CompTIA Security+ Cheat Sheet and PDF - Zero To Mastery
CompTIA Security+ Cheat Sheet and PDF - Zero To Mastery
Definitions
ACL (Access Control List) - list of rules that specifies which users or systems
are granted or denied access to a particular object or system resource.
BCP (Business Continuity Planning) - detailed strategy and set of systems for
ensuring an organization’s ability to prevent or rapidly recover from a significant
disruption to its operations. The plan is essentially a playbook for how any type of
organization—such as a private-sector company, a government agency or a
school will continue its day-to-day business during a disaster scenario or
otherwise abnormal conditions.
BDPU Guard (Bridge Protocol Data Units) - BDPU guard is a feature that
defends the layer 2 STP topology against BDPU-related threats.
BIA (Business Impact Analysis) - the BIA should identify the operational and
financial impacts resulting from the disruption of business functions and
processes.
BYOD (Bring Your Own Device) - a policy that allows employees to use their
personal devices, such as smartphones or laptops, to access company
resources.
CAC (Common Access Card) - smart card about the size of a credit card. It is
the standard identification for Active Duty United States Defense personnel.
CBC (Cipher Block Chaining) - a mode of operation for a block cipher -- one in
which a sequence of bits are encrypted as a single unit, or block, with a cipher
key applied to the entire block. Cipher block chaining uses what is known as an
initialization vector (IV) of a certain length. By using this along with a single
encryption key, organizations and individuals can safely encrypt and decrypt large
amounts of plaintext.
CER (Crossover Error Rate) - point where FAR and FRR are equal.
CSRF (Cross Site Request Forgery) - attack that forces an end user to execute
unwanted actions on a web application in which they are currently authenticated.
CSV (Comma Separated Values) - a file format used to store data in a table-like
format, with each row separated by a comma.
CYOD (Choose Your Own Device) - company has set of devices that employees
can choose to use for work.
DMZ (Demilitarized Zone) - a network segment that is isolated from the internal
network and is used to provide public-facing services, such as web servers or
email servers.
DNS (Domain Name System) - a system that translates domain names into IP
addresses.
DRP (Disaster Recovery Plan) - preparing for any type of disaster that could
occur.
EFS (Encrypting File System) - a feature in Windows that allows files and
folders to be encrypted using a user's public key. Windows' EFS feature allows
you to easily encrypt and decrypt files on your Windows NTFS drives. Once
you’ve encrypted files with this tool, other people won’t be able to access them
unless they have your password.
FDE (Full Disk Encryption) - security technique that encrypts all data stored on
a disk or storage device, including the operating system, applications, and user
data.
HIDS (Host Intrusion Detection System) - HIDS stands for host-based intrusion
detection system and represents an application that is monitoring a computer or
network for suspicious activities.
HIPAA (Health Insurance Portability And Accountability Act) - federal law that
was enacted in 1996 to protect the privacy and security of patients' personal
health information (PHI).
HSTS (HTTP Strict Transport Security) - web security policy mechanism used
to protect against protocol downgrade attacks and cookie hijacking.
HTML (Hypertext Markup Language) - is the standard markup language for
creating Web pages.
HTTP (Hypertext Transfer Protocol) - HTTP is the foundation of the World Wide
Web, and is used to load webpages using hypertext links. HTTP is an application
layer protocol designed to transfer information between networked devices and
runs on top of other layers of the network protocol stack. A typical flow over HTTP
involves a client machine making a request to a server, which then sends a
response message. HTTP uses port 80.
IoT (Internet Of Things Devices) - physical devices that are connected to the
internet and that can exchange data with each other.
MTTR (Mean Time To Repair) - average time that it takes to fix a system.
NTFS (New Technology File System) - a file system used in Windows operating
systems.
PCI DSS (Payment Card Industry Data Security Standard) - a set of security
standards for protecting credit card data.
PGP (Pretty Good Privacy) - an encryption program that provides cryptographic
privacy and authentication for data communication. PGP is used for signing,
encrypting, and decrypting texts, e-mails, files, directories, and whole disk
partitions and to increase the security of e-mail communications.
RBAC (Rule Based Access Control) - high level rules that determine how,
where and when employees can access spaces or resources.
SCP (Secure Copy Protocol) - a protocol used to securely transfer files between
two devices.
SFTP (Secure File Transfer Protocol) - a protocol used to securely transfer files
between two devices.
SHA (Secure Hash Algorithm) - SHA stands for secure hashing algorithm. SHA
is a modified version of MD5 and used for hashing data and certificates. A
hashing algorithm shortens the input data into a smaller form that cannot be
understood by using bitwise operations, modular additions, and compression
functions.
SSH (Secure Shell) - a protocol used for secure remote access to a device. Uses
Port 22.
TOTP (Time Based One Time Password) - TOTP uses a timestamp and a time-
based factor to generate the password. Specifically, TOTP calculates the
message authentication code based on the current time and a time interval
(usually 30 seconds).
TPM (Trusted Platform Module) - chip on motherboard that can be used to store
critical information such as encryption keys. TPM can be used for FDE (Full Disk
Encryption).
UBA (User Behaviour Analysis) - checks whether user activity sticks out from
their usual activity.
UDP (User Datagram Protocol) - a protocol used for sending datagrams over a
network. Connectionless.
WAP (Wireless Access Point) - network device that receives and transmits data
over WLAN.
WPA (Wi-Fi Protected Access) - a security protocol used for wireless networks.
There is WPA, WPA2, WPA3.
X.509 - a standard for public key certificates used for authentication in network
communication.