CertNova
Menu
<- Back to glossary

CompTIA Security+ (SY0-701) glossary

Terms selected for CompTIA Security+ (SY0-701) based on common objective language and practice focus.

AES

Advanced Encryption Standard used to protect data confidentiality.

Read full term ->

Anti-malware

Security software designed to detect, block, and remove malicious code.

Read full term ->

Authentication

Process of verifying a user or system identity.

Read full term ->

Authorization

Process of granting permissions after identity is authenticated.

Read full term ->

Brute-force Attack

Attack method that repeatedly attempts many credential combinations.

Read full term ->

Change Management

A systematic approach to dealing with the transition or transformation of an organization's goals, processes, or technologies.

Read full term ->

Data Encryption

Data encryption involves converting data into a coded format to prevent unauthorized access and ensure confidentiality.

Read full term ->

EDR

Endpoint Detection and Response platform for endpoint telemetry and threat response.

Read full term ->

Host Firewall

Software firewall running on an endpoint to filter inbound and outbound traffic.

Read full term ->

Incident Response

Incident response is the process of identifying, managing, and mitigating security incidents to minimize their impact on an organization.

Read full term ->

Least Privilege

A security principle that restricts user access rights to the minimum necessary to perform their job functions.

Read full term ->

Multi-Factor Authentication (MFA)

MFA is a security process that requires users to provide multiple forms of identification before granting access to resources.

Read full term ->

Patch Management

Patch management is the process of acquiring, testing, and installing patches to update software and fix vulnerabilities.

Read full term ->

Phishing

A cyber attack method where attackers impersonate legitimate entities to trick individuals into providing sensitive information.

Read full term ->

Principle of Least Functionality

Security approach that disables unnecessary services, ports, and software.

Read full term ->

Ransomware

A type of malicious software that encrypts a victim's data and demands payment for the decryption key.

Read full term ->

Single Sign-On (SSO)

Authentication model allowing users to access multiple services with one login session.

Read full term ->

Social Engineering

Manipulation techniques that exploit human psychology to trick individuals into revealing sensitive information or performing insecure actions.

Read full term ->

Cloud Access Security Broker (CASB)

A CASB is a security policy enforcement point positioned between cloud service consumers and providers to apply enterprise security policies as cloud-based resources are accessed.

Read full term ->

IAM

IAM (Identity and Access Management) is a framework of policies and technologies for ensuring that the right individuals have access to the right resources on Google Cloud.

Read full term ->

Shared Responsibility Model

The shared responsibility model outlines the division of responsibilities between cloud providers and customers, where providers manage the infrastructure and customers manage their data and applications.

Read full term ->

Supply Chain Risk

Security risk introduced through vendors, software components, or service providers.

Read full term ->

Vulnerability Management

Continuous process of identifying, evaluating, prioritizing, and remediating security weaknesses in systems and software.

Read full term ->

Encryption

The process of converting information or data into a code to prevent unauthorized access.

Read full term ->

iptables

Legacy Linux packet filtering framework for firewall rule management.

Read full term ->

LDAP

Directory access protocol used for querying and managing identity directory services.

Read full term ->

PAM

Pluggable Authentication Modules framework for Linux authentication policy.

Read full term ->

SELinux

Mandatory access control framework enforcing security policy labels on Linux.

Read full term ->

CIA Triad

The CIA Triad is a model designed to guide policies for information security within an organization, focusing on confidentiality, integrity, and availability.

Read full term ->

Content Filtering

Policy-based control that blocks or allows traffic based on content categories or rules.

Read full term ->

DNS Poisoning

Attack where DNS records are altered to redirect users to malicious destinations.

Read full term ->

Geofencing

Policy control that restricts access based on geographic location.

Read full term ->

Honeypot

Decoy system designed to attract and study attacker behavior.

Read full term ->

HTTPS

HTTP secured by TLS to protect web traffic confidentiality and integrity.

Read full term ->

IDS

Intrusion Detection System that monitors traffic and alerts on suspicious behavior.

Read full term ->

IPS

Intrusion Prevention System that can actively block malicious traffic.

Read full term ->

NAC

Network Access Control evaluates device posture and identity before granting network access.

Read full term ->

PKI

Public Key Infrastructure for issuing, managing, and validating certificates.

Read full term ->

TACACS+

AAA protocol commonly used for administrative access to network devices.

Read full term ->

AAA Concepts

AAA stands for Authentication, Authorization, and Accounting, which are the core components of network security.

Read full term ->

Access Control Models

Frameworks that define how access to resources is granted including discretionary (DAC), mandatory (MAC), and role-based (RBAC) models.

Read full term ->

Accounting (AAA)

Security logging component of AAA that tracks user actions and resource use.

