This class was created by Brainscape user Luis Lopez. Visit their profile to learn more about the creator.

Decks in this class (87)

Threat Actor Motivations
What are the threat actors intent 1,
What are the threat actors motiva...,
What is the motivation for data e...
12  cards
Hacktivists
What is a hacktivist 1,
What is hacktivism 2,
What techniques do hacktivists use 3
6  cards
Organized Crime
What are organized cybercrime gro...,
What types of advanced hacking te...,
What types of crimes would they do 3
4  cards
Unskilled Attackers
What is an unskilled attacker 1,
Are they a threat 2,
How do these unskilled attackers ...
3  cards
Nation-State Actor
What is a nation state actor 1,
What is a false flag attack 2,
What are the types of techniques ...
5  cards
Insider Threats
What is an insider threat 1,
What are the various forms of ins...,
What would be their motivations 3
3  cards
Shadow IT
What is shadow it 1,
Why does shadow it exist 2,
What is bring your own devices by...
3  cards
Threat Vectors and Attack Surfaces
What is a threat vector 1,
What is an attack surface 2,
What are the different types of t...
11  cards
Outsmarting Threat Actors
What are tactics techniques and p...,
What are deceptive and disruption...,
What are honeypots 3
11  cards
Physical Security
What is physical security 1
1  cards
Fencing and Bollards
What is a fence 1,
What are bollards 2,
What is fencing more suited for 3
4  cards
Attacking with Brute Force
What is brute force 1,
What is forcible entry 2,
What occurs when tampering with s...
5  cards
Surveillance Systems
What is a surveillance system 1,
What does surveillance comprise of 2,
What can security cameras include 3
4  cards
Bypassing Surveillance Systems
What are different methods used b...,
What occurs in visual obstruction 2,
What occurs in blinding sensors a...
7  cards
Access Control Vestibules
What are access control vestibules 1,
What do access control vestibules...,
What is piggybacking 3
5  cards
Door Locks
What are door locks 1,
What is false acceptance rate far 2,
What is false rejection rate frr 3
4  cards
Access Badge Cloning
What is access badge cloning 1,
What is step 1 of cloning an acce...,
What is step 2 of cloning an acce...
7  cards
Social Engineering
What is social engineering 1
1  cards
Motivational Triggers
What are the 6 main types of moti...,
What does the motivational trigge...,
What does the motivational trigge...
7  cards
Impersonation
What is impersonation 1,
What is brand impersonation 2,
What is typosqatting 3
5  cards
Pretexting
What is pretexting 1,
How to prevent pretexting 2
2  cards
Phishing Attacks
What is phishing 1,
What is spear phishing 2,
What is whaling 3
6  cards
Preventing Phishing Attacks
What is an anti phishing campaign 1,
What are commonly used indicators...,
What is urgency 3
7  cards
Frauds and Scams
What is fraud 1,
What is identity fraud and identi...,
What is the difference between id...
5  cards
Influence Campaigns
What are influence campaigns 1,
What is misinformation 2,
What is disinformation 3
3  cards
Other Social Engineering Attacks
What is diversion theft 1,
What are hoaxes 2,
How to prevent hoaxes 3
13  cards
MALWARE
What is malware 1,
What is a threat vector 2,
What is an attack vector 3
3  cards
Viruses
What is a computer virus 1,
What is a boot sector virus 2,
What is a macro virus 3
11  cards
Worms
What is a worm 1,
Why are worms dangerous 2,
What are worms known for 3
3  cards
Trojans
What is a trojan 1,
What is a remote access trojan rat 2,
How are trojans used 3
3  cards
Ransomware
What is ransomware 1,
How can we protect ourselves and ...,
What should you do if you find yo...
3  cards
Zombies and Botnets
What is a botnet 1,
What is a zombie 2,
What is a command and control node 3
7  cards
Rootkits
What is a rootkit 1,
What does the administrative acco...,
What is a technique used by rootk...
12  cards
Backdoors and Logic Bombs
What is a backdoor 1,
What is a backdoor used for 2,
What is an easter egg 3
4  cards
Keylogger
What is a keylogger 1,
What are software keyloggers 2,
What are hardware keyloggers 3
3  cards
Spyware and Bloatware
What is spyware 1,
How can spyware get installed on ...,
How to protect against sypware 3
6  cards
Malware Attack Techniques
What is a malware exploitation te...,
What does fileless malware do 2,
How does this modern malware work 3
12  cards
Indications of Malware Attacks
What are account lockouts 1,
What is concurrent session utiliz...,
What is blocked content 3
9  cards
DATA PROTECTION
What is data protection 1
1  cards
Data Classifications
What is data classification 1,
What is sensitive data 2,
What is the importance of data cl...
15  cards
Data Ownership
What is data ownership 1,
What is a data owner 2,
What is a data controller 3
9  cards
Data States
What is data at rest 1,
What are transport of encryption ...,
What is ssl secure sockets layer ...
9  cards
Data Types
What is regulated data 1,
What is pii personal identificati...,
What is phi protected health info...
5  cards
Securing Data
What are geographic restrictions ...,
What is encryption 2,
What is hashing 3
8  cards
CRYPTOGRAPHIC SOLUTIONS
What is cryptography 1,
What is encryption 2,
What are the three states of data 3
8  cards
