CompTIA Security+
CompTIA Security+ Certification (SY0-601) Mike Meyers and Dan Lachance
Asset - is any part of an IT infrastructure that has value
Vulnerability - is a weakness in an asset in an IT system that leaves it open to a threat
Exploit - is peace of code that takes advantage of vulnerability
Threat - is an action that a threat actor can use against a vulnerability to cause harm
An attack (exploit) that a malicious actor will use agains asset
Likelihood - is the probability of assets being damaged over time
Threat actor - is anyone or anything with the motive and resources to attack another IT infrastructure. They are sources of threats
Risk - is the likelihood of a threat actor taking advantage of vulnerability by using a threat against an IT asset
Attack vector - are pathways to gain access to restricted systems
MTBF - mean time between failures
average time between component failure
software patching
MTTF - mean time to failure
average time between non-repairable component failure
hard disk, switch, router
MTTR - time required to repair
PTA - privacy threshold assessment
first step before implementing solutions related to sensitive data
PIA - privacy impact assessment
RPO - recovery point objective
maximum tolerable amount of data loss
RTO - recovery time objective
maximum tolerable amount of downtime
BIA - business impact analysis
identifies how negative incidents will impact business processes and sensitive data
Data types and roles
Data classification assigns labesl to data to faciliate management
PII - personally indentifiable information
PHI - personal health information
Proprietary
Public
Critical
Financial
Data Privacy Standards
Data privacy and breach notification
levy fines
IP - protect intellectual property
PCI DSS - payment card industry data security standard
carholder information
GDPR - general data protection regulation
Data classification tools
metadata apply
cloud resource tagging
?
?
Data roles and responsibilities
Owner
Legal data owner
Set policies on how data will be managed
Controller
ensures data complies with applicable regulations
Processor
handles data in accordance with privacy guidelines
Custodian
data managing in allignment with data owner policies
applies data management policies
permissions
backup
DPO - data privacy officer
ensures data privacy regulation compliance with any law and regulation
Last updated