CompTIA Security+ 701 Study Guide
honeyfiles
decoy files to detect unauthorized access or data breaches
honeypot
decoy systems to attract and deceive attackers
data custodian
managing the systems on which data assets are stored, including enforcing access controls, encryption, and backup measures
Cipher locks
mechanical locks with numbers push buttons, requires a correct combination to open
Syslog servers
used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organizations systems
Technical Controls
"technology", hardware, and software mechanisms that are implemented to manage and reduce risks
Managerial Controls
("Managing" things) also referred to administrative controls, involve the strategic planning and governance side of security
Detective Controls
(detect) Monitor and alert organizations to malicious activities as they occur
6 Step Incident Response
1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
grep
A command-line utility for searching plain-text data sets for lines that match a regular expression or pattern
Layer 2 Tunneling Protocol (L2TP)
A connection between two or more computers or device that are not on the same private network. Usually paired with IPSec to provide security. Uses port 1701.
Due Process
A legal term that refers to how an organization must respect and safeguard personnels rights. Protects citizens from their government and companies from lawsuits.
Static Code Analysis
A method of debugging and application by reviewing and examining its source code before running the program
tracert/traceroute
A network diagnostic command for displaying possible routes and measuring transit delays of packets across an Internet Protocol network
Memorandum of Understanding (MOU)
A non-binding agreement between two or more organizations to detail an intended common line of action. Often referred to as a letter of intent.
Data Steward
A role focused on the quality of the data and associated metadata
Cybersecurity Framework (CSF)
A set of industry standards and best practices created by NIST to help organizations manage cybersecurity risks
SIEM (Security Information and Event Management)
A solution for real-time-or near time analysis of security alerts generated by network hardware and applications
Certificate Signing Request (CSR)
A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate.
Non-Disclosure Agreement (NDA)
Agreement between two parties that defines what data is considered confidential and cannot be shared outside of the relationship
Wild Card Certificate
Allows multiple sub domains to use the same certificate
Compensating Controls
Alternative measures that are implemented when primary security controls are not feasible or effective
Interconnection Security Agreement (ISA)
An agreement for the owners and operators of the IT systems to document what technical requirements each organization must meet
ISO 31000
An international standard for enterprise risk management that provides a universally recognized paradigm for practitioners and companies employing risk management processes to replace the myriad of existing standards, methodologies, and paradigms that differed between industries, subject matters, and regions
ISO 27002
An international standard that provides best practice recommendations on information security controls for use by those responsible for initiating, implementing, or maintaining information security management systems (ISMS)
hping
An open-source packet generator and analyzer for the TCP/IP protocol that is used for security auditing and testing of firewalls and networks
Dynamic Code Anaylsis
Analyzes applications while they run
(EAP) Extensible Authentication Protocol
Authentication framework supporting multiple methods, Provides common functions and negotiation of authentication Protocols
AAA Of Security
Authentication, Authorization, and Accounting
Vulnerability in Bluetooth protocol
Blueborne -- vulnerabilities in bluetooth technology that can allow can attacher to take over devices BlueSmack -- type of DoS attack that targets bluetooth enabled devices
Block Cipher
Breaks input data into fixed-size blocks before encryption
worms
Can replicate without any user interaction
Control Node
Computer responsible for managing and coordinating the activities of other nodes or devices within a network
Business Partnership Agreement (BPA)
Conducted between two business partners that establishes the conditions of their relationship. Can also include security requirements.
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Cryptographic protocols that provide secure internet communications for web browsing, instant messaging, email, VoIP, and many other services.
Symmetric Algorithm
DES (Data Encryption Standard), TRIPLE DES, IDEA, AES, Blowfish, Twofish, RC4, RC5, RC6
Privacy Officer
Deals with privacy data, HIPPA, (PII) Personally identifiable information, (SPI) Sensitive personal information, (PHI) Protected health information, ensuring compliance with legal and regulatory frameworks
Zero Trust
Demands verification for every device, user, and transaction with the network
Rootkit
Designed to gain administrative level control over a given computer system without being detected
Asymmetric Algorithms
Diffie-Hellman- vulnerable to man in the middle attacks RSA(Ron Rivest, Adi Shamir, Leonard Adleman) Elliptic Curve Cryptography (ECC) - More efficient than RSA, commonly used on low power computing
Deterrent Controls
Discourage potential attackers by making the effort seem less appealing or more challenging
Vestibules
Double-door System electronically controlled to allow only one door open at a time, prevents piggybacking
(PEAP) Protected Extensible Authentication Protocol
Encapsulates EAP within an encrypted TLS Tunnel
Digital Signatures
Ensure Both Integrity of data during transaction
Data plane
Ensures policies are properly executed
Network Redundancy
Ensures that if one network path fails, the data can travel through another route
Data Controller
Entity responsible for determining data storage, collection, and usage purposes and methods
EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security)
Extends TLS support across platforms and requires server side certificates for security
Directive Controls
Guide, inform, or mandate actions. Often rooted in Policy.
