Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
Security+
> Malicious Updates > Flashcards
Malicious Updates Flashcards
(0 cards)
Study These Flashcards
Security+
flashcards
Decks in class (67)
# Cards
Security Controls 1.1
11
The CIA Triad 1.2
4
Non-Repudiation 1.2
8
Authentication, Authorization, and Accounting 1.2
6
Gap Analysis 1.2
1
Zero Trust 1.2
19
Deception and Disruption 1.2
4
Change Management 1.3
4
Technical Change Management 1.3
10
Public Key Infrastructure (PKI) 1.4
6
Encrypting Data 1.4
7
Key Exchange 1.4
2
Encryption Technologies 1.4
4
Obfuscation
3
Hashing and Digital Signatures 1.4
3
Blockchain Technology 1.4
1
Certificates 1.4
8
Threat Actors 2.1
11
Threat Vectors 2.2
13
Phishing 2.2
5
Impersonation 2.2
3
Watering Hole Attack 2.2
1
Other Social Engineering Attacks 2.2
2
Memory Injections 2.3
3
Buffer Overflows 2.3
1
Race Conditions
1
Malicious Updates
0
Operating System Vulnerabilities 2.3
2
SQL Injection 2.3
2
Cross-Site Scripting 2.3
4
Hardware Vulnerabilities 2.3
7
Virtualization Vulnerabilities 2.3
2
Cloud Specific Vulnerabilities 2.3
4
Supply Chain Vulnerabilities 2.3
2
Misconfiguration Vulnerabilities 2.3
7
Mobile Device Vulnerabilities 2.3
2
Zero Day Vulnerabilities 2.3
1
An Overview of Malware 2.4
3
Viruses & Worms 2.4
7
Spyware & Bloatware 2.4
2
Other Malware Types 2.4
4
Physical Attacks 2.4
3
Denial of Service 2.4
7
DNS Attacks 2.4
4
Wireless Attacks 2.4
5
On Path Attacks 2.4
7
Application Attacks 2.4
1
Cryptographic Attacks 2.4
4
Password Attacks 2.4
2
Indicators of Compromise 2.4
10
Segmentation and Access Control
4
Mitigation Techniques 2.5
7
Hardening Techniques 2.5
9
Cloud Infrastructures 3.1
6
Network Infrastructure Concepts 3.1
6
Other Infrastructure Concepts 3.1
8
Infrastructure Considerations 3.1
9
Secure Infrastructures 3.2
4
Intrusion Prevention 3.2
4
Network Appliances
10
Port Security 3.2
2
Firewall Types 3.2
6
Secure Communication 3.2
5
Data Types and Classifications 3.3
15
States of Data 3.3
11
Protecting Data (Methods) 3.3
10
Resiliency 3.4
7