Comp TIA Security Plus 701 Flashcards
(39 cards)
Nation States / APT
Definition: Highly skilled hackers targeting systems for espionage, data theft, or sabotage.
Example: Cyber espionage against a defense contractor.
Script Kiddies
Definition: Unskilled hackers using ready-made tools for unauthorized access.
Example: Running a downloaded tool to deface a website.
Hacktivists
Definition: Hackers driven by ideological motives, such as political protests.
Example: DDoS attacks on government sites during a political protest.
Organized Crime
Definition: Hackers seeking financial gain through deliberate, skilled actions.
Example: Stealing credit card data for resale on the dark web.
AAA (Authentication, Authorization, and Accounting)
Definition: Framework for controlling access and tracking user activities.
Example: Logging into a system with credentials and recording login events.
ACL (Access Control List)
Definition: A set of rules controlling access to network resources.
Example: Allowing only certain IP addresses to access a server.
AES (Advanced Encryption Standard)
Definition: A widely used encryption method for secure data.
Example: Encrypting sensitive corporate files using AES-256.
APT (Advanced Persistent Threat)
Definition: A prolonged attack where intruders remain undetected for extended periods.
Example: A cyber espionage group infiltrating a government agency.
IPSec (Internet Protocol Security)
Definition: A suite of protocols to secure IP communications via encryption and authentication.
Example: Encrypting a VPN connection using IPSec.
TLS (Transport Layer Security)
Definition: A protocol ensuring secure communication over a network.
Example: HTTPS websites using TLS to encrypt traffic.
SSH (Secure Shell)
Definition: A protocol for secure remote access to devices.
Example: Admins using SSH to configure servers.
DNS (Domain Name System)
Definition: A system that translates human-readable domain names into IP addresses.
Example: www.google.com resolving to an IP address.
Social Media Attacks
Definition: Exploiting social media for phishing or malicious activities.
Example: Fake posts with malicious links targeting users.
Email Attacks
Definition: Using malicious emails to distribute malware or steal credentials.
Example: Phishing emails impersonating a bank to gather account details.
Cloud Vulnerabilities
Definition: Exploiting weaknesses in shared cloud infrastructure.
Example: Breaching a multi-tenant cloud provider to access sensitive data.
MFA (Multi-factor Authentication)
Definition: Security requiring two or more authentication factors.
Example: Logging into a system with both a password and a texted code.
IDS (Intrusion Detection System)
Definition: A system monitoring network traffic for signs of malicious activity.
Example: Detecting and alerting on unusual login attempts.
SIEM (Security Information and Event Management)
Definition: A system analyzing security data from across a network to detect threats.
Example: Aggregating firewall logs for suspicious activity detection.
RAID (Redundant Array of Independent Disks)
Definition: A technology for data redundancy and improved performance.
Example: Using RAID-5 to ensure data remains accessible even if one drive fails.
RBAC (Role-Based Access Control)
Definition: Permissions are granted based on user roles within an organization.
Example: Giving a database administrator access to manage databases but not HR systems.
MAC (Mandatory Access Control)
Definition: Access is enforced by the operating system based on predefined rules.
Example: A classified system where only users with a top-secret clearance can view documents.
DAC (Discretionary Access Control)
Definition: Resource owners set access permissions.
Example: A user sharing a private folder with colleagues.
OAuth (Open Authorization)
Definition: A protocol for granting third-party access to resources without sharing credentials.
Example: Signing into a web service using your Google or Facebook account.
LDAP (Lightweight Directory Access Protocol)
Definition: Protocol for accessing and managing directory information over a network.
Example: Authenticating users in an Active Directory environment.