Read full term ->

Alerting and Monitoring

Alerting and monitoring involve observing systems for security events and generating alerts when suspicious activity is detected.

Read full term ->

Architecture Models

Architecture models define the structure of IT systems, including on-premises, cloud, and IoT environments.

Read full term ->

Asset Management

Asset management involves tracking and managing an organization's IT assets throughout their lifecycle.

Read full term ->

Attack Surface

Total set of entry points where attackers can attempt to compromise systems.

Read full term ->

Attack Surfaces

An attack surface is the total sum of the vulnerabilities in a system that are accessible to an attacker.

Read full term ->

Attestation

Formal declaration that controls or processes meet stated security requirements.

Read full term ->

Audits and Assessments

Audits and assessments are evaluations conducted to ensure that security controls are effective and compliant with policies and regulations.

Read full term ->

Automation and Orchestration

Automation and orchestration involve using technology to perform tasks with minimal human intervention, improving efficiency and consistency.

Read full term ->

Baselining

Establishing normal system or network behavior as a reference for anomaly detection.

Read full term ->

Blockchain

Blockchain is a distributed ledger technology that records transactions across many computers in a way that ensures the data cannot be altered retroactively.

Read full term ->

Business Email Compromise (BEC)

Social engineering fraud where attackers impersonate trusted parties via email.

Read full term ->

Business Impact

Business impact refers to the effect that a security incident or change can have on an organization's operations and objectives.

Read full term ->

Business Impact Analysis (BIA)

Process that identifies critical business functions and the impact of disruptions.

Read full term ->

Certificate Authority (CA)

Trusted entity that issues and signs digital certificates.

Read full term ->

Compensating Control

Alternative security measure used when a primary control is not feasible.

Read full term ->

Containment

Incident response phase focused on limiting attacker movement and damage.

Read full term ->

Corrective Control

Corrective controls are actions taken to restore systems and data after a security incident has occurred.

Read full term ->

Correlation Rule

SIEM logic that links multiple events to detect suspicious activity patterns.

Read full term ->

Credential Stuffing

Credential stuffing is an attack where stolen account credentials are used to gain unauthorized access to user accounts on multiple systems.

Read full term ->

Cross-Site Request Forgery (CSRF)

Attack that tricks authenticated users into performing unintended actions.

Read full term ->

Cross-Site Scripting (XSS)

Web vulnerability where malicious scripts execute in user browsers.

Read full term ->

CVSS

Common Vulnerability Scoring System used to rate vulnerability severity.

Read full term ->

Data Classification

Process of categorizing data by sensitivity level to determine appropriate handling, storage, and protection controls.

Read full term ->

Data Loss Prevention (DLP)

Controls that monitor and prevent unauthorized data exfiltration.

Read full term ->

Deception Techniques

Deception techniques involve creating decoy systems and data to mislead attackers and gather intelligence on their methods.

Read full term ->

Deception Technology

Security approach using decoys and traps to detect attacker activity.

Read full term ->

Detective Control

Detective controls are mechanisms designed to identify and alert to security incidents after they have occurred.

Read full term ->

Deterrent Control

Control intended to discourage malicious behavior before it occurs.

Read full term ->

Digital Signature

Cryptographic proof of message origin and integrity.

Read full term ->

Directive Control

Directive controls are policies and procedures that guide how security measures should be implemented and maintained.

Read full term ->

Enterprise Defenses

Enterprise defenses are security measures implemented to protect an organization's IT infrastructure from threats.

Read full term ->

Enterprise Infrastructure

Enterprise infrastructure encompasses the IT resources and systems that support an organization's operations and services.

Read full term ->

Eradication

Incident response phase where malicious artifacts and persistence are removed.

Read full term ->

Chain of Custody

Documented timeline showing evidence handling from collection to analysis.

Read full term ->

Forensic Imaging

Bit-level copy of storage media used for digital investigations.

Read full term ->

Hashing

One-way transformation of input data into fixed-length digest values.

Read full term ->

Identity and Access Management (IAM)

Framework of policies and technologies that ensures the right individuals access the right resources at the right times for the right reasons.

Read full term ->

Incident Response Process

The incident response process is a structured approach to handling and managing security incidents.

Read full term ->

Indicator of Compromise (IOC)

Forensic artifact suggesting a system may be compromised.

Read full term ->

Security KPI

Key performance indicator measuring effectiveness of security operations.

Read full term ->

Least Common Mechanism

This principle advises minimizing the sharing of mechanisms among users to reduce the risk of unintended interactions.

Read full term ->

Logs and Investigations

Logs are records of events that occur within an IT environment, used in investigations to analyze and understand security incidents.

