Learn Security (CompTIA A+) with Interactive Flashcards
Master key concepts in Security through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.
Authentication
Authentication is a process that verifies the identity of a user, device or system. It confirms that a user or system is who they claim to be, and is crucial for maintaining security within a network. Authentication can use multiple factors, including something the user knows (e.g. password), something the user possesses (e.g. security token), or something the user is (e.g. biometric data like a fingerprint). Multi-factor authentication is considered highly secure as it combines different factors, making it difficult for an unauthorized person to breach the system.
Cryptography
Cryptography is a technique used to secure and protect data from unauthorized access and tampering. It involves encryption and decryption processes, which converts data into unreadable formats (cipher-text) and back to the original format (plain-text) respectively. Cryptography can protect data in transit or at rest, and includes symmetric key encryption, asymmetric key encryption, as well as different hashing algorithms for data integrity. In addition to encryption, cryptography is also used for digital signatures, authentication, and ensuring data confidentiality and integrity.
Firewalls
Firewalls are security mechanisms that protect networks and systems from unauthorized access and malicious activity. They monitor incoming and outgoing network traffic and determine whether it should be allowed or blocked, based on pre-defined rules and policies. Firewalls can be hardware or software-based, and are often considered the first line of defense in network security. They can provide various protection levels, such as stateful packet inspection, application-level gateways, or network address translation. They are essential in securing both personal and organizational networks from cyber threats.
Malware prevention
Malware prevention involves implementing measures to protect a system or network from malicious software. Malware, including viruses, worms, Trojans, ransomware, and spyware, can compromise the confidentiality, integrity, and availability of data, causing significant damage to the system and user. Effective malware prevention includes the deployment of antivirus software, anti-spyware software, regular updates to operating systems and applications, security patches, user awareness training, email filtering, and application control. These measures can limit malware infections and their potential impact.
Physical security
Physical security refers to the protection of IT equipment and infrastructure from physical threats such as theft, vandalism, environmental disasters, and unauthorized access. Physical security measures include restricting access to sensitive areas, using locked server rooms, implementing surveillance systems like CCTV cameras, and employing security personnel to monitor and report on-site incidents. Effective physical security is essential for organizations to prevent data breaches, equipment theft, and other risks that can compromise their information systems and operations.
Access Control
Access control is a security technique that determines and enforces who can access specific resources to protect sensitive information and systems. It manages access permissions, ensuring that users and devices get the appropriate level of access required to perform their tasks. Access control models are broadly classified into three types: Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC). MAC enforces access based on security classifications, DAC allows users to set permissions for other users, and RBAC assigns permissions to roles and users indirectly through membership in these roles.
Intrusion Detection and Prevention System (IDPS)
An Intrusion Detection and Prevention System (IDPS) is designed to monitor network traffic, identify potential threats, and take proactive measures to prevent or mitigate attacks. IDPS can be classified into Network-based (NIDPS) and Host-based (HIDPS) systems. NIDPS monitors traffic at the network level and identifies signs of an attack, while HIDPS examines a host's logs, processes, and activities to detect intrusions. Both systems create alerts and execute predefined responses when an attack is detected. This can help protect assets, minimize damage, and facilitate the recovery process after an attack has occurred.
Virtual Private Network (VPN)
A Virtual Private Network (VPN) is a technology that enables secure communication over an unsecured network by encrypting data and tunneling it through remote servers. VPNs can be useful for businesses to establish secure connections between remote employees or offices and a central server. Endpoints are authenticated, and data is encrypted to prevent unauthorized access or eavesdropping. VPNs can also protect users' privacy by masking their IP addresses and location, as well as bypass geo-restrictions imposed by certain websites or services. Some common VPN protocols include OpenVPN, L2TP/IPSec, and IKEv2.
Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA) is an additional layer of security that requires users to provide two separate factors to verify their identity during the authentication process. In contrast to single-factor authentication, which relies solely on a username and password, 2FA combines something the user knows (e.g., a password) with something the user has (e.g., a physical token, mobile device, or biometric characteristic). This extra layer of authentication makes it more difficult for attackers to gain unauthorized access to an account or device. Common 2FA methods include SMS-based codes, authentication apps, hardware tokens, and biometric identifiers such as fingerprints or facial recognition.
Security Patch Management
Security Patch Management is the process of identifying, acquiring, testing, and deploying software updates, which are also known as patches, to fix known vulnerabilities or improve system performance. Timely patching is essential to protect against potential exploits and maintain system integrity. Patch management generally involves scanning systems for known vulnerabilities, prioritizing patches based on risk assessment, testing patches in a controlled environment, deploying patches to the systems, and verifying their successful installation. Regular patch maintenance prevents security vulnerabilities from being exploited by attackers, which helps ensure the confidentiality, integrity, and availability of critical systems and data.
Go Premium
CompTIA A+ Preparation Package (2024)
- 4902 Superior-grade CompTIA A+ practice questions.
- Accelerated Mastery: Deep dive into critical topics to fast-track your mastery.
- Unlock Effortless CompTIA A+ preparation: 5 full exams.
- 100% Satisfaction Guaranteed: Full refund with no questions if unsatisfied.
- Bonus: If you upgrade now you get upgraded access to all courses
- Risk-Free Decision: Start with a 7-day free trial - get premium features at no cost!