CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
12%
Flag icon
Confidentiality, integrity, and availability together form the CIA security triad, a model used
12%
Flag icon
to guide security principles within an organization.
12%
Flag icon
A use
12%
Flag icon
case describes a goal that an organization wants to achieve.
12%
Flag icon
The agile model
12%
Flag icon
uses a set of principles that can be shared by cross- functional teams—employees
12%
Flag icon
employees in different de...
This highlight has been truncated due to consecutive passage length restrictions.
12%
Flag icon
precondition must occur before the process can
12%
Flag icon
start.
12%
Flag icon
trigger starts the use case.
12%
Flag icon
Postconditions occur after the actor triggers the process. In this
12%
Flag icon
use case will typically list each of the steps in a
12%
Flag icon
specific order.
12%
Flag icon
If you want to be
12%
Flag icon
an expert in agile, you can pursue the Project Management Institute
12%
Flag icon
Agile Certified Pra...
This highlight has been truncated due to consecutive passage length restrictions.
12%
Flag icon
Confidentiality prevents the unauthorized disclosure of
12%
Flag icon
data.
12%
Flag icon
Encryption scrambles data to make it unreadable by unauthorized personnel.
12%
Flag icon
Advanced Encryption Standard (AES).
12%
Flag icon
Personally Identifiable Information (PII),
12%
Flag icon
Identification, authentication, and authorization combined provide access controls and help ensure that only authorized personnel can access data.
12%
Flag icon
Users claim an identity with a unique username.
12%
Flag icon
Users prove their identity with authentication, such as with a password. For example, Maggie knows her password, but no one else should know it. When she logs on to her account with her
12%
Flag icon
Next, you can grant or restrict access to resources using an authorization method, such as permissions.
12%
Flag icon
It obscures the data and can be used in a use case to support obfuscation. Obfuscation methods attempt to make something unclear or difficult to understand.
12%
Flag icon
Within the context of information technology (IT) security, it’s called security by obscurity or security through obscurity.
12%
Flag icon
steganography as hiding data in plain sight.
12%
Flag icon
you can embed a hidden message in an image by modifying certain bits within the file.
12%
Flag icon
Access controls help protect confidentiality by restricting access. Steganography helps provide confidentiality by hiding data, such as hiding text files within an image file.
12%
Flag icon
Integrity provides assurances that data has not changed.
12%
Flag icon
This can be from unauthorized users, from malicious software (malware), and through system and human errors. When this occurs, the data has lost integrity.
12%
Flag icon
Message Digest 5 (MD5), Secure Hash Algorithm (SHA), and Hash- based Message Authentication Code (HMAC).
12%
Flag icon
a hash is simply a number created by executing a hashing algorithm against data, such as a file or message.
12%
Flag icon
Hashing doesn’t tell you what modified the message. It only tells you that the message has been modified.
12%
Flag icon
You can use hashes with messages, such as email, and any other type of data files.
12%
Flag icon
for this book at http://gcgapremium.com/501labs/.
12%
Flag icon
Integrity provides assurances that data has not been modified, tampered with, or corrupted.
12%
Flag icon
Hashing verifies integrity. A hash is simply a numeric value created by executing a hashing algorithm against a message or file.
12%
Flag icon
a digital signature is similar in concept to a handwritten signature.
12%
Flag icon
Authentication from the digital signature prevents attackers from impersonating others and sending malicious emails.
12%
Flag icon
Digital signatures also provide non-repudiation. In other words, Lisa cannot later deny sending the email because the digital signature proves she did.
12%
Flag icon
If you buy something with a credit card and sign the receipt, you can’t later deny making the purchase. If you do, the store will use your signature to repudiate your claim.
13%
Flag icon
Another example is with audit logs that record details such as who, what, when, and where.
13%
Flag icon
Digital signatures require the use of certificates and a Public Key Infrastructure (PKI).
13%
Flag icon
Certificates include keys used for encryption and the PKI provides the means to create, manage, and distribute certificates.
13%
Flag icon
Redundancy adds duplication to critical systems and provides fault tolerance.
13%
Flag icon
If a critical component has a fault, the duplication provided by the redundancy allows the service to continue without interruption. In other words, a system with fault tolerance can suffer a fault, but it can tolerate it and continue to operate.
13%
Flag icon
single point of failure (SPOF).
13%
Flag icon
If an SPOF fails, the entire system can fail. For example, if a server has a single drive, the drive is an SPOF because its failure takes down the server.
« Prev 1 3 4