynets?
network of decoy systems for observing complex attacks
What are honeyfiles?
decoy files to detect unauthorized access or data breaches
What are honeytokens?
Fake data used to alert administrators when accessed or used
What is the difference between threat actors’ intent and motivation?
Intent is the specific objective or goal, motivation is the underlying reason or driving force
What are some motivations behind threat actors?
Data exfiltration, financial gain, blackmail, service disruption
What is data exfiltration?
Unauthorized transfer of data from a computer
How do threat actors achieve financial gain?
Through ransomware attacks and banking trojans
What is blackmail in the context of threat actors?
Obtaining sensitive information and threatening to release it unless demands are met
Why do some threat actors aim to disrupt services?
To cause chaos, make a political statement, or demand a ransom
What is hacktivism?
Attacks conducted due to philosophical or political beliefs
What motivates ethical hackers?
Desire to improve security
What can be a motivation for a threat actor?
Revenge
What is the motivation behind creating and spreading malware or launching cyberattacks in a populated city?
Disruption or Chaos
What is the purpose of espionage in the context of cybersecurity?
Gathering sensitive or classified information
How can cyber warfare be used?
To disrupt infrastructure, compromise national security, and cause economic damage
What are the two most basic attributes of a threat actor?
Internal and external
Who are internal threat actors?
Individuals or entities within an organization
What are external threat actors?
Individuals or groups outside an organization who attempt to breach its cybersecurity defenses
What factors determine the level of sophistication of a threat actor?
Resources, funding, tools, skills, and personnel
What is a script kiddie?
An individual with limited technical knowledge who uses pre-made software or scripts to exploit computer systems and networks
What are examples of highly skilled threat actors?
Nation-state actors and Advanced Persistent Threats
How do unskilled attackers cause damage?
Launch a DDoS attack
What is website defacement?
Form of electronic graffiti and is usually treated as an act of vandalism
What are distributed denial of service (DDoS) attacks?
Attempting to overwhelm the victim’s systems or networks so that they cannot be accessed by legitimate users
What is doxing?
Involves the public release of private information about an individual or organization
What is the motivation behind hacktivists?
Ideological beliefs rather than financial gain
What is the name of the most well-known hacktivist group?
Anonymous
What is the objective of Anonymous?
Target organizations they perceive as unethical
What are organized cybercrime groups?
Collective criminal activities in the digital world
What are some advanced hacking techniques and tools used by organized crime groups?
Custom Malware, Ransomware, Sophisticated Phishing Campaigns
What are some illicit activities engaged in by organized crime groups to generate revenue?
Data Breaches, Identity Theft, Online Fraud, Ransomware Attacks
Are organized cybercrime groups driven by ideological or political objectives?
No
Who may hire organized cybercrime groups to conduct cyber operations and attacks on their behalf?
Other entities, including governments
What is the objective of attacks by nation-state actors?
Money
What is a nation-state actor?
Groups or individuals sponsored by a government to conduct cyber operations against others
What is a false flag attack?
An attack that appears to originate from a different source or group
What are some techniques used by nation-state actors in cyber operations?
Creating custom malware, using zero-day exploits, becoming an advanced persistent threat
What is an advanced persistent threat (APT)?
A prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period
What is the significance of advanced persistent threats?
They are often sponsored by a nation-state or its proxies
What motivates a nation-state actor?
Long-term strategic goals
What forms can insider threats take?
Data theft, sabotage, misuse of access privileges
What are some motivations for insider threats?
Financial gain, revenge, carelessness/lack of awareness
What does insider threat refer to?
Potential risk posed by individuals within an organization with access to sensitive information
What should organizations do to mitigate the risk of insider threats?
Implement zero-trust architecture
Why does shadow IT exist?
Security posture too high or complex for business operations
What is BYOD?
Use of personal devices for work purposes
What is a threat vector?
Means or pathway for unauthorized access
What is an attack surface?
Various points for unauthorized entry or data extraction
How can the attack surface be minimized?
Restricting access
What are some message-based threat vectors?
Email, SMS text messaging, instant messaging
What are some image-based threat vectors?
Embedding malicious code inside an image file
How can files be used as threat vectors?
Disguised as legitimate documents or software
What is vhishing?
Use of voice calls to trick victims into revealing sensitive information
What is baiting?
Leaving a malware-infected USB drive in a location where the target might find it
What are unsecure networks?
Wireless, wired, and Bluetooth networks lacking appropriate security measures
Why are wireless networks vulnerable?
Unauthorized individuals can intercept wireless communications or gain access to the network
Are wired networks completely secure?
No, they are still susceptible to threats
What are two types of attacks that can occur due to physical access to the network infrastructure?
MAC Address Cloning, VLAN Hopping
What are two Bluetooth exploits that attackers can use to carry out attacks?
BlueBorne, BlueSmack
What is BlueBorne?
Set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices, spread malware, or intercept communications
What is BlueSmack?
Bluetooth DoS attack
How can you learn from threat actors?
Set up deception and disruption technologies
What are Tactics, Techniques, and Procedures (TTPs)?
Methods associated with threat actors
What are deceptive and disruption technologies?
Tech to mislead attackers and detect threats
What is a honeypot?
Decoy system to attract hackers
What is a honeynet?
Network of honeypots
What types of devices can be part of a honeynet?
Servers, routers, switches
What is a honeyfile?
Decoy file to lure attackers
What is a honeytoken?
Piece of data or resource monitored for access
What are bogus DNS entries?
Fake DNS entries in system’s DNS server
What is the purpose of creating decoy directories?
Fake folders and files placed in storage
How does dynamic page generation help secure websites?
Effective against scraping tools or bots
What is port triggering used for?
Hiding services until specific outbound pattern
How can spoofing fake telemetry data be used as a security measure?
Sending out fake data when network scan detected
What are the objectives of physical security?
Measures to protect tangible assets from harm or unauthorized access
What are some examples of physical security controls?
Fencing and Bollards
What are bollards?
Short, sturdy vertical posts controlling or preventing vehicle access
What are fences?
Barriers made of posts and wire or boards to enclose or separate areas
What are some examples of brute force attacks on physical security?
Forcible entry, tampering with security devices, confronting security personnel, ramming a barrier with a vehicle
What are surveillance systems used for?
Observing and reporting activities