This class was created by Brainscape user Mark Garcia. Visit their profile to learn more about the creator.

Decks in this class (70)

Threats and Vunerabilities
What do you call something that c...,
Natural disasters cyber attacks d...,
What is any weakness in the syste...
7  cards
Confidentiality
What is referred to the protectio...,
In essence confidentiality is kee...,
What are 3 main reasons for confi...
9  cards
Integrity
What does integrity of systems en...,
What 3 main reasons make integrit...,
To help us maintain integrity of ...
8  cards
Availability
What ensures information systems ...,
What is availability referred to ...,
What is a duplication of critical...
8  cards
Non-Repudiation
What focuses on providing undenia...,
How is a digital signature created,
What 3 main reasons make non repu...
3  cards
Authentication
What security measure ensures ind...,
What are the 5 authentication met...,
What relies on information that a...
9  cards
Authorization
What do you call permissions and ...,
What 3 things does authorization ...,
How should you view authorization...
3  cards
Accounting
What are security measures that e...,
What 3 things does accounting ach...,
What 5 things does accounting ens...
12  cards
Security Control Categories
What are the 4 types of security ...,
What security control category is...,
What involves the strategic plann...
5  cards
Security Control Types
What are the 6 basic types of sec...,
What security control types consi...,
What
7  cards
Gap Analysis
What is the process of evaluating...,
What are the two basic types of g...,
What type of gap analysis evaluat...
5  cards
Zero Trust
What demands verification for eve...,
What two planes are required to c...,
What is the overarching framework...
12  cards
Threat Actor Motivations
What do you call an unauthorized ...,
What is the most common threat ac...,
What threat actor motivation
10  cards
Threat Actors Attributes
What are two basic attributes of ...,
Individuals or entities within an...,
People outside the organization w...
5  cards
Unskilled Attackers
What is an individual who lacks t...,
What is an unskilled attackers ma...
2  cards
Hackivists
What do you call individuals or g...,
Hacktivists use a wide range of t...,
What are some organizations that ...
3  cards
Organized Crime
What is the sophisticated well st...,
What do organized crime organizat...,
For financial gains they typicall...
4  cards
Nation-State Actor
These are groups or individuals s...,
What is an attach orchestrated in...,
What do you call a threat that is...
4  cards
Insider Threats
What do you call a cyber security...,
Insider threats have varying leve...,
What drives an insider threat to ...
3  cards
Shadow IT
What is two other names for shado...,
What is the use of information sy...,
Shadow it are projects that are m...
4  cards
Threat Vectors and Attack Surfaces
This encompasses all the various ...,
The mean or pathway which an atta...,
There are three ways to mimized e...
12  cards
Outsmarting Threat Actors
These are specific methods and pa...,
How do we learn a threat actors t...,
What are the most commonly used d...
13  cards
Fencing and Bollards
What are two physical security me...,
Well adaptable and well suited fo...,
What are physical security measur...
3  cards
Attacking with Brute Force
Attack where access is gained usi...
1  cards
Surveillance Systems
What do you call the system that ...,
There are 5 things that may trigg...,
What is the term that describes a...
9  cards
Bypassing Surveillance Systems
A way intruders bypass surveillan...,
An intruder overwhelms the sensor...,
An intruder plays loud music to d...
6  cards
Access Control Vestibules
A double door system designed wit...,
A person with legitimate access i...,
A person who closely follows some...
5  cards
Door Locks
Physical security controls design...,
Rate that a system authenticates ...,
Denies user who is authorized access
4  cards
Access Badge Cloning
Refers to copying data form an rf...,
What can a flipper zero allow att...,
There are 6 ways to prevent breac...
3  cards
Motivational Triggers
Manipulative strategy that exploi...,
A motivational trigger that gives...,
A motivational trigger
7  cards
Impersonation
A form of impersonation where an ...,
A form of impersonation where an ...,
A form of cyber attacks where an ...
4  cards
Pretexting
Trying to scam people like they k...
1  cards
Phishing Attacks
A type of phishing attack where a...,
A phishing attack where cybercrim...,
A form of spear phishing that tar...
6  cards
Preventing Phishing Attacks
A vital tool for educating indivi...,
What are 5 key indicators of phis...
2  cards
Conducting an Anti-Phishing Campaign
What is a website you can use to ...
1  cards
Frauds and Scams
Frauds and scams are a form of what,
What is the wrongful or criminal ...,
What is the use by one person of ...
5  cards
