This class was created by Brainscape user Sean Shirley. Visit their profile to learn more about the creator.

Decks in this class (41)

Basics and fundamentals
What is the cia triad,
Information has not been disclose...,
Information has not been modified...
8  cards
General Security threats
Short hand term for malicious sof...,
Occurs when access to computer re...,
Occurs when a computer crashes or...
4  cards
Generally Mitigating Threats
Alarm systems locks surveillance ...,
Smart cards encryption access con...,
Policies procedures security awar...
3  cards
Types of Hackers and Threat Actors
Non malicious hackers who attempt...,
Malicious hackers who break into ...,
Hackers without any affiliation t...
9  cards
Threat intelligence and Sources
O property of an intelligence sou...,
Property of an intelligence sourc...,
Property of an intelligence sourc...
8  cards
Threat Hunting
0  cards
Attack Frameworks
0  cards
Malware
Software designed to infiltrate a...,
Malicious code that runs on a mac...,
Viruses are stored in the first s...
20  cards
Malware Infections
Method used by an attacker to acc...,
Method used by an attacker to gai...,
Malware is placed on a website th...
8  cards
Malware Exploitation
Malware designed to install or ru...,
A piece of code that connects to ...,
Any lightweight code designed to ...
5  cards
Security Applications and Devices
0  cards
Mobile Device Security
Integrated circuit that securely ...,
Allows two phones to utilize the ...,
Sending of unsolicited messages t...
4  cards
Hardening
Act of configuring an operating s...,
Process of configuring workstatio...,
Only applications that are on the...
15  cards
Supply Chain Assessment
A legal principle identifying a s...,
A microprocessor manufacturing ut...,
The process of ensuring that hard...
21  cards
Virtualization
Complete platform designed to rep...,
Designed to only run a single pro...,
Manages the distribution of the p...
6  cards
Application Security
Text files placed on a client s c...,
Also known as flash cookies they ...,
Smaller browser extensions and pl...
5  cards
Secure Software Development
Occurs when a tester is not provi...,
Occurs when a tester is provided ...,
Provides control over what the ap...
21  cards
Network Design
Used to explain network communica...,
Represents the actual network cab...,
Describes how a connection is est...
34  cards
Perimeter Security
Security devices focused on the b...,
O firewalls screen traffic betwee...,
Inspects each packet passing thro...
21  cards
Cloud Security
A way of offering on demand servi...,
Allows a cloud provider to offer ...,
A service provider makes resource...
21  cards
Workflow Orchestration
O the automation of multiple step...,
O the automation of multiple step...,
A software development method whe...
13  cards
Network Attacks
A logical communication endpoint ...,
A logical communication opening o...,
A logical communication opening c...
39  cards
Securing Networks
A user or administrator level acc...,
Occurs when a user is able to gai...,
A way of bypassing normal authent...
32  cards
Physical Security
Area between two doorways that ho...,
Relies on the physical characteri...,
Rate that a system authenticates ...
29  cards
Authentication
Use of two or more authentication...,
A password is computed from a sha...,
A password is computed from a sha...
24  cards
Access Control
Methods used to secure data and i...,
The access control policy is dete...,
An access control policy where th...
17  cards
Risk Assessments
A process used inside of risk man...,
The probability that a threat wil...,
Weaknesses in the design or imple...
35  cards
Vulnerability Management
Seeks to identify any issues in a...,
Practice of finding and mitigatin...,
Occurs when an attacker moves ont...
25  cards
Monitoring and Auditing
Network traffic is analyzed for p...,
A baseline is established and any...,
Activity is evaluated based on th...
35  cards
Cryptography
The practice and study of writing...,
Process of converting ordinary in...,
Inactive data that is archived su...
40  cards
Hashing
A one way cryptographic function ...,
Algorithm that creates a fixed le...,
Condition that occurs when two di...
18  cards
Public Key Infrastructure
An entire system of hardware soft...,
Digitally signed electronic docum...,
Standard used pki for digital cer...
17  cards
Security Protocols
A standard that provides cryptogr...,
Cryptographic protocols that prov...,
A protocol is tricked into using ...
13  cards
Planning for the worst
The individual elements objects o...,
An enclosure that provides two or...,
An unexpected increase in the amo...
39  cards
Social Engineering
Manipulates a user into revealing...,
A person who works for or with yo...,
An attempt to fraudulently obtain...
24  cards
Policies and Procedures
Defines the role of security in a...,
Provide general direction and goa...,
Address the security needs of a s...
61  cards
Incident Response Procedure
A set of procedure that an invest...,
Program consisting of the monitor...,
Process of recognizing whether an...
41  cards
File Manipulation
A command line utility for output...,
A command line utility for output...,
A command line utility for output...
22  cards
Ports
0  cards
Port Numbers
21 tcp,
22 tcp udp,
23 tcp udp
35  cards
Port definitions
Used to transfer files from host ...,
Used to remotely administer netwo...,
Unencrypted method to remotely ad...
35  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Sean Shirley's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Security +
  • 10 decks
  • 250 flashcards
  • 816 learners
Decks: Practice Test 1, Practice Test 2, Practice Test 3, And more!
Make Flashcards