Symmetric vs Asymmetric
What is a symmetric algorithm pri...,
What is an asymmetric algorithm p...,
What is hybird implementation 3
5  cards
Symmetric Algorithms
What is data encryption standard ...,
What is triple des 3des 2,
What is the international data en...
10  cards
Asymmetric Algorithms
What is a digital signature 1,
What is diffie hellman dh 2,
What is rsa 3
4  cards
RISK MANAGEMENT
What is risk management 1
1  cards
Risk Assessment Frequency
What is risk assessment frequency 1,
What are the four main types of r...,
What are ad hoc risk assessments 3
6  cards
Risk Identification
What is risk identification 1,
What are the techniques for risk ...,
What is business impact analysis 3
7  cards
Risk Register
What is risk management 1,
What is risk register 2,
What are the components of risk r...
14  cards
Qualitative Risk Analysis
What is qualitative risk analysis 1,
Blank 2
2  cards
Quantitative Risk Analysis
What is quantitative risk analysis 1,
What are the key components for q...,
What is the exposure factor ef 3
6  cards
Risk Management Strategies
What is risk transference 1,
What is a contract indemnity clau...,
What does risk transference speci...
6  cards
Risk Monitoring and Reporting
What is risk monitoring 1,
What is residual risk 2,
What is a control risk 3
9  cards
THIRD-PARTY VENDOR RISKS
What are third party vendor risks 1
1  cards
Supply Chain Risks
How can hardware manufacturers be...,
How can secondary aftermarket sou...,
How can software developers provi...
5  cards
Supply Chain Attacks
What is a supply chain attack 1,
What is the chips act of 2022 2,
What is a semiconductor 3
8  cards
Vendor Assessment
What are vendor assessments 1,
What are the entities in vendor a...,
What are vendors 3
9  cards
Vendor Selection and Monitoring
What is due diligence 1,
What are vendor questionaires 2,
What are rules of engagement 3
5  cards
Contracts and Agreements
What is a basic contract 1,
What is a service level agreement...,
What is a memorandum of agreement...
8  cards
GOVERNANCE AND COMPLIANCE
What is governance 1,
What is compliance 2
2  cards
Governance
What is the grc triad 1,
What is governance 2,
What is the purpose of governance 3
10  cards
Governance Structures
What is organizational governance 1,
What are boards or directors 2,
What are committees 3
6  cards
Policies
What is an acceptable use policy ...,
What are information security pol...,
What is a business continuity pol...
7  cards
Standards
What are standards 1,
What are password standards 2,
What are access control standards 3
5  cards
Procedures
What are procedures 1,
What is change management 2,
What is an onboarding procedure 3
5  cards
Governance Considerations
What are regulatory considerations 1,
What are legal considerations 2,
What are industry considerations 3
7  cards
Compliance
What is compliance 1,
What is compliance reporting 2,
What is internal compliance repor...
12  cards
Non-compliance Consequences
What are fines 1,
What are sanctions 2,
What is reputational damage 3
5  cards
ASSET AND CHANGE MANAGEMENT
What is asset management 1,
What is change management 2
2  cards
Acquisition and Procurement
What is acquisition 1,
What is procurement 2,
What is a company credit card use...
5  cards
Mobile Asset Deployments
What is byod bring your own device 1,
What is cope corporate owned pers...,
What is a cyod choose your own de...
3  cards
Asset Management
What is asset monitoring 1,
What is asset tracking 2,
What is enumeration 3
6  cards
Asset Disposal and Decommissioning
What is asset disposal and decomm...,
What is nist special publication ...,
What is sanitization 3
12  cards
Change Management
What is change management 1,
What is the change advisory board...,
What is a change owner 3
5  cards
Change Management Processes
What is preparation 1,
What is a vision for change 2,
What is verification 3
6  cards
Technical Implications of Changes
What is an allow list 1,
What is a deny list 2,
What is a legacy application 3
3  cards
Documenting Changes
What do documenting changes do 1,
What is version control 2
2  cards
AUDITS AND ASSESSMENTS
What are audits 1,
What is an internal audit 2,
What is an external audit 3
5  cards
Internal Audits and Assessments
What are internal audits 1,
What does compliance do 2,
What is an audit committee 3
10  cards
Performing an Internal Assessment
What is an internal assessment 1,
What is the mcit cybersecurity se...,
What is the overview of the check...
3  cards
External Audits and Assessments
What is an external audit 1,
What is an external assessment 2,
What is regulatory compliance 3
5  cards
Penetration Testing
What is penetration testing 1,
What is physical penetration test...,
What is an offensive penetration ...
5  cards
Reconnaissance in Pentesting
What is reconnaissance 1,
What is active reconnaissance 2,
What is passive reconnaissance 3
6  cards
Attestation of Findings
What is attestation 1,
What is software attestation 2,
What is hardware attestation 3
6  cards

More about
CompTIA Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Luis Lopez's CompTIA Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 104 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 770 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!