Read full term ->

Malicious Activities

Malicious activities are actions taken by threat actors to compromise, damage, or disrupt systems and data.

Read full term ->

Managerial Control

Managerial controls involve policies and procedures that govern an organization's security practices and manage risk.

Read full term ->

Mitigation Techniques

Mitigation techniques are strategies implemented to reduce the impact or likelihood of a security threat.

Read full term ->

MITRE ATT&CK

A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Read full term ->

Non-repudiation

A security principle that ensures that a party in a communication cannot deny the authenticity of their signature or the sending of a message.

Read full term ->

Obfuscation

Obfuscation is the practice of making data unintelligible or confusing to hide its meaning.

Read full term ->

Operational Control

Operational controls are procedures and practices that are implemented to ensure day-to-day security operations are effective.

Read full term ->

OWASP Testing Guide

Methodology guidance for testing web applications for security weaknesses.

Read full term ->

Pass-the-Hash

Pass-the-hash is an attack method where an attacker uses a hashed password to authenticate as a user without knowing the actual password.

Read full term ->

Physical Control

Physical controls are security measures that prevent unauthorized physical access to facilities and equipment.

Read full term ->

Playbook

Documented response procedure for specific incident types.

Read full term ->

Preventive Control

Preventive controls are measures taken to avoid security incidents by stopping threats before they occur.

Read full term ->

Resilience and Recovery

Resilience and recovery refer to the ability of an organization to withstand and recover from security incidents and disruptions.

Read full term ->

Risk Management

Risk management is the process of identifying, assessing, and prioritizing risks to minimize their impact on an organization.

Read full term ->

Risk Register

A tool used in risk management to document potential risks and actions to manage them.

Read full term ->

Risk Treatment

Decision process to mitigate, transfer, avoid, or accept identified risks.

Read full term ->

Salting

Adding random data to passwords before hashing to resist rainbow table attacks.

Read full term ->

SAML

Security Assertion Markup Language standard used for exchanging authentication and authorization data.

Read full term ->

Secure Baselines

Secure baselines are predefined configurations that ensure systems are set up in a secure manner.

Read full term ->

Security Awareness

Programs and activities that educate users about security threats, policies, and their role in protecting organizational assets.

Read full term ->

Security Awareness and Training

Security awareness and training programs educate employees about security policies, procedures, and best practices to reduce human error and enhance organizational security.

Read full term ->

Security Compliance

Security compliance involves adhering to laws, regulations, and standards that govern the protection of information.

Read full term ->

Security Governance

Set of policies, roles, and processes that ensure security objectives align with business goals and regulatory requirements.

Read full term ->

SIEM

Security Information and Event Management platform for log aggregation and correlation.

Read full term ->

SQL Injection

Attack that inserts malicious SQL into application input to manipulate database queries.

Read full term ->

Federated Identity

Trust model where one identity provider authenticates users across separate systems.

Read full term ->

Technical Control

Technical controls are security measures implemented through technology to protect systems and data, such as firewalls and antivirus software.

Read full term ->

Third-Party Risk

Third-party risk refers to the potential threats and vulnerabilities introduced by external vendors and partners.

Read full term ->

Threat Actors

Individuals or groups that pose a threat to cybersecurity, often motivated by financial gain, espionage, or disruption.

Read full term ->

Threat Hunting

Proactive search for hidden threats that bypassed automated detection.

Read full term ->

Threat Intelligence

Contextual information about threats used to improve detection and decision-making.

Read full term ->

Threat Modeling

Threat modeling is a process used to identify, communicate, and understand threats and mitigations within the context of protecting something of value.

Read full term ->

Threat Vectors

Threat vectors are the paths or means by which an attacker can gain access to a system or network.

Read full term ->

Tokenization

Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.

Read full term ->

Triage

Initial analysis and prioritization of alerts or incidents.

Read full term ->

TTP

Tactics, techniques, and procedures associated with adversary behavior.

Read full term ->

Version Control

Version control is a system that records changes to a file or set of files over time so that specific versions can be recalled later.

Read full term ->

Vulnerability Categories

Vulnerability categories classify weaknesses in systems, such as application, hardware, and cloud vulnerabilities.

Read full term ->

Vulnerability Scanning

Automated process of probing systems for known security weaknesses and misconfigurations to prioritize remediation efforts.

Read full term ->

WAF

Web Application Firewall that inspects and filters HTTP traffic to protect web apps.

Read full term ->

XDR

Extended Detection and Response platform that correlates telemetry across multiple security layers.

Read full term ->

Zero Trust

A security model that assumes no implicit trust is granted to systems or users, requiring verification at every access point.

Read full term ->
Start practice for SY0-701