CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
0%
Flag icon
CompTIA
Tashfin Wahid
Blue - Theories/concept/keywords/terms Pink - Protocols/Formulas/Laws/Dates Orange - Links
0%
Flag icon
http://blogs.getcertifiedgetahead.com/,
6%
Flag icon
Tashfin Wahid
Crypto
12%
Flag icon
Project Management Institute Agile Certified Practitioner (PMI-ACP) certification.
12%
Flag icon
Confidentiality prevents the unauthorized disclosure of data.
Tashfin Wahid
You control confidentially with encryption, access control, stenography and Obfuscation
12%
Flag icon
Encryption scrambles data to make it unreadable by unauthorized personnel.
Tashfin Wahid
Encryption supports confidentiality.
12%
Flag icon
Identification, authentication, and authorization combined provide access controls
12%
Flag icon
Identification. Users claim an identity with a unique username.
12%
Flag icon
Authentication. Users prove their identity with authentication, such as with a password.
12%
Flag icon
Authorization. Next, you can grant or restrict access to resources using an authorization method, such
12%
Flag icon
as permissions.
12%
Flag icon
steganography
12%
Flag icon
practice of hiding data within data.
12%
Flag icon
Obfuscation
12%
Flag icon
it’s called security by obscurity or security through obscurity.
12%
Flag icon
Confidentiality ensures that data is only viewable by authorized users.
12%
Flag icon
The best way to protect the confidentiality of data is by encrypting it.
12%
Flag icon
Integrity provides assurances that data has not changed.
12%
Flag icon
Tashfin Wahid
Hashing supports integrity.
12%
Flag icon
You can use hashing techniques to enforce integrity.
12%
Flag icon
Message authentication code (MAC) provides integrity similar to how a hash is used.
12%
Flag icon
Some email programs use a message authentication code (MAC) instead of a hash to verify integrity,
12%
Flag icon
http://gcgapremium.com/501labs/.
12%
Flag icon
Integrity provides assurances that data has not been modified, tampered with, or corrupted.
12%
Flag icon
You can also use digital signatures for integrity.
13%
Flag icon
Digital signatures can verify the integrity of emails and files and they also provide authentication and non-repudiation.
13%
Flag icon
single point of failure (SPOF).
13%
Flag icon
Virtualization can also increase availability of servers by reducing unplanned downtime.
13%
Flag icon
Load balancing. Load balancing uses multiple servers to support a single service, such
13%
Flag icon
The alternate site can be a hot site (ready and available 24/7),
13%
Flag icon
a cold site (a location where equipment, data, and personnel can be moved to when needed),
13%
Flag icon
warm site (a compromise between a hot site and cold site).
13%
Flag icon
Backups. If personnel back up important data, they can restore it if the original data is lost.
13%
Flag icon
Alternate power. Uninterruptible power supplies (UPSs) and power generators can provide power
13%
Flag icon
Cooling systems. Heating, ventilation, and air conditioning (HVAC) systems improve the availability of systems by reducing outages
13%
Flag icon
Availability ensures that systems are up and operational when needed and often addresses single points of failure.
13%
Flag icon
increase availability by adding fault tolerance and redundancies, such as RAID, failover clusters, backups, and generators.
13%
Flag icon
Another method of ensuring systems stay available is with patching.
13%
Flag icon
One of the basic goals of implementing IT security is to reduce risk.
13%
Flag icon
Risk is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.
13%
Flag icon
A threat is any circumstance or event that has the potential to compromise confidentiality, integrity, or availability. A vulnerability is a weakness.
13%
Flag icon
A security incident is an adverse event or series of events that can negatively affect the confidentiality, integrity, or availability
13%
Flag icon
Risk mitigation reduces the chances that     a threat will exploit a vulnerability.
13%
Flag icon
Risk is the likelihood that a threat will exploit a vulnerability.
13%
Flag icon
Technical controls use technology. •     Administrative controls use administrative or management methods. •     Physical controls refer to controls you can physically touch. •     Preventive controls attempt to prevent an incident from occurring. •     Detective controls attempt to detect incidents after they have occurred. •     Corrective controls attempt to reverse the impact of an incident. •     Deterrent controls attempt to discourage individuals from causing an incident. •     Compensating controls are alternative controls used
13%
Flag icon
Most security controls can be classified as technical (implemented with technology), administrative (implemented using administrative or management methods), or physical (items you can touch).
13%
Flag icon
Encryption. Encryption is a strong technical control used to protect the confidentiality of data.
13%
Flag icon
Risk assessments help quantify and qualify risks within an organization
13%
Flag icon
a quantitative risk assessment uses cost and asset values
13%
Flag icon
qualitative risk assessment uses judgments to categorize risks based on probability and impact.
« Prev 1