CompTIA Chapter 1 Today's security professionals

4.0(1)
Studied by 6 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:38 PM on 9/10/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

40 Terms

1
New cards
CIA Triad
1. Confidentiality
2. Integrity
3. Availability
2
New cards
Confidentiality
Ensures unauthorized individuals can't gain access to sensitive information.
EX: Firewalls, Control list, encryption
3
New cards
Integrity
Ensures no unauthorized mods to information or systems, either intentionally or unintentionally.
4
New cards
Availability
Ensures that info + systems are ready to meet needs of legit users at the time they request them.
5
New cards
Security incidents
a breach of Confidentiality, integrity, and/or availability of information or information systems
6
New cards
3 key threats to CS efforts/DAD Triad
1.Disclose
2. Alteration
3. Denial
7
New cards
Disclose
exposure of sensitive information
Violates confidentiality.
8
New cards
Data exfiltration
removal of exposed info from organization
9
New cards

Alteration

Modification of disclosed information. "bit Flip". Natural activity(power surge) violates integrity

10
New cards

Denial

Disruption of access to information, Purposeful (denial of Service) accidental (natural disaster

11
New cards
Financial Risk
risk of monetary damage to the organization as the result of a data breach
Direct- Physical data care center destroyed.
Indirect- employee loses laptop. cost of laptop+ what the laptop contains
12
New cards
Reputational risk
The risk that occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.
13
New cards
Strategic Risk
The risk that an organization will become less effective in meeting its major goals and objectives as a result of a breach.
14
New cards
Operational Risk
The risk to an organization's ability to carry out its day-to-day functions.
15
New cards
Compliance Risk
Occurs when a security breach causes an organization to run afoul of legal or regulatory requirements.
16
New cards

Control Objectives

statements of a desired security state. They do not, by themselves, carry out security activities.

17
New cards
Security Controls
Specific measures that fulfill the security objectives of an organization
18
New cards
Technical controls
enforce confidentiality, integrity, and availability in the digital space.
19
New cards
Operational Controls
include the processes that we put in place to manage technology in a secure manner to include user access, log monitoring and vulnerability management.
20
New cards
Managerial Controls
Procedural mechanisms that focus on the mechanics of the risk management process.
21
New cards
Preventive Controls
Controls intended to stop a security issue before it occurs. Firewalls and encryption are examples of this type of Security Control.
22
New cards
Detective Controls
Controls to identify security events that have already occured. Intrusion detection systems are an example of this type of Security Control.
23
New cards
Corrective Controls
Controls to remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example of this type of Security Control.
24
New cards
Deterrent Controls
Controls that seek to prevent an attacker from attempting to violate security policies. Vicious guard dogs and barbed wire fences are examples of this type of Security Control.
25
New cards
Physical Controls
Controls that impact the physical world. Examples of this type of Security Control include fences, perimeter lighting, locks, fire suppression systems, and burglar alarms.
26
New cards
Compensating Controls
Controls that are designed to mitigate the risk associated with exceptions made to a security policy.
27
New cards
Data at Rest
The state of data that resides on hard drives, tapes, in the cloud, or on other storage media. This data is prone to pilfering by insiders or external attackers who gain access to systems and are able to browse through their contents.
28
New cards
Data in Motion
The state of data that is in transit over a network. When data travels on an untrusted network, it is open to eavesdropping attacks by anyone with access to those networks.
29
New cards
Data in Process
The state of data that is actively in use by a computer system. This includes the data stored in memory while the processing takes place. An attacker with control of the system may be able to read the contents of memory and steal sensitive information.
30
New cards
Host-based DLP
uses software agents installed on systems that search those systems for the presence of sensitive information; detecting that information allows the organization to take action to either remove or secure the data. Can also monitor system configuration and user actions, blocking undesirable actions.
31
New cards
Network-based DLP
dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information. They can then block those transmissions, preventing the unsecure loss of sensitive information.
32
New cards
Pattern matching
Watches for the telltale signs of sensitive information. For example, if they see a number that is formatted like a credit card or Social Security number, they can automatically trigger on that.
33
New cards
Watermarking
Where systems or administrators apply electronic tags to sensitive documents and the DLP system can monitor for unencrypted traffic containing those tags. aka DRM - Digital rights management
34
New cards
Data minimization
techniques seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis
35
New cards
De-identification
Removes the ability to link data back to an individual, reducing its sensitivity
36
New cards
Data Obfuscation
Transforming data into a format where the original information can't be retrieved
37
New cards
Hashing
uses a hash function to transform a value in our dataset to a corresponding hash value.
38
New cards
Tokenization
Replaces sensitive values with a unique identifier using a lookup table.
39
New cards
Masking
partially redacts sensitive information by replacing some or all sensitive fields with blank characters.
40
New cards
Rainbow Table Attack
The attacker computes the hashes of those candidate values and then checks to see if those hashes exist in our data file.

Explore top notes

note
Chemical bonds
Updated 974d ago
0.0(0)
note
History of England
Updated 1275d ago
0.0(0)
note
Indirect Values
Updated 1499d ago
0.0(0)
note
Chemistry of Life, Biology
Updated 1769d ago
0.0(0)
note
Photons
Updated 899d ago
0.0(0)
note
Biology - Evolution
Updated 1476d ago
0.0(0)
note
Chemical bonds
Updated 974d ago
0.0(0)
note
History of England
Updated 1275d ago
0.0(0)
note
Indirect Values
Updated 1499d ago
0.0(0)
note
Chemistry of Life, Biology
Updated 1769d ago
0.0(0)
note
Photons
Updated 899d ago
0.0(0)
note
Biology - Evolution
Updated 1476d ago
0.0(0)

Explore top flashcards

flashcards
faf
40
Updated 956d ago
0.0(0)
flashcards
faf
40
Updated 956d ago
0.0(0)