Influence Campaigns
Inaccurate information shared uni...,
Intentional spread of false infor...
2  cards
Other Social Engineering Attacks
A social engineering attack that ...,
A social engineering attack that ...,
A social engineering attack that ...
6  cards
Viruses
What describes the specific metho...,
What is used to create a process ...,
What virus is a form of code that...
11  cards
Worms
What is a piece of malicious soft...,
What are 2 things a worm can do
2  cards
Trojans
What is malicious software that i...,
What do you call a type of trojan...
2  cards
Ransomware
What is a type of malicious softw...,
What are 4 ways you can protect y...
2  cards
Zombies and Botnets
What is a network of compromised ...,
What is a name of a compromised c...,
What attack involves lots of mach...
3  cards
Rootkits
What is a type of software design...,
What is the kernel mode what ring...,
What is the technique used to run...
4  cards
Backdoors and Logic Bombs
What is used to bypass the normal...,
What is placed by a threat actor ...,
What is an insecure coding practi...
4  cards
Keylogger
What is a piece of software or ha...,
What are the 6 ways to protect yo...
2  cards
Spyware and Bloatware
What is a type of malicious softw...,
What is any software pre installe...,
3 ways to get rid of bloatware
3  cards
Malware Attack Techniques
What describes the specific metho...,
What is used to create a process ...,
What initiates or runs other malw...
6  cards
Indications of Malware Attacks
9 common indicators of malware at...
1  cards
Data Classification
What involves setting up virtual ...,
This has no impact on the company...,
What has a minimized impact if
5  cards
Data Ownership
What is the process of identifyin...,
What role is a senior execute rol...,
What entity holds ultimate respon...
7  cards
Data States
There are 3 data states what are ...,
What data state refers to any dat...,
What are some encryption methods ...
10  cards
Data Types
What data is controlled by laws r...,
What type of confidential busines...,
What do you call creations of the...
4  cards
Data Sovereignty
What refers to the concept that d...,
What does the gdpr stand for
2  cards
Securing Data
What form of securing data involv...,
What form of securing data is a f...,
What form of securing data is a t...
7  cards
Data Loss Prevention (DLP)
What is set up to monitor the dat...,
What is a piece of software that ...,
What s a piece of software or har...
5  cards
Symmetric vs Asymmetric
This encryption and algorithm is ...,
This encryption algorithm is wher...,
What do you call something that u...
5  cards
Symmetric Alogrithms
What do you call the encryption a...,
What encryption algorithm uses th...,
What symmetric block cipher uses ...
10  cards
Asymmetric Algorithms
What does not required a shared s...,
What do you call a hash digest of...,
This is used to conduct key excha...
8  cards
Hashing
What do you call a one way crypto...,
What main algorithm for hashing c...,
What algorithm for hashing create...
8  cards
Increasing Hash Security
What hacking technique allows the...,
What hacking technique provides t...,
What hacking technique occurs whe...
6  cards
Public Key Infrastructure (PKI)
What do you call an entire system...,
Who issues digital certificates a...,
What do you call the location whe...
3  cards
Digital Certificates
This type of certificate allows a...,
This type of certificate specifie...,
This type of certificate only req...
16  cards
Blockchain
What do you call a shared immutab...,
What do you call a record keeping...,
These are self executing contract...
4  cards
Encryption Tools
What is the dedicated microcontro...,
What is the physical device that ...,
What is the integrated approach f...
4  cards
Obfuscation
This is called covered writing an...,
This is a transformative techniqu...,
This is used to protect data by e...
3  cards
Cryptographic Attacks
What are techniques and stratiges...,
What aims to force a system into ...,
What aims to find two different i...
7  cards
Risk Assessment Frequency
What is the regularity with which...,
What are the 4 main types of freq...,
What is the frequency that is con...
6  cards
Risk Identification
What is it called when you recogn...,
What is the process that involves...,
What represents the maximum accep...
6  cards
Risk Register
0  cards

More about
comptia security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Mark Garcia's CompTia Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

(3) CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 18 learners
Decks: Security Overview, Malware, Malware Infections, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
ITI581: Cyber Security Fundamentals
  • 7 decks
  • 272 flashcards
  • 9 learners
Decks: Topic 1 Network And Security Basics, Topic 2 Attack Types, Topic 3 Threats To System Security, And more!
Make Flashcards