Which of these protocols use TLS to provide secure communication?
HTTPS, FTPS
Which of these protocols use TLS to provide secure communication?
HTTPS, TFPS
Watering hole
Hackers take over a specific website that is normally frequented by a person or company
Fuzzing
Inputs random data to provoke crashes or exceptions, helps uncover security flaws and weaknesses
Unsecure networks Vulnerabilities
MAC Address cloning, VLAN Hopping
An IPS at your company has found a sharp increase in traffic from all-in-one printers. After researching, your security team has found a vulnerability associated with these devices that allows the device to be remotely controlled by a third-party. Which category would BEST describe these devices?
MFD (Multifunction Device)
Logic Bomb
Malicious code that will only execute if certain conditions have been met
(MDM) Mobile device management
Manages Phones, remote wipe, geolocation, installs certain apps Ex) jampf
Threat Vector
Means or pathway by which an attacker can gain unauthorized access to a computer or network
Ultrasonic sensors
Measures the reflection of ultrasonic waves off moving objects
Checksums
Method to verify the integrity of data during transmission
Internet Key Exchange (IKE)
Method used by IPSec to create a secure tunnel by encrypting the connection between authenticated peers
Corrective Controls
Mitigate any potential damage and restore our systems to their normal state
(APT) Advanced Persistent Threat
Nation-state actor because of their long term persistence and stealth
You've hired a third-party to gather information about your company's servers and data. The third-party will not have direct access to your internal network but can gather information from any other source. Which of the following would BEST describe this approach?
Passive footprinting
Preventive
Proactive measures implemented to thwart potentical security threats or breaches
Operational Controls
Procedures and measures that are designed to protect data on a day to day basis. Are mainly governed by internal processes and human actions
gap analysis
Process of evaluating the differences between an organizations current performance and its desired performance
Fault-tolerant RAID
Protects against the loss of the array's data if a single component fails (RAID 1, RAID 5, RAID 6)
Fault-resistant RAID
Protects against the loss of the array's data if a single disk fails (RAID 1 or RAID 5)
Disaster-tolerant RAID
Provides two independent zones with full access to the data (RAID 10)
RAT
Remote Access Trojan or Remote Access Tool
Smishing
SMS phishing
Recovery Time Objective (RTO)
The length of time it takes after an event to resume normal business operations and activities.
Journaling
The term 'Journaling' is defined as the ability to record all communications for use in the company retention or archiving policy.
Towers of Hanoi
Three sets of backup tapes (like the grandfather-father-son) that are rotated in a more complex system
(NAC) Network Access Controller
Used to protect networks from both known and unknown devices by scanning devices to assess their security status before granting access
(EAP-FAST)Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling
Uses a protected access credential and TLS tunnel
netstat
Utility that displays network connections for Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics
Vishing
Voice Phishing
Nonces
adds unique, often random numbers to password-based authentication processes
Code Signing
confirms the software's author identity and integrity, utilizes digital signatures to verify code authenticity
Microwave Sensors
detect movement in an area by emitting microwave pulses and measuring their reflection off moving objects
data steward
focuses on data quality and metadata, making sure its labeled correctly, usually working under the data owner
TLS (Transport Layer Security)
highly effective for ensuring data privacy, it can also have an unintended consequence for cybersecurity. By encrypting internet traffic, TLS not only renders data unreadable; it also does the same for malware and other threats
data redundancy
involves storing data in multiple places
Power Redundancy
involves using backup power sources, like generators and ups systems
honeynets
network of decoy systems for observing complex attacks
RADIUS (Remote Authentication Dial-In User Service)
offers authentication, authorization, and accounting services, widely used for secure access to network resources
Trojan
piece of malicious software that is disguised as a piece of harmless or desirable software
shim
piece of sofware that is placed between two components and that intercepts the calls between those components and be used to redirect them
Non-repudiation
provides undeniable proof in the world of digital transactions. Cant deny participation or authenticity of their actions
(TACACS+) Terminal Access Controller Access-Control System Plus
separates authentication, authorization, and accounting functions. More granular control, encrypts the authentication process using TCP for enhanced security
Bollards
short vertical posts, typically made of steel. In front of government buildings alot
Service Level Agreement (SLA)
An agreement concerned with the ability to support and respond to problems within a given timeframe and continuing to provide the agreed upon level of service to the user
Piggy backing
Involves two people working together with one person who has legitimate access intentionally allows another person who doesnt have proper authorization to enter a secure area with them
Server Redundancy
Involves using multiple servers in a load balanced or failover configuration so that if one is overloaded or fails, the other servers can take over the load to continue supporting your end users
Typosquating
URL Hijacking,, hoping somebody puts in the wrong url and goes to your cloned website
Viruses
attach to clean files, (spread), and corrupt host files.
Hash based message Authentication Protocol(HMAC)
checks message integrity and authenticity