click below
click below
Normal Size Small Size show me how
Security+ Domain 1
Terminology needed for the CompTia Security+ Exam - Domain 1
| Term | Definition |
|---|---|
| CIA Triad | Confidentiality, Integrity, Availability |
| Confidentality | Ensures information is not disclosed to unauthorized users |
| Integrity | Ensures data is accurate and unaltered |
| Availability | Ensures systems/data are accessible when needed |
| Non-repudation | Prevents someone from denying an action |
| Authentication | Verifying who a user is |
| Authorization | Determining what a user can do |
| Accounting | Tracking user actions |
| Administrative Controls | Policies, procedures, training |
| Technical (Logical) Controls | Implemented using technology |
| Physical Controls | Protect physical assets |
| Threat | Any potential cause of harm |
| Vulnerability | A weakness that can be exploited |
| Risk | Likelihood that a threat will exploit a vulnerability |
| Risk Formula | Risk =Threat * Vulnterability * Impact |
| Script Kiddie | Low skill, uses existing tools |
| Hactivist | Politically or socially motivated |
| Organized Crime | Financially motivated, sophisticated |
| Insider Threat | Employee or trusted individual |
| Nation-State | Highly, skilled, well-funded attackers |
| Social Engineering | Manipulating people rather than systems |
| Defense in Depth | Multiple layers of secuirty controls |
| Zero Trusst | Never trust, always verify |
| Least Privilege | Users get minimum access necessary |
| Separation of Duties | Split responsibilities to prevent fraud |
| Fail=Secure | Blocks access on failure |
| Fail-Open | Allows access on failure |
| Policy | High-level management statement |
| Standard | Mandatory rules supporting policies |
| Procedure | Step-by-step instructions |
| Guideline | Recommended best practices (not mandatory) |
| Due Care | Taking reasonable precautions |
| Due Diligence | Ongoing effort to maintain security |
| Compliance | Meeting legal/regulatory requirements |